Action not permitted
Modal body text goes here.
Modal Title
Modal Body
cve-2020-25658
Vulnerability from cvelistv5
Published
2020-11-12 13:48
Modified
2024-08-04 15:40
Severity ?
EPSS score ?
Summary
It was found that python-rsa is vulnerable to Bleichenbacher timing attacks. An attacker can use this flaw via the RSA decryption API to decrypt parts of the cipher text encrypted with RSA.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | Sybren A. Stüvel | python-rsa |
Version: after 3.0 (inclusive) |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T15:40:36.903Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-25658" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/sybrenstuvel/python-rsa/issues/165" }, { "name": "FEDORA-2021-783a157adc", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2SAF67KDGSOHLVFTRDOHNEAFDRSSYIWA/" }, { "name": "FEDORA-2021-c1fef03e71", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/QY4PJWTYSOV7ZEYZVMYIF6XRU73CY6O7/" }, { "name": "FEDORA-2021-15e50503d6", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/APF364QJ2IYLPDNVFBOEJ24QP2WLVLJP/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "python-rsa", "vendor": "Sybren A. St\u00fcvel", "versions": [ { "status": "affected", "version": "after 3.0 (inclusive)" } ] } ], "descriptions": [ { "lang": "en", "value": "It was found that python-rsa is vulnerable to Bleichenbacher timing attacks. An attacker can use this flaw via the RSA decryption API to decrypt parts of the cipher text encrypted with RSA." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-385", "description": "CWE-385", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2021-09-25T00:07:41", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-25658" }, { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/sybrenstuvel/python-rsa/issues/165" }, { "name": "FEDORA-2021-783a157adc", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2SAF67KDGSOHLVFTRDOHNEAFDRSSYIWA/" }, { "name": "FEDORA-2021-c1fef03e71", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/QY4PJWTYSOV7ZEYZVMYIF6XRU73CY6O7/" }, { "name": "FEDORA-2021-15e50503d6", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/APF364QJ2IYLPDNVFBOEJ24QP2WLVLJP/" } ] } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2020-25658", "datePublished": "2020-11-12T13:48:31", "dateReserved": "2020-09-16T00:00:00", "dateUpdated": "2024-08-04T15:40:36.903Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "vulnerability-lookup:meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2020-25658\",\"sourceIdentifier\":\"secalert@redhat.com\",\"published\":\"2020-11-12T14:15:22.877\",\"lastModified\":\"2024-11-21T05:18:22.523\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"It was found that python-rsa is vulnerable to Bleichenbacher timing attacks. An attacker can use this flaw via the RSA decryption API to decrypt parts of the cipher text encrypted with RSA.\"},{\"lang\":\"es\",\"value\":\"Se detect\u00f3 que python-rsa es vulnerable a los ataques de sincronizaci\u00f3n de tipo Bleichenbacher.\u0026#xa0;Un atacante puede utilizar este fallo por medio de la API de descifrado RSA para descifrar partes del texto cifrado con RSA\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"secalert@redhat.com\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N\",\"baseScore\":7.5,\"baseSeverity\":\"HIGH\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"NONE\"},\"exploitabilityScore\":3.9,\"impactScore\":3.6},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N\",\"baseScore\":5.9,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"HIGH\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"NONE\"},\"exploitabilityScore\":2.2,\"impactScore\":3.6}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:M/Au:N/C:P/I:N/A:N\",\"baseScore\":4.3,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"MEDIUM\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"PARTIAL\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"NONE\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":8.6,\"impactScore\":2.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"secalert@redhat.com\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-385\"}]},{\"source\":\"nvd@nist.gov\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-327\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:python-rsa_project:python-rsa:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"2.1\",\"versionEndExcluding\":\"4.7\",\"matchCriteriaId\":\"55C2A199-1C5C-41AF-AE7E-F49E070ED45F\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:redhat:openstack_platform:13.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C52600BF-9E87-4CD2-91F3-685AFE478C1E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:redhat:openstack_platform:16.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D0C9F10E-F45D-4EA7-B39A-5298DDE84FCC\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:fedoraproject:fedora:33:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E460AA51-FCDA-46B9-AE97-E6676AA5E194\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A930E247-0B43-43CB-98FF-6CE7B8189835\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"80E516C0-98A4-4ADE-B69F-66A772E2BAAA\"}]}]}],\"references\":[{\"url\":\"https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-25658\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Issue Tracking\",\"Third Party Advisory\"]},{\"url\":\"https://github.com/sybrenstuvel/python-rsa/issues/165\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Exploit\",\"Issue Tracking\",\"Third Party Advisory\"]},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2SAF67KDGSOHLVFTRDOHNEAFDRSSYIWA/\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/APF364QJ2IYLPDNVFBOEJ24QP2WLVLJP/\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/QY4PJWTYSOV7ZEYZVMYIF6XRU73CY6O7/\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-25658\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Issue Tracking\",\"Third Party Advisory\"]},{\"url\":\"https://github.com/sybrenstuvel/python-rsa/issues/165\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Exploit\",\"Issue Tracking\",\"Third Party Advisory\"]},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2SAF67KDGSOHLVFTRDOHNEAFDRSSYIWA/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/APF364QJ2IYLPDNVFBOEJ24QP2WLVLJP/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/QY4PJWTYSOV7ZEYZVMYIF6XRU73CY6O7/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"}]}}" } }
gsd-2020-25658
Vulnerability from gsd
Modified
2023-12-13 01:21
Details
It was found that python-rsa is vulnerable to Bleichenbacher timing attacks. An attacker can use this flaw via the RSA decryption API to decrypt parts of the cipher text encrypted with RSA.
Aliases
Aliases
{ "GSD": { "alias": "CVE-2020-25658", "description": "It was found that python-rsa is vulnerable to Bleichenbacher timing attacks. An attacker can use this flaw via the RSA decryption API to decrypt parts of the cipher text encrypted with RSA.", "id": "GSD-2020-25658", "references": [ "https://www.suse.com/security/cve/CVE-2020-25658.html", "https://access.redhat.com/errata/RHSA-2021:0637", "https://access.redhat.com/errata/RHSA-2020:5634", "https://advisories.mageia.org/CVE-2020-25658.html", "https://access.redhat.com/errata/RHSA-2022:1716" ] }, "gsd": { "metadata": { "exploitCode": "unknown", "remediation": "unknown", "reportConfidence": "confirmed", "type": "vulnerability" }, "osvSchema": { "aliases": [ "CVE-2020-25658" ], "details": "It was found that python-rsa is vulnerable to Bleichenbacher timing attacks. An attacker can use this flaw via the RSA decryption API to decrypt parts of the cipher text encrypted with RSA.", "id": "GSD-2020-25658", "modified": "2023-12-13T01:21:57.166572Z", "schema_version": "1.4.0" } }, "namespaces": { "cve.org": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2020-25658", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "python-rsa", "version": { "version_data": [ { "version_affected": "=", "version_value": "after 3.0 (inclusive)" } ] } } ] }, "vendor_name": "Sybren A. St\u00fcvel" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "It was found that python-rsa is vulnerable to Bleichenbacher timing attacks. An attacker can use this flaw via the RSA decryption API to decrypt parts of the cipher text encrypted with RSA." } ] }, "impact": { "cvss": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "cweId": "CWE-385", "lang": "eng", "value": "CWE-385" } ] } ] }, "references": { "reference_data": [ { "name": "https://github.com/sybrenstuvel/python-rsa/issues/165", "refsource": "MISC", "url": "https://github.com/sybrenstuvel/python-rsa/issues/165" }, { "name": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-25658", "refsource": "MISC", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-25658" }, { "name": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2SAF67KDGSOHLVFTRDOHNEAFDRSSYIWA/", "refsource": "MISC", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2SAF67KDGSOHLVFTRDOHNEAFDRSSYIWA/" }, { "name": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/APF364QJ2IYLPDNVFBOEJ24QP2WLVLJP/", "refsource": "MISC", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/APF364QJ2IYLPDNVFBOEJ24QP2WLVLJP/" }, { "name": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/QY4PJWTYSOV7ZEYZVMYIF6XRU73CY6O7/", "refsource": "MISC", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/QY4PJWTYSOV7ZEYZVMYIF6XRU73CY6O7/" } ] } }, "gitlab.com": { "advisories": [ { "affected_range": "\u003e=2.1,\u003c4.7", "affected_versions": "All versions starting from 2.1 before 4.7", "cvss_v2": "AV:N/AC:M/Au:N/C:P/I:N/A:N", "cvss_v3": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", "cwe_ids": [ "CWE-1035", "CWE-327", "CWE-937" ], "date": "2021-09-25", "description": "It was found that python-rsa is vulnerable to Bleichenbacher timing attacks. An attacker can use this flaw via the RSA decryption API to decrypt parts of the cipher text encrypted with RSA.", "fixed_versions": [ "4.7" ], "identifier": "CVE-2020-25658", "identifiers": [ "CVE-2020-25658" ], "not_impacted": "All versions before 2.1, all versions starting from 4.7", "package_slug": "pypi/rsa", "pubdate": "2020-11-12", "solution": "Upgrade to version 4.7 or above.", "title": "Use of a Broken or Risky Cryptographic Algorithm", "urls": [ "https://nvd.nist.gov/vuln/detail/CVE-2020-25658", "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-25658", "https://github.com/sybrenstuvel/python-rsa/issues/165" ], "uuid": "460c371d-552b-4287-8a6d-f8138d851ceb" } ] }, "nvd.nist.gov": { "configurations": { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:python-rsa_project:python-rsa:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "4.7", "versionStartIncluding": "2.1", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:redhat:openstack_platform:16.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:redhat:openstack_platform:13.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:fedoraproject:fedora:33:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] }, "cve": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2020-25658" }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "en", "value": "It was found that python-rsa is vulnerable to Bleichenbacher timing attacks. An attacker can use this flaw via the RSA decryption API to decrypt parts of the cipher text encrypted with RSA." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "en", "value": "CWE-385" } ] } ] }, "references": { "reference_data": [ { "name": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-25658", "refsource": "CONFIRM", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-25658" }, { "name": "https://github.com/sybrenstuvel/python-rsa/issues/165", "refsource": "MISC", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/sybrenstuvel/python-rsa/issues/165" }, { "name": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/APF364QJ2IYLPDNVFBOEJ24QP2WLVLJP/", "refsource": "MISC", "tags": [], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/APF364QJ2IYLPDNVFBOEJ24QP2WLVLJP/" }, { "name": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2SAF67KDGSOHLVFTRDOHNEAFDRSSYIWA/", "refsource": "MISC", "tags": [], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2SAF67KDGSOHLVFTRDOHNEAFDRSSYIWA/" }, { "name": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/QY4PJWTYSOV7ZEYZVMYIF6XRU73CY6O7/", "refsource": "MISC", "tags": [], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/QY4PJWTYSOV7ZEYZVMYIF6XRU73CY6O7/" } ] } }, "impact": { "baseMetricV2": { "acInsufInfo": false, "cvssV2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "userInteractionRequired": false }, "baseMetricV3": { "cvssV3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 2.2, "impactScore": 3.6 } }, "lastModifiedDate": "2023-02-12T23:40Z", "publishedDate": "2020-11-12T14:15Z" } } }
SSA-455250
Vulnerability from csaf_siemens
Published
2024-04-09 00:00
Modified
2024-05-14 00:00
Summary
SSA-455250: Multiple Vulnerabilities in Palo Alto Networks Virtual NGFW on RUGGEDCOM APE1808 devices
Notes
Summary
Palo Alto Networks has published [1] information on vulnerabilities in PAN-OS. This advisory lists the related Siemens Industrial products affected by these vulnerabilities.
Siemens is preparing updates and recommends specific countermeasures for products where updates are not, or not yet available. Customers are advised to consult and implement the workarounds provided in Palo Alto Networks' upstream security notifications.
[1] https://security.paloaltonetworks.com/?version=11.0.1&product=PAN-OS
General Recommendations
As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens' operational guidelines for Industrial Security (Download:
https://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.
Additional information on Industrial Security by Siemens can be found at: https://www.siemens.com/industrialsecurity
Additional Resources
For further inquiries on security vulnerabilities in Siemens products and solutions, please contact the Siemens ProductCERT: https://www.siemens.com/cert/advisories
Terms of Use
Siemens Security Advisories are subject to the terms and conditions contained in Siemens' underlying license terms or other applicable agreements previously agreed to with Siemens (hereinafter "License Terms"). To the extent applicable to information, software or documentation made available in or through a Siemens Security Advisory, the Terms of Use of Siemens' Global Website (https://www.siemens.com/terms_of_use, hereinafter "Terms of Use"), in particular Sections 8-10 of the Terms of Use, shall apply additionally. In case of conflicts, the License Terms shall prevail over the Terms of Use.
{ "document": { "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Disclosure is not limited. (TLPv2: TLP:CLEAR)", "tlp": { "label": "WHITE" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Palo Alto Networks has published [1] information on vulnerabilities in PAN-OS. This advisory lists the related Siemens Industrial products affected by these vulnerabilities.\n\nSiemens is preparing updates and recommends specific countermeasures for products where updates are not, or not yet available. Customers are advised to consult and implement the workarounds provided in Palo Alto Networks\u0027 upstream security notifications.\n\n[1] https://security.paloaltonetworks.com/?version=11.0.1\u0026product=PAN-OS", "title": "Summary" }, { "category": "general", "text": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: \nhttps://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\nAdditional information on Industrial Security by Siemens can be found at: https://www.siemens.com/industrialsecurity", "title": "General Recommendations" }, { "category": "general", "text": "For further inquiries on security vulnerabilities in Siemens products and solutions, please contact the Siemens ProductCERT: https://www.siemens.com/cert/advisories", "title": "Additional Resources" }, { "category": "legal_disclaimer", "text": "Siemens Security Advisories are subject to the terms and conditions contained in Siemens\u0027 underlying license terms or other applicable agreements previously agreed to with Siemens (hereinafter \"License Terms\"). To the extent applicable to information, software or documentation made available in or through a Siemens Security Advisory, the Terms of Use of Siemens\u0027 Global Website (https://www.siemens.com/terms_of_use, hereinafter \"Terms of Use\"), in particular Sections 8-10 of the Terms of Use, shall apply additionally. In case of conflicts, the License Terms shall prevail over the Terms of Use.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "productcert@siemens.com", "name": "Siemens ProductCERT", "namespace": "https://www.siemens.com" }, "references": [ { "category": "self", "summary": "SSA-455250: Multiple Vulnerabilities in Palo Alto Networks Virtual NGFW on RUGGEDCOM APE1808 devices - HTML Version", "url": "https://cert-portal.siemens.com/productcert/html/ssa-455250.html" }, { "category": "self", "summary": "SSA-455250: Multiple Vulnerabilities in Palo Alto Networks Virtual NGFW on RUGGEDCOM APE1808 devices - CSAF Version", "url": "https://cert-portal.siemens.com/productcert/csaf/ssa-455250.json" }, { "category": "self", "summary": "SSA-455250: Multiple Vulnerabilities in Palo Alto Networks Virtual NGFW on RUGGEDCOM APE1808 devices - PDF Version", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-455250.pdf" }, { "category": "self", "summary": "SSA-455250: Multiple Vulnerabilities in Palo Alto Networks Virtual NGFW on RUGGEDCOM APE1808 devices - TXT Version", "url": "https://cert-portal.siemens.com/productcert/txt/ssa-455250.txt" } ], "title": "SSA-455250: Multiple Vulnerabilities in Palo Alto Networks Virtual NGFW on RUGGEDCOM APE1808 devices", "tracking": { "current_release_date": "2024-05-14T00:00:00Z", "generator": { "engine": { "name": "Siemens ProductCERT CSAF Generator", "version": "1" } }, "id": "SSA-455250", "initial_release_date": "2024-04-09T00:00:00Z", "revision_history": [ { "date": "2024-04-09T00:00:00Z", "legacy_version": "1.0", "number": "1", "summary": "Publication Date" }, { "date": "2024-05-14T00:00:00Z", "legacy_version": "1.1", "number": "2", "summary": "Added newly published upstream vulnerabilities: CVE-2017-8923, CVE-2017-9120, CVE-2020-25658, CVE-2021-21708, CVE-2021-43527, CVE-2022-1271, CVE-2022-31676, CVE-2022-3515, CVE-2022-37454, CVE-2022-47629, CVE-2023-0286, CVE-2024-3383, CVE-2024-3386, CVE-2024-3387, CVE-2024-3388, CVE-2024-3400" } ], "status": "final", "version": "2" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "RUGGEDCOM APE1808", "product_id": "1" } }, { "category": "product_version_range", "name": "All versions with Palo Alto Networks Virtual NGFW configured with support for the CHACHA20-POLY1305 algorithm or any Encrypt-then-MAC algorithms", "product": { "name": "RUGGEDCOM APE1808", "product_id": "2" } }, { "category": "product_version_range", "name": "All versions with Palo Alto Networks Virtual NGFW", "product": { "name": "RUGGEDCOM APE1808", "product_id": "3" } }, { "category": "product_version_range", "name": "All versions with Palo Alto Networks Virtual NGFW that are configured with BGP routing features enabled", "product": { "name": "RUGGEDCOM APE1808", "product_id": "4" } } ], "category": "product_name", "name": "RUGGEDCOM APE1808" } ], "category": "vendor", "name": "Siemens" } ] }, "vulnerabilities": [ { "cve": "CVE-2017-8923", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "notes": [ { "category": "summary", "text": "The zend_string_extend function in Zend/zend_string.h in PHP through 7.1.5 does not prevent changes to string objects that result in a negative length, which allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact by leveraging a script\u0027s use of .= with a long string.", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Contact customer support to receive patch and update information", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2017-8923" }, { "cve": "CVE-2017-9120", "cwe": { "id": "CWE-190", "name": "Integer Overflow or Wraparound" }, "notes": [ { "category": "summary", "text": "PHP 7.x through 7.1.5 allows remote attackers to cause a denial of service (buffer overflow and application crash) or possibly have unspecified other impact via a long string because of an Integer overflow in mysqli_real_escape_string.", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Contact customer support to receive patch and update information", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2017-9120" }, { "cve": "CVE-2020-25658", "cwe": { "id": "CWE-385", "name": "Covert Timing Channel" }, "notes": [ { "category": "summary", "text": "It was found that python-rsa is vulnerable to Bleichenbacher timing attacks. An attacker can use this flaw via the RSA decryption API to decrypt parts of the cipher text encrypted with RSA.", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Contact customer support to receive patch and update information", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2020-25658" }, { "cve": "CVE-2021-21708", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "summary", "text": "In PHP versions 7.4.x below 7.4.28, 8.0.x below 8.0.16, and 8.1.x below 8.1.3, when using filter functions with FILTER_VALIDATE_FLOAT filter and min/max limits, if the filter fails, there is a possibility to trigger use of allocated memory after free, which can result it crashes, and potentially in overwrite of other memory chunks and RCE. This issue affects: code that uses FILTER_VALIDATE_FLOAT with min/max limits.", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Contact customer support to receive patch and update information", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.2, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:L/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2021-21708" }, { "cve": "CVE-2021-43527", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "notes": [ { "category": "summary", "text": "NSS (Network Security Services) versions prior to 3.73 or 3.68.1 ESR are vulnerable to a heap overflow when handling DER-encoded DSA or RSA-PSS signatures. Applications using NSS for handling signatures encoded within CMS, S/MIME, PKCS #7, or PKCS #12 are likely to be impacted. Applications using NSS for certificate validation or other TLS, X.509, OCSP or CRL functionality may be impacted, depending on how they configure NSS. Note: This vulnerability does NOT impact Mozilla Firefox. However, email clients and PDF viewers that use NSS for signature verification, such as Thunderbird, LibreOffice, Evolution and Evince are believed to be impacted. This vulnerability affects NSS \u003c 3.73 and NSS \u003c 3.68.1.", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Contact customer support to receive patch and update information", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2021-43527" }, { "cve": "CVE-2022-1271", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "An arbitrary file write vulnerability was found in GNU gzip\u0027s zgrep utility. When zgrep is applied on the attacker\u0027s chosen file name (for example, a crafted file name), this can overwrite an attacker\u0027s content to an arbitrary attacker-selected file. This flaw occurs due to insufficient validation when processing filenames with two or more newlines where selected content and the target file names are embedded in crafted multi-line file names. This flaw allows a remote, low privileged attacker to force zgrep to write arbitrary files on the system.", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Contact customer support to receive patch and update information", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2022-1271" }, { "cve": "CVE-2022-3515", "cwe": { "id": "CWE-190", "name": "Integer Overflow or Wraparound" }, "notes": [ { "category": "summary", "text": "A vulnerability was found in the Libksba library due to an integer overflow within the CRL parser. The vulnerability can be exploited remotely for code execution on the target system by passing specially crafted data to the application, for example, a malicious S/MIME attachment.", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Contact customer support to receive patch and update information", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2022-3515" }, { "cve": "CVE-2022-31676", "cwe": { "id": "CWE-269", "name": "Improper Privilege Management" }, "notes": [ { "category": "summary", "text": "VMware Tools (12.0.0, 11.x.y and 10.x.y) contains a local privilege escalation vulnerability. A malicious actor with local non-administrative access to the Guest OS can escalate privileges as a root user in the virtual machine.", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Contact customer support to receive patch and update information", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2022-31676" }, { "cve": "CVE-2022-37454", "cwe": { "id": "CWE-190", "name": "Integer Overflow or Wraparound" }, "notes": [ { "category": "summary", "text": "The Keccak XKCP SHA-3 reference implementation before fdc6fef has an integer overflow and resultant buffer overflow that allows attackers to execute arbitrary code or eliminate expected cryptographic properties. This occurs in the sponge function interface.", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Contact customer support to receive patch and update information", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2022-37454" }, { "cve": "CVE-2022-47629", "cwe": { "id": "CWE-190", "name": "Integer Overflow or Wraparound" }, "notes": [ { "category": "summary", "text": "Libksba before 1.6.3 is prone to an integer overflow vulnerability in the CRL signature parser.", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Contact customer support to receive patch and update information", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2022-47629" }, { "cve": "CVE-2023-0286", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "There is a type confusion vulnerability relating to X.400 address processing inside an X.509 GeneralName. X.400 addresses were parsed as an ASN1_STRING but the public structure definition for GENERAL_NAME incorrectly specified the type of the x400Address field as ASN1_TYPE. This field is subsequently interpreted by the OpenSSL function GENERAL_NAME_cmp as an ASN1_TYPE rather than an ASN1_STRING. When CRL checking is enabled (i.e. the application sets the X509_V_FLAG_CRL_CHECK flag), this vulnerability may allow an attacker to pass arbitrary pointers to a memcmp call, enabling them to read memory contents or enact a denial of service. In most cases, the attack requires the attacker to provide both the certificate chain and CRL, neither of which need to have a valid signature. If the attacker only controls one of these inputs, the other input must already contain an X.400 address as a CRL distribution point, which is uncommon. As such, this vulnerability is most likely to only affect applications which have implemented their own functionality for retrieving CRLs over a network.", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Contact customer support to receive patch and update information", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2023-0286" }, { "cve": "CVE-2023-6789", "cwe": { "id": "CWE-79", "name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)" }, "notes": [ { "category": "summary", "text": "A cross-site scripting (XSS) vulnerability in Palo Alto Networks PAN-OS software enables a malicious authenticated read-write administrator to store a JavaScript payload using the web interface. Then, when viewed by a properly authenticated administrator, the JavaScript payload executes and disguises all associated actions as performed by that unsuspecting authenticated administrator.", "title": "Summary" } ], "product_status": { "known_affected": [ "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Contact customer support to receive patch and update information.", "product_ids": [ "3" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.8, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "3" ] } ], "title": "CVE-2023-6789" }, { "cve": "CVE-2023-6793", "cwe": { "id": "CWE-269", "name": "Improper Privilege Management" }, "notes": [ { "category": "summary", "text": "An improper privilege management vulnerability in Palo Alto Networks PAN-OS software enables an authenticated read-only administrator to revoke active XML API keys from the firewall and disrupt XML API usage.", "title": "Summary" } ], "product_status": { "known_affected": [ "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Contact customer support to receive patch and update information.", "product_ids": [ "3" ] } ], "scores": [ { "cvss_v3": { "baseScore": 2.7, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "3" ] } ], "title": "CVE-2023-6793" }, { "cve": "CVE-2023-38802", "cwe": { "id": "CWE-754", "name": "Improper Check for Unusual or Exceptional Conditions" }, "notes": [ { "category": "summary", "text": "FRRouting FRR 7.5.1 through 9.0 and Pica8 PICOS 4.3.3.2 allow a remote attacker to cause a denial of service via a crafted BGP update with a corrupted attribute 23 (Tunnel Encapsulation)", "title": "Summary" } ], "product_status": { "known_affected": [ "4" ] }, "remediations": [ { "category": "vendor_fix", "details": "Contact customer support to receive patch and update information.", "product_ids": [ "4" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "4" ] } ], "title": "CVE-2023-38802" }, { "cve": "CVE-2023-48795", "cwe": { "id": "CWE-222", "name": "Truncation of Security-relevant Information" }, "notes": [ { "category": "summary", "text": "The SSH transport protocol with certain OpenSSH extensions, found in OpenSSH before 9.6 and other products, allows remote attackers to bypass integrity checks such that some packets are omitted (from the extension negotiation message), and a client and server may consequently end up with a connection for which some security features have been downgraded or disabled, aka a Terrapin attack. This occurs because the SSH Binary Packet Protocol (BPP), implemented by these extensions, mishandles the handshake phase and mishandles use of sequence numbers. For example, there is an effective attack against SSH\u0027s use of ChaCha20-Poly1305 (and CBC with Encrypt-then-MAC). The bypass occurs in chacha20-poly1305@openssh.com and (if CBC is used) the -etm@openssh.com MAC algorithms. This also affects Maverick Synergy Java SSH API before 3.1.0-SNAPSHOT, Dropbear through 2022.83, Ssh before 5.1.1 in Erlang/OTP, PuTTY before 0.80, AsyncSSH before 2.14.2, golang.org/x/crypto before 0.17.0, libssh before 0.10.6, libssh2 through 1.11.0, Thorn Tech SFTP Gateway before 3.4.6, Tera Term before 5.1, Paramiko before 3.4.0, jsch before 0.2.15, SFTPGo before 2.5.6, Netgate pfSense Plus through 23.09.1, Netgate pfSense CE through 2.7.2, HPN-SSH through 18.2.0, ProFTPD before 1.3.8b (and before1.3.9rc2), ORYX CycloneSSH before 2.3.4, NetSarang XShell 7 before Build 0144, CrushFTP before 10.6.0, ConnectBot SSH library before 2.2.22, Apache MINA sshd through 2.11.0, sshj through 0.37.0, TinySSH through 20230101, trilead-ssh2 6401, the net-ssh gem 7.2.0 for Ruby, the mscdex ssh2 module before 1.15.0 for Node.js, the thrussh library before 0.35.1 for Rust, and the Russh crate before 0.40.2 for Rust; and there could be effects on Bitvise SSH through 9.31.", "title": "Summary" } ], "product_status": { "known_affected": [ "2" ] }, "remediations": [ { "category": "vendor_fix", "details": "Contact customer support to receive patch and update information", "product_ids": [ "2" ] }, { "category": "workaround", "details": "CVE-2023-48795: Customers can resolve this issue by configuring the in-use SSH profile to contain at least one cipher and at least one MAC algorithm, which removes support for CHACHA20-POLY1305 and all Encrypt-then-MAC algorithms available (ciphers with -etm in the name) in PAN-OS software. See Palo Alto Networks\u0027 upstream documentation \nhttps://security.paloaltonetworks.com/CVE-2023-48795 for additional guidance", "product_ids": [ "2" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "2" ] } ], "title": "CVE-2023-48795" }, { "cve": "CVE-2024-0008", "cwe": { "id": "CWE-613", "name": "Insufficient Session Expiration" }, "notes": [ { "category": "summary", "text": "Web sessions in the management interface in Palo Alto Networks PAN-OS software do not expire in certain situations, making it susceptible to unauthorized access.", "title": "Summary" } ], "product_status": { "known_affected": [ "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Contact customer support to receive patch and update information.", "product_ids": [ "3" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "3" ] } ], "title": "CVE-2024-0008" }, { "cve": "CVE-2024-3383", "cwe": { "id": "CWE-282", "name": "Improper Ownership Management" }, "notes": [ { "category": "summary", "text": "A vulnerability in how Palo Alto Networks PAN-OS software processes data received from Cloud Identity Engine (CIE) agents enables modification of User-ID groups. This impacts user access to network resources where users may be inappropriately denied or allowed access to resources based on your existing Security Policy rules.", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Contact customer support to receive patch and update information", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:H", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2024-3383" }, { "cve": "CVE-2024-3386", "cwe": { "id": "CWE-436", "name": "Interpretation Conflict" }, "notes": [ { "category": "summary", "text": "An incorrect string comparison vulnerability in Palo Alto Networks PAN-OS software prevents Predefined Decryption Exclusions from functioning as intended. This can cause traffic destined for domains that are not specified in Predefined Decryption Exclusions to be unintentionally excluded from decryption.", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Contact customer support to receive patch and update information", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2024-3386" }, { "cve": "CVE-2024-3387", "cwe": { "id": "CWE-326", "name": "Inadequate Encryption Strength" }, "notes": [ { "category": "summary", "text": "A weak (low bit strength) device certificate in Palo Alto Networks Panorama software enables an attacker to perform a meddler-in-the-middle (MitM) attack to capture encrypted traffic between the Panorama management server and the firewalls it manages. With sufficient computing resources, the attacker could break encrypted communication and expose sensitive information that is shared between the management server and the firewalls.", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Contact customer support to receive patch and update information", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2024-3387" }, { "cve": "CVE-2024-3388", "cwe": { "id": "CWE-269", "name": "Improper Privilege Management" }, "notes": [ { "category": "summary", "text": "A vulnerability in the GlobalProtect Gateway in Palo Alto Networks PAN-OS software enables an authenticated attacker to impersonate another user and send network packets to internal assets. However, this vulnerability does not allow the attacker to receive response packets from those internal assets.", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Contact customer support to receive patch and update information", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:N/I:L/A:N", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2024-3388" } ] }
ssa-455250
Vulnerability from csaf_siemens
Published
2024-04-09 00:00
Modified
2024-05-14 00:00
Summary
SSA-455250: Multiple Vulnerabilities in Palo Alto Networks Virtual NGFW on RUGGEDCOM APE1808 devices
Notes
Summary
Palo Alto Networks has published [1] information on vulnerabilities in PAN-OS. This advisory lists the related Siemens Industrial products affected by these vulnerabilities.
Siemens is preparing updates and recommends specific countermeasures for products where updates are not, or not yet available. Customers are advised to consult and implement the workarounds provided in Palo Alto Networks' upstream security notifications.
[1] https://security.paloaltonetworks.com/?version=11.0.1&product=PAN-OS
General Recommendations
As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens' operational guidelines for Industrial Security (Download:
https://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.
Additional information on Industrial Security by Siemens can be found at: https://www.siemens.com/industrialsecurity
Additional Resources
For further inquiries on security vulnerabilities in Siemens products and solutions, please contact the Siemens ProductCERT: https://www.siemens.com/cert/advisories
Terms of Use
Siemens Security Advisories are subject to the terms and conditions contained in Siemens' underlying license terms or other applicable agreements previously agreed to with Siemens (hereinafter "License Terms"). To the extent applicable to information, software or documentation made available in or through a Siemens Security Advisory, the Terms of Use of Siemens' Global Website (https://www.siemens.com/terms_of_use, hereinafter "Terms of Use"), in particular Sections 8-10 of the Terms of Use, shall apply additionally. In case of conflicts, the License Terms shall prevail over the Terms of Use.
{ "document": { "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Disclosure is not limited. (TLPv2: TLP:CLEAR)", "tlp": { "label": "WHITE" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Palo Alto Networks has published [1] information on vulnerabilities in PAN-OS. This advisory lists the related Siemens Industrial products affected by these vulnerabilities.\n\nSiemens is preparing updates and recommends specific countermeasures for products where updates are not, or not yet available. Customers are advised to consult and implement the workarounds provided in Palo Alto Networks\u0027 upstream security notifications.\n\n[1] https://security.paloaltonetworks.com/?version=11.0.1\u0026product=PAN-OS", "title": "Summary" }, { "category": "general", "text": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: \nhttps://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\nAdditional information on Industrial Security by Siemens can be found at: https://www.siemens.com/industrialsecurity", "title": "General Recommendations" }, { "category": "general", "text": "For further inquiries on security vulnerabilities in Siemens products and solutions, please contact the Siemens ProductCERT: https://www.siemens.com/cert/advisories", "title": "Additional Resources" }, { "category": "legal_disclaimer", "text": "Siemens Security Advisories are subject to the terms and conditions contained in Siemens\u0027 underlying license terms or other applicable agreements previously agreed to with Siemens (hereinafter \"License Terms\"). To the extent applicable to information, software or documentation made available in or through a Siemens Security Advisory, the Terms of Use of Siemens\u0027 Global Website (https://www.siemens.com/terms_of_use, hereinafter \"Terms of Use\"), in particular Sections 8-10 of the Terms of Use, shall apply additionally. In case of conflicts, the License Terms shall prevail over the Terms of Use.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "productcert@siemens.com", "name": "Siemens ProductCERT", "namespace": "https://www.siemens.com" }, "references": [ { "category": "self", "summary": "SSA-455250: Multiple Vulnerabilities in Palo Alto Networks Virtual NGFW on RUGGEDCOM APE1808 devices - HTML Version", "url": "https://cert-portal.siemens.com/productcert/html/ssa-455250.html" }, { "category": "self", "summary": "SSA-455250: Multiple Vulnerabilities in Palo Alto Networks Virtual NGFW on RUGGEDCOM APE1808 devices - CSAF Version", "url": "https://cert-portal.siemens.com/productcert/csaf/ssa-455250.json" }, { "category": "self", "summary": "SSA-455250: Multiple Vulnerabilities in Palo Alto Networks Virtual NGFW on RUGGEDCOM APE1808 devices - PDF Version", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-455250.pdf" }, { "category": "self", "summary": "SSA-455250: Multiple Vulnerabilities in Palo Alto Networks Virtual NGFW on RUGGEDCOM APE1808 devices - TXT Version", "url": "https://cert-portal.siemens.com/productcert/txt/ssa-455250.txt" } ], "title": "SSA-455250: Multiple Vulnerabilities in Palo Alto Networks Virtual NGFW on RUGGEDCOM APE1808 devices", "tracking": { "current_release_date": "2024-05-14T00:00:00Z", "generator": { "engine": { "name": "Siemens ProductCERT CSAF Generator", "version": "1" } }, "id": "SSA-455250", "initial_release_date": "2024-04-09T00:00:00Z", "revision_history": [ { "date": "2024-04-09T00:00:00Z", "legacy_version": "1.0", "number": "1", "summary": "Publication Date" }, { "date": "2024-05-14T00:00:00Z", "legacy_version": "1.1", "number": "2", "summary": "Added newly published upstream vulnerabilities: CVE-2017-8923, CVE-2017-9120, CVE-2020-25658, CVE-2021-21708, CVE-2021-43527, CVE-2022-1271, CVE-2022-31676, CVE-2022-3515, CVE-2022-37454, CVE-2022-47629, CVE-2023-0286, CVE-2024-3383, CVE-2024-3386, CVE-2024-3387, CVE-2024-3388, CVE-2024-3400" } ], "status": "final", "version": "2" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "RUGGEDCOM APE1808", "product_id": "1" } }, { "category": "product_version_range", "name": "All versions with Palo Alto Networks Virtual NGFW configured with support for the CHACHA20-POLY1305 algorithm or any Encrypt-then-MAC algorithms", "product": { "name": "RUGGEDCOM APE1808", "product_id": "2" } }, { "category": "product_version_range", "name": "All versions with Palo Alto Networks Virtual NGFW", "product": { "name": "RUGGEDCOM APE1808", "product_id": "3" } }, { "category": "product_version_range", "name": "All versions with Palo Alto Networks Virtual NGFW that are configured with BGP routing features enabled", "product": { "name": "RUGGEDCOM APE1808", "product_id": "4" } } ], "category": "product_name", "name": "RUGGEDCOM APE1808" } ], "category": "vendor", "name": "Siemens" } ] }, "vulnerabilities": [ { "cve": "CVE-2017-8923", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "notes": [ { "category": "summary", "text": "The zend_string_extend function in Zend/zend_string.h in PHP through 7.1.5 does not prevent changes to string objects that result in a negative length, which allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact by leveraging a script\u0027s use of .= with a long string.", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Contact customer support to receive patch and update information", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2017-8923" }, { "cve": "CVE-2017-9120", "cwe": { "id": "CWE-190", "name": "Integer Overflow or Wraparound" }, "notes": [ { "category": "summary", "text": "PHP 7.x through 7.1.5 allows remote attackers to cause a denial of service (buffer overflow and application crash) or possibly have unspecified other impact via a long string because of an Integer overflow in mysqli_real_escape_string.", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Contact customer support to receive patch and update information", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2017-9120" }, { "cve": "CVE-2020-25658", "cwe": { "id": "CWE-385", "name": "Covert Timing Channel" }, "notes": [ { "category": "summary", "text": "It was found that python-rsa is vulnerable to Bleichenbacher timing attacks. An attacker can use this flaw via the RSA decryption API to decrypt parts of the cipher text encrypted with RSA.", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Contact customer support to receive patch and update information", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2020-25658" }, { "cve": "CVE-2021-21708", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "summary", "text": "In PHP versions 7.4.x below 7.4.28, 8.0.x below 8.0.16, and 8.1.x below 8.1.3, when using filter functions with FILTER_VALIDATE_FLOAT filter and min/max limits, if the filter fails, there is a possibility to trigger use of allocated memory after free, which can result it crashes, and potentially in overwrite of other memory chunks and RCE. This issue affects: code that uses FILTER_VALIDATE_FLOAT with min/max limits.", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Contact customer support to receive patch and update information", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.2, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:L/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2021-21708" }, { "cve": "CVE-2021-43527", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "notes": [ { "category": "summary", "text": "NSS (Network Security Services) versions prior to 3.73 or 3.68.1 ESR are vulnerable to a heap overflow when handling DER-encoded DSA or RSA-PSS signatures. Applications using NSS for handling signatures encoded within CMS, S/MIME, PKCS #7, or PKCS #12 are likely to be impacted. Applications using NSS for certificate validation or other TLS, X.509, OCSP or CRL functionality may be impacted, depending on how they configure NSS. Note: This vulnerability does NOT impact Mozilla Firefox. However, email clients and PDF viewers that use NSS for signature verification, such as Thunderbird, LibreOffice, Evolution and Evince are believed to be impacted. This vulnerability affects NSS \u003c 3.73 and NSS \u003c 3.68.1.", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Contact customer support to receive patch and update information", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2021-43527" }, { "cve": "CVE-2022-1271", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "An arbitrary file write vulnerability was found in GNU gzip\u0027s zgrep utility. When zgrep is applied on the attacker\u0027s chosen file name (for example, a crafted file name), this can overwrite an attacker\u0027s content to an arbitrary attacker-selected file. This flaw occurs due to insufficient validation when processing filenames with two or more newlines where selected content and the target file names are embedded in crafted multi-line file names. This flaw allows a remote, low privileged attacker to force zgrep to write arbitrary files on the system.", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Contact customer support to receive patch and update information", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2022-1271" }, { "cve": "CVE-2022-3515", "cwe": { "id": "CWE-190", "name": "Integer Overflow or Wraparound" }, "notes": [ { "category": "summary", "text": "A vulnerability was found in the Libksba library due to an integer overflow within the CRL parser. The vulnerability can be exploited remotely for code execution on the target system by passing specially crafted data to the application, for example, a malicious S/MIME attachment.", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Contact customer support to receive patch and update information", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2022-3515" }, { "cve": "CVE-2022-31676", "cwe": { "id": "CWE-269", "name": "Improper Privilege Management" }, "notes": [ { "category": "summary", "text": "VMware Tools (12.0.0, 11.x.y and 10.x.y) contains a local privilege escalation vulnerability. A malicious actor with local non-administrative access to the Guest OS can escalate privileges as a root user in the virtual machine.", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Contact customer support to receive patch and update information", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2022-31676" }, { "cve": "CVE-2022-37454", "cwe": { "id": "CWE-190", "name": "Integer Overflow or Wraparound" }, "notes": [ { "category": "summary", "text": "The Keccak XKCP SHA-3 reference implementation before fdc6fef has an integer overflow and resultant buffer overflow that allows attackers to execute arbitrary code or eliminate expected cryptographic properties. This occurs in the sponge function interface.", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Contact customer support to receive patch and update information", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2022-37454" }, { "cve": "CVE-2022-47629", "cwe": { "id": "CWE-190", "name": "Integer Overflow or Wraparound" }, "notes": [ { "category": "summary", "text": "Libksba before 1.6.3 is prone to an integer overflow vulnerability in the CRL signature parser.", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Contact customer support to receive patch and update information", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2022-47629" }, { "cve": "CVE-2023-0286", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "There is a type confusion vulnerability relating to X.400 address processing inside an X.509 GeneralName. X.400 addresses were parsed as an ASN1_STRING but the public structure definition for GENERAL_NAME incorrectly specified the type of the x400Address field as ASN1_TYPE. This field is subsequently interpreted by the OpenSSL function GENERAL_NAME_cmp as an ASN1_TYPE rather than an ASN1_STRING. When CRL checking is enabled (i.e. the application sets the X509_V_FLAG_CRL_CHECK flag), this vulnerability may allow an attacker to pass arbitrary pointers to a memcmp call, enabling them to read memory contents or enact a denial of service. In most cases, the attack requires the attacker to provide both the certificate chain and CRL, neither of which need to have a valid signature. If the attacker only controls one of these inputs, the other input must already contain an X.400 address as a CRL distribution point, which is uncommon. As such, this vulnerability is most likely to only affect applications which have implemented their own functionality for retrieving CRLs over a network.", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Contact customer support to receive patch and update information", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2023-0286" }, { "cve": "CVE-2023-6789", "cwe": { "id": "CWE-79", "name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)" }, "notes": [ { "category": "summary", "text": "A cross-site scripting (XSS) vulnerability in Palo Alto Networks PAN-OS software enables a malicious authenticated read-write administrator to store a JavaScript payload using the web interface. Then, when viewed by a properly authenticated administrator, the JavaScript payload executes and disguises all associated actions as performed by that unsuspecting authenticated administrator.", "title": "Summary" } ], "product_status": { "known_affected": [ "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Contact customer support to receive patch and update information.", "product_ids": [ "3" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.8, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "3" ] } ], "title": "CVE-2023-6789" }, { "cve": "CVE-2023-6793", "cwe": { "id": "CWE-269", "name": "Improper Privilege Management" }, "notes": [ { "category": "summary", "text": "An improper privilege management vulnerability in Palo Alto Networks PAN-OS software enables an authenticated read-only administrator to revoke active XML API keys from the firewall and disrupt XML API usage.", "title": "Summary" } ], "product_status": { "known_affected": [ "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Contact customer support to receive patch and update information.", "product_ids": [ "3" ] } ], "scores": [ { "cvss_v3": { "baseScore": 2.7, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "3" ] } ], "title": "CVE-2023-6793" }, { "cve": "CVE-2023-38802", "cwe": { "id": "CWE-754", "name": "Improper Check for Unusual or Exceptional Conditions" }, "notes": [ { "category": "summary", "text": "FRRouting FRR 7.5.1 through 9.0 and Pica8 PICOS 4.3.3.2 allow a remote attacker to cause a denial of service via a crafted BGP update with a corrupted attribute 23 (Tunnel Encapsulation)", "title": "Summary" } ], "product_status": { "known_affected": [ "4" ] }, "remediations": [ { "category": "vendor_fix", "details": "Contact customer support to receive patch and update information.", "product_ids": [ "4" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "4" ] } ], "title": "CVE-2023-38802" }, { "cve": "CVE-2023-48795", "cwe": { "id": "CWE-222", "name": "Truncation of Security-relevant Information" }, "notes": [ { "category": "summary", "text": "The SSH transport protocol with certain OpenSSH extensions, found in OpenSSH before 9.6 and other products, allows remote attackers to bypass integrity checks such that some packets are omitted (from the extension negotiation message), and a client and server may consequently end up with a connection for which some security features have been downgraded or disabled, aka a Terrapin attack. This occurs because the SSH Binary Packet Protocol (BPP), implemented by these extensions, mishandles the handshake phase and mishandles use of sequence numbers. For example, there is an effective attack against SSH\u0027s use of ChaCha20-Poly1305 (and CBC with Encrypt-then-MAC). The bypass occurs in chacha20-poly1305@openssh.com and (if CBC is used) the -etm@openssh.com MAC algorithms. This also affects Maverick Synergy Java SSH API before 3.1.0-SNAPSHOT, Dropbear through 2022.83, Ssh before 5.1.1 in Erlang/OTP, PuTTY before 0.80, AsyncSSH before 2.14.2, golang.org/x/crypto before 0.17.0, libssh before 0.10.6, libssh2 through 1.11.0, Thorn Tech SFTP Gateway before 3.4.6, Tera Term before 5.1, Paramiko before 3.4.0, jsch before 0.2.15, SFTPGo before 2.5.6, Netgate pfSense Plus through 23.09.1, Netgate pfSense CE through 2.7.2, HPN-SSH through 18.2.0, ProFTPD before 1.3.8b (and before1.3.9rc2), ORYX CycloneSSH before 2.3.4, NetSarang XShell 7 before Build 0144, CrushFTP before 10.6.0, ConnectBot SSH library before 2.2.22, Apache MINA sshd through 2.11.0, sshj through 0.37.0, TinySSH through 20230101, trilead-ssh2 6401, the net-ssh gem 7.2.0 for Ruby, the mscdex ssh2 module before 1.15.0 for Node.js, the thrussh library before 0.35.1 for Rust, and the Russh crate before 0.40.2 for Rust; and there could be effects on Bitvise SSH through 9.31.", "title": "Summary" } ], "product_status": { "known_affected": [ "2" ] }, "remediations": [ { "category": "vendor_fix", "details": "Contact customer support to receive patch and update information", "product_ids": [ "2" ] }, { "category": "workaround", "details": "CVE-2023-48795: Customers can resolve this issue by configuring the in-use SSH profile to contain at least one cipher and at least one MAC algorithm, which removes support for CHACHA20-POLY1305 and all Encrypt-then-MAC algorithms available (ciphers with -etm in the name) in PAN-OS software. See Palo Alto Networks\u0027 upstream documentation \nhttps://security.paloaltonetworks.com/CVE-2023-48795 for additional guidance", "product_ids": [ "2" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "2" ] } ], "title": "CVE-2023-48795" }, { "cve": "CVE-2024-0008", "cwe": { "id": "CWE-613", "name": "Insufficient Session Expiration" }, "notes": [ { "category": "summary", "text": "Web sessions in the management interface in Palo Alto Networks PAN-OS software do not expire in certain situations, making it susceptible to unauthorized access.", "title": "Summary" } ], "product_status": { "known_affected": [ "3" ] }, "remediations": [ { "category": "vendor_fix", "details": "Contact customer support to receive patch and update information.", "product_ids": [ "3" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "3" ] } ], "title": "CVE-2024-0008" }, { "cve": "CVE-2024-3383", "cwe": { "id": "CWE-282", "name": "Improper Ownership Management" }, "notes": [ { "category": "summary", "text": "A vulnerability in how Palo Alto Networks PAN-OS software processes data received from Cloud Identity Engine (CIE) agents enables modification of User-ID groups. This impacts user access to network resources where users may be inappropriately denied or allowed access to resources based on your existing Security Policy rules.", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Contact customer support to receive patch and update information", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:H", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2024-3383" }, { "cve": "CVE-2024-3386", "cwe": { "id": "CWE-436", "name": "Interpretation Conflict" }, "notes": [ { "category": "summary", "text": "An incorrect string comparison vulnerability in Palo Alto Networks PAN-OS software prevents Predefined Decryption Exclusions from functioning as intended. This can cause traffic destined for domains that are not specified in Predefined Decryption Exclusions to be unintentionally excluded from decryption.", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Contact customer support to receive patch and update information", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2024-3386" }, { "cve": "CVE-2024-3387", "cwe": { "id": "CWE-326", "name": "Inadequate Encryption Strength" }, "notes": [ { "category": "summary", "text": "A weak (low bit strength) device certificate in Palo Alto Networks Panorama software enables an attacker to perform a meddler-in-the-middle (MitM) attack to capture encrypted traffic between the Panorama management server and the firewalls it manages. With sufficient computing resources, the attacker could break encrypted communication and expose sensitive information that is shared between the management server and the firewalls.", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Contact customer support to receive patch and update information", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2024-3387" }, { "cve": "CVE-2024-3388", "cwe": { "id": "CWE-269", "name": "Improper Privilege Management" }, "notes": [ { "category": "summary", "text": "A vulnerability in the GlobalProtect Gateway in Palo Alto Networks PAN-OS software enables an authenticated attacker to impersonate another user and send network packets to internal assets. However, this vulnerability does not allow the attacker to receive response packets from those internal assets.", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Contact customer support to receive patch and update information", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:N/I:L/A:N", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2024-3388" } ] }
rhsa-2022_1716
Vulnerability from csaf_redhat
Published
2022-05-05 07:56
Modified
2024-11-22 17:11
Summary
Red Hat Security Advisory: Red Hat Ceph Storage 4.3 Security and Bug Fix update
Notes
Topic
New packages for Red Hat Ceph Storage 4.3 are now available on Red Hat Enterprise Linux 8.5.
Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
Red Hat Ceph Storage is a scalable, open, software-defined storage platform that combines the most stable version of the Ceph storage system with a Ceph management platform, deployment utilities, and support services.
Security Fix(es):
* python-rsa: bleichenbacher timing oracle attack against RSA decryption (CVE-2020-25658)
* ceph object gateway: radosgw: CRLF injection (CVE-2021-3524)
* ceph: Ceph volume does not honour osd_dmcrypt_key_size (CVE-2021-3979)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
These new packages include numerous bug fixes. Space precludes documenting all of these changes in this advisory. Users are directed to the Red Hat Ceph Storage Release Notes for information on the most significant of these changes:
https://access.redhat.com/documentation/en-us/red_hat_ceph_storage/4.3/html/release_notes/index
All users of Red Hat Ceph Storage are advised to upgrade to these new packages, which provide bug fixes.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "New packages for Red Hat Ceph Storage 4.3 are now available on Red Hat Enterprise Linux 8.5.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "Red Hat Ceph Storage is a scalable, open, software-defined storage platform that combines the most stable version of the Ceph storage system with a Ceph management platform, deployment utilities, and support services.\n\nSecurity Fix(es):\n\n* python-rsa: bleichenbacher timing oracle attack against RSA decryption (CVE-2020-25658)\n\n* ceph object gateway: radosgw: CRLF injection (CVE-2021-3524)\n\n* ceph: Ceph volume does not honour osd_dmcrypt_key_size (CVE-2021-3979)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nThese new packages include numerous bug fixes. Space precludes documenting all of these changes in this advisory. Users are directed to the Red Hat Ceph Storage Release Notes for information on the most significant of these changes:\n\nhttps://access.redhat.com/documentation/en-us/red_hat_ceph_storage/4.3/html/release_notes/index\n\nAll users of Red Hat Ceph Storage are advised to upgrade to these new packages, which provide bug fixes.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2022:1716", "url": "https://access.redhat.com/errata/RHSA-2022:1716" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#moderate", "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "category": "external", "summary": "1786691", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1786691" }, { "category": "external", "summary": "1855350", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1855350" }, { "category": "external", "summary": "1876860", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1876860" }, { "category": "external", "summary": "1889972", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1889972" }, { "category": "external", "summary": "1891557", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1891557" }, { "category": "external", "summary": "1894038", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1894038" }, { "category": "external", "summary": "1896803", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1896803" }, { "category": "external", "summary": "1902999", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1902999" }, { "category": "external", "summary": "1906022", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1906022" }, { "category": "external", "summary": "1927574", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1927574" }, { "category": "external", "summary": "1936299", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1936299" }, { "category": "external", "summary": "1941775", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1941775" }, { "category": "external", "summary": "1951674", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1951674" }, { "category": "external", "summary": "1952571", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1952571" }, { "category": "external", "summary": "1955038", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1955038" }, { "category": "external", "summary": "1960306", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1960306" }, { "category": "external", "summary": "1962748", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1962748" }, { "category": "external", "summary": "1964097", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1964097" }, { "category": "external", "summary": "1964099", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1964099" }, { "category": "external", "summary": "1965314", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1965314" }, { "category": "external", "summary": "1965504", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1965504" }, { "category": "external", "summary": "1965540", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1965540" }, { "category": "external", "summary": "1967532", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1967532" }, { "category": "external", "summary": "1975102", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1975102" }, { "category": "external", "summary": "1978643", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1978643" }, { "category": "external", "summary": "1979186", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1979186" }, { "category": "external", "summary": "1981860", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1981860" }, { "category": "external", "summary": "1986684", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1986684" }, { "category": "external", "summary": "1987041", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1987041" }, { "category": "external", "summary": "1988171", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1988171" }, { "category": "external", "summary": "1990772", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1990772" }, { "category": "external", "summary": "1992178", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1992178" }, { "category": "external", "summary": "1992246", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1992246" }, { "category": "external", "summary": "1994930", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1994930" }, { "category": "external", "summary": "1995037", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1995037" }, { "category": "external", "summary": "1995562", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1995562" }, { "category": "external", "summary": "1995574", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1995574" }, { "category": "external", "summary": "1996765", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1996765" }, { "category": "external", "summary": "1997586", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1997586" }, { "category": "external", "summary": "2001444", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2001444" }, { "category": "external", "summary": "2002084", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2002084" }, { "category": "external", "summary": "2002261", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2002261" }, { "category": "external", "summary": "2003212", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2003212" }, { "category": "external", "summary": "2003219", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2003219" }, { "category": "external", "summary": "2004738", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2004738" }, { "category": "external", "summary": "2006166", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2006166" }, { "category": "external", "summary": "2006686", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2006686" }, { "category": "external", "summary": "2006805", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2006805" }, { "category": "external", "summary": "2006912", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2006912" }, { "category": "external", "summary": "2006984", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2006984" }, { "category": "external", "summary": "2008860", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2008860" }, { "category": "external", "summary": "2009516", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2009516" }, { "category": "external", "summary": "2011451", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2011451" }, { "category": "external", "summary": "2014304", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2014304" }, { "category": "external", "summary": "2016994", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2016994" }, { "category": "external", "summary": "2017878", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2017878" }, { "category": "external", "summary": "2021037", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2021037" }, { "category": "external", "summary": "2021075", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2021075" }, { "category": "external", "summary": "2021447", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2021447" }, { "category": "external", "summary": "2021993", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2021993" }, { "category": "external", "summary": "2022585", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2022585" }, { "category": "external", "summary": "2022650", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2022650" }, { "category": "external", "summary": "2023379", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2023379" }, { "category": "external", "summary": "2024788", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2024788" }, { "category": "external", "summary": "2027449", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2027449" }, { "category": "external", "summary": "2027721", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2027721" }, { "category": "external", "summary": "2027812", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2027812" }, { "category": "external", "summary": "2028248", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2028248" }, { "category": "external", "summary": "2028827", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2028827" }, { "category": "external", "summary": "2030452", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2030452" }, { "category": "external", "summary": "2032560", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2032560" }, { "category": "external", "summary": "2034595", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2034595" }, { "category": "external", "summary": "2034637", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2034637" }, { "category": "external", "summary": "2034999", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2034999" }, { "category": "external", "summary": "2036930", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2036930" }, { "category": "external", "summary": "2036941", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2036941" }, { "category": "external", "summary": "2038798", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2038798" }, { "category": "external", "summary": "2039175", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2039175" }, { "category": "external", "summary": "2040161", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2040161" }, { "category": "external", "summary": "2042585", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2042585" }, { "category": "external", "summary": "2044176", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2044176" }, { "category": "external", "summary": "2044370", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2044370" }, { "category": "external", "summary": "2044406", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2044406" }, { "category": "external", "summary": "2047694", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2047694" }, { "category": "external", "summary": "2052202", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2052202" }, { "category": "external", "summary": "2056719", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2056719" }, { "category": "external", "summary": "2056906", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2056906" }, { "category": "external", "summary": "2058201", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2058201" }, { "category": "external", "summary": "2063029", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2063029" }, { "category": "external", "summary": "2071137", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2071137" }, { "category": "external", "summary": "2076192", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2076192" }, { "category": "external", "summary": "2077139", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2077139" }, { "category": "external", "summary": "2079016", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2079016" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2022/rhsa-2022_1716.json" } ], "title": "Red Hat Security Advisory: Red Hat Ceph Storage 4.3 Security and Bug Fix update", "tracking": { "current_release_date": "2024-11-22T17:11:40+00:00", "generator": { "date": "2024-11-22T17:11:40+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2022:1716", "initial_release_date": "2022-05-05T07:56:42+00:00", "revision_history": [ { "date": "2022-05-05T07:56:42+00:00", "number": "1", "summary": "Initial version" }, { "date": "2022-05-05T07:56:42+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-22T17:11:40+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Ceph Storage 4.3 Tools", "product": { "name": "Red Hat Ceph Storage 4.3 Tools", "product_id": "7Server-RHEL-7-RHCEPH-4.3-Tools", "product_identification_helper": { "cpe": "cpe:/a:redhat:ceph_storage:4::el7" } } }, { "category": "product_name", "name": "Red Hat Ceph Storage 4.3 MON", "product": { "name": "Red Hat Ceph Storage 4.3 MON", "product_id": "7Server-RHEL-7-RHCEPH-4.3-MON", "product_identification_helper": { "cpe": "cpe:/a:redhat:ceph_storage:4::el7" } } }, { "category": "product_name", "name": "Red Hat Ceph Storage 4.3 OSD", "product": { "name": "Red Hat Ceph Storage 4.3 OSD", "product_id": "7Server-RHEL-7-RHCEPH-4.3-OSD", "product_identification_helper": { "cpe": "cpe:/a:redhat:ceph_storage:4::el7" } } }, { "category": "product_name", "name": "Red Hat Ceph Storage 4.3 Tools", "product": { "name": "Red Hat Ceph Storage 4.3 Tools", "product_id": "8Base-RHCEPH-4.3-Tools", "product_identification_helper": { "cpe": "cpe:/a:redhat:ceph_storage:4::el8" } } }, { "category": "product_name", "name": "Red Hat Ceph Storage 4.3 MON", "product": { "name": "Red Hat Ceph Storage 4.3 MON", "product_id": "8Base-RHCEPH-4.3-MON", "product_identification_helper": { "cpe": "cpe:/a:redhat:ceph_storage:4::el8" } } }, { "category": "product_name", "name": "Red Hat Ceph Storage 4.3 OSD", "product": { "name": "Red Hat Ceph Storage 4.3 OSD", "product_id": "8Base-RHCEPH-4.3-OSD", "product_identification_helper": { "cpe": "cpe:/a:redhat:ceph_storage:4::el8" } } } ], "category": "product_family", "name": "Red Hat Ceph Storage" }, { "branches": [ { "category": "product_version", "name": "libntirpc-0:3.4-1.1.el7cp.src", "product": { "name": "libntirpc-0:3.4-1.1.el7cp.src", "product_id": "libntirpc-0:3.4-1.1.el7cp.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/libntirpc@3.4-1.1.el7cp?arch=src" } } }, { "category": "product_version", "name": "tcmu-runner-0:1.5.2-5.el7cp.src", "product": { "name": "tcmu-runner-0:1.5.2-5.el7cp.src", "product_id": "tcmu-runner-0:1.5.2-5.el7cp.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/tcmu-runner@1.5.2-5.el7cp?arch=src" } } }, { "category": "product_version", "name": "nfs-ganesha-0:3.5-1.2.el7cp.src", "product": { "name": "nfs-ganesha-0:3.5-1.2.el7cp.src", "product_id": "nfs-ganesha-0:3.5-1.2.el7cp.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/nfs-ganesha@3.5-1.2.el7cp?arch=src" } } }, { "category": "product_version", "name": "ceph-iscsi-0:3.4-5.el7cp.src", "product": { "name": "ceph-iscsi-0:3.4-5.el7cp.src", "product_id": "ceph-iscsi-0:3.4-5.el7cp.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/ceph-iscsi@3.4-5.el7cp?arch=src" } } }, { "category": "product_version", "name": "ceph-ansible-0:4.0.70.3-1.el7cp.src", "product": { "name": "ceph-ansible-0:4.0.70.3-1.el7cp.src", "product_id": "ceph-ansible-0:4.0.70.3-1.el7cp.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/ceph-ansible@4.0.70.3-1.el7cp?arch=src" } } }, { "category": "product_version", "name": "ceph-2:14.2.22-110.el7cp.src", "product": { "name": "ceph-2:14.2.22-110.el7cp.src", "product_id": "ceph-2:14.2.22-110.el7cp.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/ceph@14.2.22-110.el7cp?arch=src\u0026epoch=2" } } }, { "category": "product_version", "name": "libntirpc-0:3.4-1.1.el8cp.src", "product": { "name": "libntirpc-0:3.4-1.1.el8cp.src", "product_id": "libntirpc-0:3.4-1.1.el8cp.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/libntirpc@3.4-1.1.el8cp?arch=src" } } }, { "category": "product_version", "name": "tcmu-runner-0:1.5.2-5.el8cp.src", "product": { "name": "tcmu-runner-0:1.5.2-5.el8cp.src", "product_id": "tcmu-runner-0:1.5.2-5.el8cp.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/tcmu-runner@1.5.2-5.el8cp?arch=src" } } }, { "category": "product_version", "name": "nfs-ganesha-0:3.5-1.2.el8cp.src", "product": { "name": "nfs-ganesha-0:3.5-1.2.el8cp.src", "product_id": "nfs-ganesha-0:3.5-1.2.el8cp.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/nfs-ganesha@3.5-1.2.el8cp?arch=src" } } }, { "category": "product_version", "name": "python-rsa-0:4.8-1.el8cp.src", "product": { "name": "python-rsa-0:4.8-1.el8cp.src", "product_id": "python-rsa-0:4.8-1.el8cp.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-rsa@4.8-1.el8cp?arch=src" } } }, { "category": "product_version", "name": "ceph-iscsi-0:3.4-5.el8cp.src", "product": { "name": "ceph-iscsi-0:3.4-5.el8cp.src", "product_id": "ceph-iscsi-0:3.4-5.el8cp.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/ceph-iscsi@3.4-5.el8cp?arch=src" } } }, { "category": "product_version", "name": "ceph-ansible-0:4.0.70.3-1.el8cp.src", "product": { "name": "ceph-ansible-0:4.0.70.3-1.el8cp.src", "product_id": "ceph-ansible-0:4.0.70.3-1.el8cp.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/ceph-ansible@4.0.70.3-1.el8cp?arch=src" } } }, { "category": "product_version", "name": "ceph-2:14.2.22-110.el8cp.src", "product": { "name": "ceph-2:14.2.22-110.el8cp.src", "product_id": "ceph-2:14.2.22-110.el8cp.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/ceph@14.2.22-110.el8cp?arch=src\u0026epoch=2" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "libntirpc-0:3.4-1.1.el7cp.x86_64", "product": { "name": "libntirpc-0:3.4-1.1.el7cp.x86_64", "product_id": "libntirpc-0:3.4-1.1.el7cp.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/libntirpc@3.4-1.1.el7cp?arch=x86_64" } } }, { "category": "product_version", "name": "libntirpc-debuginfo-0:3.4-1.1.el7cp.x86_64", "product": { "name": "libntirpc-debuginfo-0:3.4-1.1.el7cp.x86_64", "product_id": "libntirpc-debuginfo-0:3.4-1.1.el7cp.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/libntirpc-debuginfo@3.4-1.1.el7cp?arch=x86_64" } } }, { "category": "product_version", "name": "libtcmu-0:1.5.2-5.el7cp.x86_64", "product": { "name": "libtcmu-0:1.5.2-5.el7cp.x86_64", "product_id": "libtcmu-0:1.5.2-5.el7cp.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/libtcmu@1.5.2-5.el7cp?arch=x86_64" } } }, { "category": "product_version", "name": "tcmu-runner-0:1.5.2-5.el7cp.x86_64", "product": { "name": "tcmu-runner-0:1.5.2-5.el7cp.x86_64", "product_id": "tcmu-runner-0:1.5.2-5.el7cp.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/tcmu-runner@1.5.2-5.el7cp?arch=x86_64" } } }, { "category": "product_version", "name": "nfs-ganesha-0:3.5-1.2.el7cp.x86_64", "product": { "name": "nfs-ganesha-0:3.5-1.2.el7cp.x86_64", "product_id": "nfs-ganesha-0:3.5-1.2.el7cp.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/nfs-ganesha@3.5-1.2.el7cp?arch=x86_64" } } }, { "category": "product_version", "name": "nfs-ganesha-ceph-0:3.5-1.2.el7cp.x86_64", "product": { "name": "nfs-ganesha-ceph-0:3.5-1.2.el7cp.x86_64", "product_id": "nfs-ganesha-ceph-0:3.5-1.2.el7cp.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/nfs-ganesha-ceph@3.5-1.2.el7cp?arch=x86_64" } } }, { "category": "product_version", "name": "nfs-ganesha-proxy-0:3.5-1.2.el7cp.x86_64", "product": { "name": "nfs-ganesha-proxy-0:3.5-1.2.el7cp.x86_64", "product_id": "nfs-ganesha-proxy-0:3.5-1.2.el7cp.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/nfs-ganesha-proxy@3.5-1.2.el7cp?arch=x86_64" } } }, { "category": "product_version", "name": "nfs-ganesha-rados-grace-0:3.5-1.2.el7cp.x86_64", "product": { "name": "nfs-ganesha-rados-grace-0:3.5-1.2.el7cp.x86_64", "product_id": "nfs-ganesha-rados-grace-0:3.5-1.2.el7cp.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/nfs-ganesha-rados-grace@3.5-1.2.el7cp?arch=x86_64" } } }, { "category": "product_version", "name": "nfs-ganesha-rados-urls-0:3.5-1.2.el7cp.x86_64", "product": { "name": "nfs-ganesha-rados-urls-0:3.5-1.2.el7cp.x86_64", "product_id": "nfs-ganesha-rados-urls-0:3.5-1.2.el7cp.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/nfs-ganesha-rados-urls@3.5-1.2.el7cp?arch=x86_64" } } }, { "category": "product_version", "name": "nfs-ganesha-rgw-0:3.5-1.2.el7cp.x86_64", "product": { "name": "nfs-ganesha-rgw-0:3.5-1.2.el7cp.x86_64", "product_id": "nfs-ganesha-rgw-0:3.5-1.2.el7cp.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/nfs-ganesha-rgw@3.5-1.2.el7cp?arch=x86_64" } } }, { "category": "product_version", "name": "nfs-ganesha-vfs-0:3.5-1.2.el7cp.x86_64", "product": { "name": "nfs-ganesha-vfs-0:3.5-1.2.el7cp.x86_64", "product_id": "nfs-ganesha-vfs-0:3.5-1.2.el7cp.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/nfs-ganesha-vfs@3.5-1.2.el7cp?arch=x86_64" } } }, { "category": "product_version", "name": "nfs-ganesha-debuginfo-0:3.5-1.2.el7cp.x86_64", "product": { "name": "nfs-ganesha-debuginfo-0:3.5-1.2.el7cp.x86_64", "product_id": "nfs-ganesha-debuginfo-0:3.5-1.2.el7cp.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/nfs-ganesha-debuginfo@3.5-1.2.el7cp?arch=x86_64" } } }, { "category": "product_version", "name": "ceph-base-2:14.2.22-110.el7cp.x86_64", "product": { "name": "ceph-base-2:14.2.22-110.el7cp.x86_64", "product_id": "ceph-base-2:14.2.22-110.el7cp.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ceph-base@14.2.22-110.el7cp?arch=x86_64\u0026epoch=2" } } }, { "category": "product_version", "name": "ceph-common-2:14.2.22-110.el7cp.x86_64", "product": { "name": "ceph-common-2:14.2.22-110.el7cp.x86_64", "product_id": "ceph-common-2:14.2.22-110.el7cp.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ceph-common@14.2.22-110.el7cp?arch=x86_64\u0026epoch=2" } } }, { "category": "product_version", "name": "ceph-mgr-2:14.2.22-110.el7cp.x86_64", "product": { "name": "ceph-mgr-2:14.2.22-110.el7cp.x86_64", "product_id": "ceph-mgr-2:14.2.22-110.el7cp.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ceph-mgr@14.2.22-110.el7cp?arch=x86_64\u0026epoch=2" } } }, { "category": "product_version", "name": "ceph-mon-2:14.2.22-110.el7cp.x86_64", "product": { "name": "ceph-mon-2:14.2.22-110.el7cp.x86_64", "product_id": "ceph-mon-2:14.2.22-110.el7cp.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ceph-mon@14.2.22-110.el7cp?arch=x86_64\u0026epoch=2" } } }, { "category": "product_version", "name": "ceph-selinux-2:14.2.22-110.el7cp.x86_64", "product": { "name": "ceph-selinux-2:14.2.22-110.el7cp.x86_64", "product_id": "ceph-selinux-2:14.2.22-110.el7cp.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ceph-selinux@14.2.22-110.el7cp?arch=x86_64\u0026epoch=2" } } }, { "category": "product_version", "name": "ceph-test-2:14.2.22-110.el7cp.x86_64", "product": { "name": "ceph-test-2:14.2.22-110.el7cp.x86_64", "product_id": "ceph-test-2:14.2.22-110.el7cp.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ceph-test@14.2.22-110.el7cp?arch=x86_64\u0026epoch=2" } } }, { "category": "product_version", "name": "libcephfs-devel-2:14.2.22-110.el7cp.x86_64", "product": { "name": "libcephfs-devel-2:14.2.22-110.el7cp.x86_64", "product_id": "libcephfs-devel-2:14.2.22-110.el7cp.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/libcephfs-devel@14.2.22-110.el7cp?arch=x86_64\u0026epoch=2" } } }, { "category": "product_version", "name": "libcephfs2-2:14.2.22-110.el7cp.x86_64", "product": { "name": "libcephfs2-2:14.2.22-110.el7cp.x86_64", "product_id": "libcephfs2-2:14.2.22-110.el7cp.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/libcephfs2@14.2.22-110.el7cp?arch=x86_64\u0026epoch=2" } } }, { "category": "product_version", "name": "librados-devel-2:14.2.22-110.el7cp.x86_64", "product": { "name": "librados-devel-2:14.2.22-110.el7cp.x86_64", "product_id": "librados-devel-2:14.2.22-110.el7cp.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/librados-devel@14.2.22-110.el7cp?arch=x86_64\u0026epoch=2" } } }, { "category": "product_version", "name": "librados2-2:14.2.22-110.el7cp.x86_64", "product": { "name": "librados2-2:14.2.22-110.el7cp.x86_64", "product_id": "librados2-2:14.2.22-110.el7cp.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/librados2@14.2.22-110.el7cp?arch=x86_64\u0026epoch=2" } } }, { "category": "product_version", "name": "libradospp-devel-2:14.2.22-110.el7cp.x86_64", "product": { "name": "libradospp-devel-2:14.2.22-110.el7cp.x86_64", "product_id": "libradospp-devel-2:14.2.22-110.el7cp.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/libradospp-devel@14.2.22-110.el7cp?arch=x86_64\u0026epoch=2" } } }, { "category": "product_version", "name": "libradosstriper1-2:14.2.22-110.el7cp.x86_64", "product": { "name": "libradosstriper1-2:14.2.22-110.el7cp.x86_64", "product_id": "libradosstriper1-2:14.2.22-110.el7cp.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/libradosstriper1@14.2.22-110.el7cp?arch=x86_64\u0026epoch=2" } } }, { "category": "product_version", "name": "librbd-devel-2:14.2.22-110.el7cp.x86_64", "product": { "name": "librbd-devel-2:14.2.22-110.el7cp.x86_64", "product_id": "librbd-devel-2:14.2.22-110.el7cp.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/librbd-devel@14.2.22-110.el7cp?arch=x86_64\u0026epoch=2" } } }, { "category": "product_version", "name": "librbd1-2:14.2.22-110.el7cp.x86_64", "product": { "name": "librbd1-2:14.2.22-110.el7cp.x86_64", "product_id": "librbd1-2:14.2.22-110.el7cp.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/librbd1@14.2.22-110.el7cp?arch=x86_64\u0026epoch=2" } } }, { "category": "product_version", "name": "librgw-devel-2:14.2.22-110.el7cp.x86_64", "product": { "name": "librgw-devel-2:14.2.22-110.el7cp.x86_64", "product_id": "librgw-devel-2:14.2.22-110.el7cp.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/librgw-devel@14.2.22-110.el7cp?arch=x86_64\u0026epoch=2" } } }, { "category": "product_version", "name": "librgw2-2:14.2.22-110.el7cp.x86_64", "product": { "name": "librgw2-2:14.2.22-110.el7cp.x86_64", "product_id": "librgw2-2:14.2.22-110.el7cp.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/librgw2@14.2.22-110.el7cp?arch=x86_64\u0026epoch=2" } } }, { "category": "product_version", "name": "python-ceph-argparse-2:14.2.22-110.el7cp.x86_64", "product": { "name": "python-ceph-argparse-2:14.2.22-110.el7cp.x86_64", "product_id": "python-ceph-argparse-2:14.2.22-110.el7cp.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-ceph-argparse@14.2.22-110.el7cp?arch=x86_64\u0026epoch=2" } } }, { "category": "product_version", "name": "python-cephfs-2:14.2.22-110.el7cp.x86_64", "product": { "name": "python-cephfs-2:14.2.22-110.el7cp.x86_64", "product_id": "python-cephfs-2:14.2.22-110.el7cp.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-cephfs@14.2.22-110.el7cp?arch=x86_64\u0026epoch=2" } } }, { "category": "product_version", "name": "python-rados-2:14.2.22-110.el7cp.x86_64", "product": { "name": "python-rados-2:14.2.22-110.el7cp.x86_64", "product_id": "python-rados-2:14.2.22-110.el7cp.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-rados@14.2.22-110.el7cp?arch=x86_64\u0026epoch=2" } } }, { "category": "product_version", "name": "python-rbd-2:14.2.22-110.el7cp.x86_64", "product": { "name": "python-rbd-2:14.2.22-110.el7cp.x86_64", "product_id": "python-rbd-2:14.2.22-110.el7cp.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-rbd@14.2.22-110.el7cp?arch=x86_64\u0026epoch=2" } } }, { "category": "product_version", "name": "python-rgw-2:14.2.22-110.el7cp.x86_64", "product": { "name": "python-rgw-2:14.2.22-110.el7cp.x86_64", "product_id": "python-rgw-2:14.2.22-110.el7cp.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-rgw@14.2.22-110.el7cp?arch=x86_64\u0026epoch=2" } } }, { "category": "product_version", "name": "ceph-debuginfo-2:14.2.22-110.el7cp.x86_64", "product": { "name": "ceph-debuginfo-2:14.2.22-110.el7cp.x86_64", "product_id": "ceph-debuginfo-2:14.2.22-110.el7cp.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ceph-debuginfo@14.2.22-110.el7cp?arch=x86_64\u0026epoch=2" } } }, { "category": "product_version", "name": "ceph-osd-2:14.2.22-110.el7cp.x86_64", "product": { "name": "ceph-osd-2:14.2.22-110.el7cp.x86_64", "product_id": "ceph-osd-2:14.2.22-110.el7cp.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ceph-osd@14.2.22-110.el7cp?arch=x86_64\u0026epoch=2" } } }, { "category": "product_version", "name": "ceph-fuse-2:14.2.22-110.el7cp.x86_64", "product": { "name": "ceph-fuse-2:14.2.22-110.el7cp.x86_64", "product_id": "ceph-fuse-2:14.2.22-110.el7cp.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ceph-fuse@14.2.22-110.el7cp?arch=x86_64\u0026epoch=2" } } }, { "category": "product_version", "name": "ceph-mds-2:14.2.22-110.el7cp.x86_64", "product": { "name": "ceph-mds-2:14.2.22-110.el7cp.x86_64", "product_id": "ceph-mds-2:14.2.22-110.el7cp.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ceph-mds@14.2.22-110.el7cp?arch=x86_64\u0026epoch=2" } } }, { "category": "product_version", "name": "ceph-radosgw-2:14.2.22-110.el7cp.x86_64", "product": { "name": "ceph-radosgw-2:14.2.22-110.el7cp.x86_64", "product_id": "ceph-radosgw-2:14.2.22-110.el7cp.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ceph-radosgw@14.2.22-110.el7cp?arch=x86_64\u0026epoch=2" } } }, { "category": "product_version", "name": "rbd-mirror-2:14.2.22-110.el7cp.x86_64", "product": { "name": "rbd-mirror-2:14.2.22-110.el7cp.x86_64", "product_id": "rbd-mirror-2:14.2.22-110.el7cp.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/rbd-mirror@14.2.22-110.el7cp?arch=x86_64\u0026epoch=2" } } }, { "category": "product_version", "name": "rbd-nbd-2:14.2.22-110.el7cp.x86_64", "product": { "name": "rbd-nbd-2:14.2.22-110.el7cp.x86_64", "product_id": "rbd-nbd-2:14.2.22-110.el7cp.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/rbd-nbd@14.2.22-110.el7cp?arch=x86_64\u0026epoch=2" } } }, { "category": "product_version", "name": "libntirpc-0:3.4-1.1.el8cp.x86_64", "product": { "name": "libntirpc-0:3.4-1.1.el8cp.x86_64", "product_id": "libntirpc-0:3.4-1.1.el8cp.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/libntirpc@3.4-1.1.el8cp?arch=x86_64" } } }, { "category": "product_version", "name": "libntirpc-debugsource-0:3.4-1.1.el8cp.x86_64", "product": { "name": "libntirpc-debugsource-0:3.4-1.1.el8cp.x86_64", "product_id": "libntirpc-debugsource-0:3.4-1.1.el8cp.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/libntirpc-debugsource@3.4-1.1.el8cp?arch=x86_64" } } }, { "category": "product_version", "name": "libntirpc-debuginfo-0:3.4-1.1.el8cp.x86_64", "product": { "name": "libntirpc-debuginfo-0:3.4-1.1.el8cp.x86_64", "product_id": "libntirpc-debuginfo-0:3.4-1.1.el8cp.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/libntirpc-debuginfo@3.4-1.1.el8cp?arch=x86_64" } } }, { "category": "product_version", "name": "libtcmu-0:1.5.2-5.el8cp.x86_64", "product": { "name": "libtcmu-0:1.5.2-5.el8cp.x86_64", "product_id": "libtcmu-0:1.5.2-5.el8cp.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/libtcmu@1.5.2-5.el8cp?arch=x86_64" } } }, { "category": "product_version", "name": "tcmu-runner-0:1.5.2-5.el8cp.x86_64", "product": { "name": "tcmu-runner-0:1.5.2-5.el8cp.x86_64", "product_id": "tcmu-runner-0:1.5.2-5.el8cp.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/tcmu-runner@1.5.2-5.el8cp?arch=x86_64" } } }, { "category": "product_version", "name": "nfs-ganesha-0:3.5-1.2.el8cp.x86_64", "product": { "name": "nfs-ganesha-0:3.5-1.2.el8cp.x86_64", "product_id": "nfs-ganesha-0:3.5-1.2.el8cp.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/nfs-ganesha@3.5-1.2.el8cp?arch=x86_64" } } }, { "category": "product_version", "name": "nfs-ganesha-ceph-0:3.5-1.2.el8cp.x86_64", "product": { "name": "nfs-ganesha-ceph-0:3.5-1.2.el8cp.x86_64", "product_id": "nfs-ganesha-ceph-0:3.5-1.2.el8cp.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/nfs-ganesha-ceph@3.5-1.2.el8cp?arch=x86_64" } } }, { "category": "product_version", "name": "nfs-ganesha-proxy-0:3.5-1.2.el8cp.x86_64", "product": { "name": "nfs-ganesha-proxy-0:3.5-1.2.el8cp.x86_64", "product_id": "nfs-ganesha-proxy-0:3.5-1.2.el8cp.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/nfs-ganesha-proxy@3.5-1.2.el8cp?arch=x86_64" } } }, { "category": "product_version", "name": "nfs-ganesha-rados-grace-0:3.5-1.2.el8cp.x86_64", "product": { "name": "nfs-ganesha-rados-grace-0:3.5-1.2.el8cp.x86_64", "product_id": "nfs-ganesha-rados-grace-0:3.5-1.2.el8cp.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/nfs-ganesha-rados-grace@3.5-1.2.el8cp?arch=x86_64" } } }, { "category": "product_version", "name": "nfs-ganesha-rados-urls-0:3.5-1.2.el8cp.x86_64", "product": { "name": "nfs-ganesha-rados-urls-0:3.5-1.2.el8cp.x86_64", "product_id": "nfs-ganesha-rados-urls-0:3.5-1.2.el8cp.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/nfs-ganesha-rados-urls@3.5-1.2.el8cp?arch=x86_64" } } }, { "category": "product_version", "name": "nfs-ganesha-rgw-0:3.5-1.2.el8cp.x86_64", "product": { "name": "nfs-ganesha-rgw-0:3.5-1.2.el8cp.x86_64", "product_id": "nfs-ganesha-rgw-0:3.5-1.2.el8cp.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/nfs-ganesha-rgw@3.5-1.2.el8cp?arch=x86_64" } } }, { "category": "product_version", "name": "nfs-ganesha-vfs-0:3.5-1.2.el8cp.x86_64", "product": { "name": "nfs-ganesha-vfs-0:3.5-1.2.el8cp.x86_64", "product_id": "nfs-ganesha-vfs-0:3.5-1.2.el8cp.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/nfs-ganesha-vfs@3.5-1.2.el8cp?arch=x86_64" } } }, { "category": "product_version", "name": "nfs-ganesha-debugsource-0:3.5-1.2.el8cp.x86_64", "product": { "name": "nfs-ganesha-debugsource-0:3.5-1.2.el8cp.x86_64", "product_id": "nfs-ganesha-debugsource-0:3.5-1.2.el8cp.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/nfs-ganesha-debugsource@3.5-1.2.el8cp?arch=x86_64" } } }, { "category": "product_version", "name": "nfs-ganesha-ceph-debuginfo-0:3.5-1.2.el8cp.x86_64", "product": { "name": "nfs-ganesha-ceph-debuginfo-0:3.5-1.2.el8cp.x86_64", "product_id": "nfs-ganesha-ceph-debuginfo-0:3.5-1.2.el8cp.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/nfs-ganesha-ceph-debuginfo@3.5-1.2.el8cp?arch=x86_64" } } }, { "category": "product_version", "name": "nfs-ganesha-debuginfo-0:3.5-1.2.el8cp.x86_64", "product": { "name": "nfs-ganesha-debuginfo-0:3.5-1.2.el8cp.x86_64", "product_id": "nfs-ganesha-debuginfo-0:3.5-1.2.el8cp.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/nfs-ganesha-debuginfo@3.5-1.2.el8cp?arch=x86_64" } } }, { "category": "product_version", "name": "nfs-ganesha-proxy-debuginfo-0:3.5-1.2.el8cp.x86_64", "product": { "name": "nfs-ganesha-proxy-debuginfo-0:3.5-1.2.el8cp.x86_64", "product_id": "nfs-ganesha-proxy-debuginfo-0:3.5-1.2.el8cp.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/nfs-ganesha-proxy-debuginfo@3.5-1.2.el8cp?arch=x86_64" } } }, { "category": "product_version", "name": "nfs-ganesha-rados-grace-debuginfo-0:3.5-1.2.el8cp.x86_64", "product": { "name": "nfs-ganesha-rados-grace-debuginfo-0:3.5-1.2.el8cp.x86_64", "product_id": "nfs-ganesha-rados-grace-debuginfo-0:3.5-1.2.el8cp.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/nfs-ganesha-rados-grace-debuginfo@3.5-1.2.el8cp?arch=x86_64" } } }, { "category": "product_version", "name": "nfs-ganesha-rados-urls-debuginfo-0:3.5-1.2.el8cp.x86_64", "product": { "name": "nfs-ganesha-rados-urls-debuginfo-0:3.5-1.2.el8cp.x86_64", "product_id": "nfs-ganesha-rados-urls-debuginfo-0:3.5-1.2.el8cp.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/nfs-ganesha-rados-urls-debuginfo@3.5-1.2.el8cp?arch=x86_64" } } }, { "category": "product_version", "name": "nfs-ganesha-rgw-debuginfo-0:3.5-1.2.el8cp.x86_64", "product": { "name": "nfs-ganesha-rgw-debuginfo-0:3.5-1.2.el8cp.x86_64", "product_id": "nfs-ganesha-rgw-debuginfo-0:3.5-1.2.el8cp.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/nfs-ganesha-rgw-debuginfo@3.5-1.2.el8cp?arch=x86_64" } } }, { "category": "product_version", "name": "nfs-ganesha-vfs-debuginfo-0:3.5-1.2.el8cp.x86_64", "product": { "name": "nfs-ganesha-vfs-debuginfo-0:3.5-1.2.el8cp.x86_64", "product_id": "nfs-ganesha-vfs-debuginfo-0:3.5-1.2.el8cp.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/nfs-ganesha-vfs-debuginfo@3.5-1.2.el8cp?arch=x86_64" } } }, { "category": "product_version", "name": "ceph-base-2:14.2.22-110.el8cp.x86_64", "product": { "name": "ceph-base-2:14.2.22-110.el8cp.x86_64", "product_id": "ceph-base-2:14.2.22-110.el8cp.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ceph-base@14.2.22-110.el8cp?arch=x86_64\u0026epoch=2" } } }, { "category": "product_version", "name": "ceph-common-2:14.2.22-110.el8cp.x86_64", "product": { "name": "ceph-common-2:14.2.22-110.el8cp.x86_64", "product_id": "ceph-common-2:14.2.22-110.el8cp.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ceph-common@14.2.22-110.el8cp?arch=x86_64\u0026epoch=2" } } }, { "category": "product_version", "name": "ceph-mgr-2:14.2.22-110.el8cp.x86_64", "product": { "name": "ceph-mgr-2:14.2.22-110.el8cp.x86_64", "product_id": "ceph-mgr-2:14.2.22-110.el8cp.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ceph-mgr@14.2.22-110.el8cp?arch=x86_64\u0026epoch=2" } } }, { "category": "product_version", "name": "ceph-mon-2:14.2.22-110.el8cp.x86_64", "product": { "name": "ceph-mon-2:14.2.22-110.el8cp.x86_64", "product_id": "ceph-mon-2:14.2.22-110.el8cp.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ceph-mon@14.2.22-110.el8cp?arch=x86_64\u0026epoch=2" } } }, { "category": "product_version", "name": "ceph-selinux-2:14.2.22-110.el8cp.x86_64", "product": { "name": "ceph-selinux-2:14.2.22-110.el8cp.x86_64", "product_id": "ceph-selinux-2:14.2.22-110.el8cp.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ceph-selinux@14.2.22-110.el8cp?arch=x86_64\u0026epoch=2" } } }, { "category": "product_version", "name": "ceph-test-2:14.2.22-110.el8cp.x86_64", "product": { "name": "ceph-test-2:14.2.22-110.el8cp.x86_64", "product_id": "ceph-test-2:14.2.22-110.el8cp.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ceph-test@14.2.22-110.el8cp?arch=x86_64\u0026epoch=2" } } }, { "category": "product_version", "name": "libcephfs-devel-2:14.2.22-110.el8cp.x86_64", "product": { "name": "libcephfs-devel-2:14.2.22-110.el8cp.x86_64", "product_id": "libcephfs-devel-2:14.2.22-110.el8cp.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/libcephfs-devel@14.2.22-110.el8cp?arch=x86_64\u0026epoch=2" } } }, { "category": "product_version", "name": "libcephfs2-2:14.2.22-110.el8cp.x86_64", "product": { "name": "libcephfs2-2:14.2.22-110.el8cp.x86_64", "product_id": "libcephfs2-2:14.2.22-110.el8cp.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/libcephfs2@14.2.22-110.el8cp?arch=x86_64\u0026epoch=2" } } }, { "category": "product_version", "name": "librados-devel-2:14.2.22-110.el8cp.x86_64", "product": { "name": "librados-devel-2:14.2.22-110.el8cp.x86_64", "product_id": "librados-devel-2:14.2.22-110.el8cp.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/librados-devel@14.2.22-110.el8cp?arch=x86_64\u0026epoch=2" } } }, { "category": "product_version", "name": "librados2-2:14.2.22-110.el8cp.x86_64", "product": { "name": "librados2-2:14.2.22-110.el8cp.x86_64", "product_id": "librados2-2:14.2.22-110.el8cp.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/librados2@14.2.22-110.el8cp?arch=x86_64\u0026epoch=2" } } }, { "category": "product_version", "name": "libradospp-devel-2:14.2.22-110.el8cp.x86_64", "product": { "name": "libradospp-devel-2:14.2.22-110.el8cp.x86_64", "product_id": "libradospp-devel-2:14.2.22-110.el8cp.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/libradospp-devel@14.2.22-110.el8cp?arch=x86_64\u0026epoch=2" } } }, { "category": "product_version", "name": "libradosstriper1-2:14.2.22-110.el8cp.x86_64", "product": { "name": "libradosstriper1-2:14.2.22-110.el8cp.x86_64", "product_id": "libradosstriper1-2:14.2.22-110.el8cp.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/libradosstriper1@14.2.22-110.el8cp?arch=x86_64\u0026epoch=2" } } }, { "category": "product_version", "name": "librbd-devel-2:14.2.22-110.el8cp.x86_64", "product": { "name": "librbd-devel-2:14.2.22-110.el8cp.x86_64", "product_id": "librbd-devel-2:14.2.22-110.el8cp.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/librbd-devel@14.2.22-110.el8cp?arch=x86_64\u0026epoch=2" } } }, { "category": "product_version", "name": "librbd1-2:14.2.22-110.el8cp.x86_64", "product": { "name": "librbd1-2:14.2.22-110.el8cp.x86_64", "product_id": "librbd1-2:14.2.22-110.el8cp.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/librbd1@14.2.22-110.el8cp?arch=x86_64\u0026epoch=2" } } }, { "category": "product_version", "name": "librgw-devel-2:14.2.22-110.el8cp.x86_64", "product": { "name": "librgw-devel-2:14.2.22-110.el8cp.x86_64", "product_id": "librgw-devel-2:14.2.22-110.el8cp.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/librgw-devel@14.2.22-110.el8cp?arch=x86_64\u0026epoch=2" } } }, { "category": "product_version", "name": "librgw2-2:14.2.22-110.el8cp.x86_64", "product": { "name": "librgw2-2:14.2.22-110.el8cp.x86_64", "product_id": "librgw2-2:14.2.22-110.el8cp.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/librgw2@14.2.22-110.el8cp?arch=x86_64\u0026epoch=2" } } }, { "category": "product_version", "name": "python3-ceph-argparse-2:14.2.22-110.el8cp.x86_64", "product": { "name": "python3-ceph-argparse-2:14.2.22-110.el8cp.x86_64", "product_id": "python3-ceph-argparse-2:14.2.22-110.el8cp.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-ceph-argparse@14.2.22-110.el8cp?arch=x86_64\u0026epoch=2" } } }, { "category": "product_version", "name": "python3-cephfs-2:14.2.22-110.el8cp.x86_64", "product": { "name": "python3-cephfs-2:14.2.22-110.el8cp.x86_64", "product_id": "python3-cephfs-2:14.2.22-110.el8cp.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-cephfs@14.2.22-110.el8cp?arch=x86_64\u0026epoch=2" } } }, { "category": "product_version", "name": "python3-rados-2:14.2.22-110.el8cp.x86_64", "product": { "name": "python3-rados-2:14.2.22-110.el8cp.x86_64", "product_id": "python3-rados-2:14.2.22-110.el8cp.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-rados@14.2.22-110.el8cp?arch=x86_64\u0026epoch=2" } } }, { "category": "product_version", "name": "python3-rbd-2:14.2.22-110.el8cp.x86_64", "product": { "name": "python3-rbd-2:14.2.22-110.el8cp.x86_64", "product_id": "python3-rbd-2:14.2.22-110.el8cp.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-rbd@14.2.22-110.el8cp?arch=x86_64\u0026epoch=2" } } }, { "category": "product_version", "name": "python3-rgw-2:14.2.22-110.el8cp.x86_64", "product": { "name": "python3-rgw-2:14.2.22-110.el8cp.x86_64", "product_id": "python3-rgw-2:14.2.22-110.el8cp.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-rgw@14.2.22-110.el8cp?arch=x86_64\u0026epoch=2" } } }, { "category": "product_version", "name": "ceph-debugsource-2:14.2.22-110.el8cp.x86_64", "product": { "name": "ceph-debugsource-2:14.2.22-110.el8cp.x86_64", "product_id": "ceph-debugsource-2:14.2.22-110.el8cp.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ceph-debugsource@14.2.22-110.el8cp?arch=x86_64\u0026epoch=2" } } }, { "category": "product_version", "name": "ceph-base-debuginfo-2:14.2.22-110.el8cp.x86_64", "product": { "name": "ceph-base-debuginfo-2:14.2.22-110.el8cp.x86_64", "product_id": "ceph-base-debuginfo-2:14.2.22-110.el8cp.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ceph-base-debuginfo@14.2.22-110.el8cp?arch=x86_64\u0026epoch=2" } } }, { "category": "product_version", "name": "ceph-common-debuginfo-2:14.2.22-110.el8cp.x86_64", "product": { "name": "ceph-common-debuginfo-2:14.2.22-110.el8cp.x86_64", "product_id": "ceph-common-debuginfo-2:14.2.22-110.el8cp.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ceph-common-debuginfo@14.2.22-110.el8cp?arch=x86_64\u0026epoch=2" } } }, { "category": "product_version", "name": "ceph-fuse-debuginfo-2:14.2.22-110.el8cp.x86_64", "product": { "name": "ceph-fuse-debuginfo-2:14.2.22-110.el8cp.x86_64", "product_id": "ceph-fuse-debuginfo-2:14.2.22-110.el8cp.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ceph-fuse-debuginfo@14.2.22-110.el8cp?arch=x86_64\u0026epoch=2" } } }, { "category": "product_version", "name": "ceph-mds-debuginfo-2:14.2.22-110.el8cp.x86_64", "product": { "name": "ceph-mds-debuginfo-2:14.2.22-110.el8cp.x86_64", "product_id": "ceph-mds-debuginfo-2:14.2.22-110.el8cp.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ceph-mds-debuginfo@14.2.22-110.el8cp?arch=x86_64\u0026epoch=2" } } }, { "category": "product_version", "name": "ceph-mgr-debuginfo-2:14.2.22-110.el8cp.x86_64", "product": { "name": "ceph-mgr-debuginfo-2:14.2.22-110.el8cp.x86_64", "product_id": "ceph-mgr-debuginfo-2:14.2.22-110.el8cp.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ceph-mgr-debuginfo@14.2.22-110.el8cp?arch=x86_64\u0026epoch=2" } } }, { "category": "product_version", "name": "ceph-mon-debuginfo-2:14.2.22-110.el8cp.x86_64", "product": { "name": "ceph-mon-debuginfo-2:14.2.22-110.el8cp.x86_64", "product_id": "ceph-mon-debuginfo-2:14.2.22-110.el8cp.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ceph-mon-debuginfo@14.2.22-110.el8cp?arch=x86_64\u0026epoch=2" } } }, { "category": "product_version", "name": "ceph-osd-debuginfo-2:14.2.22-110.el8cp.x86_64", "product": { "name": "ceph-osd-debuginfo-2:14.2.22-110.el8cp.x86_64", "product_id": "ceph-osd-debuginfo-2:14.2.22-110.el8cp.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ceph-osd-debuginfo@14.2.22-110.el8cp?arch=x86_64\u0026epoch=2" } } }, { "category": "product_version", "name": "ceph-radosgw-debuginfo-2:14.2.22-110.el8cp.x86_64", "product": { "name": "ceph-radosgw-debuginfo-2:14.2.22-110.el8cp.x86_64", "product_id": "ceph-radosgw-debuginfo-2:14.2.22-110.el8cp.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ceph-radosgw-debuginfo@14.2.22-110.el8cp?arch=x86_64\u0026epoch=2" } } }, { "category": "product_version", "name": "ceph-test-debuginfo-2:14.2.22-110.el8cp.x86_64", "product": { "name": "ceph-test-debuginfo-2:14.2.22-110.el8cp.x86_64", "product_id": "ceph-test-debuginfo-2:14.2.22-110.el8cp.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ceph-test-debuginfo@14.2.22-110.el8cp?arch=x86_64\u0026epoch=2" } } }, { "category": "product_version", "name": "libcephfs2-debuginfo-2:14.2.22-110.el8cp.x86_64", "product": { "name": "libcephfs2-debuginfo-2:14.2.22-110.el8cp.x86_64", "product_id": "libcephfs2-debuginfo-2:14.2.22-110.el8cp.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/libcephfs2-debuginfo@14.2.22-110.el8cp?arch=x86_64\u0026epoch=2" } } }, { "category": "product_version", "name": "librados-devel-debuginfo-2:14.2.22-110.el8cp.x86_64", "product": { "name": "librados-devel-debuginfo-2:14.2.22-110.el8cp.x86_64", "product_id": "librados-devel-debuginfo-2:14.2.22-110.el8cp.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/librados-devel-debuginfo@14.2.22-110.el8cp?arch=x86_64\u0026epoch=2" } } }, { "category": "product_version", "name": "librados2-debuginfo-2:14.2.22-110.el8cp.x86_64", "product": { "name": "librados2-debuginfo-2:14.2.22-110.el8cp.x86_64", "product_id": "librados2-debuginfo-2:14.2.22-110.el8cp.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/librados2-debuginfo@14.2.22-110.el8cp?arch=x86_64\u0026epoch=2" } } }, { "category": "product_version", "name": "libradosstriper1-debuginfo-2:14.2.22-110.el8cp.x86_64", "product": { "name": "libradosstriper1-debuginfo-2:14.2.22-110.el8cp.x86_64", "product_id": "libradosstriper1-debuginfo-2:14.2.22-110.el8cp.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/libradosstriper1-debuginfo@14.2.22-110.el8cp?arch=x86_64\u0026epoch=2" } } }, { "category": "product_version", "name": "librbd1-debuginfo-2:14.2.22-110.el8cp.x86_64", "product": { "name": "librbd1-debuginfo-2:14.2.22-110.el8cp.x86_64", "product_id": "librbd1-debuginfo-2:14.2.22-110.el8cp.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/librbd1-debuginfo@14.2.22-110.el8cp?arch=x86_64\u0026epoch=2" } } }, { "category": "product_version", "name": "librgw2-debuginfo-2:14.2.22-110.el8cp.x86_64", "product": { "name": "librgw2-debuginfo-2:14.2.22-110.el8cp.x86_64", "product_id": "librgw2-debuginfo-2:14.2.22-110.el8cp.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/librgw2-debuginfo@14.2.22-110.el8cp?arch=x86_64\u0026epoch=2" } } }, { "category": "product_version", "name": "python3-cephfs-debuginfo-2:14.2.22-110.el8cp.x86_64", "product": { "name": "python3-cephfs-debuginfo-2:14.2.22-110.el8cp.x86_64", "product_id": "python3-cephfs-debuginfo-2:14.2.22-110.el8cp.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-cephfs-debuginfo@14.2.22-110.el8cp?arch=x86_64\u0026epoch=2" } } }, { "category": "product_version", "name": "python3-rados-debuginfo-2:14.2.22-110.el8cp.x86_64", "product": { "name": "python3-rados-debuginfo-2:14.2.22-110.el8cp.x86_64", "product_id": "python3-rados-debuginfo-2:14.2.22-110.el8cp.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-rados-debuginfo@14.2.22-110.el8cp?arch=x86_64\u0026epoch=2" } } }, { "category": "product_version", "name": "python3-rbd-debuginfo-2:14.2.22-110.el8cp.x86_64", "product": { "name": "python3-rbd-debuginfo-2:14.2.22-110.el8cp.x86_64", "product_id": "python3-rbd-debuginfo-2:14.2.22-110.el8cp.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-rbd-debuginfo@14.2.22-110.el8cp?arch=x86_64\u0026epoch=2" } } }, { "category": "product_version", "name": "python3-rgw-debuginfo-2:14.2.22-110.el8cp.x86_64", "product": { "name": "python3-rgw-debuginfo-2:14.2.22-110.el8cp.x86_64", "product_id": "python3-rgw-debuginfo-2:14.2.22-110.el8cp.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-rgw-debuginfo@14.2.22-110.el8cp?arch=x86_64\u0026epoch=2" } } }, { "category": "product_version", "name": "rbd-fuse-debuginfo-2:14.2.22-110.el8cp.x86_64", "product": { "name": "rbd-fuse-debuginfo-2:14.2.22-110.el8cp.x86_64", "product_id": "rbd-fuse-debuginfo-2:14.2.22-110.el8cp.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/rbd-fuse-debuginfo@14.2.22-110.el8cp?arch=x86_64\u0026epoch=2" } } }, { "category": "product_version", "name": "rbd-mirror-debuginfo-2:14.2.22-110.el8cp.x86_64", "product": { "name": "rbd-mirror-debuginfo-2:14.2.22-110.el8cp.x86_64", "product_id": "rbd-mirror-debuginfo-2:14.2.22-110.el8cp.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/rbd-mirror-debuginfo@14.2.22-110.el8cp?arch=x86_64\u0026epoch=2" } } }, { "category": "product_version", "name": "rbd-nbd-debuginfo-2:14.2.22-110.el8cp.x86_64", "product": { "name": "rbd-nbd-debuginfo-2:14.2.22-110.el8cp.x86_64", "product_id": "rbd-nbd-debuginfo-2:14.2.22-110.el8cp.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/rbd-nbd-debuginfo@14.2.22-110.el8cp?arch=x86_64\u0026epoch=2" } } }, { "category": "product_version", "name": "ceph-osd-2:14.2.22-110.el8cp.x86_64", "product": { "name": "ceph-osd-2:14.2.22-110.el8cp.x86_64", "product_id": "ceph-osd-2:14.2.22-110.el8cp.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ceph-osd@14.2.22-110.el8cp?arch=x86_64\u0026epoch=2" } } }, { "category": "product_version", "name": "ceph-fuse-2:14.2.22-110.el8cp.x86_64", "product": { "name": "ceph-fuse-2:14.2.22-110.el8cp.x86_64", "product_id": "ceph-fuse-2:14.2.22-110.el8cp.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ceph-fuse@14.2.22-110.el8cp?arch=x86_64\u0026epoch=2" } } }, { "category": "product_version", "name": "ceph-mds-2:14.2.22-110.el8cp.x86_64", "product": { "name": "ceph-mds-2:14.2.22-110.el8cp.x86_64", "product_id": "ceph-mds-2:14.2.22-110.el8cp.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ceph-mds@14.2.22-110.el8cp?arch=x86_64\u0026epoch=2" } } }, { "category": "product_version", "name": "ceph-radosgw-2:14.2.22-110.el8cp.x86_64", "product": { "name": "ceph-radosgw-2:14.2.22-110.el8cp.x86_64", "product_id": "ceph-radosgw-2:14.2.22-110.el8cp.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ceph-radosgw@14.2.22-110.el8cp?arch=x86_64\u0026epoch=2" } } }, { "category": "product_version", "name": "rbd-mirror-2:14.2.22-110.el8cp.x86_64", "product": { "name": "rbd-mirror-2:14.2.22-110.el8cp.x86_64", "product_id": "rbd-mirror-2:14.2.22-110.el8cp.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/rbd-mirror@14.2.22-110.el8cp?arch=x86_64\u0026epoch=2" } } }, { "category": "product_version", "name": "rbd-nbd-2:14.2.22-110.el8cp.x86_64", "product": { "name": "rbd-nbd-2:14.2.22-110.el8cp.x86_64", "product_id": "rbd-nbd-2:14.2.22-110.el8cp.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/rbd-nbd@14.2.22-110.el8cp?arch=x86_64\u0026epoch=2" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "libntirpc-0:3.4-1.1.el7cp.ppc64le", "product": { "name": "libntirpc-0:3.4-1.1.el7cp.ppc64le", "product_id": "libntirpc-0:3.4-1.1.el7cp.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/libntirpc@3.4-1.1.el7cp?arch=ppc64le" } } }, { "category": "product_version", "name": "libntirpc-debuginfo-0:3.4-1.1.el7cp.ppc64le", "product": { "name": "libntirpc-debuginfo-0:3.4-1.1.el7cp.ppc64le", "product_id": "libntirpc-debuginfo-0:3.4-1.1.el7cp.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/libntirpc-debuginfo@3.4-1.1.el7cp?arch=ppc64le" } } }, { "category": "product_version", "name": "libtcmu-0:1.5.2-5.el7cp.ppc64le", "product": { "name": "libtcmu-0:1.5.2-5.el7cp.ppc64le", "product_id": "libtcmu-0:1.5.2-5.el7cp.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/libtcmu@1.5.2-5.el7cp?arch=ppc64le" } } }, { "category": "product_version", "name": "tcmu-runner-0:1.5.2-5.el7cp.ppc64le", "product": { "name": "tcmu-runner-0:1.5.2-5.el7cp.ppc64le", "product_id": "tcmu-runner-0:1.5.2-5.el7cp.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/tcmu-runner@1.5.2-5.el7cp?arch=ppc64le" } } }, { "category": "product_version", "name": "nfs-ganesha-0:3.5-1.2.el7cp.ppc64le", "product": { "name": "nfs-ganesha-0:3.5-1.2.el7cp.ppc64le", "product_id": "nfs-ganesha-0:3.5-1.2.el7cp.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/nfs-ganesha@3.5-1.2.el7cp?arch=ppc64le" } } }, { "category": "product_version", "name": "nfs-ganesha-ceph-0:3.5-1.2.el7cp.ppc64le", "product": { "name": "nfs-ganesha-ceph-0:3.5-1.2.el7cp.ppc64le", "product_id": "nfs-ganesha-ceph-0:3.5-1.2.el7cp.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/nfs-ganesha-ceph@3.5-1.2.el7cp?arch=ppc64le" } } }, { "category": "product_version", "name": "nfs-ganesha-proxy-0:3.5-1.2.el7cp.ppc64le", "product": { "name": "nfs-ganesha-proxy-0:3.5-1.2.el7cp.ppc64le", "product_id": "nfs-ganesha-proxy-0:3.5-1.2.el7cp.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/nfs-ganesha-proxy@3.5-1.2.el7cp?arch=ppc64le" } } }, { "category": "product_version", "name": "nfs-ganesha-rados-grace-0:3.5-1.2.el7cp.ppc64le", "product": { "name": "nfs-ganesha-rados-grace-0:3.5-1.2.el7cp.ppc64le", "product_id": "nfs-ganesha-rados-grace-0:3.5-1.2.el7cp.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/nfs-ganesha-rados-grace@3.5-1.2.el7cp?arch=ppc64le" } } }, { "category": "product_version", "name": "nfs-ganesha-rados-urls-0:3.5-1.2.el7cp.ppc64le", "product": { "name": "nfs-ganesha-rados-urls-0:3.5-1.2.el7cp.ppc64le", "product_id": "nfs-ganesha-rados-urls-0:3.5-1.2.el7cp.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/nfs-ganesha-rados-urls@3.5-1.2.el7cp?arch=ppc64le" } } }, { "category": "product_version", "name": "nfs-ganesha-rgw-0:3.5-1.2.el7cp.ppc64le", "product": { "name": "nfs-ganesha-rgw-0:3.5-1.2.el7cp.ppc64le", "product_id": "nfs-ganesha-rgw-0:3.5-1.2.el7cp.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/nfs-ganesha-rgw@3.5-1.2.el7cp?arch=ppc64le" } } }, { "category": "product_version", "name": "nfs-ganesha-vfs-0:3.5-1.2.el7cp.ppc64le", "product": { "name": "nfs-ganesha-vfs-0:3.5-1.2.el7cp.ppc64le", "product_id": "nfs-ganesha-vfs-0:3.5-1.2.el7cp.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/nfs-ganesha-vfs@3.5-1.2.el7cp?arch=ppc64le" } } }, { "category": "product_version", "name": "nfs-ganesha-debuginfo-0:3.5-1.2.el7cp.ppc64le", "product": { "name": "nfs-ganesha-debuginfo-0:3.5-1.2.el7cp.ppc64le", "product_id": "nfs-ganesha-debuginfo-0:3.5-1.2.el7cp.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/nfs-ganesha-debuginfo@3.5-1.2.el7cp?arch=ppc64le" } } }, { "category": "product_version", "name": "ceph-base-2:14.2.22-110.el7cp.ppc64le", "product": { "name": "ceph-base-2:14.2.22-110.el7cp.ppc64le", "product_id": "ceph-base-2:14.2.22-110.el7cp.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/ceph-base@14.2.22-110.el7cp?arch=ppc64le\u0026epoch=2" } } }, { "category": "product_version", "name": "ceph-common-2:14.2.22-110.el7cp.ppc64le", "product": { "name": "ceph-common-2:14.2.22-110.el7cp.ppc64le", "product_id": "ceph-common-2:14.2.22-110.el7cp.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/ceph-common@14.2.22-110.el7cp?arch=ppc64le\u0026epoch=2" } } }, { "category": "product_version", "name": "ceph-mgr-2:14.2.22-110.el7cp.ppc64le", "product": { "name": "ceph-mgr-2:14.2.22-110.el7cp.ppc64le", "product_id": "ceph-mgr-2:14.2.22-110.el7cp.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/ceph-mgr@14.2.22-110.el7cp?arch=ppc64le\u0026epoch=2" } } }, { "category": "product_version", "name": "ceph-mon-2:14.2.22-110.el7cp.ppc64le", "product": { "name": "ceph-mon-2:14.2.22-110.el7cp.ppc64le", "product_id": "ceph-mon-2:14.2.22-110.el7cp.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/ceph-mon@14.2.22-110.el7cp?arch=ppc64le\u0026epoch=2" } } }, { "category": "product_version", "name": "ceph-selinux-2:14.2.22-110.el7cp.ppc64le", "product": { "name": "ceph-selinux-2:14.2.22-110.el7cp.ppc64le", "product_id": "ceph-selinux-2:14.2.22-110.el7cp.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/ceph-selinux@14.2.22-110.el7cp?arch=ppc64le\u0026epoch=2" } } }, { "category": "product_version", "name": "ceph-test-2:14.2.22-110.el7cp.ppc64le", "product": { "name": "ceph-test-2:14.2.22-110.el7cp.ppc64le", "product_id": "ceph-test-2:14.2.22-110.el7cp.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/ceph-test@14.2.22-110.el7cp?arch=ppc64le\u0026epoch=2" } } }, { "category": "product_version", "name": "libcephfs-devel-2:14.2.22-110.el7cp.ppc64le", "product": { "name": "libcephfs-devel-2:14.2.22-110.el7cp.ppc64le", "product_id": "libcephfs-devel-2:14.2.22-110.el7cp.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/libcephfs-devel@14.2.22-110.el7cp?arch=ppc64le\u0026epoch=2" } } }, { "category": "product_version", "name": "libcephfs2-2:14.2.22-110.el7cp.ppc64le", "product": { "name": "libcephfs2-2:14.2.22-110.el7cp.ppc64le", "product_id": "libcephfs2-2:14.2.22-110.el7cp.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/libcephfs2@14.2.22-110.el7cp?arch=ppc64le\u0026epoch=2" } } }, { "category": "product_version", "name": "librados-devel-2:14.2.22-110.el7cp.ppc64le", "product": { "name": "librados-devel-2:14.2.22-110.el7cp.ppc64le", "product_id": "librados-devel-2:14.2.22-110.el7cp.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/librados-devel@14.2.22-110.el7cp?arch=ppc64le\u0026epoch=2" } } }, { "category": "product_version", "name": "librados2-2:14.2.22-110.el7cp.ppc64le", "product": { "name": "librados2-2:14.2.22-110.el7cp.ppc64le", "product_id": "librados2-2:14.2.22-110.el7cp.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/librados2@14.2.22-110.el7cp?arch=ppc64le\u0026epoch=2" } } }, { "category": "product_version", "name": "libradospp-devel-2:14.2.22-110.el7cp.ppc64le", "product": { "name": "libradospp-devel-2:14.2.22-110.el7cp.ppc64le", "product_id": "libradospp-devel-2:14.2.22-110.el7cp.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/libradospp-devel@14.2.22-110.el7cp?arch=ppc64le\u0026epoch=2" } } }, { "category": "product_version", "name": "libradosstriper1-2:14.2.22-110.el7cp.ppc64le", "product": { "name": "libradosstriper1-2:14.2.22-110.el7cp.ppc64le", "product_id": "libradosstriper1-2:14.2.22-110.el7cp.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/libradosstriper1@14.2.22-110.el7cp?arch=ppc64le\u0026epoch=2" } } }, { "category": "product_version", "name": "librbd-devel-2:14.2.22-110.el7cp.ppc64le", "product": { "name": "librbd-devel-2:14.2.22-110.el7cp.ppc64le", "product_id": "librbd-devel-2:14.2.22-110.el7cp.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/librbd-devel@14.2.22-110.el7cp?arch=ppc64le\u0026epoch=2" } } }, { "category": "product_version", "name": "librbd1-2:14.2.22-110.el7cp.ppc64le", "product": { "name": "librbd1-2:14.2.22-110.el7cp.ppc64le", "product_id": "librbd1-2:14.2.22-110.el7cp.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/librbd1@14.2.22-110.el7cp?arch=ppc64le\u0026epoch=2" } } }, { "category": "product_version", "name": "librgw-devel-2:14.2.22-110.el7cp.ppc64le", "product": { "name": "librgw-devel-2:14.2.22-110.el7cp.ppc64le", "product_id": "librgw-devel-2:14.2.22-110.el7cp.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/librgw-devel@14.2.22-110.el7cp?arch=ppc64le\u0026epoch=2" } } }, { "category": "product_version", "name": "librgw2-2:14.2.22-110.el7cp.ppc64le", "product": { "name": "librgw2-2:14.2.22-110.el7cp.ppc64le", "product_id": "librgw2-2:14.2.22-110.el7cp.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/librgw2@14.2.22-110.el7cp?arch=ppc64le\u0026epoch=2" } } }, { "category": "product_version", "name": "python-ceph-argparse-2:14.2.22-110.el7cp.ppc64le", "product": { "name": "python-ceph-argparse-2:14.2.22-110.el7cp.ppc64le", "product_id": "python-ceph-argparse-2:14.2.22-110.el7cp.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-ceph-argparse@14.2.22-110.el7cp?arch=ppc64le\u0026epoch=2" } } }, { "category": "product_version", "name": "python-cephfs-2:14.2.22-110.el7cp.ppc64le", "product": { "name": "python-cephfs-2:14.2.22-110.el7cp.ppc64le", "product_id": "python-cephfs-2:14.2.22-110.el7cp.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-cephfs@14.2.22-110.el7cp?arch=ppc64le\u0026epoch=2" } } }, { "category": "product_version", "name": "python-rados-2:14.2.22-110.el7cp.ppc64le", "product": { "name": "python-rados-2:14.2.22-110.el7cp.ppc64le", "product_id": "python-rados-2:14.2.22-110.el7cp.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-rados@14.2.22-110.el7cp?arch=ppc64le\u0026epoch=2" } } }, { "category": "product_version", "name": "python-rbd-2:14.2.22-110.el7cp.ppc64le", "product": { "name": "python-rbd-2:14.2.22-110.el7cp.ppc64le", "product_id": "python-rbd-2:14.2.22-110.el7cp.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-rbd@14.2.22-110.el7cp?arch=ppc64le\u0026epoch=2" } } }, { "category": "product_version", "name": "python-rgw-2:14.2.22-110.el7cp.ppc64le", "product": { "name": "python-rgw-2:14.2.22-110.el7cp.ppc64le", "product_id": "python-rgw-2:14.2.22-110.el7cp.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-rgw@14.2.22-110.el7cp?arch=ppc64le\u0026epoch=2" } } }, { "category": "product_version", "name": "ceph-debuginfo-2:14.2.22-110.el7cp.ppc64le", "product": { "name": "ceph-debuginfo-2:14.2.22-110.el7cp.ppc64le", "product_id": "ceph-debuginfo-2:14.2.22-110.el7cp.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/ceph-debuginfo@14.2.22-110.el7cp?arch=ppc64le\u0026epoch=2" } } }, { "category": "product_version", "name": "ceph-osd-2:14.2.22-110.el7cp.ppc64le", "product": { "name": "ceph-osd-2:14.2.22-110.el7cp.ppc64le", "product_id": "ceph-osd-2:14.2.22-110.el7cp.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/ceph-osd@14.2.22-110.el7cp?arch=ppc64le\u0026epoch=2" } } }, { "category": "product_version", "name": "ceph-fuse-2:14.2.22-110.el7cp.ppc64le", "product": { "name": "ceph-fuse-2:14.2.22-110.el7cp.ppc64le", "product_id": "ceph-fuse-2:14.2.22-110.el7cp.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/ceph-fuse@14.2.22-110.el7cp?arch=ppc64le\u0026epoch=2" } } }, { "category": "product_version", "name": "ceph-mds-2:14.2.22-110.el7cp.ppc64le", "product": { "name": "ceph-mds-2:14.2.22-110.el7cp.ppc64le", "product_id": "ceph-mds-2:14.2.22-110.el7cp.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/ceph-mds@14.2.22-110.el7cp?arch=ppc64le\u0026epoch=2" } } }, { "category": "product_version", "name": "ceph-radosgw-2:14.2.22-110.el7cp.ppc64le", "product": { "name": "ceph-radosgw-2:14.2.22-110.el7cp.ppc64le", "product_id": "ceph-radosgw-2:14.2.22-110.el7cp.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/ceph-radosgw@14.2.22-110.el7cp?arch=ppc64le\u0026epoch=2" } } }, { "category": "product_version", "name": "rbd-mirror-2:14.2.22-110.el7cp.ppc64le", "product": { "name": "rbd-mirror-2:14.2.22-110.el7cp.ppc64le", "product_id": "rbd-mirror-2:14.2.22-110.el7cp.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/rbd-mirror@14.2.22-110.el7cp?arch=ppc64le\u0026epoch=2" } } }, { "category": "product_version", "name": "rbd-nbd-2:14.2.22-110.el7cp.ppc64le", "product": { "name": "rbd-nbd-2:14.2.22-110.el7cp.ppc64le", "product_id": "rbd-nbd-2:14.2.22-110.el7cp.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/rbd-nbd@14.2.22-110.el7cp?arch=ppc64le\u0026epoch=2" } } }, { "category": "product_version", "name": "libntirpc-0:3.4-1.1.el8cp.ppc64le", "product": { "name": "libntirpc-0:3.4-1.1.el8cp.ppc64le", "product_id": "libntirpc-0:3.4-1.1.el8cp.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/libntirpc@3.4-1.1.el8cp?arch=ppc64le" } } }, { "category": "product_version", "name": "libntirpc-debugsource-0:3.4-1.1.el8cp.ppc64le", "product": { "name": "libntirpc-debugsource-0:3.4-1.1.el8cp.ppc64le", "product_id": "libntirpc-debugsource-0:3.4-1.1.el8cp.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/libntirpc-debugsource@3.4-1.1.el8cp?arch=ppc64le" } } }, { "category": "product_version", "name": "libntirpc-debuginfo-0:3.4-1.1.el8cp.ppc64le", "product": { "name": "libntirpc-debuginfo-0:3.4-1.1.el8cp.ppc64le", "product_id": "libntirpc-debuginfo-0:3.4-1.1.el8cp.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/libntirpc-debuginfo@3.4-1.1.el8cp?arch=ppc64le" } } }, { "category": "product_version", "name": "libtcmu-0:1.5.2-5.el8cp.ppc64le", "product": { "name": "libtcmu-0:1.5.2-5.el8cp.ppc64le", "product_id": "libtcmu-0:1.5.2-5.el8cp.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/libtcmu@1.5.2-5.el8cp?arch=ppc64le" } } }, { "category": "product_version", "name": "tcmu-runner-0:1.5.2-5.el8cp.ppc64le", "product": { "name": "tcmu-runner-0:1.5.2-5.el8cp.ppc64le", "product_id": "tcmu-runner-0:1.5.2-5.el8cp.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/tcmu-runner@1.5.2-5.el8cp?arch=ppc64le" } } }, { "category": "product_version", "name": "nfs-ganesha-0:3.5-1.2.el8cp.ppc64le", "product": { "name": "nfs-ganesha-0:3.5-1.2.el8cp.ppc64le", "product_id": "nfs-ganesha-0:3.5-1.2.el8cp.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/nfs-ganesha@3.5-1.2.el8cp?arch=ppc64le" } } }, { "category": "product_version", "name": "nfs-ganesha-ceph-0:3.5-1.2.el8cp.ppc64le", "product": { "name": "nfs-ganesha-ceph-0:3.5-1.2.el8cp.ppc64le", "product_id": "nfs-ganesha-ceph-0:3.5-1.2.el8cp.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/nfs-ganesha-ceph@3.5-1.2.el8cp?arch=ppc64le" } } }, { "category": "product_version", "name": "nfs-ganesha-proxy-0:3.5-1.2.el8cp.ppc64le", "product": { "name": "nfs-ganesha-proxy-0:3.5-1.2.el8cp.ppc64le", "product_id": "nfs-ganesha-proxy-0:3.5-1.2.el8cp.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/nfs-ganesha-proxy@3.5-1.2.el8cp?arch=ppc64le" } } }, { "category": "product_version", "name": "nfs-ganesha-rados-grace-0:3.5-1.2.el8cp.ppc64le", "product": { "name": "nfs-ganesha-rados-grace-0:3.5-1.2.el8cp.ppc64le", "product_id": "nfs-ganesha-rados-grace-0:3.5-1.2.el8cp.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/nfs-ganesha-rados-grace@3.5-1.2.el8cp?arch=ppc64le" } } }, { "category": "product_version", "name": "nfs-ganesha-rados-urls-0:3.5-1.2.el8cp.ppc64le", "product": { "name": "nfs-ganesha-rados-urls-0:3.5-1.2.el8cp.ppc64le", "product_id": "nfs-ganesha-rados-urls-0:3.5-1.2.el8cp.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/nfs-ganesha-rados-urls@3.5-1.2.el8cp?arch=ppc64le" } } }, { "category": "product_version", "name": "nfs-ganesha-rgw-0:3.5-1.2.el8cp.ppc64le", "product": { "name": "nfs-ganesha-rgw-0:3.5-1.2.el8cp.ppc64le", "product_id": "nfs-ganesha-rgw-0:3.5-1.2.el8cp.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/nfs-ganesha-rgw@3.5-1.2.el8cp?arch=ppc64le" } } }, { "category": "product_version", "name": "nfs-ganesha-vfs-0:3.5-1.2.el8cp.ppc64le", "product": { "name": "nfs-ganesha-vfs-0:3.5-1.2.el8cp.ppc64le", "product_id": "nfs-ganesha-vfs-0:3.5-1.2.el8cp.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/nfs-ganesha-vfs@3.5-1.2.el8cp?arch=ppc64le" } } }, { "category": "product_version", "name": "nfs-ganesha-debugsource-0:3.5-1.2.el8cp.ppc64le", "product": { "name": "nfs-ganesha-debugsource-0:3.5-1.2.el8cp.ppc64le", "product_id": "nfs-ganesha-debugsource-0:3.5-1.2.el8cp.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/nfs-ganesha-debugsource@3.5-1.2.el8cp?arch=ppc64le" } } }, { "category": "product_version", "name": "nfs-ganesha-ceph-debuginfo-0:3.5-1.2.el8cp.ppc64le", "product": { "name": "nfs-ganesha-ceph-debuginfo-0:3.5-1.2.el8cp.ppc64le", "product_id": "nfs-ganesha-ceph-debuginfo-0:3.5-1.2.el8cp.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/nfs-ganesha-ceph-debuginfo@3.5-1.2.el8cp?arch=ppc64le" } } }, { "category": "product_version", "name": "nfs-ganesha-debuginfo-0:3.5-1.2.el8cp.ppc64le", "product": { "name": "nfs-ganesha-debuginfo-0:3.5-1.2.el8cp.ppc64le", "product_id": "nfs-ganesha-debuginfo-0:3.5-1.2.el8cp.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/nfs-ganesha-debuginfo@3.5-1.2.el8cp?arch=ppc64le" } } }, { "category": "product_version", "name": "nfs-ganesha-proxy-debuginfo-0:3.5-1.2.el8cp.ppc64le", "product": { "name": "nfs-ganesha-proxy-debuginfo-0:3.5-1.2.el8cp.ppc64le", "product_id": "nfs-ganesha-proxy-debuginfo-0:3.5-1.2.el8cp.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/nfs-ganesha-proxy-debuginfo@3.5-1.2.el8cp?arch=ppc64le" } } }, { "category": "product_version", "name": "nfs-ganesha-rados-grace-debuginfo-0:3.5-1.2.el8cp.ppc64le", "product": { "name": "nfs-ganesha-rados-grace-debuginfo-0:3.5-1.2.el8cp.ppc64le", "product_id": "nfs-ganesha-rados-grace-debuginfo-0:3.5-1.2.el8cp.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/nfs-ganesha-rados-grace-debuginfo@3.5-1.2.el8cp?arch=ppc64le" } } }, { "category": "product_version", "name": "nfs-ganesha-rados-urls-debuginfo-0:3.5-1.2.el8cp.ppc64le", "product": { "name": "nfs-ganesha-rados-urls-debuginfo-0:3.5-1.2.el8cp.ppc64le", "product_id": "nfs-ganesha-rados-urls-debuginfo-0:3.5-1.2.el8cp.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/nfs-ganesha-rados-urls-debuginfo@3.5-1.2.el8cp?arch=ppc64le" } } }, { "category": "product_version", "name": "nfs-ganesha-rgw-debuginfo-0:3.5-1.2.el8cp.ppc64le", "product": { "name": "nfs-ganesha-rgw-debuginfo-0:3.5-1.2.el8cp.ppc64le", "product_id": "nfs-ganesha-rgw-debuginfo-0:3.5-1.2.el8cp.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/nfs-ganesha-rgw-debuginfo@3.5-1.2.el8cp?arch=ppc64le" } } }, { "category": "product_version", "name": "nfs-ganesha-vfs-debuginfo-0:3.5-1.2.el8cp.ppc64le", "product": { "name": "nfs-ganesha-vfs-debuginfo-0:3.5-1.2.el8cp.ppc64le", "product_id": "nfs-ganesha-vfs-debuginfo-0:3.5-1.2.el8cp.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/nfs-ganesha-vfs-debuginfo@3.5-1.2.el8cp?arch=ppc64le" } } }, { "category": "product_version", "name": "ceph-base-2:14.2.22-110.el8cp.ppc64le", "product": { "name": "ceph-base-2:14.2.22-110.el8cp.ppc64le", "product_id": "ceph-base-2:14.2.22-110.el8cp.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/ceph-base@14.2.22-110.el8cp?arch=ppc64le\u0026epoch=2" } } }, { "category": "product_version", "name": "ceph-common-2:14.2.22-110.el8cp.ppc64le", "product": { "name": "ceph-common-2:14.2.22-110.el8cp.ppc64le", "product_id": "ceph-common-2:14.2.22-110.el8cp.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/ceph-common@14.2.22-110.el8cp?arch=ppc64le\u0026epoch=2" } } }, { "category": "product_version", "name": "ceph-mgr-2:14.2.22-110.el8cp.ppc64le", "product": { "name": "ceph-mgr-2:14.2.22-110.el8cp.ppc64le", "product_id": "ceph-mgr-2:14.2.22-110.el8cp.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/ceph-mgr@14.2.22-110.el8cp?arch=ppc64le\u0026epoch=2" } } }, { "category": "product_version", "name": "ceph-mon-2:14.2.22-110.el8cp.ppc64le", "product": { "name": "ceph-mon-2:14.2.22-110.el8cp.ppc64le", "product_id": "ceph-mon-2:14.2.22-110.el8cp.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/ceph-mon@14.2.22-110.el8cp?arch=ppc64le\u0026epoch=2" } } }, { "category": "product_version", "name": "ceph-selinux-2:14.2.22-110.el8cp.ppc64le", "product": { "name": "ceph-selinux-2:14.2.22-110.el8cp.ppc64le", "product_id": "ceph-selinux-2:14.2.22-110.el8cp.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/ceph-selinux@14.2.22-110.el8cp?arch=ppc64le\u0026epoch=2" } } }, { "category": "product_version", "name": "ceph-test-2:14.2.22-110.el8cp.ppc64le", "product": { "name": "ceph-test-2:14.2.22-110.el8cp.ppc64le", "product_id": "ceph-test-2:14.2.22-110.el8cp.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/ceph-test@14.2.22-110.el8cp?arch=ppc64le\u0026epoch=2" } } }, { "category": "product_version", "name": "libcephfs-devel-2:14.2.22-110.el8cp.ppc64le", "product": { "name": "libcephfs-devel-2:14.2.22-110.el8cp.ppc64le", "product_id": "libcephfs-devel-2:14.2.22-110.el8cp.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/libcephfs-devel@14.2.22-110.el8cp?arch=ppc64le\u0026epoch=2" } } }, { "category": "product_version", "name": "libcephfs2-2:14.2.22-110.el8cp.ppc64le", "product": { "name": "libcephfs2-2:14.2.22-110.el8cp.ppc64le", "product_id": "libcephfs2-2:14.2.22-110.el8cp.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/libcephfs2@14.2.22-110.el8cp?arch=ppc64le\u0026epoch=2" } } }, { "category": "product_version", "name": "librados-devel-2:14.2.22-110.el8cp.ppc64le", "product": { "name": "librados-devel-2:14.2.22-110.el8cp.ppc64le", "product_id": "librados-devel-2:14.2.22-110.el8cp.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/librados-devel@14.2.22-110.el8cp?arch=ppc64le\u0026epoch=2" } } }, { "category": "product_version", "name": "librados2-2:14.2.22-110.el8cp.ppc64le", "product": { "name": "librados2-2:14.2.22-110.el8cp.ppc64le", "product_id": "librados2-2:14.2.22-110.el8cp.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/librados2@14.2.22-110.el8cp?arch=ppc64le\u0026epoch=2" } } }, { "category": "product_version", "name": "libradospp-devel-2:14.2.22-110.el8cp.ppc64le", "product": { "name": "libradospp-devel-2:14.2.22-110.el8cp.ppc64le", "product_id": "libradospp-devel-2:14.2.22-110.el8cp.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/libradospp-devel@14.2.22-110.el8cp?arch=ppc64le\u0026epoch=2" } } }, { "category": "product_version", "name": "libradosstriper1-2:14.2.22-110.el8cp.ppc64le", "product": { "name": "libradosstriper1-2:14.2.22-110.el8cp.ppc64le", "product_id": "libradosstriper1-2:14.2.22-110.el8cp.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/libradosstriper1@14.2.22-110.el8cp?arch=ppc64le\u0026epoch=2" } } }, { "category": "product_version", "name": "librbd-devel-2:14.2.22-110.el8cp.ppc64le", "product": { "name": "librbd-devel-2:14.2.22-110.el8cp.ppc64le", "product_id": "librbd-devel-2:14.2.22-110.el8cp.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/librbd-devel@14.2.22-110.el8cp?arch=ppc64le\u0026epoch=2" } } }, { "category": "product_version", "name": "librbd1-2:14.2.22-110.el8cp.ppc64le", "product": { "name": "librbd1-2:14.2.22-110.el8cp.ppc64le", "product_id": "librbd1-2:14.2.22-110.el8cp.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/librbd1@14.2.22-110.el8cp?arch=ppc64le\u0026epoch=2" } } }, { "category": "product_version", "name": "librgw-devel-2:14.2.22-110.el8cp.ppc64le", "product": { "name": "librgw-devel-2:14.2.22-110.el8cp.ppc64le", "product_id": "librgw-devel-2:14.2.22-110.el8cp.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/librgw-devel@14.2.22-110.el8cp?arch=ppc64le\u0026epoch=2" } } }, { "category": "product_version", "name": "librgw2-2:14.2.22-110.el8cp.ppc64le", "product": { "name": "librgw2-2:14.2.22-110.el8cp.ppc64le", "product_id": "librgw2-2:14.2.22-110.el8cp.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/librgw2@14.2.22-110.el8cp?arch=ppc64le\u0026epoch=2" } } }, { "category": "product_version", "name": "python3-ceph-argparse-2:14.2.22-110.el8cp.ppc64le", "product": { "name": "python3-ceph-argparse-2:14.2.22-110.el8cp.ppc64le", "product_id": "python3-ceph-argparse-2:14.2.22-110.el8cp.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-ceph-argparse@14.2.22-110.el8cp?arch=ppc64le\u0026epoch=2" } } }, { "category": "product_version", "name": "python3-cephfs-2:14.2.22-110.el8cp.ppc64le", "product": { "name": "python3-cephfs-2:14.2.22-110.el8cp.ppc64le", "product_id": "python3-cephfs-2:14.2.22-110.el8cp.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-cephfs@14.2.22-110.el8cp?arch=ppc64le\u0026epoch=2" } } }, { "category": "product_version", "name": "python3-rados-2:14.2.22-110.el8cp.ppc64le", "product": { "name": "python3-rados-2:14.2.22-110.el8cp.ppc64le", "product_id": "python3-rados-2:14.2.22-110.el8cp.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-rados@14.2.22-110.el8cp?arch=ppc64le\u0026epoch=2" } } }, { "category": "product_version", "name": "python3-rbd-2:14.2.22-110.el8cp.ppc64le", "product": { "name": "python3-rbd-2:14.2.22-110.el8cp.ppc64le", "product_id": "python3-rbd-2:14.2.22-110.el8cp.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-rbd@14.2.22-110.el8cp?arch=ppc64le\u0026epoch=2" } } }, { "category": "product_version", "name": "python3-rgw-2:14.2.22-110.el8cp.ppc64le", "product": { "name": "python3-rgw-2:14.2.22-110.el8cp.ppc64le", "product_id": "python3-rgw-2:14.2.22-110.el8cp.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-rgw@14.2.22-110.el8cp?arch=ppc64le\u0026epoch=2" } } }, { "category": "product_version", "name": "ceph-debugsource-2:14.2.22-110.el8cp.ppc64le", "product": { "name": "ceph-debugsource-2:14.2.22-110.el8cp.ppc64le", "product_id": "ceph-debugsource-2:14.2.22-110.el8cp.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/ceph-debugsource@14.2.22-110.el8cp?arch=ppc64le\u0026epoch=2" } } }, { "category": "product_version", "name": "ceph-base-debuginfo-2:14.2.22-110.el8cp.ppc64le", "product": { "name": "ceph-base-debuginfo-2:14.2.22-110.el8cp.ppc64le", "product_id": "ceph-base-debuginfo-2:14.2.22-110.el8cp.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/ceph-base-debuginfo@14.2.22-110.el8cp?arch=ppc64le\u0026epoch=2" } } }, { "category": "product_version", "name": "ceph-common-debuginfo-2:14.2.22-110.el8cp.ppc64le", "product": { "name": "ceph-common-debuginfo-2:14.2.22-110.el8cp.ppc64le", "product_id": "ceph-common-debuginfo-2:14.2.22-110.el8cp.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/ceph-common-debuginfo@14.2.22-110.el8cp?arch=ppc64le\u0026epoch=2" } } }, { "category": "product_version", "name": "ceph-fuse-debuginfo-2:14.2.22-110.el8cp.ppc64le", "product": { "name": "ceph-fuse-debuginfo-2:14.2.22-110.el8cp.ppc64le", "product_id": "ceph-fuse-debuginfo-2:14.2.22-110.el8cp.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/ceph-fuse-debuginfo@14.2.22-110.el8cp?arch=ppc64le\u0026epoch=2" } } }, { "category": "product_version", "name": "ceph-mds-debuginfo-2:14.2.22-110.el8cp.ppc64le", "product": { "name": "ceph-mds-debuginfo-2:14.2.22-110.el8cp.ppc64le", "product_id": "ceph-mds-debuginfo-2:14.2.22-110.el8cp.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/ceph-mds-debuginfo@14.2.22-110.el8cp?arch=ppc64le\u0026epoch=2" } } }, { "category": "product_version", "name": "ceph-mgr-debuginfo-2:14.2.22-110.el8cp.ppc64le", "product": { "name": "ceph-mgr-debuginfo-2:14.2.22-110.el8cp.ppc64le", "product_id": "ceph-mgr-debuginfo-2:14.2.22-110.el8cp.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/ceph-mgr-debuginfo@14.2.22-110.el8cp?arch=ppc64le\u0026epoch=2" } } }, { "category": "product_version", "name": "ceph-mon-debuginfo-2:14.2.22-110.el8cp.ppc64le", "product": { "name": "ceph-mon-debuginfo-2:14.2.22-110.el8cp.ppc64le", "product_id": "ceph-mon-debuginfo-2:14.2.22-110.el8cp.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/ceph-mon-debuginfo@14.2.22-110.el8cp?arch=ppc64le\u0026epoch=2" } } }, { "category": "product_version", "name": "ceph-osd-debuginfo-2:14.2.22-110.el8cp.ppc64le", "product": { "name": "ceph-osd-debuginfo-2:14.2.22-110.el8cp.ppc64le", "product_id": "ceph-osd-debuginfo-2:14.2.22-110.el8cp.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/ceph-osd-debuginfo@14.2.22-110.el8cp?arch=ppc64le\u0026epoch=2" } } }, { "category": "product_version", "name": "ceph-radosgw-debuginfo-2:14.2.22-110.el8cp.ppc64le", "product": { "name": "ceph-radosgw-debuginfo-2:14.2.22-110.el8cp.ppc64le", "product_id": "ceph-radosgw-debuginfo-2:14.2.22-110.el8cp.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/ceph-radosgw-debuginfo@14.2.22-110.el8cp?arch=ppc64le\u0026epoch=2" } } }, { "category": "product_version", "name": "ceph-test-debuginfo-2:14.2.22-110.el8cp.ppc64le", "product": { "name": "ceph-test-debuginfo-2:14.2.22-110.el8cp.ppc64le", "product_id": "ceph-test-debuginfo-2:14.2.22-110.el8cp.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/ceph-test-debuginfo@14.2.22-110.el8cp?arch=ppc64le\u0026epoch=2" } } }, { "category": "product_version", "name": "libcephfs2-debuginfo-2:14.2.22-110.el8cp.ppc64le", "product": { "name": "libcephfs2-debuginfo-2:14.2.22-110.el8cp.ppc64le", "product_id": "libcephfs2-debuginfo-2:14.2.22-110.el8cp.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/libcephfs2-debuginfo@14.2.22-110.el8cp?arch=ppc64le\u0026epoch=2" } } }, { "category": "product_version", "name": "librados-devel-debuginfo-2:14.2.22-110.el8cp.ppc64le", "product": { "name": "librados-devel-debuginfo-2:14.2.22-110.el8cp.ppc64le", "product_id": "librados-devel-debuginfo-2:14.2.22-110.el8cp.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/librados-devel-debuginfo@14.2.22-110.el8cp?arch=ppc64le\u0026epoch=2" } } }, { "category": "product_version", "name": "librados2-debuginfo-2:14.2.22-110.el8cp.ppc64le", "product": { "name": "librados2-debuginfo-2:14.2.22-110.el8cp.ppc64le", "product_id": "librados2-debuginfo-2:14.2.22-110.el8cp.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/librados2-debuginfo@14.2.22-110.el8cp?arch=ppc64le\u0026epoch=2" } } }, { "category": "product_version", "name": "libradosstriper1-debuginfo-2:14.2.22-110.el8cp.ppc64le", "product": { "name": "libradosstriper1-debuginfo-2:14.2.22-110.el8cp.ppc64le", "product_id": "libradosstriper1-debuginfo-2:14.2.22-110.el8cp.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/libradosstriper1-debuginfo@14.2.22-110.el8cp?arch=ppc64le\u0026epoch=2" } } }, { "category": "product_version", "name": "librbd1-debuginfo-2:14.2.22-110.el8cp.ppc64le", "product": { "name": "librbd1-debuginfo-2:14.2.22-110.el8cp.ppc64le", "product_id": "librbd1-debuginfo-2:14.2.22-110.el8cp.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/librbd1-debuginfo@14.2.22-110.el8cp?arch=ppc64le\u0026epoch=2" } } }, { "category": "product_version", "name": "librgw2-debuginfo-2:14.2.22-110.el8cp.ppc64le", "product": { "name": "librgw2-debuginfo-2:14.2.22-110.el8cp.ppc64le", "product_id": "librgw2-debuginfo-2:14.2.22-110.el8cp.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/librgw2-debuginfo@14.2.22-110.el8cp?arch=ppc64le\u0026epoch=2" } } }, { "category": "product_version", "name": "python3-cephfs-debuginfo-2:14.2.22-110.el8cp.ppc64le", "product": { "name": "python3-cephfs-debuginfo-2:14.2.22-110.el8cp.ppc64le", "product_id": "python3-cephfs-debuginfo-2:14.2.22-110.el8cp.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-cephfs-debuginfo@14.2.22-110.el8cp?arch=ppc64le\u0026epoch=2" } } }, { "category": "product_version", "name": "python3-rados-debuginfo-2:14.2.22-110.el8cp.ppc64le", "product": { "name": "python3-rados-debuginfo-2:14.2.22-110.el8cp.ppc64le", "product_id": "python3-rados-debuginfo-2:14.2.22-110.el8cp.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-rados-debuginfo@14.2.22-110.el8cp?arch=ppc64le\u0026epoch=2" } } }, { "category": "product_version", "name": "python3-rbd-debuginfo-2:14.2.22-110.el8cp.ppc64le", "product": { "name": "python3-rbd-debuginfo-2:14.2.22-110.el8cp.ppc64le", "product_id": "python3-rbd-debuginfo-2:14.2.22-110.el8cp.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-rbd-debuginfo@14.2.22-110.el8cp?arch=ppc64le\u0026epoch=2" } } }, { "category": "product_version", "name": "python3-rgw-debuginfo-2:14.2.22-110.el8cp.ppc64le", "product": { "name": "python3-rgw-debuginfo-2:14.2.22-110.el8cp.ppc64le", "product_id": "python3-rgw-debuginfo-2:14.2.22-110.el8cp.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-rgw-debuginfo@14.2.22-110.el8cp?arch=ppc64le\u0026epoch=2" } } }, { "category": "product_version", "name": "rbd-fuse-debuginfo-2:14.2.22-110.el8cp.ppc64le", "product": { "name": "rbd-fuse-debuginfo-2:14.2.22-110.el8cp.ppc64le", "product_id": "rbd-fuse-debuginfo-2:14.2.22-110.el8cp.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/rbd-fuse-debuginfo@14.2.22-110.el8cp?arch=ppc64le\u0026epoch=2" } } }, { "category": "product_version", "name": "rbd-mirror-debuginfo-2:14.2.22-110.el8cp.ppc64le", "product": { "name": "rbd-mirror-debuginfo-2:14.2.22-110.el8cp.ppc64le", "product_id": "rbd-mirror-debuginfo-2:14.2.22-110.el8cp.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/rbd-mirror-debuginfo@14.2.22-110.el8cp?arch=ppc64le\u0026epoch=2" } } }, { "category": "product_version", "name": "rbd-nbd-debuginfo-2:14.2.22-110.el8cp.ppc64le", "product": { "name": "rbd-nbd-debuginfo-2:14.2.22-110.el8cp.ppc64le", "product_id": "rbd-nbd-debuginfo-2:14.2.22-110.el8cp.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/rbd-nbd-debuginfo@14.2.22-110.el8cp?arch=ppc64le\u0026epoch=2" } } }, { "category": "product_version", "name": "ceph-osd-2:14.2.22-110.el8cp.ppc64le", "product": { "name": "ceph-osd-2:14.2.22-110.el8cp.ppc64le", "product_id": "ceph-osd-2:14.2.22-110.el8cp.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/ceph-osd@14.2.22-110.el8cp?arch=ppc64le\u0026epoch=2" } } }, { "category": "product_version", "name": "ceph-fuse-2:14.2.22-110.el8cp.ppc64le", "product": { "name": "ceph-fuse-2:14.2.22-110.el8cp.ppc64le", "product_id": "ceph-fuse-2:14.2.22-110.el8cp.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/ceph-fuse@14.2.22-110.el8cp?arch=ppc64le\u0026epoch=2" } } }, { "category": "product_version", "name": "ceph-mds-2:14.2.22-110.el8cp.ppc64le", "product": { "name": "ceph-mds-2:14.2.22-110.el8cp.ppc64le", "product_id": "ceph-mds-2:14.2.22-110.el8cp.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/ceph-mds@14.2.22-110.el8cp?arch=ppc64le\u0026epoch=2" } } }, { "category": "product_version", "name": "ceph-radosgw-2:14.2.22-110.el8cp.ppc64le", "product": { "name": "ceph-radosgw-2:14.2.22-110.el8cp.ppc64le", "product_id": "ceph-radosgw-2:14.2.22-110.el8cp.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/ceph-radosgw@14.2.22-110.el8cp?arch=ppc64le\u0026epoch=2" } } }, { "category": "product_version", "name": "rbd-mirror-2:14.2.22-110.el8cp.ppc64le", "product": { "name": "rbd-mirror-2:14.2.22-110.el8cp.ppc64le", "product_id": "rbd-mirror-2:14.2.22-110.el8cp.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/rbd-mirror@14.2.22-110.el8cp?arch=ppc64le\u0026epoch=2" } } }, { "category": "product_version", "name": "rbd-nbd-2:14.2.22-110.el8cp.ppc64le", "product": { "name": "rbd-nbd-2:14.2.22-110.el8cp.ppc64le", "product_id": "rbd-nbd-2:14.2.22-110.el8cp.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/rbd-nbd@14.2.22-110.el8cp?arch=ppc64le\u0026epoch=2" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "nfs-ganesha-selinux-0:3.5-1.2.el7cp.noarch", "product": { "name": "nfs-ganesha-selinux-0:3.5-1.2.el7cp.noarch", "product_id": "nfs-ganesha-selinux-0:3.5-1.2.el7cp.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/nfs-ganesha-selinux@3.5-1.2.el7cp?arch=noarch" } } }, { "category": "product_version", "name": "ceph-iscsi-0:3.4-5.el7cp.noarch", "product": { "name": "ceph-iscsi-0:3.4-5.el7cp.noarch", "product_id": "ceph-iscsi-0:3.4-5.el7cp.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/ceph-iscsi@3.4-5.el7cp?arch=noarch" } } }, { "category": "product_version", "name": "ceph-ansible-0:4.0.70.3-1.el7cp.noarch", "product": { "name": "ceph-ansible-0:4.0.70.3-1.el7cp.noarch", "product_id": "ceph-ansible-0:4.0.70.3-1.el7cp.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/ceph-ansible@4.0.70.3-1.el7cp?arch=noarch" } } }, { "category": "product_version", "name": "ceph-grafana-dashboards-2:14.2.22-110.el7cp.noarch", "product": { "name": "ceph-grafana-dashboards-2:14.2.22-110.el7cp.noarch", "product_id": "ceph-grafana-dashboards-2:14.2.22-110.el7cp.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/ceph-grafana-dashboards@14.2.22-110.el7cp?arch=noarch\u0026epoch=2" } } }, { "category": "product_version", "name": "ceph-mgr-dashboard-2:14.2.22-110.el7cp.noarch", "product": { "name": "ceph-mgr-dashboard-2:14.2.22-110.el7cp.noarch", "product_id": "ceph-mgr-dashboard-2:14.2.22-110.el7cp.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/ceph-mgr-dashboard@14.2.22-110.el7cp?arch=noarch\u0026epoch=2" } } }, { "category": "product_version", "name": "ceph-mgr-diskprediction-local-2:14.2.22-110.el7cp.noarch", "product": { "name": "ceph-mgr-diskprediction-local-2:14.2.22-110.el7cp.noarch", "product_id": "ceph-mgr-diskprediction-local-2:14.2.22-110.el7cp.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/ceph-mgr-diskprediction-local@14.2.22-110.el7cp?arch=noarch\u0026epoch=2" } } }, { "category": "product_version", "name": "ceph-mgr-k8sevents-2:14.2.22-110.el7cp.noarch", "product": { "name": "ceph-mgr-k8sevents-2:14.2.22-110.el7cp.noarch", "product_id": "ceph-mgr-k8sevents-2:14.2.22-110.el7cp.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/ceph-mgr-k8sevents@14.2.22-110.el7cp?arch=noarch\u0026epoch=2" } } }, { "category": "product_version", "name": "ceph-mgr-rook-2:14.2.22-110.el7cp.noarch", "product": { "name": "ceph-mgr-rook-2:14.2.22-110.el7cp.noarch", "product_id": "ceph-mgr-rook-2:14.2.22-110.el7cp.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/ceph-mgr-rook@14.2.22-110.el7cp?arch=noarch\u0026epoch=2" } } }, { "category": "product_version", "name": "nfs-ganesha-selinux-0:3.5-1.2.el8cp.noarch", "product": { "name": "nfs-ganesha-selinux-0:3.5-1.2.el8cp.noarch", "product_id": "nfs-ganesha-selinux-0:3.5-1.2.el8cp.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/nfs-ganesha-selinux@3.5-1.2.el8cp?arch=noarch" } } }, { "category": "product_version", "name": "python3-rsa-0:4.8-1.el8cp.noarch", "product": { "name": "python3-rsa-0:4.8-1.el8cp.noarch", "product_id": "python3-rsa-0:4.8-1.el8cp.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-rsa@4.8-1.el8cp?arch=noarch" } } }, { "category": "product_version", "name": "ceph-iscsi-0:3.4-5.el8cp.noarch", "product": { "name": "ceph-iscsi-0:3.4-5.el8cp.noarch", "product_id": "ceph-iscsi-0:3.4-5.el8cp.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/ceph-iscsi@3.4-5.el8cp?arch=noarch" } } }, { "category": "product_version", "name": "ceph-ansible-0:4.0.70.3-1.el8cp.noarch", "product": { "name": "ceph-ansible-0:4.0.70.3-1.el8cp.noarch", "product_id": "ceph-ansible-0:4.0.70.3-1.el8cp.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/ceph-ansible@4.0.70.3-1.el8cp?arch=noarch" } } }, { "category": "product_version", "name": "ceph-grafana-dashboards-2:14.2.22-110.el8cp.noarch", "product": { "name": "ceph-grafana-dashboards-2:14.2.22-110.el8cp.noarch", "product_id": "ceph-grafana-dashboards-2:14.2.22-110.el8cp.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/ceph-grafana-dashboards@14.2.22-110.el8cp?arch=noarch\u0026epoch=2" } } }, { "category": "product_version", "name": "ceph-mgr-dashboard-2:14.2.22-110.el8cp.noarch", "product": { "name": "ceph-mgr-dashboard-2:14.2.22-110.el8cp.noarch", "product_id": "ceph-mgr-dashboard-2:14.2.22-110.el8cp.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/ceph-mgr-dashboard@14.2.22-110.el8cp?arch=noarch\u0026epoch=2" } } }, { "category": "product_version", "name": "ceph-mgr-diskprediction-local-2:14.2.22-110.el8cp.noarch", "product": { "name": "ceph-mgr-diskprediction-local-2:14.2.22-110.el8cp.noarch", "product_id": "ceph-mgr-diskprediction-local-2:14.2.22-110.el8cp.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/ceph-mgr-diskprediction-local@14.2.22-110.el8cp?arch=noarch\u0026epoch=2" } } }, { "category": "product_version", "name": "ceph-mgr-k8sevents-2:14.2.22-110.el8cp.noarch", "product": { "name": "ceph-mgr-k8sevents-2:14.2.22-110.el8cp.noarch", "product_id": "ceph-mgr-k8sevents-2:14.2.22-110.el8cp.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/ceph-mgr-k8sevents@14.2.22-110.el8cp?arch=noarch\u0026epoch=2" } } }, { "category": "product_version", "name": "ceph-mgr-rook-2:14.2.22-110.el8cp.noarch", "product": { "name": "ceph-mgr-rook-2:14.2.22-110.el8cp.noarch", "product_id": "ceph-mgr-rook-2:14.2.22-110.el8cp.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/ceph-mgr-rook@14.2.22-110.el8cp?arch=noarch\u0026epoch=2" } } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "libntirpc-0:3.4-1.1.el8cp.s390x", "product": { "name": "libntirpc-0:3.4-1.1.el8cp.s390x", "product_id": "libntirpc-0:3.4-1.1.el8cp.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/libntirpc@3.4-1.1.el8cp?arch=s390x" } } }, { "category": "product_version", "name": "libntirpc-debugsource-0:3.4-1.1.el8cp.s390x", "product": { "name": "libntirpc-debugsource-0:3.4-1.1.el8cp.s390x", "product_id": "libntirpc-debugsource-0:3.4-1.1.el8cp.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/libntirpc-debugsource@3.4-1.1.el8cp?arch=s390x" } } }, { "category": "product_version", "name": "libntirpc-debuginfo-0:3.4-1.1.el8cp.s390x", "product": { "name": "libntirpc-debuginfo-0:3.4-1.1.el8cp.s390x", "product_id": "libntirpc-debuginfo-0:3.4-1.1.el8cp.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/libntirpc-debuginfo@3.4-1.1.el8cp?arch=s390x" } } }, { "category": "product_version", "name": "libtcmu-0:1.5.2-5.el8cp.s390x", "product": { "name": "libtcmu-0:1.5.2-5.el8cp.s390x", "product_id": "libtcmu-0:1.5.2-5.el8cp.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/libtcmu@1.5.2-5.el8cp?arch=s390x" } } }, { "category": "product_version", "name": "tcmu-runner-0:1.5.2-5.el8cp.s390x", "product": { "name": "tcmu-runner-0:1.5.2-5.el8cp.s390x", "product_id": "tcmu-runner-0:1.5.2-5.el8cp.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/tcmu-runner@1.5.2-5.el8cp?arch=s390x" } } }, { "category": "product_version", "name": "nfs-ganesha-0:3.5-1.2.el8cp.s390x", "product": { "name": "nfs-ganesha-0:3.5-1.2.el8cp.s390x", "product_id": "nfs-ganesha-0:3.5-1.2.el8cp.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/nfs-ganesha@3.5-1.2.el8cp?arch=s390x" } } }, { "category": "product_version", "name": "nfs-ganesha-ceph-0:3.5-1.2.el8cp.s390x", "product": { "name": "nfs-ganesha-ceph-0:3.5-1.2.el8cp.s390x", "product_id": "nfs-ganesha-ceph-0:3.5-1.2.el8cp.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/nfs-ganesha-ceph@3.5-1.2.el8cp?arch=s390x" } } }, { "category": "product_version", "name": "nfs-ganesha-proxy-0:3.5-1.2.el8cp.s390x", "product": { "name": "nfs-ganesha-proxy-0:3.5-1.2.el8cp.s390x", "product_id": "nfs-ganesha-proxy-0:3.5-1.2.el8cp.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/nfs-ganesha-proxy@3.5-1.2.el8cp?arch=s390x" } } }, { "category": "product_version", "name": "nfs-ganesha-rados-grace-0:3.5-1.2.el8cp.s390x", "product": { "name": "nfs-ganesha-rados-grace-0:3.5-1.2.el8cp.s390x", "product_id": "nfs-ganesha-rados-grace-0:3.5-1.2.el8cp.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/nfs-ganesha-rados-grace@3.5-1.2.el8cp?arch=s390x" } } }, { "category": "product_version", "name": "nfs-ganesha-rados-urls-0:3.5-1.2.el8cp.s390x", "product": { "name": "nfs-ganesha-rados-urls-0:3.5-1.2.el8cp.s390x", "product_id": "nfs-ganesha-rados-urls-0:3.5-1.2.el8cp.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/nfs-ganesha-rados-urls@3.5-1.2.el8cp?arch=s390x" } } }, { "category": "product_version", "name": "nfs-ganesha-rgw-0:3.5-1.2.el8cp.s390x", "product": { "name": "nfs-ganesha-rgw-0:3.5-1.2.el8cp.s390x", "product_id": "nfs-ganesha-rgw-0:3.5-1.2.el8cp.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/nfs-ganesha-rgw@3.5-1.2.el8cp?arch=s390x" } } }, { "category": "product_version", "name": "nfs-ganesha-vfs-0:3.5-1.2.el8cp.s390x", "product": { "name": "nfs-ganesha-vfs-0:3.5-1.2.el8cp.s390x", "product_id": "nfs-ganesha-vfs-0:3.5-1.2.el8cp.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/nfs-ganesha-vfs@3.5-1.2.el8cp?arch=s390x" } } }, { "category": "product_version", "name": "nfs-ganesha-debugsource-0:3.5-1.2.el8cp.s390x", "product": { "name": "nfs-ganesha-debugsource-0:3.5-1.2.el8cp.s390x", "product_id": "nfs-ganesha-debugsource-0:3.5-1.2.el8cp.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/nfs-ganesha-debugsource@3.5-1.2.el8cp?arch=s390x" } } }, { "category": "product_version", "name": "nfs-ganesha-ceph-debuginfo-0:3.5-1.2.el8cp.s390x", "product": { "name": "nfs-ganesha-ceph-debuginfo-0:3.5-1.2.el8cp.s390x", "product_id": "nfs-ganesha-ceph-debuginfo-0:3.5-1.2.el8cp.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/nfs-ganesha-ceph-debuginfo@3.5-1.2.el8cp?arch=s390x" } } }, { "category": "product_version", "name": "nfs-ganesha-debuginfo-0:3.5-1.2.el8cp.s390x", "product": { "name": "nfs-ganesha-debuginfo-0:3.5-1.2.el8cp.s390x", "product_id": "nfs-ganesha-debuginfo-0:3.5-1.2.el8cp.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/nfs-ganesha-debuginfo@3.5-1.2.el8cp?arch=s390x" } } }, { "category": "product_version", "name": "nfs-ganesha-proxy-debuginfo-0:3.5-1.2.el8cp.s390x", "product": { "name": "nfs-ganesha-proxy-debuginfo-0:3.5-1.2.el8cp.s390x", "product_id": "nfs-ganesha-proxy-debuginfo-0:3.5-1.2.el8cp.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/nfs-ganesha-proxy-debuginfo@3.5-1.2.el8cp?arch=s390x" } } }, { "category": "product_version", "name": "nfs-ganesha-rados-grace-debuginfo-0:3.5-1.2.el8cp.s390x", "product": { "name": "nfs-ganesha-rados-grace-debuginfo-0:3.5-1.2.el8cp.s390x", "product_id": "nfs-ganesha-rados-grace-debuginfo-0:3.5-1.2.el8cp.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/nfs-ganesha-rados-grace-debuginfo@3.5-1.2.el8cp?arch=s390x" } } }, { "category": "product_version", "name": "nfs-ganesha-rados-urls-debuginfo-0:3.5-1.2.el8cp.s390x", "product": { "name": "nfs-ganesha-rados-urls-debuginfo-0:3.5-1.2.el8cp.s390x", "product_id": "nfs-ganesha-rados-urls-debuginfo-0:3.5-1.2.el8cp.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/nfs-ganesha-rados-urls-debuginfo@3.5-1.2.el8cp?arch=s390x" } } }, { "category": "product_version", "name": "nfs-ganesha-rgw-debuginfo-0:3.5-1.2.el8cp.s390x", "product": { "name": "nfs-ganesha-rgw-debuginfo-0:3.5-1.2.el8cp.s390x", "product_id": "nfs-ganesha-rgw-debuginfo-0:3.5-1.2.el8cp.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/nfs-ganesha-rgw-debuginfo@3.5-1.2.el8cp?arch=s390x" } } }, { "category": "product_version", "name": "nfs-ganesha-vfs-debuginfo-0:3.5-1.2.el8cp.s390x", "product": { "name": "nfs-ganesha-vfs-debuginfo-0:3.5-1.2.el8cp.s390x", "product_id": "nfs-ganesha-vfs-debuginfo-0:3.5-1.2.el8cp.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/nfs-ganesha-vfs-debuginfo@3.5-1.2.el8cp?arch=s390x" } } }, { "category": "product_version", "name": "ceph-base-2:14.2.22-110.el8cp.s390x", "product": { "name": "ceph-base-2:14.2.22-110.el8cp.s390x", "product_id": "ceph-base-2:14.2.22-110.el8cp.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/ceph-base@14.2.22-110.el8cp?arch=s390x\u0026epoch=2" } } }, { "category": "product_version", "name": "ceph-common-2:14.2.22-110.el8cp.s390x", "product": { "name": "ceph-common-2:14.2.22-110.el8cp.s390x", "product_id": "ceph-common-2:14.2.22-110.el8cp.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/ceph-common@14.2.22-110.el8cp?arch=s390x\u0026epoch=2" } } }, { "category": "product_version", "name": "ceph-mgr-2:14.2.22-110.el8cp.s390x", "product": { "name": "ceph-mgr-2:14.2.22-110.el8cp.s390x", "product_id": "ceph-mgr-2:14.2.22-110.el8cp.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/ceph-mgr@14.2.22-110.el8cp?arch=s390x\u0026epoch=2" } } }, { "category": "product_version", "name": "ceph-mon-2:14.2.22-110.el8cp.s390x", "product": { "name": "ceph-mon-2:14.2.22-110.el8cp.s390x", "product_id": "ceph-mon-2:14.2.22-110.el8cp.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/ceph-mon@14.2.22-110.el8cp?arch=s390x\u0026epoch=2" } } }, { "category": "product_version", "name": "ceph-selinux-2:14.2.22-110.el8cp.s390x", "product": { "name": "ceph-selinux-2:14.2.22-110.el8cp.s390x", "product_id": "ceph-selinux-2:14.2.22-110.el8cp.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/ceph-selinux@14.2.22-110.el8cp?arch=s390x\u0026epoch=2" } } }, { "category": "product_version", "name": "ceph-test-2:14.2.22-110.el8cp.s390x", "product": { "name": "ceph-test-2:14.2.22-110.el8cp.s390x", "product_id": "ceph-test-2:14.2.22-110.el8cp.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/ceph-test@14.2.22-110.el8cp?arch=s390x\u0026epoch=2" } } }, { "category": "product_version", "name": "libcephfs-devel-2:14.2.22-110.el8cp.s390x", "product": { "name": "libcephfs-devel-2:14.2.22-110.el8cp.s390x", "product_id": "libcephfs-devel-2:14.2.22-110.el8cp.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/libcephfs-devel@14.2.22-110.el8cp?arch=s390x\u0026epoch=2" } } }, { "category": "product_version", "name": "libcephfs2-2:14.2.22-110.el8cp.s390x", "product": { "name": "libcephfs2-2:14.2.22-110.el8cp.s390x", "product_id": "libcephfs2-2:14.2.22-110.el8cp.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/libcephfs2@14.2.22-110.el8cp?arch=s390x\u0026epoch=2" } } }, { "category": "product_version", "name": "librados-devel-2:14.2.22-110.el8cp.s390x", "product": { "name": "librados-devel-2:14.2.22-110.el8cp.s390x", "product_id": "librados-devel-2:14.2.22-110.el8cp.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/librados-devel@14.2.22-110.el8cp?arch=s390x\u0026epoch=2" } } }, { "category": "product_version", "name": "librados2-2:14.2.22-110.el8cp.s390x", "product": { "name": "librados2-2:14.2.22-110.el8cp.s390x", "product_id": "librados2-2:14.2.22-110.el8cp.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/librados2@14.2.22-110.el8cp?arch=s390x\u0026epoch=2" } } }, { "category": "product_version", "name": "libradospp-devel-2:14.2.22-110.el8cp.s390x", "product": { "name": "libradospp-devel-2:14.2.22-110.el8cp.s390x", "product_id": "libradospp-devel-2:14.2.22-110.el8cp.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/libradospp-devel@14.2.22-110.el8cp?arch=s390x\u0026epoch=2" } } }, { "category": "product_version", "name": "libradosstriper1-2:14.2.22-110.el8cp.s390x", "product": { "name": "libradosstriper1-2:14.2.22-110.el8cp.s390x", "product_id": "libradosstriper1-2:14.2.22-110.el8cp.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/libradosstriper1@14.2.22-110.el8cp?arch=s390x\u0026epoch=2" } } }, { "category": "product_version", "name": "librbd-devel-2:14.2.22-110.el8cp.s390x", "product": { "name": "librbd-devel-2:14.2.22-110.el8cp.s390x", "product_id": "librbd-devel-2:14.2.22-110.el8cp.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/librbd-devel@14.2.22-110.el8cp?arch=s390x\u0026epoch=2" } } }, { "category": "product_version", "name": "librbd1-2:14.2.22-110.el8cp.s390x", "product": { "name": "librbd1-2:14.2.22-110.el8cp.s390x", "product_id": "librbd1-2:14.2.22-110.el8cp.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/librbd1@14.2.22-110.el8cp?arch=s390x\u0026epoch=2" } } }, { "category": "product_version", "name": "librgw-devel-2:14.2.22-110.el8cp.s390x", "product": { "name": "librgw-devel-2:14.2.22-110.el8cp.s390x", "product_id": "librgw-devel-2:14.2.22-110.el8cp.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/librgw-devel@14.2.22-110.el8cp?arch=s390x\u0026epoch=2" } } }, { "category": "product_version", "name": "librgw2-2:14.2.22-110.el8cp.s390x", "product": { "name": "librgw2-2:14.2.22-110.el8cp.s390x", "product_id": "librgw2-2:14.2.22-110.el8cp.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/librgw2@14.2.22-110.el8cp?arch=s390x\u0026epoch=2" } } }, { "category": "product_version", "name": "python3-ceph-argparse-2:14.2.22-110.el8cp.s390x", "product": { "name": "python3-ceph-argparse-2:14.2.22-110.el8cp.s390x", "product_id": "python3-ceph-argparse-2:14.2.22-110.el8cp.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-ceph-argparse@14.2.22-110.el8cp?arch=s390x\u0026epoch=2" } } }, { "category": "product_version", "name": "python3-cephfs-2:14.2.22-110.el8cp.s390x", "product": { "name": "python3-cephfs-2:14.2.22-110.el8cp.s390x", "product_id": "python3-cephfs-2:14.2.22-110.el8cp.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-cephfs@14.2.22-110.el8cp?arch=s390x\u0026epoch=2" } } }, { "category": "product_version", "name": "python3-rados-2:14.2.22-110.el8cp.s390x", "product": { "name": "python3-rados-2:14.2.22-110.el8cp.s390x", "product_id": "python3-rados-2:14.2.22-110.el8cp.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-rados@14.2.22-110.el8cp?arch=s390x\u0026epoch=2" } } }, { "category": "product_version", "name": "python3-rbd-2:14.2.22-110.el8cp.s390x", "product": { "name": "python3-rbd-2:14.2.22-110.el8cp.s390x", "product_id": "python3-rbd-2:14.2.22-110.el8cp.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-rbd@14.2.22-110.el8cp?arch=s390x\u0026epoch=2" } } }, { "category": "product_version", "name": "python3-rgw-2:14.2.22-110.el8cp.s390x", "product": { "name": "python3-rgw-2:14.2.22-110.el8cp.s390x", "product_id": "python3-rgw-2:14.2.22-110.el8cp.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-rgw@14.2.22-110.el8cp?arch=s390x\u0026epoch=2" } } }, { "category": "product_version", "name": "ceph-debugsource-2:14.2.22-110.el8cp.s390x", "product": { "name": "ceph-debugsource-2:14.2.22-110.el8cp.s390x", "product_id": "ceph-debugsource-2:14.2.22-110.el8cp.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/ceph-debugsource@14.2.22-110.el8cp?arch=s390x\u0026epoch=2" } } }, { "category": "product_version", "name": "ceph-base-debuginfo-2:14.2.22-110.el8cp.s390x", "product": { "name": "ceph-base-debuginfo-2:14.2.22-110.el8cp.s390x", "product_id": "ceph-base-debuginfo-2:14.2.22-110.el8cp.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/ceph-base-debuginfo@14.2.22-110.el8cp?arch=s390x\u0026epoch=2" } } }, { "category": "product_version", "name": "ceph-common-debuginfo-2:14.2.22-110.el8cp.s390x", "product": { "name": "ceph-common-debuginfo-2:14.2.22-110.el8cp.s390x", "product_id": "ceph-common-debuginfo-2:14.2.22-110.el8cp.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/ceph-common-debuginfo@14.2.22-110.el8cp?arch=s390x\u0026epoch=2" } } }, { "category": "product_version", "name": "ceph-fuse-debuginfo-2:14.2.22-110.el8cp.s390x", "product": { "name": "ceph-fuse-debuginfo-2:14.2.22-110.el8cp.s390x", "product_id": "ceph-fuse-debuginfo-2:14.2.22-110.el8cp.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/ceph-fuse-debuginfo@14.2.22-110.el8cp?arch=s390x\u0026epoch=2" } } }, { "category": "product_version", "name": "ceph-mds-debuginfo-2:14.2.22-110.el8cp.s390x", "product": { "name": "ceph-mds-debuginfo-2:14.2.22-110.el8cp.s390x", "product_id": "ceph-mds-debuginfo-2:14.2.22-110.el8cp.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/ceph-mds-debuginfo@14.2.22-110.el8cp?arch=s390x\u0026epoch=2" } } }, { "category": "product_version", "name": "ceph-mgr-debuginfo-2:14.2.22-110.el8cp.s390x", "product": { "name": "ceph-mgr-debuginfo-2:14.2.22-110.el8cp.s390x", "product_id": "ceph-mgr-debuginfo-2:14.2.22-110.el8cp.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/ceph-mgr-debuginfo@14.2.22-110.el8cp?arch=s390x\u0026epoch=2" } } }, { "category": "product_version", "name": "ceph-mon-debuginfo-2:14.2.22-110.el8cp.s390x", "product": { "name": "ceph-mon-debuginfo-2:14.2.22-110.el8cp.s390x", "product_id": "ceph-mon-debuginfo-2:14.2.22-110.el8cp.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/ceph-mon-debuginfo@14.2.22-110.el8cp?arch=s390x\u0026epoch=2" } } }, { "category": "product_version", "name": "ceph-osd-debuginfo-2:14.2.22-110.el8cp.s390x", "product": { "name": "ceph-osd-debuginfo-2:14.2.22-110.el8cp.s390x", "product_id": "ceph-osd-debuginfo-2:14.2.22-110.el8cp.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/ceph-osd-debuginfo@14.2.22-110.el8cp?arch=s390x\u0026epoch=2" } } }, { "category": "product_version", "name": "ceph-radosgw-debuginfo-2:14.2.22-110.el8cp.s390x", "product": { "name": "ceph-radosgw-debuginfo-2:14.2.22-110.el8cp.s390x", "product_id": "ceph-radosgw-debuginfo-2:14.2.22-110.el8cp.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/ceph-radosgw-debuginfo@14.2.22-110.el8cp?arch=s390x\u0026epoch=2" } } }, { "category": "product_version", "name": "ceph-test-debuginfo-2:14.2.22-110.el8cp.s390x", "product": { "name": "ceph-test-debuginfo-2:14.2.22-110.el8cp.s390x", "product_id": "ceph-test-debuginfo-2:14.2.22-110.el8cp.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/ceph-test-debuginfo@14.2.22-110.el8cp?arch=s390x\u0026epoch=2" } } }, { "category": "product_version", "name": "libcephfs2-debuginfo-2:14.2.22-110.el8cp.s390x", "product": { "name": "libcephfs2-debuginfo-2:14.2.22-110.el8cp.s390x", "product_id": "libcephfs2-debuginfo-2:14.2.22-110.el8cp.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/libcephfs2-debuginfo@14.2.22-110.el8cp?arch=s390x\u0026epoch=2" } } }, { "category": "product_version", "name": "librados-devel-debuginfo-2:14.2.22-110.el8cp.s390x", "product": { "name": "librados-devel-debuginfo-2:14.2.22-110.el8cp.s390x", "product_id": "librados-devel-debuginfo-2:14.2.22-110.el8cp.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/librados-devel-debuginfo@14.2.22-110.el8cp?arch=s390x\u0026epoch=2" } } }, { "category": "product_version", "name": "librados2-debuginfo-2:14.2.22-110.el8cp.s390x", "product": { "name": "librados2-debuginfo-2:14.2.22-110.el8cp.s390x", "product_id": "librados2-debuginfo-2:14.2.22-110.el8cp.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/librados2-debuginfo@14.2.22-110.el8cp?arch=s390x\u0026epoch=2" } } }, { "category": "product_version", "name": "libradosstriper1-debuginfo-2:14.2.22-110.el8cp.s390x", "product": { "name": "libradosstriper1-debuginfo-2:14.2.22-110.el8cp.s390x", "product_id": "libradosstriper1-debuginfo-2:14.2.22-110.el8cp.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/libradosstriper1-debuginfo@14.2.22-110.el8cp?arch=s390x\u0026epoch=2" } } }, { "category": "product_version", "name": "librbd1-debuginfo-2:14.2.22-110.el8cp.s390x", "product": { "name": "librbd1-debuginfo-2:14.2.22-110.el8cp.s390x", "product_id": "librbd1-debuginfo-2:14.2.22-110.el8cp.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/librbd1-debuginfo@14.2.22-110.el8cp?arch=s390x\u0026epoch=2" } } }, { "category": "product_version", "name": "librgw2-debuginfo-2:14.2.22-110.el8cp.s390x", "product": { "name": "librgw2-debuginfo-2:14.2.22-110.el8cp.s390x", "product_id": "librgw2-debuginfo-2:14.2.22-110.el8cp.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/librgw2-debuginfo@14.2.22-110.el8cp?arch=s390x\u0026epoch=2" } } }, { "category": "product_version", "name": "python3-cephfs-debuginfo-2:14.2.22-110.el8cp.s390x", "product": { "name": "python3-cephfs-debuginfo-2:14.2.22-110.el8cp.s390x", "product_id": "python3-cephfs-debuginfo-2:14.2.22-110.el8cp.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-cephfs-debuginfo@14.2.22-110.el8cp?arch=s390x\u0026epoch=2" } } }, { "category": "product_version", "name": "python3-rados-debuginfo-2:14.2.22-110.el8cp.s390x", "product": { "name": "python3-rados-debuginfo-2:14.2.22-110.el8cp.s390x", "product_id": "python3-rados-debuginfo-2:14.2.22-110.el8cp.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-rados-debuginfo@14.2.22-110.el8cp?arch=s390x\u0026epoch=2" } } }, { "category": "product_version", "name": "python3-rbd-debuginfo-2:14.2.22-110.el8cp.s390x", "product": { "name": "python3-rbd-debuginfo-2:14.2.22-110.el8cp.s390x", "product_id": "python3-rbd-debuginfo-2:14.2.22-110.el8cp.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-rbd-debuginfo@14.2.22-110.el8cp?arch=s390x\u0026epoch=2" } } }, { "category": "product_version", "name": "python3-rgw-debuginfo-2:14.2.22-110.el8cp.s390x", "product": { "name": "python3-rgw-debuginfo-2:14.2.22-110.el8cp.s390x", "product_id": "python3-rgw-debuginfo-2:14.2.22-110.el8cp.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-rgw-debuginfo@14.2.22-110.el8cp?arch=s390x\u0026epoch=2" } } }, { "category": "product_version", "name": "rbd-fuse-debuginfo-2:14.2.22-110.el8cp.s390x", "product": { "name": "rbd-fuse-debuginfo-2:14.2.22-110.el8cp.s390x", "product_id": "rbd-fuse-debuginfo-2:14.2.22-110.el8cp.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/rbd-fuse-debuginfo@14.2.22-110.el8cp?arch=s390x\u0026epoch=2" } } }, { "category": "product_version", "name": "rbd-mirror-debuginfo-2:14.2.22-110.el8cp.s390x", "product": { "name": "rbd-mirror-debuginfo-2:14.2.22-110.el8cp.s390x", "product_id": "rbd-mirror-debuginfo-2:14.2.22-110.el8cp.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/rbd-mirror-debuginfo@14.2.22-110.el8cp?arch=s390x\u0026epoch=2" } } }, { "category": "product_version", "name": "rbd-nbd-debuginfo-2:14.2.22-110.el8cp.s390x", "product": { "name": "rbd-nbd-debuginfo-2:14.2.22-110.el8cp.s390x", "product_id": "rbd-nbd-debuginfo-2:14.2.22-110.el8cp.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/rbd-nbd-debuginfo@14.2.22-110.el8cp?arch=s390x\u0026epoch=2" } } }, { "category": "product_version", "name": "ceph-osd-2:14.2.22-110.el8cp.s390x", "product": { "name": "ceph-osd-2:14.2.22-110.el8cp.s390x", "product_id": "ceph-osd-2:14.2.22-110.el8cp.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/ceph-osd@14.2.22-110.el8cp?arch=s390x\u0026epoch=2" } } }, { "category": "product_version", "name": "ceph-fuse-2:14.2.22-110.el8cp.s390x", "product": { "name": "ceph-fuse-2:14.2.22-110.el8cp.s390x", "product_id": "ceph-fuse-2:14.2.22-110.el8cp.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/ceph-fuse@14.2.22-110.el8cp?arch=s390x\u0026epoch=2" } } }, { "category": "product_version", "name": "ceph-mds-2:14.2.22-110.el8cp.s390x", "product": { "name": "ceph-mds-2:14.2.22-110.el8cp.s390x", "product_id": "ceph-mds-2:14.2.22-110.el8cp.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/ceph-mds@14.2.22-110.el8cp?arch=s390x\u0026epoch=2" } } }, { "category": "product_version", "name": "ceph-radosgw-2:14.2.22-110.el8cp.s390x", "product": { "name": "ceph-radosgw-2:14.2.22-110.el8cp.s390x", "product_id": "ceph-radosgw-2:14.2.22-110.el8cp.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/ceph-radosgw@14.2.22-110.el8cp?arch=s390x\u0026epoch=2" } } }, { "category": "product_version", "name": "rbd-mirror-2:14.2.22-110.el8cp.s390x", "product": { "name": "rbd-mirror-2:14.2.22-110.el8cp.s390x", "product_id": "rbd-mirror-2:14.2.22-110.el8cp.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/rbd-mirror@14.2.22-110.el8cp?arch=s390x\u0026epoch=2" } } }, { "category": "product_version", "name": "rbd-nbd-2:14.2.22-110.el8cp.s390x", "product": { "name": "rbd-nbd-2:14.2.22-110.el8cp.s390x", "product_id": "rbd-nbd-2:14.2.22-110.el8cp.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/rbd-nbd@14.2.22-110.el8cp?arch=s390x\u0026epoch=2" } } } ], "category": "architecture", "name": "s390x" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "ceph-2:14.2.22-110.el7cp.src as a component of Red Hat Ceph Storage 4.3 MON", "product_id": "7Server-RHEL-7-RHCEPH-4.3-MON:ceph-2:14.2.22-110.el7cp.src" }, "product_reference": "ceph-2:14.2.22-110.el7cp.src", "relates_to_product_reference": "7Server-RHEL-7-RHCEPH-4.3-MON" }, { "category": "default_component_of", "full_product_name": { "name": "ceph-base-2:14.2.22-110.el7cp.ppc64le as a component of Red Hat Ceph Storage 4.3 MON", "product_id": "7Server-RHEL-7-RHCEPH-4.3-MON:ceph-base-2:14.2.22-110.el7cp.ppc64le" }, "product_reference": "ceph-base-2:14.2.22-110.el7cp.ppc64le", "relates_to_product_reference": "7Server-RHEL-7-RHCEPH-4.3-MON" }, { "category": "default_component_of", "full_product_name": { "name": "ceph-base-2:14.2.22-110.el7cp.x86_64 as a component of Red Hat Ceph Storage 4.3 MON", "product_id": "7Server-RHEL-7-RHCEPH-4.3-MON:ceph-base-2:14.2.22-110.el7cp.x86_64" }, "product_reference": "ceph-base-2:14.2.22-110.el7cp.x86_64", "relates_to_product_reference": "7Server-RHEL-7-RHCEPH-4.3-MON" }, { "category": "default_component_of", "full_product_name": { "name": "ceph-common-2:14.2.22-110.el7cp.ppc64le as a component of Red Hat Ceph Storage 4.3 MON", "product_id": "7Server-RHEL-7-RHCEPH-4.3-MON:ceph-common-2:14.2.22-110.el7cp.ppc64le" }, "product_reference": "ceph-common-2:14.2.22-110.el7cp.ppc64le", "relates_to_product_reference": "7Server-RHEL-7-RHCEPH-4.3-MON" }, { "category": "default_component_of", "full_product_name": { "name": "ceph-common-2:14.2.22-110.el7cp.x86_64 as a component of Red Hat Ceph Storage 4.3 MON", "product_id": "7Server-RHEL-7-RHCEPH-4.3-MON:ceph-common-2:14.2.22-110.el7cp.x86_64" }, "product_reference": "ceph-common-2:14.2.22-110.el7cp.x86_64", "relates_to_product_reference": "7Server-RHEL-7-RHCEPH-4.3-MON" }, { "category": "default_component_of", "full_product_name": { "name": "ceph-debuginfo-2:14.2.22-110.el7cp.ppc64le as a component of Red Hat Ceph Storage 4.3 MON", "product_id": "7Server-RHEL-7-RHCEPH-4.3-MON:ceph-debuginfo-2:14.2.22-110.el7cp.ppc64le" }, "product_reference": "ceph-debuginfo-2:14.2.22-110.el7cp.ppc64le", "relates_to_product_reference": "7Server-RHEL-7-RHCEPH-4.3-MON" }, { "category": "default_component_of", "full_product_name": { "name": "ceph-debuginfo-2:14.2.22-110.el7cp.x86_64 as a component of Red Hat Ceph Storage 4.3 MON", "product_id": "7Server-RHEL-7-RHCEPH-4.3-MON:ceph-debuginfo-2:14.2.22-110.el7cp.x86_64" }, "product_reference": "ceph-debuginfo-2:14.2.22-110.el7cp.x86_64", "relates_to_product_reference": "7Server-RHEL-7-RHCEPH-4.3-MON" }, { "category": "default_component_of", "full_product_name": { "name": "ceph-fuse-2:14.2.22-110.el7cp.ppc64le as a component of Red Hat Ceph Storage 4.3 MON", "product_id": "7Server-RHEL-7-RHCEPH-4.3-MON:ceph-fuse-2:14.2.22-110.el7cp.ppc64le" }, "product_reference": "ceph-fuse-2:14.2.22-110.el7cp.ppc64le", "relates_to_product_reference": "7Server-RHEL-7-RHCEPH-4.3-MON" }, { "category": "default_component_of", "full_product_name": { "name": "ceph-fuse-2:14.2.22-110.el7cp.x86_64 as a component of Red Hat Ceph Storage 4.3 MON", "product_id": "7Server-RHEL-7-RHCEPH-4.3-MON:ceph-fuse-2:14.2.22-110.el7cp.x86_64" }, "product_reference": "ceph-fuse-2:14.2.22-110.el7cp.x86_64", "relates_to_product_reference": "7Server-RHEL-7-RHCEPH-4.3-MON" }, { "category": "default_component_of", "full_product_name": { "name": "ceph-grafana-dashboards-2:14.2.22-110.el7cp.noarch as a component of Red Hat Ceph Storage 4.3 MON", "product_id": "7Server-RHEL-7-RHCEPH-4.3-MON:ceph-grafana-dashboards-2:14.2.22-110.el7cp.noarch" }, "product_reference": "ceph-grafana-dashboards-2:14.2.22-110.el7cp.noarch", "relates_to_product_reference": "7Server-RHEL-7-RHCEPH-4.3-MON" }, { "category": "default_component_of", "full_product_name": { "name": "ceph-mds-2:14.2.22-110.el7cp.ppc64le as a component of Red Hat Ceph Storage 4.3 MON", "product_id": "7Server-RHEL-7-RHCEPH-4.3-MON:ceph-mds-2:14.2.22-110.el7cp.ppc64le" }, "product_reference": "ceph-mds-2:14.2.22-110.el7cp.ppc64le", "relates_to_product_reference": "7Server-RHEL-7-RHCEPH-4.3-MON" }, { "category": "default_component_of", "full_product_name": { "name": "ceph-mds-2:14.2.22-110.el7cp.x86_64 as a component of Red Hat Ceph Storage 4.3 MON", "product_id": "7Server-RHEL-7-RHCEPH-4.3-MON:ceph-mds-2:14.2.22-110.el7cp.x86_64" }, "product_reference": "ceph-mds-2:14.2.22-110.el7cp.x86_64", "relates_to_product_reference": "7Server-RHEL-7-RHCEPH-4.3-MON" }, { "category": "default_component_of", "full_product_name": { "name": "ceph-mgr-2:14.2.22-110.el7cp.ppc64le as a component of Red Hat Ceph Storage 4.3 MON", "product_id": "7Server-RHEL-7-RHCEPH-4.3-MON:ceph-mgr-2:14.2.22-110.el7cp.ppc64le" }, "product_reference": "ceph-mgr-2:14.2.22-110.el7cp.ppc64le", "relates_to_product_reference": "7Server-RHEL-7-RHCEPH-4.3-MON" }, { "category": "default_component_of", "full_product_name": { "name": "ceph-mgr-2:14.2.22-110.el7cp.x86_64 as a component of Red Hat Ceph Storage 4.3 MON", "product_id": "7Server-RHEL-7-RHCEPH-4.3-MON:ceph-mgr-2:14.2.22-110.el7cp.x86_64" }, "product_reference": "ceph-mgr-2:14.2.22-110.el7cp.x86_64", "relates_to_product_reference": "7Server-RHEL-7-RHCEPH-4.3-MON" }, { "category": "default_component_of", "full_product_name": { "name": "ceph-mgr-dashboard-2:14.2.22-110.el7cp.noarch as a component of Red Hat Ceph Storage 4.3 MON", "product_id": "7Server-RHEL-7-RHCEPH-4.3-MON:ceph-mgr-dashboard-2:14.2.22-110.el7cp.noarch" }, "product_reference": "ceph-mgr-dashboard-2:14.2.22-110.el7cp.noarch", "relates_to_product_reference": "7Server-RHEL-7-RHCEPH-4.3-MON" }, { "category": "default_component_of", "full_product_name": { "name": "ceph-mgr-diskprediction-local-2:14.2.22-110.el7cp.noarch as a component of Red Hat Ceph Storage 4.3 MON", "product_id": "7Server-RHEL-7-RHCEPH-4.3-MON:ceph-mgr-diskprediction-local-2:14.2.22-110.el7cp.noarch" }, "product_reference": "ceph-mgr-diskprediction-local-2:14.2.22-110.el7cp.noarch", "relates_to_product_reference": "7Server-RHEL-7-RHCEPH-4.3-MON" }, { "category": "default_component_of", "full_product_name": { "name": "ceph-mgr-k8sevents-2:14.2.22-110.el7cp.noarch as a component of Red Hat Ceph Storage 4.3 MON", "product_id": "7Server-RHEL-7-RHCEPH-4.3-MON:ceph-mgr-k8sevents-2:14.2.22-110.el7cp.noarch" }, "product_reference": "ceph-mgr-k8sevents-2:14.2.22-110.el7cp.noarch", "relates_to_product_reference": "7Server-RHEL-7-RHCEPH-4.3-MON" }, { "category": "default_component_of", "full_product_name": { "name": "ceph-mgr-rook-2:14.2.22-110.el7cp.noarch as a component of Red Hat Ceph Storage 4.3 MON", "product_id": "7Server-RHEL-7-RHCEPH-4.3-MON:ceph-mgr-rook-2:14.2.22-110.el7cp.noarch" }, "product_reference": "ceph-mgr-rook-2:14.2.22-110.el7cp.noarch", "relates_to_product_reference": "7Server-RHEL-7-RHCEPH-4.3-MON" }, { "category": "default_component_of", "full_product_name": { "name": "ceph-mon-2:14.2.22-110.el7cp.ppc64le as a component of Red Hat Ceph Storage 4.3 MON", "product_id": "7Server-RHEL-7-RHCEPH-4.3-MON:ceph-mon-2:14.2.22-110.el7cp.ppc64le" }, "product_reference": "ceph-mon-2:14.2.22-110.el7cp.ppc64le", "relates_to_product_reference": "7Server-RHEL-7-RHCEPH-4.3-MON" }, { "category": "default_component_of", "full_product_name": { "name": "ceph-mon-2:14.2.22-110.el7cp.x86_64 as a component of Red Hat Ceph Storage 4.3 MON", "product_id": "7Server-RHEL-7-RHCEPH-4.3-MON:ceph-mon-2:14.2.22-110.el7cp.x86_64" }, "product_reference": "ceph-mon-2:14.2.22-110.el7cp.x86_64", "relates_to_product_reference": "7Server-RHEL-7-RHCEPH-4.3-MON" }, { "category": "default_component_of", "full_product_name": { "name": "ceph-osd-2:14.2.22-110.el7cp.ppc64le as a component of Red Hat Ceph Storage 4.3 MON", "product_id": "7Server-RHEL-7-RHCEPH-4.3-MON:ceph-osd-2:14.2.22-110.el7cp.ppc64le" }, "product_reference": "ceph-osd-2:14.2.22-110.el7cp.ppc64le", "relates_to_product_reference": "7Server-RHEL-7-RHCEPH-4.3-MON" }, { "category": "default_component_of", "full_product_name": { "name": "ceph-osd-2:14.2.22-110.el7cp.x86_64 as a component of Red Hat Ceph Storage 4.3 MON", "product_id": "7Server-RHEL-7-RHCEPH-4.3-MON:ceph-osd-2:14.2.22-110.el7cp.x86_64" }, "product_reference": "ceph-osd-2:14.2.22-110.el7cp.x86_64", "relates_to_product_reference": "7Server-RHEL-7-RHCEPH-4.3-MON" }, { "category": "default_component_of", "full_product_name": { "name": "ceph-radosgw-2:14.2.22-110.el7cp.ppc64le as a component of Red Hat Ceph Storage 4.3 MON", "product_id": "7Server-RHEL-7-RHCEPH-4.3-MON:ceph-radosgw-2:14.2.22-110.el7cp.ppc64le" }, "product_reference": "ceph-radosgw-2:14.2.22-110.el7cp.ppc64le", "relates_to_product_reference": "7Server-RHEL-7-RHCEPH-4.3-MON" }, { "category": "default_component_of", "full_product_name": { "name": "ceph-radosgw-2:14.2.22-110.el7cp.x86_64 as a component of Red Hat Ceph Storage 4.3 MON", "product_id": "7Server-RHEL-7-RHCEPH-4.3-MON:ceph-radosgw-2:14.2.22-110.el7cp.x86_64" }, "product_reference": "ceph-radosgw-2:14.2.22-110.el7cp.x86_64", "relates_to_product_reference": "7Server-RHEL-7-RHCEPH-4.3-MON" }, { "category": "default_component_of", "full_product_name": { "name": "ceph-selinux-2:14.2.22-110.el7cp.ppc64le as a component of Red Hat Ceph Storage 4.3 MON", "product_id": "7Server-RHEL-7-RHCEPH-4.3-MON:ceph-selinux-2:14.2.22-110.el7cp.ppc64le" }, "product_reference": "ceph-selinux-2:14.2.22-110.el7cp.ppc64le", "relates_to_product_reference": "7Server-RHEL-7-RHCEPH-4.3-MON" }, { "category": "default_component_of", "full_product_name": { "name": "ceph-selinux-2:14.2.22-110.el7cp.x86_64 as a component of Red Hat Ceph Storage 4.3 MON", "product_id": "7Server-RHEL-7-RHCEPH-4.3-MON:ceph-selinux-2:14.2.22-110.el7cp.x86_64" }, "product_reference": "ceph-selinux-2:14.2.22-110.el7cp.x86_64", "relates_to_product_reference": "7Server-RHEL-7-RHCEPH-4.3-MON" }, { "category": "default_component_of", "full_product_name": { "name": "ceph-test-2:14.2.22-110.el7cp.ppc64le as a component of Red Hat Ceph Storage 4.3 MON", "product_id": "7Server-RHEL-7-RHCEPH-4.3-MON:ceph-test-2:14.2.22-110.el7cp.ppc64le" }, "product_reference": "ceph-test-2:14.2.22-110.el7cp.ppc64le", "relates_to_product_reference": "7Server-RHEL-7-RHCEPH-4.3-MON" }, { "category": "default_component_of", "full_product_name": { "name": "ceph-test-2:14.2.22-110.el7cp.x86_64 as a component of Red Hat Ceph Storage 4.3 MON", "product_id": "7Server-RHEL-7-RHCEPH-4.3-MON:ceph-test-2:14.2.22-110.el7cp.x86_64" }, "product_reference": "ceph-test-2:14.2.22-110.el7cp.x86_64", "relates_to_product_reference": "7Server-RHEL-7-RHCEPH-4.3-MON" }, { "category": "default_component_of", "full_product_name": { "name": "libcephfs-devel-2:14.2.22-110.el7cp.ppc64le as a component of Red Hat Ceph Storage 4.3 MON", "product_id": "7Server-RHEL-7-RHCEPH-4.3-MON:libcephfs-devel-2:14.2.22-110.el7cp.ppc64le" }, "product_reference": "libcephfs-devel-2:14.2.22-110.el7cp.ppc64le", "relates_to_product_reference": "7Server-RHEL-7-RHCEPH-4.3-MON" }, { "category": "default_component_of", "full_product_name": { "name": "libcephfs-devel-2:14.2.22-110.el7cp.x86_64 as a component of Red Hat Ceph Storage 4.3 MON", "product_id": "7Server-RHEL-7-RHCEPH-4.3-MON:libcephfs-devel-2:14.2.22-110.el7cp.x86_64" }, "product_reference": "libcephfs-devel-2:14.2.22-110.el7cp.x86_64", "relates_to_product_reference": "7Server-RHEL-7-RHCEPH-4.3-MON" }, { "category": "default_component_of", "full_product_name": { "name": "libcephfs2-2:14.2.22-110.el7cp.ppc64le as a component of Red Hat Ceph Storage 4.3 MON", "product_id": "7Server-RHEL-7-RHCEPH-4.3-MON:libcephfs2-2:14.2.22-110.el7cp.ppc64le" }, "product_reference": "libcephfs2-2:14.2.22-110.el7cp.ppc64le", "relates_to_product_reference": "7Server-RHEL-7-RHCEPH-4.3-MON" }, { "category": "default_component_of", "full_product_name": { "name": "libcephfs2-2:14.2.22-110.el7cp.x86_64 as a component of Red Hat Ceph Storage 4.3 MON", "product_id": "7Server-RHEL-7-RHCEPH-4.3-MON:libcephfs2-2:14.2.22-110.el7cp.x86_64" }, "product_reference": "libcephfs2-2:14.2.22-110.el7cp.x86_64", "relates_to_product_reference": "7Server-RHEL-7-RHCEPH-4.3-MON" }, { "category": "default_component_of", "full_product_name": { "name": "librados-devel-2:14.2.22-110.el7cp.ppc64le as a component of Red Hat Ceph Storage 4.3 MON", "product_id": "7Server-RHEL-7-RHCEPH-4.3-MON:librados-devel-2:14.2.22-110.el7cp.ppc64le" }, "product_reference": "librados-devel-2:14.2.22-110.el7cp.ppc64le", "relates_to_product_reference": "7Server-RHEL-7-RHCEPH-4.3-MON" }, { "category": "default_component_of", "full_product_name": { "name": "librados-devel-2:14.2.22-110.el7cp.x86_64 as a component of Red Hat Ceph Storage 4.3 MON", "product_id": "7Server-RHEL-7-RHCEPH-4.3-MON:librados-devel-2:14.2.22-110.el7cp.x86_64" }, "product_reference": "librados-devel-2:14.2.22-110.el7cp.x86_64", "relates_to_product_reference": "7Server-RHEL-7-RHCEPH-4.3-MON" }, { "category": "default_component_of", "full_product_name": { "name": "librados2-2:14.2.22-110.el7cp.ppc64le as a component of Red Hat Ceph Storage 4.3 MON", "product_id": "7Server-RHEL-7-RHCEPH-4.3-MON:librados2-2:14.2.22-110.el7cp.ppc64le" }, "product_reference": "librados2-2:14.2.22-110.el7cp.ppc64le", "relates_to_product_reference": "7Server-RHEL-7-RHCEPH-4.3-MON" }, { "category": "default_component_of", "full_product_name": { "name": "librados2-2:14.2.22-110.el7cp.x86_64 as a component of Red Hat Ceph Storage 4.3 MON", "product_id": "7Server-RHEL-7-RHCEPH-4.3-MON:librados2-2:14.2.22-110.el7cp.x86_64" }, "product_reference": "librados2-2:14.2.22-110.el7cp.x86_64", "relates_to_product_reference": "7Server-RHEL-7-RHCEPH-4.3-MON" }, { "category": "default_component_of", "full_product_name": { "name": "libradospp-devel-2:14.2.22-110.el7cp.ppc64le as a component of Red Hat Ceph Storage 4.3 MON", "product_id": "7Server-RHEL-7-RHCEPH-4.3-MON:libradospp-devel-2:14.2.22-110.el7cp.ppc64le" }, "product_reference": "libradospp-devel-2:14.2.22-110.el7cp.ppc64le", "relates_to_product_reference": "7Server-RHEL-7-RHCEPH-4.3-MON" }, { "category": "default_component_of", "full_product_name": { "name": "libradospp-devel-2:14.2.22-110.el7cp.x86_64 as a component of Red Hat Ceph Storage 4.3 MON", "product_id": "7Server-RHEL-7-RHCEPH-4.3-MON:libradospp-devel-2:14.2.22-110.el7cp.x86_64" }, "product_reference": "libradospp-devel-2:14.2.22-110.el7cp.x86_64", "relates_to_product_reference": "7Server-RHEL-7-RHCEPH-4.3-MON" }, { "category": "default_component_of", "full_product_name": { "name": "libradosstriper1-2:14.2.22-110.el7cp.ppc64le as a component of Red Hat Ceph Storage 4.3 MON", "product_id": "7Server-RHEL-7-RHCEPH-4.3-MON:libradosstriper1-2:14.2.22-110.el7cp.ppc64le" }, "product_reference": "libradosstriper1-2:14.2.22-110.el7cp.ppc64le", "relates_to_product_reference": "7Server-RHEL-7-RHCEPH-4.3-MON" }, { "category": "default_component_of", "full_product_name": { "name": "libradosstriper1-2:14.2.22-110.el7cp.x86_64 as a component of Red Hat Ceph Storage 4.3 MON", "product_id": "7Server-RHEL-7-RHCEPH-4.3-MON:libradosstriper1-2:14.2.22-110.el7cp.x86_64" }, "product_reference": "libradosstriper1-2:14.2.22-110.el7cp.x86_64", "relates_to_product_reference": "7Server-RHEL-7-RHCEPH-4.3-MON" }, { "category": "default_component_of", "full_product_name": { "name": "librbd-devel-2:14.2.22-110.el7cp.ppc64le as a component of Red Hat Ceph Storage 4.3 MON", "product_id": "7Server-RHEL-7-RHCEPH-4.3-MON:librbd-devel-2:14.2.22-110.el7cp.ppc64le" }, "product_reference": "librbd-devel-2:14.2.22-110.el7cp.ppc64le", "relates_to_product_reference": "7Server-RHEL-7-RHCEPH-4.3-MON" }, { "category": "default_component_of", "full_product_name": { "name": "librbd-devel-2:14.2.22-110.el7cp.x86_64 as a component of Red Hat Ceph Storage 4.3 MON", "product_id": "7Server-RHEL-7-RHCEPH-4.3-MON:librbd-devel-2:14.2.22-110.el7cp.x86_64" }, "product_reference": "librbd-devel-2:14.2.22-110.el7cp.x86_64", "relates_to_product_reference": "7Server-RHEL-7-RHCEPH-4.3-MON" }, { "category": "default_component_of", "full_product_name": { "name": "librbd1-2:14.2.22-110.el7cp.ppc64le as a component of Red Hat Ceph Storage 4.3 MON", "product_id": "7Server-RHEL-7-RHCEPH-4.3-MON:librbd1-2:14.2.22-110.el7cp.ppc64le" }, "product_reference": "librbd1-2:14.2.22-110.el7cp.ppc64le", "relates_to_product_reference": "7Server-RHEL-7-RHCEPH-4.3-MON" }, { "category": "default_component_of", "full_product_name": { "name": "librbd1-2:14.2.22-110.el7cp.x86_64 as a component of Red Hat Ceph Storage 4.3 MON", "product_id": "7Server-RHEL-7-RHCEPH-4.3-MON:librbd1-2:14.2.22-110.el7cp.x86_64" }, "product_reference": "librbd1-2:14.2.22-110.el7cp.x86_64", "relates_to_product_reference": "7Server-RHEL-7-RHCEPH-4.3-MON" }, { "category": "default_component_of", "full_product_name": { "name": "librgw-devel-2:14.2.22-110.el7cp.ppc64le as a component of Red Hat Ceph Storage 4.3 MON", "product_id": "7Server-RHEL-7-RHCEPH-4.3-MON:librgw-devel-2:14.2.22-110.el7cp.ppc64le" }, "product_reference": "librgw-devel-2:14.2.22-110.el7cp.ppc64le", "relates_to_product_reference": "7Server-RHEL-7-RHCEPH-4.3-MON" }, { "category": "default_component_of", "full_product_name": { "name": "librgw-devel-2:14.2.22-110.el7cp.x86_64 as a component of Red Hat Ceph Storage 4.3 MON", "product_id": "7Server-RHEL-7-RHCEPH-4.3-MON:librgw-devel-2:14.2.22-110.el7cp.x86_64" }, "product_reference": "librgw-devel-2:14.2.22-110.el7cp.x86_64", "relates_to_product_reference": "7Server-RHEL-7-RHCEPH-4.3-MON" }, { "category": "default_component_of", "full_product_name": { "name": "librgw2-2:14.2.22-110.el7cp.ppc64le as a component of Red Hat Ceph Storage 4.3 MON", "product_id": "7Server-RHEL-7-RHCEPH-4.3-MON:librgw2-2:14.2.22-110.el7cp.ppc64le" }, "product_reference": "librgw2-2:14.2.22-110.el7cp.ppc64le", "relates_to_product_reference": "7Server-RHEL-7-RHCEPH-4.3-MON" }, { "category": "default_component_of", "full_product_name": { "name": "librgw2-2:14.2.22-110.el7cp.x86_64 as a component of Red Hat Ceph Storage 4.3 MON", "product_id": "7Server-RHEL-7-RHCEPH-4.3-MON:librgw2-2:14.2.22-110.el7cp.x86_64" }, "product_reference": "librgw2-2:14.2.22-110.el7cp.x86_64", "relates_to_product_reference": "7Server-RHEL-7-RHCEPH-4.3-MON" }, { "category": "default_component_of", "full_product_name": { "name": "python-ceph-argparse-2:14.2.22-110.el7cp.ppc64le as a component of Red Hat Ceph Storage 4.3 MON", "product_id": "7Server-RHEL-7-RHCEPH-4.3-MON:python-ceph-argparse-2:14.2.22-110.el7cp.ppc64le" }, "product_reference": "python-ceph-argparse-2:14.2.22-110.el7cp.ppc64le", "relates_to_product_reference": "7Server-RHEL-7-RHCEPH-4.3-MON" }, { "category": "default_component_of", "full_product_name": { "name": "python-ceph-argparse-2:14.2.22-110.el7cp.x86_64 as a component of Red Hat Ceph Storage 4.3 MON", "product_id": "7Server-RHEL-7-RHCEPH-4.3-MON:python-ceph-argparse-2:14.2.22-110.el7cp.x86_64" }, "product_reference": "python-ceph-argparse-2:14.2.22-110.el7cp.x86_64", "relates_to_product_reference": "7Server-RHEL-7-RHCEPH-4.3-MON" }, { "category": "default_component_of", "full_product_name": { "name": "python-cephfs-2:14.2.22-110.el7cp.ppc64le as a component of Red Hat Ceph Storage 4.3 MON", "product_id": "7Server-RHEL-7-RHCEPH-4.3-MON:python-cephfs-2:14.2.22-110.el7cp.ppc64le" }, "product_reference": "python-cephfs-2:14.2.22-110.el7cp.ppc64le", "relates_to_product_reference": "7Server-RHEL-7-RHCEPH-4.3-MON" }, { "category": "default_component_of", "full_product_name": { "name": "python-cephfs-2:14.2.22-110.el7cp.x86_64 as a component of Red Hat Ceph Storage 4.3 MON", "product_id": "7Server-RHEL-7-RHCEPH-4.3-MON:python-cephfs-2:14.2.22-110.el7cp.x86_64" }, "product_reference": "python-cephfs-2:14.2.22-110.el7cp.x86_64", "relates_to_product_reference": "7Server-RHEL-7-RHCEPH-4.3-MON" }, { "category": "default_component_of", "full_product_name": { "name": "python-rados-2:14.2.22-110.el7cp.ppc64le as a component of Red Hat Ceph Storage 4.3 MON", "product_id": "7Server-RHEL-7-RHCEPH-4.3-MON:python-rados-2:14.2.22-110.el7cp.ppc64le" }, "product_reference": "python-rados-2:14.2.22-110.el7cp.ppc64le", "relates_to_product_reference": "7Server-RHEL-7-RHCEPH-4.3-MON" }, { "category": "default_component_of", "full_product_name": { "name": "python-rados-2:14.2.22-110.el7cp.x86_64 as a component of Red Hat Ceph Storage 4.3 MON", "product_id": "7Server-RHEL-7-RHCEPH-4.3-MON:python-rados-2:14.2.22-110.el7cp.x86_64" }, "product_reference": "python-rados-2:14.2.22-110.el7cp.x86_64", "relates_to_product_reference": "7Server-RHEL-7-RHCEPH-4.3-MON" }, { "category": "default_component_of", "full_product_name": { "name": "python-rbd-2:14.2.22-110.el7cp.ppc64le as a component of Red Hat Ceph Storage 4.3 MON", "product_id": "7Server-RHEL-7-RHCEPH-4.3-MON:python-rbd-2:14.2.22-110.el7cp.ppc64le" }, "product_reference": "python-rbd-2:14.2.22-110.el7cp.ppc64le", "relates_to_product_reference": "7Server-RHEL-7-RHCEPH-4.3-MON" }, { "category": "default_component_of", "full_product_name": { "name": "python-rbd-2:14.2.22-110.el7cp.x86_64 as a component of Red Hat Ceph Storage 4.3 MON", "product_id": "7Server-RHEL-7-RHCEPH-4.3-MON:python-rbd-2:14.2.22-110.el7cp.x86_64" }, "product_reference": "python-rbd-2:14.2.22-110.el7cp.x86_64", "relates_to_product_reference": "7Server-RHEL-7-RHCEPH-4.3-MON" }, { "category": "default_component_of", "full_product_name": { "name": "python-rgw-2:14.2.22-110.el7cp.ppc64le as a component of Red Hat Ceph Storage 4.3 MON", "product_id": "7Server-RHEL-7-RHCEPH-4.3-MON:python-rgw-2:14.2.22-110.el7cp.ppc64le" }, "product_reference": "python-rgw-2:14.2.22-110.el7cp.ppc64le", "relates_to_product_reference": "7Server-RHEL-7-RHCEPH-4.3-MON" }, { "category": "default_component_of", "full_product_name": { "name": "python-rgw-2:14.2.22-110.el7cp.x86_64 as a component of Red Hat Ceph Storage 4.3 MON", "product_id": "7Server-RHEL-7-RHCEPH-4.3-MON:python-rgw-2:14.2.22-110.el7cp.x86_64" }, "product_reference": "python-rgw-2:14.2.22-110.el7cp.x86_64", "relates_to_product_reference": "7Server-RHEL-7-RHCEPH-4.3-MON" }, { "category": "default_component_of", "full_product_name": { "name": "rbd-mirror-2:14.2.22-110.el7cp.ppc64le as a component of Red Hat Ceph Storage 4.3 MON", "product_id": "7Server-RHEL-7-RHCEPH-4.3-MON:rbd-mirror-2:14.2.22-110.el7cp.ppc64le" }, "product_reference": "rbd-mirror-2:14.2.22-110.el7cp.ppc64le", "relates_to_product_reference": "7Server-RHEL-7-RHCEPH-4.3-MON" }, { "category": "default_component_of", "full_product_name": { "name": "rbd-mirror-2:14.2.22-110.el7cp.x86_64 as a component of Red Hat Ceph Storage 4.3 MON", "product_id": "7Server-RHEL-7-RHCEPH-4.3-MON:rbd-mirror-2:14.2.22-110.el7cp.x86_64" }, "product_reference": "rbd-mirror-2:14.2.22-110.el7cp.x86_64", "relates_to_product_reference": "7Server-RHEL-7-RHCEPH-4.3-MON" }, { "category": "default_component_of", "full_product_name": { "name": "rbd-nbd-2:14.2.22-110.el7cp.ppc64le as a component of Red Hat Ceph Storage 4.3 MON", "product_id": "7Server-RHEL-7-RHCEPH-4.3-MON:rbd-nbd-2:14.2.22-110.el7cp.ppc64le" }, "product_reference": "rbd-nbd-2:14.2.22-110.el7cp.ppc64le", "relates_to_product_reference": "7Server-RHEL-7-RHCEPH-4.3-MON" }, { "category": "default_component_of", "full_product_name": { "name": "rbd-nbd-2:14.2.22-110.el7cp.x86_64 as a component of Red Hat Ceph Storage 4.3 MON", "product_id": "7Server-RHEL-7-RHCEPH-4.3-MON:rbd-nbd-2:14.2.22-110.el7cp.x86_64" }, "product_reference": "rbd-nbd-2:14.2.22-110.el7cp.x86_64", "relates_to_product_reference": "7Server-RHEL-7-RHCEPH-4.3-MON" }, { "category": "default_component_of", "full_product_name": { "name": "ceph-2:14.2.22-110.el7cp.src as a component of Red Hat Ceph Storage 4.3 OSD", "product_id": "7Server-RHEL-7-RHCEPH-4.3-OSD:ceph-2:14.2.22-110.el7cp.src" }, "product_reference": "ceph-2:14.2.22-110.el7cp.src", "relates_to_product_reference": "7Server-RHEL-7-RHCEPH-4.3-OSD" }, { "category": "default_component_of", "full_product_name": { "name": "ceph-base-2:14.2.22-110.el7cp.ppc64le as a component of Red Hat Ceph Storage 4.3 OSD", "product_id": "7Server-RHEL-7-RHCEPH-4.3-OSD:ceph-base-2:14.2.22-110.el7cp.ppc64le" }, "product_reference": "ceph-base-2:14.2.22-110.el7cp.ppc64le", "relates_to_product_reference": "7Server-RHEL-7-RHCEPH-4.3-OSD" }, { "category": "default_component_of", "full_product_name": { "name": "ceph-base-2:14.2.22-110.el7cp.x86_64 as a component of Red Hat Ceph Storage 4.3 OSD", "product_id": "7Server-RHEL-7-RHCEPH-4.3-OSD:ceph-base-2:14.2.22-110.el7cp.x86_64" }, "product_reference": "ceph-base-2:14.2.22-110.el7cp.x86_64", "relates_to_product_reference": "7Server-RHEL-7-RHCEPH-4.3-OSD" }, { "category": "default_component_of", "full_product_name": { "name": "ceph-common-2:14.2.22-110.el7cp.ppc64le as a component of Red Hat Ceph Storage 4.3 OSD", "product_id": "7Server-RHEL-7-RHCEPH-4.3-OSD:ceph-common-2:14.2.22-110.el7cp.ppc64le" }, "product_reference": "ceph-common-2:14.2.22-110.el7cp.ppc64le", "relates_to_product_reference": "7Server-RHEL-7-RHCEPH-4.3-OSD" }, { "category": "default_component_of", "full_product_name": { "name": "ceph-common-2:14.2.22-110.el7cp.x86_64 as a component of Red Hat Ceph Storage 4.3 OSD", "product_id": "7Server-RHEL-7-RHCEPH-4.3-OSD:ceph-common-2:14.2.22-110.el7cp.x86_64" }, "product_reference": "ceph-common-2:14.2.22-110.el7cp.x86_64", "relates_to_product_reference": "7Server-RHEL-7-RHCEPH-4.3-OSD" }, { "category": "default_component_of", "full_product_name": { "name": "ceph-debuginfo-2:14.2.22-110.el7cp.ppc64le as a component of Red Hat Ceph Storage 4.3 OSD", "product_id": "7Server-RHEL-7-RHCEPH-4.3-OSD:ceph-debuginfo-2:14.2.22-110.el7cp.ppc64le" }, "product_reference": "ceph-debuginfo-2:14.2.22-110.el7cp.ppc64le", "relates_to_product_reference": "7Server-RHEL-7-RHCEPH-4.3-OSD" }, { "category": "default_component_of", "full_product_name": { "name": "ceph-debuginfo-2:14.2.22-110.el7cp.x86_64 as a component of Red Hat Ceph Storage 4.3 OSD", "product_id": "7Server-RHEL-7-RHCEPH-4.3-OSD:ceph-debuginfo-2:14.2.22-110.el7cp.x86_64" }, "product_reference": "ceph-debuginfo-2:14.2.22-110.el7cp.x86_64", "relates_to_product_reference": "7Server-RHEL-7-RHCEPH-4.3-OSD" }, { "category": "default_component_of", "full_product_name": { "name": "ceph-fuse-2:14.2.22-110.el7cp.ppc64le as a component of Red Hat Ceph Storage 4.3 OSD", "product_id": "7Server-RHEL-7-RHCEPH-4.3-OSD:ceph-fuse-2:14.2.22-110.el7cp.ppc64le" }, "product_reference": "ceph-fuse-2:14.2.22-110.el7cp.ppc64le", "relates_to_product_reference": "7Server-RHEL-7-RHCEPH-4.3-OSD" }, { "category": "default_component_of", "full_product_name": { "name": "ceph-fuse-2:14.2.22-110.el7cp.x86_64 as a component of Red Hat Ceph Storage 4.3 OSD", "product_id": "7Server-RHEL-7-RHCEPH-4.3-OSD:ceph-fuse-2:14.2.22-110.el7cp.x86_64" }, "product_reference": "ceph-fuse-2:14.2.22-110.el7cp.x86_64", "relates_to_product_reference": "7Server-RHEL-7-RHCEPH-4.3-OSD" }, { "category": "default_component_of", "full_product_name": { "name": "ceph-grafana-dashboards-2:14.2.22-110.el7cp.noarch as a component of Red Hat Ceph Storage 4.3 OSD", "product_id": "7Server-RHEL-7-RHCEPH-4.3-OSD:ceph-grafana-dashboards-2:14.2.22-110.el7cp.noarch" }, "product_reference": "ceph-grafana-dashboards-2:14.2.22-110.el7cp.noarch", "relates_to_product_reference": "7Server-RHEL-7-RHCEPH-4.3-OSD" }, { "category": "default_component_of", "full_product_name": { "name": "ceph-mds-2:14.2.22-110.el7cp.ppc64le as a component of Red Hat Ceph Storage 4.3 OSD", "product_id": "7Server-RHEL-7-RHCEPH-4.3-OSD:ceph-mds-2:14.2.22-110.el7cp.ppc64le" }, "product_reference": "ceph-mds-2:14.2.22-110.el7cp.ppc64le", "relates_to_product_reference": "7Server-RHEL-7-RHCEPH-4.3-OSD" }, { "category": "default_component_of", "full_product_name": { "name": "ceph-mds-2:14.2.22-110.el7cp.x86_64 as a component of Red Hat Ceph Storage 4.3 OSD", "product_id": "7Server-RHEL-7-RHCEPH-4.3-OSD:ceph-mds-2:14.2.22-110.el7cp.x86_64" }, "product_reference": "ceph-mds-2:14.2.22-110.el7cp.x86_64", "relates_to_product_reference": "7Server-RHEL-7-RHCEPH-4.3-OSD" }, { "category": "default_component_of", "full_product_name": { "name": "ceph-mgr-2:14.2.22-110.el7cp.ppc64le as a component of Red Hat Ceph Storage 4.3 OSD", "product_id": "7Server-RHEL-7-RHCEPH-4.3-OSD:ceph-mgr-2:14.2.22-110.el7cp.ppc64le" }, "product_reference": "ceph-mgr-2:14.2.22-110.el7cp.ppc64le", "relates_to_product_reference": "7Server-RHEL-7-RHCEPH-4.3-OSD" }, { "category": "default_component_of", "full_product_name": { "name": "ceph-mgr-2:14.2.22-110.el7cp.x86_64 as a component of Red Hat Ceph Storage 4.3 OSD", "product_id": "7Server-RHEL-7-RHCEPH-4.3-OSD:ceph-mgr-2:14.2.22-110.el7cp.x86_64" }, "product_reference": "ceph-mgr-2:14.2.22-110.el7cp.x86_64", "relates_to_product_reference": "7Server-RHEL-7-RHCEPH-4.3-OSD" }, { "category": "default_component_of", "full_product_name": { "name": "ceph-mgr-dashboard-2:14.2.22-110.el7cp.noarch as a component of Red Hat Ceph Storage 4.3 OSD", "product_id": "7Server-RHEL-7-RHCEPH-4.3-OSD:ceph-mgr-dashboard-2:14.2.22-110.el7cp.noarch" }, "product_reference": "ceph-mgr-dashboard-2:14.2.22-110.el7cp.noarch", "relates_to_product_reference": "7Server-RHEL-7-RHCEPH-4.3-OSD" }, { "category": "default_component_of", "full_product_name": { "name": "ceph-mgr-diskprediction-local-2:14.2.22-110.el7cp.noarch as a component of Red Hat Ceph Storage 4.3 OSD", "product_id": "7Server-RHEL-7-RHCEPH-4.3-OSD:ceph-mgr-diskprediction-local-2:14.2.22-110.el7cp.noarch" }, "product_reference": "ceph-mgr-diskprediction-local-2:14.2.22-110.el7cp.noarch", "relates_to_product_reference": "7Server-RHEL-7-RHCEPH-4.3-OSD" }, { "category": "default_component_of", "full_product_name": { "name": "ceph-mgr-k8sevents-2:14.2.22-110.el7cp.noarch as a component of Red Hat Ceph Storage 4.3 OSD", "product_id": "7Server-RHEL-7-RHCEPH-4.3-OSD:ceph-mgr-k8sevents-2:14.2.22-110.el7cp.noarch" }, "product_reference": "ceph-mgr-k8sevents-2:14.2.22-110.el7cp.noarch", "relates_to_product_reference": "7Server-RHEL-7-RHCEPH-4.3-OSD" }, { "category": "default_component_of", "full_product_name": { "name": "ceph-mgr-rook-2:14.2.22-110.el7cp.noarch as a component of Red Hat Ceph Storage 4.3 OSD", "product_id": "7Server-RHEL-7-RHCEPH-4.3-OSD:ceph-mgr-rook-2:14.2.22-110.el7cp.noarch" }, "product_reference": "ceph-mgr-rook-2:14.2.22-110.el7cp.noarch", "relates_to_product_reference": "7Server-RHEL-7-RHCEPH-4.3-OSD" }, { "category": "default_component_of", "full_product_name": { "name": "ceph-mon-2:14.2.22-110.el7cp.ppc64le as a component of Red Hat Ceph Storage 4.3 OSD", "product_id": "7Server-RHEL-7-RHCEPH-4.3-OSD:ceph-mon-2:14.2.22-110.el7cp.ppc64le" }, "product_reference": "ceph-mon-2:14.2.22-110.el7cp.ppc64le", "relates_to_product_reference": "7Server-RHEL-7-RHCEPH-4.3-OSD" }, { "category": "default_component_of", "full_product_name": { "name": "ceph-mon-2:14.2.22-110.el7cp.x86_64 as a component of Red Hat Ceph Storage 4.3 OSD", "product_id": "7Server-RHEL-7-RHCEPH-4.3-OSD:ceph-mon-2:14.2.22-110.el7cp.x86_64" }, "product_reference": "ceph-mon-2:14.2.22-110.el7cp.x86_64", "relates_to_product_reference": "7Server-RHEL-7-RHCEPH-4.3-OSD" }, { "category": "default_component_of", "full_product_name": { "name": "ceph-osd-2:14.2.22-110.el7cp.ppc64le as a component of Red Hat Ceph Storage 4.3 OSD", "product_id": "7Server-RHEL-7-RHCEPH-4.3-OSD:ceph-osd-2:14.2.22-110.el7cp.ppc64le" }, "product_reference": "ceph-osd-2:14.2.22-110.el7cp.ppc64le", "relates_to_product_reference": "7Server-RHEL-7-RHCEPH-4.3-OSD" }, { "category": "default_component_of", "full_product_name": { "name": "ceph-osd-2:14.2.22-110.el7cp.x86_64 as a component of Red Hat Ceph Storage 4.3 OSD", "product_id": "7Server-RHEL-7-RHCEPH-4.3-OSD:ceph-osd-2:14.2.22-110.el7cp.x86_64" }, "product_reference": "ceph-osd-2:14.2.22-110.el7cp.x86_64", "relates_to_product_reference": "7Server-RHEL-7-RHCEPH-4.3-OSD" }, { "category": "default_component_of", "full_product_name": { "name": "ceph-radosgw-2:14.2.22-110.el7cp.ppc64le as a component of Red Hat Ceph Storage 4.3 OSD", "product_id": "7Server-RHEL-7-RHCEPH-4.3-OSD:ceph-radosgw-2:14.2.22-110.el7cp.ppc64le" }, "product_reference": "ceph-radosgw-2:14.2.22-110.el7cp.ppc64le", "relates_to_product_reference": "7Server-RHEL-7-RHCEPH-4.3-OSD" }, { "category": "default_component_of", "full_product_name": { "name": "ceph-radosgw-2:14.2.22-110.el7cp.x86_64 as a component of Red Hat Ceph Storage 4.3 OSD", "product_id": "7Server-RHEL-7-RHCEPH-4.3-OSD:ceph-radosgw-2:14.2.22-110.el7cp.x86_64" }, "product_reference": "ceph-radosgw-2:14.2.22-110.el7cp.x86_64", "relates_to_product_reference": "7Server-RHEL-7-RHCEPH-4.3-OSD" }, { "category": "default_component_of", "full_product_name": { "name": "ceph-selinux-2:14.2.22-110.el7cp.ppc64le as a component of Red Hat Ceph Storage 4.3 OSD", "product_id": "7Server-RHEL-7-RHCEPH-4.3-OSD:ceph-selinux-2:14.2.22-110.el7cp.ppc64le" }, "product_reference": "ceph-selinux-2:14.2.22-110.el7cp.ppc64le", "relates_to_product_reference": "7Server-RHEL-7-RHCEPH-4.3-OSD" }, { "category": "default_component_of", "full_product_name": { "name": "ceph-selinux-2:14.2.22-110.el7cp.x86_64 as a component of Red Hat Ceph Storage 4.3 OSD", "product_id": "7Server-RHEL-7-RHCEPH-4.3-OSD:ceph-selinux-2:14.2.22-110.el7cp.x86_64" }, "product_reference": "ceph-selinux-2:14.2.22-110.el7cp.x86_64", "relates_to_product_reference": "7Server-RHEL-7-RHCEPH-4.3-OSD" }, { "category": "default_component_of", "full_product_name": { "name": "ceph-test-2:14.2.22-110.el7cp.ppc64le as a component of Red Hat Ceph Storage 4.3 OSD", "product_id": "7Server-RHEL-7-RHCEPH-4.3-OSD:ceph-test-2:14.2.22-110.el7cp.ppc64le" }, "product_reference": "ceph-test-2:14.2.22-110.el7cp.ppc64le", "relates_to_product_reference": "7Server-RHEL-7-RHCEPH-4.3-OSD" }, { "category": "default_component_of", "full_product_name": { "name": "ceph-test-2:14.2.22-110.el7cp.x86_64 as a component of Red Hat Ceph Storage 4.3 OSD", "product_id": "7Server-RHEL-7-RHCEPH-4.3-OSD:ceph-test-2:14.2.22-110.el7cp.x86_64" }, "product_reference": "ceph-test-2:14.2.22-110.el7cp.x86_64", "relates_to_product_reference": "7Server-RHEL-7-RHCEPH-4.3-OSD" }, { "category": "default_component_of", "full_product_name": { "name": "libcephfs-devel-2:14.2.22-110.el7cp.ppc64le as a component of Red Hat Ceph Storage 4.3 OSD", "product_id": "7Server-RHEL-7-RHCEPH-4.3-OSD:libcephfs-devel-2:14.2.22-110.el7cp.ppc64le" }, "product_reference": "libcephfs-devel-2:14.2.22-110.el7cp.ppc64le", "relates_to_product_reference": "7Server-RHEL-7-RHCEPH-4.3-OSD" }, { "category": "default_component_of", "full_product_name": { "name": "libcephfs-devel-2:14.2.22-110.el7cp.x86_64 as a component of Red Hat Ceph Storage 4.3 OSD", "product_id": "7Server-RHEL-7-RHCEPH-4.3-OSD:libcephfs-devel-2:14.2.22-110.el7cp.x86_64" }, "product_reference": "libcephfs-devel-2:14.2.22-110.el7cp.x86_64", "relates_to_product_reference": "7Server-RHEL-7-RHCEPH-4.3-OSD" }, { "category": "default_component_of", "full_product_name": { "name": "libcephfs2-2:14.2.22-110.el7cp.ppc64le as a component of Red Hat Ceph Storage 4.3 OSD", "product_id": "7Server-RHEL-7-RHCEPH-4.3-OSD:libcephfs2-2:14.2.22-110.el7cp.ppc64le" }, "product_reference": "libcephfs2-2:14.2.22-110.el7cp.ppc64le", "relates_to_product_reference": "7Server-RHEL-7-RHCEPH-4.3-OSD" }, { "category": "default_component_of", "full_product_name": { "name": "libcephfs2-2:14.2.22-110.el7cp.x86_64 as a component of Red Hat Ceph Storage 4.3 OSD", "product_id": "7Server-RHEL-7-RHCEPH-4.3-OSD:libcephfs2-2:14.2.22-110.el7cp.x86_64" }, "product_reference": "libcephfs2-2:14.2.22-110.el7cp.x86_64", "relates_to_product_reference": "7Server-RHEL-7-RHCEPH-4.3-OSD" }, { "category": "default_component_of", "full_product_name": { "name": "librados-devel-2:14.2.22-110.el7cp.ppc64le as a component of Red Hat Ceph Storage 4.3 OSD", "product_id": "7Server-RHEL-7-RHCEPH-4.3-OSD:librados-devel-2:14.2.22-110.el7cp.ppc64le" }, "product_reference": "librados-devel-2:14.2.22-110.el7cp.ppc64le", "relates_to_product_reference": "7Server-RHEL-7-RHCEPH-4.3-OSD" }, { "category": "default_component_of", "full_product_name": { "name": "librados-devel-2:14.2.22-110.el7cp.x86_64 as a component of Red Hat Ceph Storage 4.3 OSD", "product_id": "7Server-RHEL-7-RHCEPH-4.3-OSD:librados-devel-2:14.2.22-110.el7cp.x86_64" }, "product_reference": "librados-devel-2:14.2.22-110.el7cp.x86_64", "relates_to_product_reference": "7Server-RHEL-7-RHCEPH-4.3-OSD" }, { "category": "default_component_of", "full_product_name": { "name": "librados2-2:14.2.22-110.el7cp.ppc64le as a component of Red Hat Ceph Storage 4.3 OSD", "product_id": "7Server-RHEL-7-RHCEPH-4.3-OSD:librados2-2:14.2.22-110.el7cp.ppc64le" }, "product_reference": "librados2-2:14.2.22-110.el7cp.ppc64le", "relates_to_product_reference": "7Server-RHEL-7-RHCEPH-4.3-OSD" }, { "category": "default_component_of", "full_product_name": { "name": "librados2-2:14.2.22-110.el7cp.x86_64 as a component of Red Hat Ceph Storage 4.3 OSD", "product_id": "7Server-RHEL-7-RHCEPH-4.3-OSD:librados2-2:14.2.22-110.el7cp.x86_64" }, "product_reference": "librados2-2:14.2.22-110.el7cp.x86_64", "relates_to_product_reference": "7Server-RHEL-7-RHCEPH-4.3-OSD" }, { "category": "default_component_of", "full_product_name": { "name": "libradospp-devel-2:14.2.22-110.el7cp.ppc64le as a component of Red Hat Ceph Storage 4.3 OSD", "product_id": "7Server-RHEL-7-RHCEPH-4.3-OSD:libradospp-devel-2:14.2.22-110.el7cp.ppc64le" }, "product_reference": "libradospp-devel-2:14.2.22-110.el7cp.ppc64le", "relates_to_product_reference": "7Server-RHEL-7-RHCEPH-4.3-OSD" }, { "category": "default_component_of", "full_product_name": { "name": "libradospp-devel-2:14.2.22-110.el7cp.x86_64 as a component of Red Hat Ceph Storage 4.3 OSD", "product_id": "7Server-RHEL-7-RHCEPH-4.3-OSD:libradospp-devel-2:14.2.22-110.el7cp.x86_64" }, "product_reference": "libradospp-devel-2:14.2.22-110.el7cp.x86_64", "relates_to_product_reference": "7Server-RHEL-7-RHCEPH-4.3-OSD" }, { "category": "default_component_of", "full_product_name": { "name": "libradosstriper1-2:14.2.22-110.el7cp.ppc64le as a component of Red Hat Ceph Storage 4.3 OSD", "product_id": "7Server-RHEL-7-RHCEPH-4.3-OSD:libradosstriper1-2:14.2.22-110.el7cp.ppc64le" }, "product_reference": "libradosstriper1-2:14.2.22-110.el7cp.ppc64le", "relates_to_product_reference": "7Server-RHEL-7-RHCEPH-4.3-OSD" }, { "category": "default_component_of", "full_product_name": { "name": "libradosstriper1-2:14.2.22-110.el7cp.x86_64 as a component of Red Hat Ceph Storage 4.3 OSD", "product_id": "7Server-RHEL-7-RHCEPH-4.3-OSD:libradosstriper1-2:14.2.22-110.el7cp.x86_64" }, "product_reference": "libradosstriper1-2:14.2.22-110.el7cp.x86_64", "relates_to_product_reference": "7Server-RHEL-7-RHCEPH-4.3-OSD" }, { "category": "default_component_of", "full_product_name": { "name": "librbd-devel-2:14.2.22-110.el7cp.ppc64le as a component of Red Hat Ceph Storage 4.3 OSD", "product_id": "7Server-RHEL-7-RHCEPH-4.3-OSD:librbd-devel-2:14.2.22-110.el7cp.ppc64le" }, "product_reference": "librbd-devel-2:14.2.22-110.el7cp.ppc64le", "relates_to_product_reference": "7Server-RHEL-7-RHCEPH-4.3-OSD" }, { "category": "default_component_of", "full_product_name": { "name": "librbd-devel-2:14.2.22-110.el7cp.x86_64 as a component of Red Hat Ceph Storage 4.3 OSD", "product_id": "7Server-RHEL-7-RHCEPH-4.3-OSD:librbd-devel-2:14.2.22-110.el7cp.x86_64" }, "product_reference": "librbd-devel-2:14.2.22-110.el7cp.x86_64", "relates_to_product_reference": "7Server-RHEL-7-RHCEPH-4.3-OSD" }, { "category": "default_component_of", "full_product_name": { "name": "librbd1-2:14.2.22-110.el7cp.ppc64le as a component of Red Hat Ceph Storage 4.3 OSD", "product_id": "7Server-RHEL-7-RHCEPH-4.3-OSD:librbd1-2:14.2.22-110.el7cp.ppc64le" }, "product_reference": "librbd1-2:14.2.22-110.el7cp.ppc64le", "relates_to_product_reference": "7Server-RHEL-7-RHCEPH-4.3-OSD" }, { "category": "default_component_of", "full_product_name": { "name": "librbd1-2:14.2.22-110.el7cp.x86_64 as a component of Red Hat Ceph Storage 4.3 OSD", "product_id": "7Server-RHEL-7-RHCEPH-4.3-OSD:librbd1-2:14.2.22-110.el7cp.x86_64" }, "product_reference": "librbd1-2:14.2.22-110.el7cp.x86_64", "relates_to_product_reference": "7Server-RHEL-7-RHCEPH-4.3-OSD" }, { "category": "default_component_of", "full_product_name": { "name": "librgw-devel-2:14.2.22-110.el7cp.ppc64le as a component of Red Hat Ceph Storage 4.3 OSD", "product_id": "7Server-RHEL-7-RHCEPH-4.3-OSD:librgw-devel-2:14.2.22-110.el7cp.ppc64le" }, "product_reference": "librgw-devel-2:14.2.22-110.el7cp.ppc64le", "relates_to_product_reference": "7Server-RHEL-7-RHCEPH-4.3-OSD" }, { "category": "default_component_of", "full_product_name": { "name": "librgw-devel-2:14.2.22-110.el7cp.x86_64 as a component of Red Hat Ceph Storage 4.3 OSD", "product_id": "7Server-RHEL-7-RHCEPH-4.3-OSD:librgw-devel-2:14.2.22-110.el7cp.x86_64" }, "product_reference": "librgw-devel-2:14.2.22-110.el7cp.x86_64", "relates_to_product_reference": "7Server-RHEL-7-RHCEPH-4.3-OSD" }, { "category": "default_component_of", "full_product_name": { "name": "librgw2-2:14.2.22-110.el7cp.ppc64le as a component of Red Hat Ceph Storage 4.3 OSD", "product_id": "7Server-RHEL-7-RHCEPH-4.3-OSD:librgw2-2:14.2.22-110.el7cp.ppc64le" }, "product_reference": "librgw2-2:14.2.22-110.el7cp.ppc64le", "relates_to_product_reference": "7Server-RHEL-7-RHCEPH-4.3-OSD" }, { "category": "default_component_of", "full_product_name": { "name": "librgw2-2:14.2.22-110.el7cp.x86_64 as a component of Red Hat Ceph Storage 4.3 OSD", "product_id": "7Server-RHEL-7-RHCEPH-4.3-OSD:librgw2-2:14.2.22-110.el7cp.x86_64" }, "product_reference": "librgw2-2:14.2.22-110.el7cp.x86_64", "relates_to_product_reference": "7Server-RHEL-7-RHCEPH-4.3-OSD" }, { "category": "default_component_of", "full_product_name": { "name": "python-ceph-argparse-2:14.2.22-110.el7cp.ppc64le as a component of Red Hat Ceph Storage 4.3 OSD", "product_id": "7Server-RHEL-7-RHCEPH-4.3-OSD:python-ceph-argparse-2:14.2.22-110.el7cp.ppc64le" }, "product_reference": "python-ceph-argparse-2:14.2.22-110.el7cp.ppc64le", "relates_to_product_reference": "7Server-RHEL-7-RHCEPH-4.3-OSD" }, { "category": "default_component_of", "full_product_name": { "name": "python-ceph-argparse-2:14.2.22-110.el7cp.x86_64 as a component of Red Hat Ceph Storage 4.3 OSD", "product_id": "7Server-RHEL-7-RHCEPH-4.3-OSD:python-ceph-argparse-2:14.2.22-110.el7cp.x86_64" }, "product_reference": "python-ceph-argparse-2:14.2.22-110.el7cp.x86_64", "relates_to_product_reference": "7Server-RHEL-7-RHCEPH-4.3-OSD" }, { "category": "default_component_of", "full_product_name": { "name": "python-cephfs-2:14.2.22-110.el7cp.ppc64le as a component of Red Hat Ceph Storage 4.3 OSD", "product_id": "7Server-RHEL-7-RHCEPH-4.3-OSD:python-cephfs-2:14.2.22-110.el7cp.ppc64le" }, "product_reference": "python-cephfs-2:14.2.22-110.el7cp.ppc64le", "relates_to_product_reference": "7Server-RHEL-7-RHCEPH-4.3-OSD" }, { "category": "default_component_of", "full_product_name": { "name": "python-cephfs-2:14.2.22-110.el7cp.x86_64 as a component of Red Hat Ceph Storage 4.3 OSD", "product_id": "7Server-RHEL-7-RHCEPH-4.3-OSD:python-cephfs-2:14.2.22-110.el7cp.x86_64" }, "product_reference": "python-cephfs-2:14.2.22-110.el7cp.x86_64", "relates_to_product_reference": "7Server-RHEL-7-RHCEPH-4.3-OSD" }, { "category": "default_component_of", "full_product_name": { "name": "python-rados-2:14.2.22-110.el7cp.ppc64le as a component of Red Hat Ceph Storage 4.3 OSD", "product_id": "7Server-RHEL-7-RHCEPH-4.3-OSD:python-rados-2:14.2.22-110.el7cp.ppc64le" }, "product_reference": "python-rados-2:14.2.22-110.el7cp.ppc64le", "relates_to_product_reference": "7Server-RHEL-7-RHCEPH-4.3-OSD" }, { "category": "default_component_of", "full_product_name": { "name": "python-rados-2:14.2.22-110.el7cp.x86_64 as a component of Red Hat Ceph Storage 4.3 OSD", "product_id": "7Server-RHEL-7-RHCEPH-4.3-OSD:python-rados-2:14.2.22-110.el7cp.x86_64" }, "product_reference": "python-rados-2:14.2.22-110.el7cp.x86_64", "relates_to_product_reference": "7Server-RHEL-7-RHCEPH-4.3-OSD" }, { "category": "default_component_of", "full_product_name": { "name": "python-rbd-2:14.2.22-110.el7cp.ppc64le as a component of Red Hat Ceph Storage 4.3 OSD", "product_id": "7Server-RHEL-7-RHCEPH-4.3-OSD:python-rbd-2:14.2.22-110.el7cp.ppc64le" }, "product_reference": "python-rbd-2:14.2.22-110.el7cp.ppc64le", "relates_to_product_reference": "7Server-RHEL-7-RHCEPH-4.3-OSD" }, { "category": "default_component_of", "full_product_name": { "name": "python-rbd-2:14.2.22-110.el7cp.x86_64 as a component of Red Hat Ceph Storage 4.3 OSD", "product_id": "7Server-RHEL-7-RHCEPH-4.3-OSD:python-rbd-2:14.2.22-110.el7cp.x86_64" }, "product_reference": "python-rbd-2:14.2.22-110.el7cp.x86_64", "relates_to_product_reference": "7Server-RHEL-7-RHCEPH-4.3-OSD" }, { "category": "default_component_of", "full_product_name": { "name": "python-rgw-2:14.2.22-110.el7cp.ppc64le as a component of Red Hat Ceph Storage 4.3 OSD", "product_id": "7Server-RHEL-7-RHCEPH-4.3-OSD:python-rgw-2:14.2.22-110.el7cp.ppc64le" }, "product_reference": "python-rgw-2:14.2.22-110.el7cp.ppc64le", "relates_to_product_reference": "7Server-RHEL-7-RHCEPH-4.3-OSD" }, { "category": "default_component_of", "full_product_name": { "name": "python-rgw-2:14.2.22-110.el7cp.x86_64 as a component of Red Hat Ceph Storage 4.3 OSD", "product_id": "7Server-RHEL-7-RHCEPH-4.3-OSD:python-rgw-2:14.2.22-110.el7cp.x86_64" }, "product_reference": "python-rgw-2:14.2.22-110.el7cp.x86_64", "relates_to_product_reference": "7Server-RHEL-7-RHCEPH-4.3-OSD" }, { "category": "default_component_of", "full_product_name": { "name": "rbd-mirror-2:14.2.22-110.el7cp.ppc64le as a component of Red Hat Ceph Storage 4.3 OSD", "product_id": "7Server-RHEL-7-RHCEPH-4.3-OSD:rbd-mirror-2:14.2.22-110.el7cp.ppc64le" }, "product_reference": "rbd-mirror-2:14.2.22-110.el7cp.ppc64le", "relates_to_product_reference": "7Server-RHEL-7-RHCEPH-4.3-OSD" }, { "category": "default_component_of", "full_product_name": { "name": "rbd-mirror-2:14.2.22-110.el7cp.x86_64 as a component of Red Hat Ceph Storage 4.3 OSD", "product_id": "7Server-RHEL-7-RHCEPH-4.3-OSD:rbd-mirror-2:14.2.22-110.el7cp.x86_64" }, "product_reference": "rbd-mirror-2:14.2.22-110.el7cp.x86_64", "relates_to_product_reference": "7Server-RHEL-7-RHCEPH-4.3-OSD" }, { "category": "default_component_of", "full_product_name": { "name": "rbd-nbd-2:14.2.22-110.el7cp.ppc64le as a component of Red Hat Ceph Storage 4.3 OSD", "product_id": "7Server-RHEL-7-RHCEPH-4.3-OSD:rbd-nbd-2:14.2.22-110.el7cp.ppc64le" }, "product_reference": "rbd-nbd-2:14.2.22-110.el7cp.ppc64le", "relates_to_product_reference": "7Server-RHEL-7-RHCEPH-4.3-OSD" }, { "category": "default_component_of", "full_product_name": { "name": "rbd-nbd-2:14.2.22-110.el7cp.x86_64 as a component of Red Hat Ceph Storage 4.3 OSD", "product_id": "7Server-RHEL-7-RHCEPH-4.3-OSD:rbd-nbd-2:14.2.22-110.el7cp.x86_64" }, "product_reference": "rbd-nbd-2:14.2.22-110.el7cp.x86_64", "relates_to_product_reference": "7Server-RHEL-7-RHCEPH-4.3-OSD" }, { "category": "default_component_of", "full_product_name": { "name": "ceph-2:14.2.22-110.el7cp.src as a component of Red Hat Ceph Storage 4.3 Tools", "product_id": "7Server-RHEL-7-RHCEPH-4.3-Tools:ceph-2:14.2.22-110.el7cp.src" }, "product_reference": "ceph-2:14.2.22-110.el7cp.src", "relates_to_product_reference": "7Server-RHEL-7-RHCEPH-4.3-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "ceph-ansible-0:4.0.70.3-1.el7cp.noarch as a component of Red Hat Ceph Storage 4.3 Tools", "product_id": "7Server-RHEL-7-RHCEPH-4.3-Tools:ceph-ansible-0:4.0.70.3-1.el7cp.noarch" }, "product_reference": "ceph-ansible-0:4.0.70.3-1.el7cp.noarch", "relates_to_product_reference": "7Server-RHEL-7-RHCEPH-4.3-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "ceph-ansible-0:4.0.70.3-1.el7cp.src as a component of Red Hat Ceph Storage 4.3 Tools", "product_id": "7Server-RHEL-7-RHCEPH-4.3-Tools:ceph-ansible-0:4.0.70.3-1.el7cp.src" }, "product_reference": "ceph-ansible-0:4.0.70.3-1.el7cp.src", "relates_to_product_reference": "7Server-RHEL-7-RHCEPH-4.3-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "ceph-base-2:14.2.22-110.el7cp.ppc64le as a component of Red Hat Ceph Storage 4.3 Tools", "product_id": "7Server-RHEL-7-RHCEPH-4.3-Tools:ceph-base-2:14.2.22-110.el7cp.ppc64le" }, "product_reference": "ceph-base-2:14.2.22-110.el7cp.ppc64le", "relates_to_product_reference": "7Server-RHEL-7-RHCEPH-4.3-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "ceph-base-2:14.2.22-110.el7cp.x86_64 as a component of Red Hat Ceph Storage 4.3 Tools", "product_id": "7Server-RHEL-7-RHCEPH-4.3-Tools:ceph-base-2:14.2.22-110.el7cp.x86_64" }, "product_reference": "ceph-base-2:14.2.22-110.el7cp.x86_64", "relates_to_product_reference": "7Server-RHEL-7-RHCEPH-4.3-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "ceph-common-2:14.2.22-110.el7cp.ppc64le as a component of Red Hat Ceph Storage 4.3 Tools", "product_id": "7Server-RHEL-7-RHCEPH-4.3-Tools:ceph-common-2:14.2.22-110.el7cp.ppc64le" }, "product_reference": "ceph-common-2:14.2.22-110.el7cp.ppc64le", "relates_to_product_reference": "7Server-RHEL-7-RHCEPH-4.3-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "ceph-common-2:14.2.22-110.el7cp.x86_64 as a component of Red Hat Ceph Storage 4.3 Tools", "product_id": "7Server-RHEL-7-RHCEPH-4.3-Tools:ceph-common-2:14.2.22-110.el7cp.x86_64" }, "product_reference": "ceph-common-2:14.2.22-110.el7cp.x86_64", "relates_to_product_reference": "7Server-RHEL-7-RHCEPH-4.3-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "ceph-debuginfo-2:14.2.22-110.el7cp.ppc64le as a component of Red Hat Ceph Storage 4.3 Tools", "product_id": "7Server-RHEL-7-RHCEPH-4.3-Tools:ceph-debuginfo-2:14.2.22-110.el7cp.ppc64le" }, "product_reference": "ceph-debuginfo-2:14.2.22-110.el7cp.ppc64le", "relates_to_product_reference": "7Server-RHEL-7-RHCEPH-4.3-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "ceph-debuginfo-2:14.2.22-110.el7cp.x86_64 as a component of Red Hat Ceph Storage 4.3 Tools", "product_id": "7Server-RHEL-7-RHCEPH-4.3-Tools:ceph-debuginfo-2:14.2.22-110.el7cp.x86_64" }, "product_reference": "ceph-debuginfo-2:14.2.22-110.el7cp.x86_64", "relates_to_product_reference": "7Server-RHEL-7-RHCEPH-4.3-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "ceph-fuse-2:14.2.22-110.el7cp.ppc64le as a component of Red Hat Ceph Storage 4.3 Tools", "product_id": "7Server-RHEL-7-RHCEPH-4.3-Tools:ceph-fuse-2:14.2.22-110.el7cp.ppc64le" }, "product_reference": "ceph-fuse-2:14.2.22-110.el7cp.ppc64le", "relates_to_product_reference": "7Server-RHEL-7-RHCEPH-4.3-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "ceph-fuse-2:14.2.22-110.el7cp.x86_64 as a component of Red Hat Ceph Storage 4.3 Tools", "product_id": "7Server-RHEL-7-RHCEPH-4.3-Tools:ceph-fuse-2:14.2.22-110.el7cp.x86_64" }, "product_reference": "ceph-fuse-2:14.2.22-110.el7cp.x86_64", "relates_to_product_reference": "7Server-RHEL-7-RHCEPH-4.3-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "ceph-grafana-dashboards-2:14.2.22-110.el7cp.noarch as a component of Red Hat Ceph Storage 4.3 Tools", "product_id": "7Server-RHEL-7-RHCEPH-4.3-Tools:ceph-grafana-dashboards-2:14.2.22-110.el7cp.noarch" }, "product_reference": "ceph-grafana-dashboards-2:14.2.22-110.el7cp.noarch", "relates_to_product_reference": "7Server-RHEL-7-RHCEPH-4.3-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "ceph-iscsi-0:3.4-5.el7cp.noarch as a component of Red Hat Ceph Storage 4.3 Tools", "product_id": "7Server-RHEL-7-RHCEPH-4.3-Tools:ceph-iscsi-0:3.4-5.el7cp.noarch" }, "product_reference": "ceph-iscsi-0:3.4-5.el7cp.noarch", "relates_to_product_reference": "7Server-RHEL-7-RHCEPH-4.3-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "ceph-iscsi-0:3.4-5.el7cp.src as a component of Red Hat Ceph Storage 4.3 Tools", "product_id": "7Server-RHEL-7-RHCEPH-4.3-Tools:ceph-iscsi-0:3.4-5.el7cp.src" }, "product_reference": "ceph-iscsi-0:3.4-5.el7cp.src", "relates_to_product_reference": "7Server-RHEL-7-RHCEPH-4.3-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "ceph-mds-2:14.2.22-110.el7cp.ppc64le as a component of Red Hat Ceph Storage 4.3 Tools", "product_id": "7Server-RHEL-7-RHCEPH-4.3-Tools:ceph-mds-2:14.2.22-110.el7cp.ppc64le" }, "product_reference": "ceph-mds-2:14.2.22-110.el7cp.ppc64le", "relates_to_product_reference": "7Server-RHEL-7-RHCEPH-4.3-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "ceph-mds-2:14.2.22-110.el7cp.x86_64 as a component of Red Hat Ceph Storage 4.3 Tools", "product_id": "7Server-RHEL-7-RHCEPH-4.3-Tools:ceph-mds-2:14.2.22-110.el7cp.x86_64" }, "product_reference": "ceph-mds-2:14.2.22-110.el7cp.x86_64", "relates_to_product_reference": "7Server-RHEL-7-RHCEPH-4.3-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "ceph-mgr-2:14.2.22-110.el7cp.ppc64le as a component of Red Hat Ceph Storage 4.3 Tools", "product_id": "7Server-RHEL-7-RHCEPH-4.3-Tools:ceph-mgr-2:14.2.22-110.el7cp.ppc64le" }, "product_reference": "ceph-mgr-2:14.2.22-110.el7cp.ppc64le", "relates_to_product_reference": "7Server-RHEL-7-RHCEPH-4.3-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "ceph-mgr-2:14.2.22-110.el7cp.x86_64 as a component of Red Hat Ceph Storage 4.3 Tools", "product_id": "7Server-RHEL-7-RHCEPH-4.3-Tools:ceph-mgr-2:14.2.22-110.el7cp.x86_64" }, "product_reference": "ceph-mgr-2:14.2.22-110.el7cp.x86_64", "relates_to_product_reference": "7Server-RHEL-7-RHCEPH-4.3-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "ceph-mgr-dashboard-2:14.2.22-110.el7cp.noarch as a component of Red Hat Ceph Storage 4.3 Tools", "product_id": "7Server-RHEL-7-RHCEPH-4.3-Tools:ceph-mgr-dashboard-2:14.2.22-110.el7cp.noarch" }, "product_reference": "ceph-mgr-dashboard-2:14.2.22-110.el7cp.noarch", "relates_to_product_reference": "7Server-RHEL-7-RHCEPH-4.3-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "ceph-mgr-diskprediction-local-2:14.2.22-110.el7cp.noarch as a component of Red Hat Ceph Storage 4.3 Tools", "product_id": "7Server-RHEL-7-RHCEPH-4.3-Tools:ceph-mgr-diskprediction-local-2:14.2.22-110.el7cp.noarch" }, "product_reference": "ceph-mgr-diskprediction-local-2:14.2.22-110.el7cp.noarch", "relates_to_product_reference": "7Server-RHEL-7-RHCEPH-4.3-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "ceph-mgr-k8sevents-2:14.2.22-110.el7cp.noarch as a component of Red Hat Ceph Storage 4.3 Tools", "product_id": "7Server-RHEL-7-RHCEPH-4.3-Tools:ceph-mgr-k8sevents-2:14.2.22-110.el7cp.noarch" }, "product_reference": "ceph-mgr-k8sevents-2:14.2.22-110.el7cp.noarch", "relates_to_product_reference": "7Server-RHEL-7-RHCEPH-4.3-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "ceph-mgr-rook-2:14.2.22-110.el7cp.noarch as a component of Red Hat Ceph Storage 4.3 Tools", "product_id": "7Server-RHEL-7-RHCEPH-4.3-Tools:ceph-mgr-rook-2:14.2.22-110.el7cp.noarch" }, "product_reference": "ceph-mgr-rook-2:14.2.22-110.el7cp.noarch", "relates_to_product_reference": "7Server-RHEL-7-RHCEPH-4.3-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "ceph-mon-2:14.2.22-110.el7cp.ppc64le as a component of Red Hat Ceph Storage 4.3 Tools", "product_id": "7Server-RHEL-7-RHCEPH-4.3-Tools:ceph-mon-2:14.2.22-110.el7cp.ppc64le" }, "product_reference": "ceph-mon-2:14.2.22-110.el7cp.ppc64le", "relates_to_product_reference": "7Server-RHEL-7-RHCEPH-4.3-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "ceph-mon-2:14.2.22-110.el7cp.x86_64 as a component of Red Hat Ceph Storage 4.3 Tools", "product_id": "7Server-RHEL-7-RHCEPH-4.3-Tools:ceph-mon-2:14.2.22-110.el7cp.x86_64" }, "product_reference": "ceph-mon-2:14.2.22-110.el7cp.x86_64", "relates_to_product_reference": "7Server-RHEL-7-RHCEPH-4.3-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "ceph-osd-2:14.2.22-110.el7cp.ppc64le as a component of Red Hat Ceph Storage 4.3 Tools", "product_id": "7Server-RHEL-7-RHCEPH-4.3-Tools:ceph-osd-2:14.2.22-110.el7cp.ppc64le" }, "product_reference": "ceph-osd-2:14.2.22-110.el7cp.ppc64le", "relates_to_product_reference": "7Server-RHEL-7-RHCEPH-4.3-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "ceph-osd-2:14.2.22-110.el7cp.x86_64 as a component of Red Hat Ceph Storage 4.3 Tools", "product_id": "7Server-RHEL-7-RHCEPH-4.3-Tools:ceph-osd-2:14.2.22-110.el7cp.x86_64" }, "product_reference": "ceph-osd-2:14.2.22-110.el7cp.x86_64", "relates_to_product_reference": "7Server-RHEL-7-RHCEPH-4.3-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "ceph-radosgw-2:14.2.22-110.el7cp.ppc64le as a component of Red Hat Ceph Storage 4.3 Tools", "product_id": "7Server-RHEL-7-RHCEPH-4.3-Tools:ceph-radosgw-2:14.2.22-110.el7cp.ppc64le" }, "product_reference": "ceph-radosgw-2:14.2.22-110.el7cp.ppc64le", "relates_to_product_reference": "7Server-RHEL-7-RHCEPH-4.3-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "ceph-radosgw-2:14.2.22-110.el7cp.x86_64 as a component of Red Hat Ceph Storage 4.3 Tools", "product_id": "7Server-RHEL-7-RHCEPH-4.3-Tools:ceph-radosgw-2:14.2.22-110.el7cp.x86_64" }, "product_reference": "ceph-radosgw-2:14.2.22-110.el7cp.x86_64", "relates_to_product_reference": "7Server-RHEL-7-RHCEPH-4.3-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "ceph-selinux-2:14.2.22-110.el7cp.ppc64le as a component of Red Hat Ceph Storage 4.3 Tools", "product_id": "7Server-RHEL-7-RHCEPH-4.3-Tools:ceph-selinux-2:14.2.22-110.el7cp.ppc64le" }, "product_reference": "ceph-selinux-2:14.2.22-110.el7cp.ppc64le", "relates_to_product_reference": "7Server-RHEL-7-RHCEPH-4.3-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "ceph-selinux-2:14.2.22-110.el7cp.x86_64 as a component of Red Hat Ceph Storage 4.3 Tools", "product_id": "7Server-RHEL-7-RHCEPH-4.3-Tools:ceph-selinux-2:14.2.22-110.el7cp.x86_64" }, "product_reference": "ceph-selinux-2:14.2.22-110.el7cp.x86_64", "relates_to_product_reference": "7Server-RHEL-7-RHCEPH-4.3-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "ceph-test-2:14.2.22-110.el7cp.ppc64le as a component of Red Hat Ceph Storage 4.3 Tools", "product_id": "7Server-RHEL-7-RHCEPH-4.3-Tools:ceph-test-2:14.2.22-110.el7cp.ppc64le" }, "product_reference": "ceph-test-2:14.2.22-110.el7cp.ppc64le", "relates_to_product_reference": "7Server-RHEL-7-RHCEPH-4.3-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "ceph-test-2:14.2.22-110.el7cp.x86_64 as a component of Red Hat Ceph Storage 4.3 Tools", "product_id": "7Server-RHEL-7-RHCEPH-4.3-Tools:ceph-test-2:14.2.22-110.el7cp.x86_64" }, "product_reference": "ceph-test-2:14.2.22-110.el7cp.x86_64", "relates_to_product_reference": "7Server-RHEL-7-RHCEPH-4.3-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "libcephfs-devel-2:14.2.22-110.el7cp.ppc64le as a component of Red Hat Ceph Storage 4.3 Tools", "product_id": "7Server-RHEL-7-RHCEPH-4.3-Tools:libcephfs-devel-2:14.2.22-110.el7cp.ppc64le" }, "product_reference": "libcephfs-devel-2:14.2.22-110.el7cp.ppc64le", "relates_to_product_reference": "7Server-RHEL-7-RHCEPH-4.3-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "libcephfs-devel-2:14.2.22-110.el7cp.x86_64 as a component of Red Hat Ceph Storage 4.3 Tools", "product_id": "7Server-RHEL-7-RHCEPH-4.3-Tools:libcephfs-devel-2:14.2.22-110.el7cp.x86_64" }, "product_reference": "libcephfs-devel-2:14.2.22-110.el7cp.x86_64", "relates_to_product_reference": "7Server-RHEL-7-RHCEPH-4.3-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "libcephfs2-2:14.2.22-110.el7cp.ppc64le as a component of Red Hat Ceph Storage 4.3 Tools", "product_id": "7Server-RHEL-7-RHCEPH-4.3-Tools:libcephfs2-2:14.2.22-110.el7cp.ppc64le" }, "product_reference": "libcephfs2-2:14.2.22-110.el7cp.ppc64le", "relates_to_product_reference": "7Server-RHEL-7-RHCEPH-4.3-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "libcephfs2-2:14.2.22-110.el7cp.x86_64 as a component of Red Hat Ceph Storage 4.3 Tools", "product_id": "7Server-RHEL-7-RHCEPH-4.3-Tools:libcephfs2-2:14.2.22-110.el7cp.x86_64" }, "product_reference": "libcephfs2-2:14.2.22-110.el7cp.x86_64", "relates_to_product_reference": "7Server-RHEL-7-RHCEPH-4.3-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "libntirpc-0:3.4-1.1.el7cp.ppc64le as a component of Red Hat Ceph Storage 4.3 Tools", "product_id": "7Server-RHEL-7-RHCEPH-4.3-Tools:libntirpc-0:3.4-1.1.el7cp.ppc64le" }, "product_reference": "libntirpc-0:3.4-1.1.el7cp.ppc64le", "relates_to_product_reference": "7Server-RHEL-7-RHCEPH-4.3-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "libntirpc-0:3.4-1.1.el7cp.src as a component of Red Hat Ceph Storage 4.3 Tools", "product_id": "7Server-RHEL-7-RHCEPH-4.3-Tools:libntirpc-0:3.4-1.1.el7cp.src" }, "product_reference": "libntirpc-0:3.4-1.1.el7cp.src", "relates_to_product_reference": "7Server-RHEL-7-RHCEPH-4.3-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "libntirpc-0:3.4-1.1.el7cp.x86_64 as a component of Red Hat Ceph Storage 4.3 Tools", "product_id": "7Server-RHEL-7-RHCEPH-4.3-Tools:libntirpc-0:3.4-1.1.el7cp.x86_64" }, "product_reference": "libntirpc-0:3.4-1.1.el7cp.x86_64", "relates_to_product_reference": "7Server-RHEL-7-RHCEPH-4.3-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "libntirpc-debuginfo-0:3.4-1.1.el7cp.ppc64le as a component of Red Hat Ceph Storage 4.3 Tools", "product_id": "7Server-RHEL-7-RHCEPH-4.3-Tools:libntirpc-debuginfo-0:3.4-1.1.el7cp.ppc64le" }, "product_reference": "libntirpc-debuginfo-0:3.4-1.1.el7cp.ppc64le", "relates_to_product_reference": "7Server-RHEL-7-RHCEPH-4.3-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "libntirpc-debuginfo-0:3.4-1.1.el7cp.x86_64 as a component of Red Hat Ceph Storage 4.3 Tools", "product_id": "7Server-RHEL-7-RHCEPH-4.3-Tools:libntirpc-debuginfo-0:3.4-1.1.el7cp.x86_64" }, "product_reference": "libntirpc-debuginfo-0:3.4-1.1.el7cp.x86_64", "relates_to_product_reference": "7Server-RHEL-7-RHCEPH-4.3-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "librados-devel-2:14.2.22-110.el7cp.ppc64le as a component of Red Hat Ceph Storage 4.3 Tools", "product_id": "7Server-RHEL-7-RHCEPH-4.3-Tools:librados-devel-2:14.2.22-110.el7cp.ppc64le" }, "product_reference": "librados-devel-2:14.2.22-110.el7cp.ppc64le", "relates_to_product_reference": "7Server-RHEL-7-RHCEPH-4.3-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "librados-devel-2:14.2.22-110.el7cp.x86_64 as a component of Red Hat Ceph Storage 4.3 Tools", "product_id": "7Server-RHEL-7-RHCEPH-4.3-Tools:librados-devel-2:14.2.22-110.el7cp.x86_64" }, "product_reference": "librados-devel-2:14.2.22-110.el7cp.x86_64", "relates_to_product_reference": "7Server-RHEL-7-RHCEPH-4.3-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "librados2-2:14.2.22-110.el7cp.ppc64le as a component of Red Hat Ceph Storage 4.3 Tools", "product_id": "7Server-RHEL-7-RHCEPH-4.3-Tools:librados2-2:14.2.22-110.el7cp.ppc64le" }, "product_reference": "librados2-2:14.2.22-110.el7cp.ppc64le", "relates_to_product_reference": "7Server-RHEL-7-RHCEPH-4.3-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "librados2-2:14.2.22-110.el7cp.x86_64 as a component of Red Hat Ceph Storage 4.3 Tools", "product_id": "7Server-RHEL-7-RHCEPH-4.3-Tools:librados2-2:14.2.22-110.el7cp.x86_64" }, "product_reference": "librados2-2:14.2.22-110.el7cp.x86_64", "relates_to_product_reference": "7Server-RHEL-7-RHCEPH-4.3-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "libradospp-devel-2:14.2.22-110.el7cp.ppc64le as a component of Red Hat Ceph Storage 4.3 Tools", "product_id": "7Server-RHEL-7-RHCEPH-4.3-Tools:libradospp-devel-2:14.2.22-110.el7cp.ppc64le" }, "product_reference": "libradospp-devel-2:14.2.22-110.el7cp.ppc64le", "relates_to_product_reference": "7Server-RHEL-7-RHCEPH-4.3-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "libradospp-devel-2:14.2.22-110.el7cp.x86_64 as a component of Red Hat Ceph Storage 4.3 Tools", "product_id": "7Server-RHEL-7-RHCEPH-4.3-Tools:libradospp-devel-2:14.2.22-110.el7cp.x86_64" }, "product_reference": "libradospp-devel-2:14.2.22-110.el7cp.x86_64", "relates_to_product_reference": "7Server-RHEL-7-RHCEPH-4.3-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "libradosstriper1-2:14.2.22-110.el7cp.ppc64le as a component of Red Hat Ceph Storage 4.3 Tools", "product_id": "7Server-RHEL-7-RHCEPH-4.3-Tools:libradosstriper1-2:14.2.22-110.el7cp.ppc64le" }, "product_reference": "libradosstriper1-2:14.2.22-110.el7cp.ppc64le", "relates_to_product_reference": "7Server-RHEL-7-RHCEPH-4.3-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "libradosstriper1-2:14.2.22-110.el7cp.x86_64 as a component of Red Hat Ceph Storage 4.3 Tools", "product_id": "7Server-RHEL-7-RHCEPH-4.3-Tools:libradosstriper1-2:14.2.22-110.el7cp.x86_64" }, "product_reference": "libradosstriper1-2:14.2.22-110.el7cp.x86_64", "relates_to_product_reference": "7Server-RHEL-7-RHCEPH-4.3-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "librbd-devel-2:14.2.22-110.el7cp.ppc64le as a component of Red Hat Ceph Storage 4.3 Tools", "product_id": "7Server-RHEL-7-RHCEPH-4.3-Tools:librbd-devel-2:14.2.22-110.el7cp.ppc64le" }, "product_reference": "librbd-devel-2:14.2.22-110.el7cp.ppc64le", "relates_to_product_reference": "7Server-RHEL-7-RHCEPH-4.3-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "librbd-devel-2:14.2.22-110.el7cp.x86_64 as a component of Red Hat Ceph Storage 4.3 Tools", "product_id": "7Server-RHEL-7-RHCEPH-4.3-Tools:librbd-devel-2:14.2.22-110.el7cp.x86_64" }, "product_reference": "librbd-devel-2:14.2.22-110.el7cp.x86_64", "relates_to_product_reference": "7Server-RHEL-7-RHCEPH-4.3-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "librbd1-2:14.2.22-110.el7cp.ppc64le as a component of Red Hat Ceph Storage 4.3 Tools", "product_id": "7Server-RHEL-7-RHCEPH-4.3-Tools:librbd1-2:14.2.22-110.el7cp.ppc64le" }, "product_reference": "librbd1-2:14.2.22-110.el7cp.ppc64le", "relates_to_product_reference": "7Server-RHEL-7-RHCEPH-4.3-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "librbd1-2:14.2.22-110.el7cp.x86_64 as a component of Red Hat Ceph Storage 4.3 Tools", "product_id": "7Server-RHEL-7-RHCEPH-4.3-Tools:librbd1-2:14.2.22-110.el7cp.x86_64" }, "product_reference": "librbd1-2:14.2.22-110.el7cp.x86_64", "relates_to_product_reference": "7Server-RHEL-7-RHCEPH-4.3-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "librgw-devel-2:14.2.22-110.el7cp.ppc64le as a component of Red Hat Ceph Storage 4.3 Tools", "product_id": "7Server-RHEL-7-RHCEPH-4.3-Tools:librgw-devel-2:14.2.22-110.el7cp.ppc64le" }, "product_reference": "librgw-devel-2:14.2.22-110.el7cp.ppc64le", "relates_to_product_reference": "7Server-RHEL-7-RHCEPH-4.3-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "librgw-devel-2:14.2.22-110.el7cp.x86_64 as a component of Red Hat Ceph Storage 4.3 Tools", "product_id": "7Server-RHEL-7-RHCEPH-4.3-Tools:librgw-devel-2:14.2.22-110.el7cp.x86_64" }, "product_reference": "librgw-devel-2:14.2.22-110.el7cp.x86_64", "relates_to_product_reference": "7Server-RHEL-7-RHCEPH-4.3-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "librgw2-2:14.2.22-110.el7cp.ppc64le as a component of Red Hat Ceph Storage 4.3 Tools", "product_id": "7Server-RHEL-7-RHCEPH-4.3-Tools:librgw2-2:14.2.22-110.el7cp.ppc64le" }, "product_reference": "librgw2-2:14.2.22-110.el7cp.ppc64le", "relates_to_product_reference": "7Server-RHEL-7-RHCEPH-4.3-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "librgw2-2:14.2.22-110.el7cp.x86_64 as a component of Red Hat Ceph Storage 4.3 Tools", "product_id": "7Server-RHEL-7-RHCEPH-4.3-Tools:librgw2-2:14.2.22-110.el7cp.x86_64" }, "product_reference": "librgw2-2:14.2.22-110.el7cp.x86_64", "relates_to_product_reference": "7Server-RHEL-7-RHCEPH-4.3-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "libtcmu-0:1.5.2-5.el7cp.ppc64le as a component of Red Hat Ceph Storage 4.3 Tools", "product_id": "7Server-RHEL-7-RHCEPH-4.3-Tools:libtcmu-0:1.5.2-5.el7cp.ppc64le" }, "product_reference": "libtcmu-0:1.5.2-5.el7cp.ppc64le", "relates_to_product_reference": "7Server-RHEL-7-RHCEPH-4.3-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "libtcmu-0:1.5.2-5.el7cp.x86_64 as a component of Red Hat Ceph Storage 4.3 Tools", "product_id": "7Server-RHEL-7-RHCEPH-4.3-Tools:libtcmu-0:1.5.2-5.el7cp.x86_64" }, "product_reference": "libtcmu-0:1.5.2-5.el7cp.x86_64", "relates_to_product_reference": "7Server-RHEL-7-RHCEPH-4.3-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "nfs-ganesha-0:3.5-1.2.el7cp.ppc64le as a component of Red Hat Ceph Storage 4.3 Tools", "product_id": "7Server-RHEL-7-RHCEPH-4.3-Tools:nfs-ganesha-0:3.5-1.2.el7cp.ppc64le" }, "product_reference": "nfs-ganesha-0:3.5-1.2.el7cp.ppc64le", "relates_to_product_reference": "7Server-RHEL-7-RHCEPH-4.3-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "nfs-ganesha-0:3.5-1.2.el7cp.src as a component of Red Hat Ceph Storage 4.3 Tools", "product_id": "7Server-RHEL-7-RHCEPH-4.3-Tools:nfs-ganesha-0:3.5-1.2.el7cp.src" }, "product_reference": "nfs-ganesha-0:3.5-1.2.el7cp.src", "relates_to_product_reference": "7Server-RHEL-7-RHCEPH-4.3-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "nfs-ganesha-0:3.5-1.2.el7cp.x86_64 as a component of Red Hat Ceph Storage 4.3 Tools", "product_id": "7Server-RHEL-7-RHCEPH-4.3-Tools:nfs-ganesha-0:3.5-1.2.el7cp.x86_64" }, "product_reference": "nfs-ganesha-0:3.5-1.2.el7cp.x86_64", "relates_to_product_reference": "7Server-RHEL-7-RHCEPH-4.3-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "nfs-ganesha-ceph-0:3.5-1.2.el7cp.ppc64le as a component of Red Hat Ceph Storage 4.3 Tools", "product_id": "7Server-RHEL-7-RHCEPH-4.3-Tools:nfs-ganesha-ceph-0:3.5-1.2.el7cp.ppc64le" }, "product_reference": "nfs-ganesha-ceph-0:3.5-1.2.el7cp.ppc64le", "relates_to_product_reference": "7Server-RHEL-7-RHCEPH-4.3-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "nfs-ganesha-ceph-0:3.5-1.2.el7cp.x86_64 as a component of Red Hat Ceph Storage 4.3 Tools", "product_id": "7Server-RHEL-7-RHCEPH-4.3-Tools:nfs-ganesha-ceph-0:3.5-1.2.el7cp.x86_64" }, "product_reference": "nfs-ganesha-ceph-0:3.5-1.2.el7cp.x86_64", "relates_to_product_reference": "7Server-RHEL-7-RHCEPH-4.3-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "nfs-ganesha-debuginfo-0:3.5-1.2.el7cp.ppc64le as a component of Red Hat Ceph Storage 4.3 Tools", "product_id": "7Server-RHEL-7-RHCEPH-4.3-Tools:nfs-ganesha-debuginfo-0:3.5-1.2.el7cp.ppc64le" }, "product_reference": "nfs-ganesha-debuginfo-0:3.5-1.2.el7cp.ppc64le", "relates_to_product_reference": "7Server-RHEL-7-RHCEPH-4.3-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "nfs-ganesha-debuginfo-0:3.5-1.2.el7cp.x86_64 as a component of Red Hat Ceph Storage 4.3 Tools", "product_id": "7Server-RHEL-7-RHCEPH-4.3-Tools:nfs-ganesha-debuginfo-0:3.5-1.2.el7cp.x86_64" }, "product_reference": "nfs-ganesha-debuginfo-0:3.5-1.2.el7cp.x86_64", "relates_to_product_reference": "7Server-RHEL-7-RHCEPH-4.3-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "nfs-ganesha-proxy-0:3.5-1.2.el7cp.ppc64le as a component of Red Hat Ceph Storage 4.3 Tools", "product_id": "7Server-RHEL-7-RHCEPH-4.3-Tools:nfs-ganesha-proxy-0:3.5-1.2.el7cp.ppc64le" }, "product_reference": "nfs-ganesha-proxy-0:3.5-1.2.el7cp.ppc64le", "relates_to_product_reference": "7Server-RHEL-7-RHCEPH-4.3-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "nfs-ganesha-proxy-0:3.5-1.2.el7cp.x86_64 as a component of Red Hat Ceph Storage 4.3 Tools", "product_id": "7Server-RHEL-7-RHCEPH-4.3-Tools:nfs-ganesha-proxy-0:3.5-1.2.el7cp.x86_64" }, "product_reference": "nfs-ganesha-proxy-0:3.5-1.2.el7cp.x86_64", "relates_to_product_reference": "7Server-RHEL-7-RHCEPH-4.3-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "nfs-ganesha-rados-grace-0:3.5-1.2.el7cp.ppc64le as a component of Red Hat Ceph Storage 4.3 Tools", "product_id": "7Server-RHEL-7-RHCEPH-4.3-Tools:nfs-ganesha-rados-grace-0:3.5-1.2.el7cp.ppc64le" }, "product_reference": "nfs-ganesha-rados-grace-0:3.5-1.2.el7cp.ppc64le", "relates_to_product_reference": "7Server-RHEL-7-RHCEPH-4.3-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "nfs-ganesha-rados-grace-0:3.5-1.2.el7cp.x86_64 as a component of Red Hat Ceph Storage 4.3 Tools", "product_id": "7Server-RHEL-7-RHCEPH-4.3-Tools:nfs-ganesha-rados-grace-0:3.5-1.2.el7cp.x86_64" }, "product_reference": "nfs-ganesha-rados-grace-0:3.5-1.2.el7cp.x86_64", "relates_to_product_reference": "7Server-RHEL-7-RHCEPH-4.3-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "nfs-ganesha-rados-urls-0:3.5-1.2.el7cp.ppc64le as a component of Red Hat Ceph Storage 4.3 Tools", "product_id": "7Server-RHEL-7-RHCEPH-4.3-Tools:nfs-ganesha-rados-urls-0:3.5-1.2.el7cp.ppc64le" }, "product_reference": "nfs-ganesha-rados-urls-0:3.5-1.2.el7cp.ppc64le", "relates_to_product_reference": "7Server-RHEL-7-RHCEPH-4.3-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "nfs-ganesha-rados-urls-0:3.5-1.2.el7cp.x86_64 as a component of Red Hat Ceph Storage 4.3 Tools", "product_id": "7Server-RHEL-7-RHCEPH-4.3-Tools:nfs-ganesha-rados-urls-0:3.5-1.2.el7cp.x86_64" }, "product_reference": "nfs-ganesha-rados-urls-0:3.5-1.2.el7cp.x86_64", "relates_to_product_reference": "7Server-RHEL-7-RHCEPH-4.3-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "nfs-ganesha-rgw-0:3.5-1.2.el7cp.ppc64le as a component of Red Hat Ceph Storage 4.3 Tools", "product_id": "7Server-RHEL-7-RHCEPH-4.3-Tools:nfs-ganesha-rgw-0:3.5-1.2.el7cp.ppc64le" }, "product_reference": "nfs-ganesha-rgw-0:3.5-1.2.el7cp.ppc64le", "relates_to_product_reference": "7Server-RHEL-7-RHCEPH-4.3-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "nfs-ganesha-rgw-0:3.5-1.2.el7cp.x86_64 as a component of Red Hat Ceph Storage 4.3 Tools", "product_id": "7Server-RHEL-7-RHCEPH-4.3-Tools:nfs-ganesha-rgw-0:3.5-1.2.el7cp.x86_64" }, "product_reference": "nfs-ganesha-rgw-0:3.5-1.2.el7cp.x86_64", "relates_to_product_reference": "7Server-RHEL-7-RHCEPH-4.3-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "nfs-ganesha-selinux-0:3.5-1.2.el7cp.noarch as a component of Red Hat Ceph Storage 4.3 Tools", "product_id": "7Server-RHEL-7-RHCEPH-4.3-Tools:nfs-ganesha-selinux-0:3.5-1.2.el7cp.noarch" }, "product_reference": "nfs-ganesha-selinux-0:3.5-1.2.el7cp.noarch", "relates_to_product_reference": "7Server-RHEL-7-RHCEPH-4.3-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "nfs-ganesha-vfs-0:3.5-1.2.el7cp.ppc64le as a component of Red Hat Ceph Storage 4.3 Tools", "product_id": "7Server-RHEL-7-RHCEPH-4.3-Tools:nfs-ganesha-vfs-0:3.5-1.2.el7cp.ppc64le" }, "product_reference": "nfs-ganesha-vfs-0:3.5-1.2.el7cp.ppc64le", "relates_to_product_reference": "7Server-RHEL-7-RHCEPH-4.3-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "nfs-ganesha-vfs-0:3.5-1.2.el7cp.x86_64 as a component of Red Hat Ceph Storage 4.3 Tools", "product_id": "7Server-RHEL-7-RHCEPH-4.3-Tools:nfs-ganesha-vfs-0:3.5-1.2.el7cp.x86_64" }, "product_reference": "nfs-ganesha-vfs-0:3.5-1.2.el7cp.x86_64", "relates_to_product_reference": "7Server-RHEL-7-RHCEPH-4.3-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "python-ceph-argparse-2:14.2.22-110.el7cp.ppc64le as a component of Red Hat Ceph Storage 4.3 Tools", "product_id": "7Server-RHEL-7-RHCEPH-4.3-Tools:python-ceph-argparse-2:14.2.22-110.el7cp.ppc64le" }, "product_reference": "python-ceph-argparse-2:14.2.22-110.el7cp.ppc64le", "relates_to_product_reference": "7Server-RHEL-7-RHCEPH-4.3-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "python-ceph-argparse-2:14.2.22-110.el7cp.x86_64 as a component of Red Hat Ceph Storage 4.3 Tools", "product_id": "7Server-RHEL-7-RHCEPH-4.3-Tools:python-ceph-argparse-2:14.2.22-110.el7cp.x86_64" }, "product_reference": "python-ceph-argparse-2:14.2.22-110.el7cp.x86_64", "relates_to_product_reference": "7Server-RHEL-7-RHCEPH-4.3-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "python-cephfs-2:14.2.22-110.el7cp.ppc64le as a component of Red Hat Ceph Storage 4.3 Tools", "product_id": "7Server-RHEL-7-RHCEPH-4.3-Tools:python-cephfs-2:14.2.22-110.el7cp.ppc64le" }, "product_reference": "python-cephfs-2:14.2.22-110.el7cp.ppc64le", "relates_to_product_reference": "7Server-RHEL-7-RHCEPH-4.3-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "python-cephfs-2:14.2.22-110.el7cp.x86_64 as a component of Red Hat Ceph Storage 4.3 Tools", "product_id": "7Server-RHEL-7-RHCEPH-4.3-Tools:python-cephfs-2:14.2.22-110.el7cp.x86_64" }, "product_reference": "python-cephfs-2:14.2.22-110.el7cp.x86_64", "relates_to_product_reference": "7Server-RHEL-7-RHCEPH-4.3-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "python-rados-2:14.2.22-110.el7cp.ppc64le as a component of Red Hat Ceph Storage 4.3 Tools", "product_id": "7Server-RHEL-7-RHCEPH-4.3-Tools:python-rados-2:14.2.22-110.el7cp.ppc64le" }, "product_reference": "python-rados-2:14.2.22-110.el7cp.ppc64le", "relates_to_product_reference": "7Server-RHEL-7-RHCEPH-4.3-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "python-rados-2:14.2.22-110.el7cp.x86_64 as a component of Red Hat Ceph Storage 4.3 Tools", "product_id": "7Server-RHEL-7-RHCEPH-4.3-Tools:python-rados-2:14.2.22-110.el7cp.x86_64" }, "product_reference": "python-rados-2:14.2.22-110.el7cp.x86_64", "relates_to_product_reference": "7Server-RHEL-7-RHCEPH-4.3-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "python-rbd-2:14.2.22-110.el7cp.ppc64le as a component of Red Hat Ceph Storage 4.3 Tools", "product_id": "7Server-RHEL-7-RHCEPH-4.3-Tools:python-rbd-2:14.2.22-110.el7cp.ppc64le" }, "product_reference": "python-rbd-2:14.2.22-110.el7cp.ppc64le", "relates_to_product_reference": "7Server-RHEL-7-RHCEPH-4.3-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "python-rbd-2:14.2.22-110.el7cp.x86_64 as a component of Red Hat Ceph Storage 4.3 Tools", "product_id": "7Server-RHEL-7-RHCEPH-4.3-Tools:python-rbd-2:14.2.22-110.el7cp.x86_64" }, "product_reference": "python-rbd-2:14.2.22-110.el7cp.x86_64", "relates_to_product_reference": "7Server-RHEL-7-RHCEPH-4.3-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "python-rgw-2:14.2.22-110.el7cp.ppc64le as a component of Red Hat Ceph Storage 4.3 Tools", "product_id": "7Server-RHEL-7-RHCEPH-4.3-Tools:python-rgw-2:14.2.22-110.el7cp.ppc64le" }, "product_reference": "python-rgw-2:14.2.22-110.el7cp.ppc64le", "relates_to_product_reference": "7Server-RHEL-7-RHCEPH-4.3-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "python-rgw-2:14.2.22-110.el7cp.x86_64 as a component of Red Hat Ceph Storage 4.3 Tools", "product_id": "7Server-RHEL-7-RHCEPH-4.3-Tools:python-rgw-2:14.2.22-110.el7cp.x86_64" }, "product_reference": "python-rgw-2:14.2.22-110.el7cp.x86_64", "relates_to_product_reference": "7Server-RHEL-7-RHCEPH-4.3-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "rbd-mirror-2:14.2.22-110.el7cp.ppc64le as a component of Red Hat Ceph Storage 4.3 Tools", "product_id": "7Server-RHEL-7-RHCEPH-4.3-Tools:rbd-mirror-2:14.2.22-110.el7cp.ppc64le" }, "product_reference": "rbd-mirror-2:14.2.22-110.el7cp.ppc64le", "relates_to_product_reference": "7Server-RHEL-7-RHCEPH-4.3-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "rbd-mirror-2:14.2.22-110.el7cp.x86_64 as a component of Red Hat Ceph Storage 4.3 Tools", "product_id": "7Server-RHEL-7-RHCEPH-4.3-Tools:rbd-mirror-2:14.2.22-110.el7cp.x86_64" }, "product_reference": "rbd-mirror-2:14.2.22-110.el7cp.x86_64", "relates_to_product_reference": "7Server-RHEL-7-RHCEPH-4.3-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "rbd-nbd-2:14.2.22-110.el7cp.ppc64le as a component of Red Hat Ceph Storage 4.3 Tools", "product_id": "7Server-RHEL-7-RHCEPH-4.3-Tools:rbd-nbd-2:14.2.22-110.el7cp.ppc64le" }, "product_reference": "rbd-nbd-2:14.2.22-110.el7cp.ppc64le", "relates_to_product_reference": "7Server-RHEL-7-RHCEPH-4.3-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "rbd-nbd-2:14.2.22-110.el7cp.x86_64 as a component of Red Hat Ceph Storage 4.3 Tools", "product_id": "7Server-RHEL-7-RHCEPH-4.3-Tools:rbd-nbd-2:14.2.22-110.el7cp.x86_64" }, "product_reference": "rbd-nbd-2:14.2.22-110.el7cp.x86_64", "relates_to_product_reference": "7Server-RHEL-7-RHCEPH-4.3-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "tcmu-runner-0:1.5.2-5.el7cp.ppc64le as a component of Red Hat Ceph Storage 4.3 Tools", "product_id": "7Server-RHEL-7-RHCEPH-4.3-Tools:tcmu-runner-0:1.5.2-5.el7cp.ppc64le" }, "product_reference": "tcmu-runner-0:1.5.2-5.el7cp.ppc64le", "relates_to_product_reference": "7Server-RHEL-7-RHCEPH-4.3-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "tcmu-runner-0:1.5.2-5.el7cp.src as a component of Red Hat Ceph Storage 4.3 Tools", "product_id": "7Server-RHEL-7-RHCEPH-4.3-Tools:tcmu-runner-0:1.5.2-5.el7cp.src" }, "product_reference": "tcmu-runner-0:1.5.2-5.el7cp.src", "relates_to_product_reference": "7Server-RHEL-7-RHCEPH-4.3-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "tcmu-runner-0:1.5.2-5.el7cp.x86_64 as a component of Red Hat Ceph Storage 4.3 Tools", "product_id": "7Server-RHEL-7-RHCEPH-4.3-Tools:tcmu-runner-0:1.5.2-5.el7cp.x86_64" }, "product_reference": "tcmu-runner-0:1.5.2-5.el7cp.x86_64", "relates_to_product_reference": "7Server-RHEL-7-RHCEPH-4.3-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "ceph-2:14.2.22-110.el8cp.src as a component of Red Hat Ceph Storage 4.3 MON", "product_id": "8Base-RHCEPH-4.3-MON:ceph-2:14.2.22-110.el8cp.src" }, "product_reference": "ceph-2:14.2.22-110.el8cp.src", "relates_to_product_reference": "8Base-RHCEPH-4.3-MON" }, { "category": "default_component_of", "full_product_name": { "name": "ceph-base-2:14.2.22-110.el8cp.ppc64le as a component of Red Hat Ceph Storage 4.3 MON", "product_id": "8Base-RHCEPH-4.3-MON:ceph-base-2:14.2.22-110.el8cp.ppc64le" }, "product_reference": "ceph-base-2:14.2.22-110.el8cp.ppc64le", "relates_to_product_reference": "8Base-RHCEPH-4.3-MON" }, { "category": "default_component_of", "full_product_name": { "name": "ceph-base-2:14.2.22-110.el8cp.s390x as a component of Red Hat Ceph Storage 4.3 MON", "product_id": "8Base-RHCEPH-4.3-MON:ceph-base-2:14.2.22-110.el8cp.s390x" }, "product_reference": "ceph-base-2:14.2.22-110.el8cp.s390x", "relates_to_product_reference": "8Base-RHCEPH-4.3-MON" }, { "category": "default_component_of", "full_product_name": { "name": "ceph-base-2:14.2.22-110.el8cp.x86_64 as a component of Red Hat Ceph Storage 4.3 MON", "product_id": "8Base-RHCEPH-4.3-MON:ceph-base-2:14.2.22-110.el8cp.x86_64" }, "product_reference": "ceph-base-2:14.2.22-110.el8cp.x86_64", "relates_to_product_reference": "8Base-RHCEPH-4.3-MON" }, { "category": "default_component_of", "full_product_name": { "name": "ceph-base-debuginfo-2:14.2.22-110.el8cp.ppc64le as a component of Red Hat Ceph Storage 4.3 MON", "product_id": "8Base-RHCEPH-4.3-MON:ceph-base-debuginfo-2:14.2.22-110.el8cp.ppc64le" }, "product_reference": "ceph-base-debuginfo-2:14.2.22-110.el8cp.ppc64le", "relates_to_product_reference": "8Base-RHCEPH-4.3-MON" }, { "category": "default_component_of", "full_product_name": { "name": "ceph-base-debuginfo-2:14.2.22-110.el8cp.s390x as a component of Red Hat Ceph Storage 4.3 MON", "product_id": "8Base-RHCEPH-4.3-MON:ceph-base-debuginfo-2:14.2.22-110.el8cp.s390x" }, "product_reference": "ceph-base-debuginfo-2:14.2.22-110.el8cp.s390x", "relates_to_product_reference": "8Base-RHCEPH-4.3-MON" }, { "category": "default_component_of", "full_product_name": { "name": "ceph-base-debuginfo-2:14.2.22-110.el8cp.x86_64 as a component of Red Hat Ceph Storage 4.3 MON", "product_id": "8Base-RHCEPH-4.3-MON:ceph-base-debuginfo-2:14.2.22-110.el8cp.x86_64" }, "product_reference": "ceph-base-debuginfo-2:14.2.22-110.el8cp.x86_64", "relates_to_product_reference": "8Base-RHCEPH-4.3-MON" }, { "category": "default_component_of", "full_product_name": { "name": "ceph-common-2:14.2.22-110.el8cp.ppc64le as a component of Red Hat Ceph Storage 4.3 MON", "product_id": "8Base-RHCEPH-4.3-MON:ceph-common-2:14.2.22-110.el8cp.ppc64le" }, "product_reference": "ceph-common-2:14.2.22-110.el8cp.ppc64le", "relates_to_product_reference": "8Base-RHCEPH-4.3-MON" }, { "category": "default_component_of", "full_product_name": { "name": "ceph-common-2:14.2.22-110.el8cp.s390x as a component of Red Hat Ceph Storage 4.3 MON", "product_id": "8Base-RHCEPH-4.3-MON:ceph-common-2:14.2.22-110.el8cp.s390x" }, "product_reference": "ceph-common-2:14.2.22-110.el8cp.s390x", "relates_to_product_reference": "8Base-RHCEPH-4.3-MON" }, { "category": "default_component_of", "full_product_name": { "name": "ceph-common-2:14.2.22-110.el8cp.x86_64 as a component of Red Hat Ceph Storage 4.3 MON", "product_id": "8Base-RHCEPH-4.3-MON:ceph-common-2:14.2.22-110.el8cp.x86_64" }, "product_reference": "ceph-common-2:14.2.22-110.el8cp.x86_64", "relates_to_product_reference": "8Base-RHCEPH-4.3-MON" }, { "category": "default_component_of", "full_product_name": { "name": "ceph-common-debuginfo-2:14.2.22-110.el8cp.ppc64le as a component of Red Hat Ceph Storage 4.3 MON", "product_id": "8Base-RHCEPH-4.3-MON:ceph-common-debuginfo-2:14.2.22-110.el8cp.ppc64le" }, "product_reference": "ceph-common-debuginfo-2:14.2.22-110.el8cp.ppc64le", "relates_to_product_reference": "8Base-RHCEPH-4.3-MON" }, { "category": "default_component_of", "full_product_name": { "name": "ceph-common-debuginfo-2:14.2.22-110.el8cp.s390x as a component of Red Hat Ceph Storage 4.3 MON", "product_id": "8Base-RHCEPH-4.3-MON:ceph-common-debuginfo-2:14.2.22-110.el8cp.s390x" }, "product_reference": "ceph-common-debuginfo-2:14.2.22-110.el8cp.s390x", "relates_to_product_reference": "8Base-RHCEPH-4.3-MON" }, { "category": "default_component_of", "full_product_name": { "name": "ceph-common-debuginfo-2:14.2.22-110.el8cp.x86_64 as a component of Red Hat Ceph Storage 4.3 MON", "product_id": "8Base-RHCEPH-4.3-MON:ceph-common-debuginfo-2:14.2.22-110.el8cp.x86_64" }, "product_reference": "ceph-common-debuginfo-2:14.2.22-110.el8cp.x86_64", "relates_to_product_reference": "8Base-RHCEPH-4.3-MON" }, { "category": "default_component_of", "full_product_name": { "name": "ceph-debugsource-2:14.2.22-110.el8cp.ppc64le as a component of Red Hat Ceph Storage 4.3 MON", "product_id": "8Base-RHCEPH-4.3-MON:ceph-debugsource-2:14.2.22-110.el8cp.ppc64le" }, "product_reference": "ceph-debugsource-2:14.2.22-110.el8cp.ppc64le", "relates_to_product_reference": "8Base-RHCEPH-4.3-MON" }, { "category": "default_component_of", "full_product_name": { "name": "ceph-debugsource-2:14.2.22-110.el8cp.s390x as a component of Red Hat Ceph Storage 4.3 MON", "product_id": "8Base-RHCEPH-4.3-MON:ceph-debugsource-2:14.2.22-110.el8cp.s390x" }, "product_reference": "ceph-debugsource-2:14.2.22-110.el8cp.s390x", "relates_to_product_reference": "8Base-RHCEPH-4.3-MON" }, { "category": "default_component_of", "full_product_name": { "name": "ceph-debugsource-2:14.2.22-110.el8cp.x86_64 as a component of Red Hat Ceph Storage 4.3 MON", "product_id": "8Base-RHCEPH-4.3-MON:ceph-debugsource-2:14.2.22-110.el8cp.x86_64" }, "product_reference": "ceph-debugsource-2:14.2.22-110.el8cp.x86_64", "relates_to_product_reference": "8Base-RHCEPH-4.3-MON" }, { "category": "default_component_of", "full_product_name": { "name": "ceph-fuse-2:14.2.22-110.el8cp.ppc64le as a component of Red Hat Ceph Storage 4.3 MON", "product_id": "8Base-RHCEPH-4.3-MON:ceph-fuse-2:14.2.22-110.el8cp.ppc64le" }, "product_reference": "ceph-fuse-2:14.2.22-110.el8cp.ppc64le", "relates_to_product_reference": "8Base-RHCEPH-4.3-MON" }, { "category": "default_component_of", "full_product_name": { "name": "ceph-fuse-2:14.2.22-110.el8cp.s390x as a component of Red Hat Ceph Storage 4.3 MON", "product_id": "8Base-RHCEPH-4.3-MON:ceph-fuse-2:14.2.22-110.el8cp.s390x" }, "product_reference": "ceph-fuse-2:14.2.22-110.el8cp.s390x", "relates_to_product_reference": "8Base-RHCEPH-4.3-MON" }, { "category": "default_component_of", "full_product_name": { "name": "ceph-fuse-2:14.2.22-110.el8cp.x86_64 as a component of Red Hat Ceph Storage 4.3 MON", "product_id": "8Base-RHCEPH-4.3-MON:ceph-fuse-2:14.2.22-110.el8cp.x86_64" }, "product_reference": "ceph-fuse-2:14.2.22-110.el8cp.x86_64", "relates_to_product_reference": "8Base-RHCEPH-4.3-MON" }, { "category": "default_component_of", "full_product_name": { "name": "ceph-fuse-debuginfo-2:14.2.22-110.el8cp.ppc64le as a component of Red Hat Ceph Storage 4.3 MON", "product_id": "8Base-RHCEPH-4.3-MON:ceph-fuse-debuginfo-2:14.2.22-110.el8cp.ppc64le" }, "product_reference": "ceph-fuse-debuginfo-2:14.2.22-110.el8cp.ppc64le", "relates_to_product_reference": "8Base-RHCEPH-4.3-MON" }, { "category": "default_component_of", "full_product_name": { "name": "ceph-fuse-debuginfo-2:14.2.22-110.el8cp.s390x as a component of Red Hat Ceph Storage 4.3 MON", "product_id": "8Base-RHCEPH-4.3-MON:ceph-fuse-debuginfo-2:14.2.22-110.el8cp.s390x" }, "product_reference": "ceph-fuse-debuginfo-2:14.2.22-110.el8cp.s390x", "relates_to_product_reference": "8Base-RHCEPH-4.3-MON" }, { "category": "default_component_of", "full_product_name": { "name": "ceph-fuse-debuginfo-2:14.2.22-110.el8cp.x86_64 as a component of Red Hat Ceph Storage 4.3 MON", "product_id": "8Base-RHCEPH-4.3-MON:ceph-fuse-debuginfo-2:14.2.22-110.el8cp.x86_64" }, "product_reference": "ceph-fuse-debuginfo-2:14.2.22-110.el8cp.x86_64", "relates_to_product_reference": "8Base-RHCEPH-4.3-MON" }, { "category": "default_component_of", "full_product_name": { "name": "ceph-grafana-dashboards-2:14.2.22-110.el8cp.noarch as a component of Red Hat Ceph Storage 4.3 MON", "product_id": "8Base-RHCEPH-4.3-MON:ceph-grafana-dashboards-2:14.2.22-110.el8cp.noarch" }, "product_reference": "ceph-grafana-dashboards-2:14.2.22-110.el8cp.noarch", "relates_to_product_reference": "8Base-RHCEPH-4.3-MON" }, { "category": "default_component_of", "full_product_name": { "name": "ceph-mds-2:14.2.22-110.el8cp.ppc64le as a component of Red Hat Ceph Storage 4.3 MON", "product_id": "8Base-RHCEPH-4.3-MON:ceph-mds-2:14.2.22-110.el8cp.ppc64le" }, "product_reference": "ceph-mds-2:14.2.22-110.el8cp.ppc64le", "relates_to_product_reference": "8Base-RHCEPH-4.3-MON" }, { "category": "default_component_of", "full_product_name": { "name": "ceph-mds-2:14.2.22-110.el8cp.s390x as a component of Red Hat Ceph Storage 4.3 MON", "product_id": "8Base-RHCEPH-4.3-MON:ceph-mds-2:14.2.22-110.el8cp.s390x" }, "product_reference": "ceph-mds-2:14.2.22-110.el8cp.s390x", "relates_to_product_reference": "8Base-RHCEPH-4.3-MON" }, { "category": "default_component_of", "full_product_name": { "name": "ceph-mds-2:14.2.22-110.el8cp.x86_64 as a component of Red Hat Ceph Storage 4.3 MON", "product_id": "8Base-RHCEPH-4.3-MON:ceph-mds-2:14.2.22-110.el8cp.x86_64" }, "product_reference": "ceph-mds-2:14.2.22-110.el8cp.x86_64", "relates_to_product_reference": "8Base-RHCEPH-4.3-MON" }, { "category": "default_component_of", "full_product_name": { "name": "ceph-mds-debuginfo-2:14.2.22-110.el8cp.ppc64le as a component of Red Hat Ceph Storage 4.3 MON", "product_id": "8Base-RHCEPH-4.3-MON:ceph-mds-debuginfo-2:14.2.22-110.el8cp.ppc64le" }, "product_reference": "ceph-mds-debuginfo-2:14.2.22-110.el8cp.ppc64le", "relates_to_product_reference": "8Base-RHCEPH-4.3-MON" }, { "category": "default_component_of", "full_product_name": { "name": "ceph-mds-debuginfo-2:14.2.22-110.el8cp.s390x as a component of Red Hat Ceph Storage 4.3 MON", "product_id": "8Base-RHCEPH-4.3-MON:ceph-mds-debuginfo-2:14.2.22-110.el8cp.s390x" }, "product_reference": "ceph-mds-debuginfo-2:14.2.22-110.el8cp.s390x", "relates_to_product_reference": "8Base-RHCEPH-4.3-MON" }, { "category": "default_component_of", "full_product_name": { "name": "ceph-mds-debuginfo-2:14.2.22-110.el8cp.x86_64 as a component of Red Hat Ceph Storage 4.3 MON", "product_id": "8Base-RHCEPH-4.3-MON:ceph-mds-debuginfo-2:14.2.22-110.el8cp.x86_64" }, "product_reference": "ceph-mds-debuginfo-2:14.2.22-110.el8cp.x86_64", "relates_to_product_reference": "8Base-RHCEPH-4.3-MON" }, { "category": "default_component_of", "full_product_name": { "name": "ceph-mgr-2:14.2.22-110.el8cp.ppc64le as a component of Red Hat Ceph Storage 4.3 MON", "product_id": "8Base-RHCEPH-4.3-MON:ceph-mgr-2:14.2.22-110.el8cp.ppc64le" }, "product_reference": "ceph-mgr-2:14.2.22-110.el8cp.ppc64le", "relates_to_product_reference": "8Base-RHCEPH-4.3-MON" }, { "category": "default_component_of", "full_product_name": { "name": "ceph-mgr-2:14.2.22-110.el8cp.s390x as a component of Red Hat Ceph Storage 4.3 MON", "product_id": "8Base-RHCEPH-4.3-MON:ceph-mgr-2:14.2.22-110.el8cp.s390x" }, "product_reference": "ceph-mgr-2:14.2.22-110.el8cp.s390x", "relates_to_product_reference": "8Base-RHCEPH-4.3-MON" }, { "category": "default_component_of", "full_product_name": { "name": "ceph-mgr-2:14.2.22-110.el8cp.x86_64 as a component of Red Hat Ceph Storage 4.3 MON", "product_id": "8Base-RHCEPH-4.3-MON:ceph-mgr-2:14.2.22-110.el8cp.x86_64" }, "product_reference": "ceph-mgr-2:14.2.22-110.el8cp.x86_64", "relates_to_product_reference": "8Base-RHCEPH-4.3-MON" }, { "category": "default_component_of", "full_product_name": { "name": "ceph-mgr-dashboard-2:14.2.22-110.el8cp.noarch as a component of Red Hat Ceph Storage 4.3 MON", "product_id": "8Base-RHCEPH-4.3-MON:ceph-mgr-dashboard-2:14.2.22-110.el8cp.noarch" }, "product_reference": "ceph-mgr-dashboard-2:14.2.22-110.el8cp.noarch", "relates_to_product_reference": "8Base-RHCEPH-4.3-MON" }, { "category": "default_component_of", "full_product_name": { "name": "ceph-mgr-debuginfo-2:14.2.22-110.el8cp.ppc64le as a component of Red Hat Ceph Storage 4.3 MON", "product_id": "8Base-RHCEPH-4.3-MON:ceph-mgr-debuginfo-2:14.2.22-110.el8cp.ppc64le" }, "product_reference": "ceph-mgr-debuginfo-2:14.2.22-110.el8cp.ppc64le", "relates_to_product_reference": "8Base-RHCEPH-4.3-MON" }, { "category": "default_component_of", "full_product_name": { "name": "ceph-mgr-debuginfo-2:14.2.22-110.el8cp.s390x as a component of Red Hat Ceph Storage 4.3 MON", "product_id": "8Base-RHCEPH-4.3-MON:ceph-mgr-debuginfo-2:14.2.22-110.el8cp.s390x" }, "product_reference": "ceph-mgr-debuginfo-2:14.2.22-110.el8cp.s390x", "relates_to_product_reference": "8Base-RHCEPH-4.3-MON" }, { "category": "default_component_of", "full_product_name": { "name": "ceph-mgr-debuginfo-2:14.2.22-110.el8cp.x86_64 as a component of Red Hat Ceph Storage 4.3 MON", "product_id": "8Base-RHCEPH-4.3-MON:ceph-mgr-debuginfo-2:14.2.22-110.el8cp.x86_64" }, "product_reference": "ceph-mgr-debuginfo-2:14.2.22-110.el8cp.x86_64", "relates_to_product_reference": "8Base-RHCEPH-4.3-MON" }, { "category": "default_component_of", "full_product_name": { "name": "ceph-mgr-diskprediction-local-2:14.2.22-110.el8cp.noarch as a component of Red Hat Ceph Storage 4.3 MON", "product_id": "8Base-RHCEPH-4.3-MON:ceph-mgr-diskprediction-local-2:14.2.22-110.el8cp.noarch" }, "product_reference": "ceph-mgr-diskprediction-local-2:14.2.22-110.el8cp.noarch", "relates_to_product_reference": "8Base-RHCEPH-4.3-MON" }, { "category": "default_component_of", "full_product_name": { "name": "ceph-mgr-k8sevents-2:14.2.22-110.el8cp.noarch as a component of Red Hat Ceph Storage 4.3 MON", "product_id": "8Base-RHCEPH-4.3-MON:ceph-mgr-k8sevents-2:14.2.22-110.el8cp.noarch" }, "product_reference": "ceph-mgr-k8sevents-2:14.2.22-110.el8cp.noarch", "relates_to_product_reference": "8Base-RHCEPH-4.3-MON" }, { "category": "default_component_of", "full_product_name": { "name": "ceph-mgr-rook-2:14.2.22-110.el8cp.noarch as a component of Red Hat Ceph Storage 4.3 MON", "product_id": "8Base-RHCEPH-4.3-MON:ceph-mgr-rook-2:14.2.22-110.el8cp.noarch" }, "product_reference": "ceph-mgr-rook-2:14.2.22-110.el8cp.noarch", "relates_to_product_reference": "8Base-RHCEPH-4.3-MON" }, { "category": "default_component_of", "full_product_name": { "name": "ceph-mon-2:14.2.22-110.el8cp.ppc64le as a component of Red Hat Ceph Storage 4.3 MON", "product_id": "8Base-RHCEPH-4.3-MON:ceph-mon-2:14.2.22-110.el8cp.ppc64le" }, "product_reference": "ceph-mon-2:14.2.22-110.el8cp.ppc64le", "relates_to_product_reference": "8Base-RHCEPH-4.3-MON" }, { "category": "default_component_of", "full_product_name": { "name": "ceph-mon-2:14.2.22-110.el8cp.s390x as a component of Red Hat Ceph Storage 4.3 MON", "product_id": "8Base-RHCEPH-4.3-MON:ceph-mon-2:14.2.22-110.el8cp.s390x" }, "product_reference": "ceph-mon-2:14.2.22-110.el8cp.s390x", "relates_to_product_reference": "8Base-RHCEPH-4.3-MON" }, { "category": "default_component_of", "full_product_name": { "name": "ceph-mon-2:14.2.22-110.el8cp.x86_64 as a component of Red Hat Ceph Storage 4.3 MON", "product_id": "8Base-RHCEPH-4.3-MON:ceph-mon-2:14.2.22-110.el8cp.x86_64" }, "product_reference": "ceph-mon-2:14.2.22-110.el8cp.x86_64", "relates_to_product_reference": "8Base-RHCEPH-4.3-MON" }, { "category": "default_component_of", "full_product_name": { "name": "ceph-mon-debuginfo-2:14.2.22-110.el8cp.ppc64le as a component of Red Hat Ceph Storage 4.3 MON", "product_id": "8Base-RHCEPH-4.3-MON:ceph-mon-debuginfo-2:14.2.22-110.el8cp.ppc64le" }, "product_reference": "ceph-mon-debuginfo-2:14.2.22-110.el8cp.ppc64le", "relates_to_product_reference": "8Base-RHCEPH-4.3-MON" }, { "category": "default_component_of", "full_product_name": { "name": "ceph-mon-debuginfo-2:14.2.22-110.el8cp.s390x as a component of Red Hat Ceph Storage 4.3 MON", "product_id": "8Base-RHCEPH-4.3-MON:ceph-mon-debuginfo-2:14.2.22-110.el8cp.s390x" }, "product_reference": "ceph-mon-debuginfo-2:14.2.22-110.el8cp.s390x", "relates_to_product_reference": "8Base-RHCEPH-4.3-MON" }, { "category": "default_component_of", "full_product_name": { "name": "ceph-mon-debuginfo-2:14.2.22-110.el8cp.x86_64 as a component of Red Hat Ceph Storage 4.3 MON", "product_id": "8Base-RHCEPH-4.3-MON:ceph-mon-debuginfo-2:14.2.22-110.el8cp.x86_64" }, "product_reference": "ceph-mon-debuginfo-2:14.2.22-110.el8cp.x86_64", "relates_to_product_reference": "8Base-RHCEPH-4.3-MON" }, { "category": "default_component_of", "full_product_name": { "name": "ceph-osd-2:14.2.22-110.el8cp.ppc64le as a component of Red Hat Ceph Storage 4.3 MON", "product_id": "8Base-RHCEPH-4.3-MON:ceph-osd-2:14.2.22-110.el8cp.ppc64le" }, "product_reference": "ceph-osd-2:14.2.22-110.el8cp.ppc64le", "relates_to_product_reference": "8Base-RHCEPH-4.3-MON" }, { "category": "default_component_of", "full_product_name": { "name": "ceph-osd-2:14.2.22-110.el8cp.s390x as a component of Red Hat Ceph Storage 4.3 MON", "product_id": "8Base-RHCEPH-4.3-MON:ceph-osd-2:14.2.22-110.el8cp.s390x" }, "product_reference": "ceph-osd-2:14.2.22-110.el8cp.s390x", "relates_to_product_reference": "8Base-RHCEPH-4.3-MON" }, { "category": "default_component_of", "full_product_name": { "name": "ceph-osd-2:14.2.22-110.el8cp.x86_64 as a component of Red Hat Ceph Storage 4.3 MON", "product_id": "8Base-RHCEPH-4.3-MON:ceph-osd-2:14.2.22-110.el8cp.x86_64" }, "product_reference": "ceph-osd-2:14.2.22-110.el8cp.x86_64", "relates_to_product_reference": "8Base-RHCEPH-4.3-MON" }, { "category": "default_component_of", "full_product_name": { "name": "ceph-osd-debuginfo-2:14.2.22-110.el8cp.ppc64le as a component of Red Hat Ceph Storage 4.3 MON", "product_id": "8Base-RHCEPH-4.3-MON:ceph-osd-debuginfo-2:14.2.22-110.el8cp.ppc64le" }, "product_reference": "ceph-osd-debuginfo-2:14.2.22-110.el8cp.ppc64le", "relates_to_product_reference": "8Base-RHCEPH-4.3-MON" }, { "category": "default_component_of", "full_product_name": { "name": "ceph-osd-debuginfo-2:14.2.22-110.el8cp.s390x as a component of Red Hat Ceph Storage 4.3 MON", "product_id": "8Base-RHCEPH-4.3-MON:ceph-osd-debuginfo-2:14.2.22-110.el8cp.s390x" }, "product_reference": "ceph-osd-debuginfo-2:14.2.22-110.el8cp.s390x", "relates_to_product_reference": "8Base-RHCEPH-4.3-MON" }, { "category": "default_component_of", "full_product_name": { "name": "ceph-osd-debuginfo-2:14.2.22-110.el8cp.x86_64 as a component of Red Hat Ceph Storage 4.3 MON", "product_id": "8Base-RHCEPH-4.3-MON:ceph-osd-debuginfo-2:14.2.22-110.el8cp.x86_64" }, "product_reference": "ceph-osd-debuginfo-2:14.2.22-110.el8cp.x86_64", "relates_to_product_reference": "8Base-RHCEPH-4.3-MON" }, { "category": "default_component_of", "full_product_name": { "name": "ceph-radosgw-2:14.2.22-110.el8cp.ppc64le as a component of Red Hat Ceph Storage 4.3 MON", "product_id": "8Base-RHCEPH-4.3-MON:ceph-radosgw-2:14.2.22-110.el8cp.ppc64le" }, "product_reference": "ceph-radosgw-2:14.2.22-110.el8cp.ppc64le", "relates_to_product_reference": "8Base-RHCEPH-4.3-MON" }, { "category": "default_component_of", "full_product_name": { "name": "ceph-radosgw-2:14.2.22-110.el8cp.s390x as a component of Red Hat Ceph Storage 4.3 MON", "product_id": "8Base-RHCEPH-4.3-MON:ceph-radosgw-2:14.2.22-110.el8cp.s390x" }, "product_reference": "ceph-radosgw-2:14.2.22-110.el8cp.s390x", "relates_to_product_reference": "8Base-RHCEPH-4.3-MON" }, { "category": "default_component_of", "full_product_name": { "name": "ceph-radosgw-2:14.2.22-110.el8cp.x86_64 as a component of Red Hat Ceph Storage 4.3 MON", "product_id": "8Base-RHCEPH-4.3-MON:ceph-radosgw-2:14.2.22-110.el8cp.x86_64" }, "product_reference": "ceph-radosgw-2:14.2.22-110.el8cp.x86_64", "relates_to_product_reference": "8Base-RHCEPH-4.3-MON" }, { "category": "default_component_of", "full_product_name": { "name": "ceph-radosgw-debuginfo-2:14.2.22-110.el8cp.ppc64le as a component of Red Hat Ceph Storage 4.3 MON", "product_id": "8Base-RHCEPH-4.3-MON:ceph-radosgw-debuginfo-2:14.2.22-110.el8cp.ppc64le" }, "product_reference": "ceph-radosgw-debuginfo-2:14.2.22-110.el8cp.ppc64le", "relates_to_product_reference": "8Base-RHCEPH-4.3-MON" }, { "category": "default_component_of", "full_product_name": { "name": "ceph-radosgw-debuginfo-2:14.2.22-110.el8cp.s390x as a component of Red Hat Ceph Storage 4.3 MON", "product_id": "8Base-RHCEPH-4.3-MON:ceph-radosgw-debuginfo-2:14.2.22-110.el8cp.s390x" }, "product_reference": "ceph-radosgw-debuginfo-2:14.2.22-110.el8cp.s390x", "relates_to_product_reference": "8Base-RHCEPH-4.3-MON" }, { "category": "default_component_of", "full_product_name": { "name": "ceph-radosgw-debuginfo-2:14.2.22-110.el8cp.x86_64 as a component of Red Hat Ceph Storage 4.3 MON", "product_id": "8Base-RHCEPH-4.3-MON:ceph-radosgw-debuginfo-2:14.2.22-110.el8cp.x86_64" }, "product_reference": "ceph-radosgw-debuginfo-2:14.2.22-110.el8cp.x86_64", "relates_to_product_reference": "8Base-RHCEPH-4.3-MON" }, { "category": "default_component_of", "full_product_name": { "name": "ceph-selinux-2:14.2.22-110.el8cp.ppc64le as a component of Red Hat Ceph Storage 4.3 MON", "product_id": "8Base-RHCEPH-4.3-MON:ceph-selinux-2:14.2.22-110.el8cp.ppc64le" }, "product_reference": "ceph-selinux-2:14.2.22-110.el8cp.ppc64le", "relates_to_product_reference": "8Base-RHCEPH-4.3-MON" }, { "category": "default_component_of", "full_product_name": { "name": "ceph-selinux-2:14.2.22-110.el8cp.s390x as a component of Red Hat Ceph Storage 4.3 MON", "product_id": "8Base-RHCEPH-4.3-MON:ceph-selinux-2:14.2.22-110.el8cp.s390x" }, "product_reference": "ceph-selinux-2:14.2.22-110.el8cp.s390x", "relates_to_product_reference": "8Base-RHCEPH-4.3-MON" }, { "category": "default_component_of", "full_product_name": { "name": "ceph-selinux-2:14.2.22-110.el8cp.x86_64 as a component of Red Hat Ceph Storage 4.3 MON", "product_id": "8Base-RHCEPH-4.3-MON:ceph-selinux-2:14.2.22-110.el8cp.x86_64" }, "product_reference": "ceph-selinux-2:14.2.22-110.el8cp.x86_64", "relates_to_product_reference": "8Base-RHCEPH-4.3-MON" }, { "category": "default_component_of", "full_product_name": { "name": "ceph-test-2:14.2.22-110.el8cp.ppc64le as a component of Red Hat Ceph Storage 4.3 MON", "product_id": "8Base-RHCEPH-4.3-MON:ceph-test-2:14.2.22-110.el8cp.ppc64le" }, "product_reference": "ceph-test-2:14.2.22-110.el8cp.ppc64le", "relates_to_product_reference": "8Base-RHCEPH-4.3-MON" }, { "category": "default_component_of", "full_product_name": { "name": "ceph-test-2:14.2.22-110.el8cp.s390x as a component of Red Hat Ceph Storage 4.3 MON", "product_id": "8Base-RHCEPH-4.3-MON:ceph-test-2:14.2.22-110.el8cp.s390x" }, "product_reference": "ceph-test-2:14.2.22-110.el8cp.s390x", "relates_to_product_reference": "8Base-RHCEPH-4.3-MON" }, { "category": "default_component_of", "full_product_name": { "name": "ceph-test-2:14.2.22-110.el8cp.x86_64 as a component of Red Hat Ceph Storage 4.3 MON", "product_id": "8Base-RHCEPH-4.3-MON:ceph-test-2:14.2.22-110.el8cp.x86_64" }, "product_reference": "ceph-test-2:14.2.22-110.el8cp.x86_64", "relates_to_product_reference": "8Base-RHCEPH-4.3-MON" }, { "category": "default_component_of", "full_product_name": { "name": "ceph-test-debuginfo-2:14.2.22-110.el8cp.ppc64le as a component of Red Hat Ceph Storage 4.3 MON", "product_id": "8Base-RHCEPH-4.3-MON:ceph-test-debuginfo-2:14.2.22-110.el8cp.ppc64le" }, "product_reference": "ceph-test-debuginfo-2:14.2.22-110.el8cp.ppc64le", "relates_to_product_reference": "8Base-RHCEPH-4.3-MON" }, { "category": "default_component_of", "full_product_name": { "name": "ceph-test-debuginfo-2:14.2.22-110.el8cp.s390x as a component of Red Hat Ceph Storage 4.3 MON", "product_id": "8Base-RHCEPH-4.3-MON:ceph-test-debuginfo-2:14.2.22-110.el8cp.s390x" }, "product_reference": "ceph-test-debuginfo-2:14.2.22-110.el8cp.s390x", "relates_to_product_reference": "8Base-RHCEPH-4.3-MON" }, { "category": "default_component_of", "full_product_name": { "name": "ceph-test-debuginfo-2:14.2.22-110.el8cp.x86_64 as a component of Red Hat Ceph Storage 4.3 MON", "product_id": "8Base-RHCEPH-4.3-MON:ceph-test-debuginfo-2:14.2.22-110.el8cp.x86_64" }, "product_reference": "ceph-test-debuginfo-2:14.2.22-110.el8cp.x86_64", "relates_to_product_reference": "8Base-RHCEPH-4.3-MON" }, { "category": "default_component_of", "full_product_name": { "name": "libcephfs-devel-2:14.2.22-110.el8cp.ppc64le as a component of Red Hat Ceph Storage 4.3 MON", "product_id": "8Base-RHCEPH-4.3-MON:libcephfs-devel-2:14.2.22-110.el8cp.ppc64le" }, "product_reference": "libcephfs-devel-2:14.2.22-110.el8cp.ppc64le", "relates_to_product_reference": "8Base-RHCEPH-4.3-MON" }, { "category": "default_component_of", "full_product_name": { "name": "libcephfs-devel-2:14.2.22-110.el8cp.s390x as a component of Red Hat Ceph Storage 4.3 MON", "product_id": "8Base-RHCEPH-4.3-MON:libcephfs-devel-2:14.2.22-110.el8cp.s390x" }, "product_reference": "libcephfs-devel-2:14.2.22-110.el8cp.s390x", "relates_to_product_reference": "8Base-RHCEPH-4.3-MON" }, { "category": "default_component_of", "full_product_name": { "name": "libcephfs-devel-2:14.2.22-110.el8cp.x86_64 as a component of Red Hat Ceph Storage 4.3 MON", "product_id": "8Base-RHCEPH-4.3-MON:libcephfs-devel-2:14.2.22-110.el8cp.x86_64" }, "product_reference": "libcephfs-devel-2:14.2.22-110.el8cp.x86_64", "relates_to_product_reference": "8Base-RHCEPH-4.3-MON" }, { "category": "default_component_of", "full_product_name": { "name": "libcephfs2-2:14.2.22-110.el8cp.ppc64le as a component of Red Hat Ceph Storage 4.3 MON", "product_id": "8Base-RHCEPH-4.3-MON:libcephfs2-2:14.2.22-110.el8cp.ppc64le" }, "product_reference": "libcephfs2-2:14.2.22-110.el8cp.ppc64le", "relates_to_product_reference": "8Base-RHCEPH-4.3-MON" }, { "category": "default_component_of", "full_product_name": { "name": "libcephfs2-2:14.2.22-110.el8cp.s390x as a component of Red Hat Ceph Storage 4.3 MON", "product_id": "8Base-RHCEPH-4.3-MON:libcephfs2-2:14.2.22-110.el8cp.s390x" }, "product_reference": "libcephfs2-2:14.2.22-110.el8cp.s390x", "relates_to_product_reference": "8Base-RHCEPH-4.3-MON" }, { "category": "default_component_of", "full_product_name": { "name": "libcephfs2-2:14.2.22-110.el8cp.x86_64 as a component of Red Hat Ceph Storage 4.3 MON", "product_id": "8Base-RHCEPH-4.3-MON:libcephfs2-2:14.2.22-110.el8cp.x86_64" }, "product_reference": "libcephfs2-2:14.2.22-110.el8cp.x86_64", "relates_to_product_reference": "8Base-RHCEPH-4.3-MON" }, { "category": "default_component_of", "full_product_name": { "name": "libcephfs2-debuginfo-2:14.2.22-110.el8cp.ppc64le as a component of Red Hat Ceph Storage 4.3 MON", "product_id": "8Base-RHCEPH-4.3-MON:libcephfs2-debuginfo-2:14.2.22-110.el8cp.ppc64le" }, "product_reference": "libcephfs2-debuginfo-2:14.2.22-110.el8cp.ppc64le", "relates_to_product_reference": "8Base-RHCEPH-4.3-MON" }, { "category": "default_component_of", "full_product_name": { "name": "libcephfs2-debuginfo-2:14.2.22-110.el8cp.s390x as a component of Red Hat Ceph Storage 4.3 MON", "product_id": "8Base-RHCEPH-4.3-MON:libcephfs2-debuginfo-2:14.2.22-110.el8cp.s390x" }, "product_reference": "libcephfs2-debuginfo-2:14.2.22-110.el8cp.s390x", "relates_to_product_reference": "8Base-RHCEPH-4.3-MON" }, { "category": "default_component_of", "full_product_name": { "name": "libcephfs2-debuginfo-2:14.2.22-110.el8cp.x86_64 as a component of Red Hat Ceph Storage 4.3 MON", "product_id": "8Base-RHCEPH-4.3-MON:libcephfs2-debuginfo-2:14.2.22-110.el8cp.x86_64" }, "product_reference": "libcephfs2-debuginfo-2:14.2.22-110.el8cp.x86_64", "relates_to_product_reference": "8Base-RHCEPH-4.3-MON" }, { "category": "default_component_of", "full_product_name": { "name": "librados-devel-2:14.2.22-110.el8cp.ppc64le as a component of Red Hat Ceph Storage 4.3 MON", "product_id": "8Base-RHCEPH-4.3-MON:librados-devel-2:14.2.22-110.el8cp.ppc64le" }, "product_reference": "librados-devel-2:14.2.22-110.el8cp.ppc64le", "relates_to_product_reference": "8Base-RHCEPH-4.3-MON" }, { "category": "default_component_of", "full_product_name": { "name": "librados-devel-2:14.2.22-110.el8cp.s390x as a component of Red Hat Ceph Storage 4.3 MON", "product_id": "8Base-RHCEPH-4.3-MON:librados-devel-2:14.2.22-110.el8cp.s390x" }, "product_reference": "librados-devel-2:14.2.22-110.el8cp.s390x", "relates_to_product_reference": "8Base-RHCEPH-4.3-MON" }, { "category": "default_component_of", "full_product_name": { "name": "librados-devel-2:14.2.22-110.el8cp.x86_64 as a component of Red Hat Ceph Storage 4.3 MON", "product_id": "8Base-RHCEPH-4.3-MON:librados-devel-2:14.2.22-110.el8cp.x86_64" }, "product_reference": "librados-devel-2:14.2.22-110.el8cp.x86_64", "relates_to_product_reference": "8Base-RHCEPH-4.3-MON" }, { "category": "default_component_of", "full_product_name": { "name": "librados-devel-debuginfo-2:14.2.22-110.el8cp.ppc64le as a component of Red Hat Ceph Storage 4.3 MON", "product_id": "8Base-RHCEPH-4.3-MON:librados-devel-debuginfo-2:14.2.22-110.el8cp.ppc64le" }, "product_reference": "librados-devel-debuginfo-2:14.2.22-110.el8cp.ppc64le", "relates_to_product_reference": "8Base-RHCEPH-4.3-MON" }, { "category": "default_component_of", "full_product_name": { "name": "librados-devel-debuginfo-2:14.2.22-110.el8cp.s390x as a component of Red Hat Ceph Storage 4.3 MON", "product_id": "8Base-RHCEPH-4.3-MON:librados-devel-debuginfo-2:14.2.22-110.el8cp.s390x" }, "product_reference": "librados-devel-debuginfo-2:14.2.22-110.el8cp.s390x", "relates_to_product_reference": "8Base-RHCEPH-4.3-MON" }, { "category": "default_component_of", "full_product_name": { "name": "librados-devel-debuginfo-2:14.2.22-110.el8cp.x86_64 as a component of Red Hat Ceph Storage 4.3 MON", "product_id": "8Base-RHCEPH-4.3-MON:librados-devel-debuginfo-2:14.2.22-110.el8cp.x86_64" }, "product_reference": "librados-devel-debuginfo-2:14.2.22-110.el8cp.x86_64", "relates_to_product_reference": "8Base-RHCEPH-4.3-MON" }, { "category": "default_component_of", "full_product_name": { "name": "librados2-2:14.2.22-110.el8cp.ppc64le as a component of Red Hat Ceph Storage 4.3 MON", "product_id": "8Base-RHCEPH-4.3-MON:librados2-2:14.2.22-110.el8cp.ppc64le" }, "product_reference": "librados2-2:14.2.22-110.el8cp.ppc64le", "relates_to_product_reference": "8Base-RHCEPH-4.3-MON" }, { "category": "default_component_of", "full_product_name": { "name": "librados2-2:14.2.22-110.el8cp.s390x as a component of Red Hat Ceph Storage 4.3 MON", "product_id": "8Base-RHCEPH-4.3-MON:librados2-2:14.2.22-110.el8cp.s390x" }, "product_reference": "librados2-2:14.2.22-110.el8cp.s390x", "relates_to_product_reference": "8Base-RHCEPH-4.3-MON" }, { "category": "default_component_of", "full_product_name": { "name": "librados2-2:14.2.22-110.el8cp.x86_64 as a component of Red Hat Ceph Storage 4.3 MON", "product_id": "8Base-RHCEPH-4.3-MON:librados2-2:14.2.22-110.el8cp.x86_64" }, "product_reference": "librados2-2:14.2.22-110.el8cp.x86_64", "relates_to_product_reference": "8Base-RHCEPH-4.3-MON" }, { "category": "default_component_of", "full_product_name": { "name": "librados2-debuginfo-2:14.2.22-110.el8cp.ppc64le as a component of Red Hat Ceph Storage 4.3 MON", "product_id": "8Base-RHCEPH-4.3-MON:librados2-debuginfo-2:14.2.22-110.el8cp.ppc64le" }, "product_reference": "librados2-debuginfo-2:14.2.22-110.el8cp.ppc64le", "relates_to_product_reference": "8Base-RHCEPH-4.3-MON" }, { "category": "default_component_of", "full_product_name": { "name": "librados2-debuginfo-2:14.2.22-110.el8cp.s390x as a component of Red Hat Ceph Storage 4.3 MON", "product_id": "8Base-RHCEPH-4.3-MON:librados2-debuginfo-2:14.2.22-110.el8cp.s390x" }, "product_reference": "librados2-debuginfo-2:14.2.22-110.el8cp.s390x", "relates_to_product_reference": "8Base-RHCEPH-4.3-MON" }, { "category": "default_component_of", "full_product_name": { "name": "librados2-debuginfo-2:14.2.22-110.el8cp.x86_64 as a component of Red Hat Ceph Storage 4.3 MON", "product_id": "8Base-RHCEPH-4.3-MON:librados2-debuginfo-2:14.2.22-110.el8cp.x86_64" }, "product_reference": "librados2-debuginfo-2:14.2.22-110.el8cp.x86_64", "relates_to_product_reference": "8Base-RHCEPH-4.3-MON" }, { "category": "default_component_of", "full_product_name": { "name": "libradospp-devel-2:14.2.22-110.el8cp.ppc64le as a component of Red Hat Ceph Storage 4.3 MON", "product_id": "8Base-RHCEPH-4.3-MON:libradospp-devel-2:14.2.22-110.el8cp.ppc64le" }, "product_reference": "libradospp-devel-2:14.2.22-110.el8cp.ppc64le", "relates_to_product_reference": "8Base-RHCEPH-4.3-MON" }, { "category": "default_component_of", "full_product_name": { "name": "libradospp-devel-2:14.2.22-110.el8cp.s390x as a component of Red Hat Ceph Storage 4.3 MON", "product_id": "8Base-RHCEPH-4.3-MON:libradospp-devel-2:14.2.22-110.el8cp.s390x" }, "product_reference": "libradospp-devel-2:14.2.22-110.el8cp.s390x", "relates_to_product_reference": "8Base-RHCEPH-4.3-MON" }, { "category": "default_component_of", "full_product_name": { "name": "libradospp-devel-2:14.2.22-110.el8cp.x86_64 as a component of Red Hat Ceph Storage 4.3 MON", "product_id": "8Base-RHCEPH-4.3-MON:libradospp-devel-2:14.2.22-110.el8cp.x86_64" }, "product_reference": "libradospp-devel-2:14.2.22-110.el8cp.x86_64", "relates_to_product_reference": "8Base-RHCEPH-4.3-MON" }, { "category": "default_component_of", "full_product_name": { "name": "libradosstriper1-2:14.2.22-110.el8cp.ppc64le as a component of Red Hat Ceph Storage 4.3 MON", "product_id": "8Base-RHCEPH-4.3-MON:libradosstriper1-2:14.2.22-110.el8cp.ppc64le" }, "product_reference": "libradosstriper1-2:14.2.22-110.el8cp.ppc64le", "relates_to_product_reference": "8Base-RHCEPH-4.3-MON" }, { "category": "default_component_of", "full_product_name": { "name": "libradosstriper1-2:14.2.22-110.el8cp.s390x as a component of Red Hat Ceph Storage 4.3 MON", "product_id": "8Base-RHCEPH-4.3-MON:libradosstriper1-2:14.2.22-110.el8cp.s390x" }, "product_reference": "libradosstriper1-2:14.2.22-110.el8cp.s390x", "relates_to_product_reference": "8Base-RHCEPH-4.3-MON" }, { "category": "default_component_of", "full_product_name": { "name": "libradosstriper1-2:14.2.22-110.el8cp.x86_64 as a component of Red Hat Ceph Storage 4.3 MON", "product_id": "8Base-RHCEPH-4.3-MON:libradosstriper1-2:14.2.22-110.el8cp.x86_64" }, "product_reference": "libradosstriper1-2:14.2.22-110.el8cp.x86_64", "relates_to_product_reference": "8Base-RHCEPH-4.3-MON" }, { "category": "default_component_of", "full_product_name": { "name": "libradosstriper1-debuginfo-2:14.2.22-110.el8cp.ppc64le as a component of Red Hat Ceph Storage 4.3 MON", "product_id": "8Base-RHCEPH-4.3-MON:libradosstriper1-debuginfo-2:14.2.22-110.el8cp.ppc64le" }, "product_reference": "libradosstriper1-debuginfo-2:14.2.22-110.el8cp.ppc64le", "relates_to_product_reference": "8Base-RHCEPH-4.3-MON" }, { "category": "default_component_of", "full_product_name": { "name": "libradosstriper1-debuginfo-2:14.2.22-110.el8cp.s390x as a component of Red Hat Ceph Storage 4.3 MON", "product_id": "8Base-RHCEPH-4.3-MON:libradosstriper1-debuginfo-2:14.2.22-110.el8cp.s390x" }, "product_reference": "libradosstriper1-debuginfo-2:14.2.22-110.el8cp.s390x", "relates_to_product_reference": "8Base-RHCEPH-4.3-MON" }, { "category": "default_component_of", "full_product_name": { "name": "libradosstriper1-debuginfo-2:14.2.22-110.el8cp.x86_64 as a component of Red Hat Ceph Storage 4.3 MON", "product_id": "8Base-RHCEPH-4.3-MON:libradosstriper1-debuginfo-2:14.2.22-110.el8cp.x86_64" }, "product_reference": "libradosstriper1-debuginfo-2:14.2.22-110.el8cp.x86_64", "relates_to_product_reference": "8Base-RHCEPH-4.3-MON" }, { "category": "default_component_of", "full_product_name": { "name": "librbd-devel-2:14.2.22-110.el8cp.ppc64le as a component of Red Hat Ceph Storage 4.3 MON", "product_id": "8Base-RHCEPH-4.3-MON:librbd-devel-2:14.2.22-110.el8cp.ppc64le" }, "product_reference": "librbd-devel-2:14.2.22-110.el8cp.ppc64le", "relates_to_product_reference": "8Base-RHCEPH-4.3-MON" }, { "category": "default_component_of", "full_product_name": { "name": "librbd-devel-2:14.2.22-110.el8cp.s390x as a component of Red Hat Ceph Storage 4.3 MON", "product_id": "8Base-RHCEPH-4.3-MON:librbd-devel-2:14.2.22-110.el8cp.s390x" }, "product_reference": "librbd-devel-2:14.2.22-110.el8cp.s390x", "relates_to_product_reference": "8Base-RHCEPH-4.3-MON" }, { "category": "default_component_of", "full_product_name": { "name": "librbd-devel-2:14.2.22-110.el8cp.x86_64 as a component of Red Hat Ceph Storage 4.3 MON", "product_id": "8Base-RHCEPH-4.3-MON:librbd-devel-2:14.2.22-110.el8cp.x86_64" }, "product_reference": "librbd-devel-2:14.2.22-110.el8cp.x86_64", "relates_to_product_reference": "8Base-RHCEPH-4.3-MON" }, { "category": "default_component_of", "full_product_name": { "name": "librbd1-2:14.2.22-110.el8cp.ppc64le as a component of Red Hat Ceph Storage 4.3 MON", "product_id": "8Base-RHCEPH-4.3-MON:librbd1-2:14.2.22-110.el8cp.ppc64le" }, "product_reference": "librbd1-2:14.2.22-110.el8cp.ppc64le", "relates_to_product_reference": "8Base-RHCEPH-4.3-MON" }, { "category": "default_component_of", "full_product_name": { "name": "librbd1-2:14.2.22-110.el8cp.s390x as a component of Red Hat Ceph Storage 4.3 MON", "product_id": "8Base-RHCEPH-4.3-MON:librbd1-2:14.2.22-110.el8cp.s390x" }, "product_reference": "librbd1-2:14.2.22-110.el8cp.s390x", "relates_to_product_reference": "8Base-RHCEPH-4.3-MON" }, { "category": "default_component_of", "full_product_name": { "name": "librbd1-2:14.2.22-110.el8cp.x86_64 as a component of Red Hat Ceph Storage 4.3 MON", "product_id": "8Base-RHCEPH-4.3-MON:librbd1-2:14.2.22-110.el8cp.x86_64" }, "product_reference": "librbd1-2:14.2.22-110.el8cp.x86_64", "relates_to_product_reference": "8Base-RHCEPH-4.3-MON" }, { "category": "default_component_of", "full_product_name": { "name": "librbd1-debuginfo-2:14.2.22-110.el8cp.ppc64le as a component of Red Hat Ceph Storage 4.3 MON", "product_id": "8Base-RHCEPH-4.3-MON:librbd1-debuginfo-2:14.2.22-110.el8cp.ppc64le" }, "product_reference": "librbd1-debuginfo-2:14.2.22-110.el8cp.ppc64le", "relates_to_product_reference": "8Base-RHCEPH-4.3-MON" }, { "category": "default_component_of", "full_product_name": { "name": "librbd1-debuginfo-2:14.2.22-110.el8cp.s390x as a component of Red Hat Ceph Storage 4.3 MON", "product_id": "8Base-RHCEPH-4.3-MON:librbd1-debuginfo-2:14.2.22-110.el8cp.s390x" }, "product_reference": "librbd1-debuginfo-2:14.2.22-110.el8cp.s390x", "relates_to_product_reference": "8Base-RHCEPH-4.3-MON" }, { "category": "default_component_of", "full_product_name": { "name": "librbd1-debuginfo-2:14.2.22-110.el8cp.x86_64 as a component of Red Hat Ceph Storage 4.3 MON", "product_id": "8Base-RHCEPH-4.3-MON:librbd1-debuginfo-2:14.2.22-110.el8cp.x86_64" }, "product_reference": "librbd1-debuginfo-2:14.2.22-110.el8cp.x86_64", "relates_to_product_reference": "8Base-RHCEPH-4.3-MON" }, { "category": "default_component_of", "full_product_name": { "name": "librgw-devel-2:14.2.22-110.el8cp.ppc64le as a component of Red Hat Ceph Storage 4.3 MON", "product_id": "8Base-RHCEPH-4.3-MON:librgw-devel-2:14.2.22-110.el8cp.ppc64le" }, "product_reference": "librgw-devel-2:14.2.22-110.el8cp.ppc64le", "relates_to_product_reference": "8Base-RHCEPH-4.3-MON" }, { "category": "default_component_of", "full_product_name": { "name": "librgw-devel-2:14.2.22-110.el8cp.s390x as a component of Red Hat Ceph Storage 4.3 MON", "product_id": "8Base-RHCEPH-4.3-MON:librgw-devel-2:14.2.22-110.el8cp.s390x" }, "product_reference": "librgw-devel-2:14.2.22-110.el8cp.s390x", "relates_to_product_reference": "8Base-RHCEPH-4.3-MON" }, { "category": "default_component_of", "full_product_name": { "name": "librgw-devel-2:14.2.22-110.el8cp.x86_64 as a component of Red Hat Ceph Storage 4.3 MON", "product_id": "8Base-RHCEPH-4.3-MON:librgw-devel-2:14.2.22-110.el8cp.x86_64" }, "product_reference": "librgw-devel-2:14.2.22-110.el8cp.x86_64", "relates_to_product_reference": "8Base-RHCEPH-4.3-MON" }, { "category": "default_component_of", "full_product_name": { "name": "librgw2-2:14.2.22-110.el8cp.ppc64le as a component of Red Hat Ceph Storage 4.3 MON", "product_id": "8Base-RHCEPH-4.3-MON:librgw2-2:14.2.22-110.el8cp.ppc64le" }, "product_reference": "librgw2-2:14.2.22-110.el8cp.ppc64le", "relates_to_product_reference": "8Base-RHCEPH-4.3-MON" }, { "category": "default_component_of", "full_product_name": { "name": "librgw2-2:14.2.22-110.el8cp.s390x as a component of Red Hat Ceph Storage 4.3 MON", "product_id": "8Base-RHCEPH-4.3-MON:librgw2-2:14.2.22-110.el8cp.s390x" }, "product_reference": "librgw2-2:14.2.22-110.el8cp.s390x", "relates_to_product_reference": "8Base-RHCEPH-4.3-MON" }, { "category": "default_component_of", "full_product_name": { "name": "librgw2-2:14.2.22-110.el8cp.x86_64 as a component of Red Hat Ceph Storage 4.3 MON", "product_id": "8Base-RHCEPH-4.3-MON:librgw2-2:14.2.22-110.el8cp.x86_64" }, "product_reference": "librgw2-2:14.2.22-110.el8cp.x86_64", "relates_to_product_reference": "8Base-RHCEPH-4.3-MON" }, { "category": "default_component_of", "full_product_name": { "name": "librgw2-debuginfo-2:14.2.22-110.el8cp.ppc64le as a component of Red Hat Ceph Storage 4.3 MON", "product_id": "8Base-RHCEPH-4.3-MON:librgw2-debuginfo-2:14.2.22-110.el8cp.ppc64le" }, "product_reference": "librgw2-debuginfo-2:14.2.22-110.el8cp.ppc64le", "relates_to_product_reference": "8Base-RHCEPH-4.3-MON" }, { "category": "default_component_of", "full_product_name": { "name": "librgw2-debuginfo-2:14.2.22-110.el8cp.s390x as a component of Red Hat Ceph Storage 4.3 MON", "product_id": "8Base-RHCEPH-4.3-MON:librgw2-debuginfo-2:14.2.22-110.el8cp.s390x" }, "product_reference": "librgw2-debuginfo-2:14.2.22-110.el8cp.s390x", "relates_to_product_reference": "8Base-RHCEPH-4.3-MON" }, { "category": "default_component_of", "full_product_name": { "name": "librgw2-debuginfo-2:14.2.22-110.el8cp.x86_64 as a component of Red Hat Ceph Storage 4.3 MON", "product_id": "8Base-RHCEPH-4.3-MON:librgw2-debuginfo-2:14.2.22-110.el8cp.x86_64" }, "product_reference": "librgw2-debuginfo-2:14.2.22-110.el8cp.x86_64", "relates_to_product_reference": "8Base-RHCEPH-4.3-MON" }, { "category": "default_component_of", "full_product_name": { "name": "python-rsa-0:4.8-1.el8cp.src as a component of Red Hat Ceph Storage 4.3 MON", "product_id": "8Base-RHCEPH-4.3-MON:python-rsa-0:4.8-1.el8cp.src" }, "product_reference": "python-rsa-0:4.8-1.el8cp.src", "relates_to_product_reference": "8Base-RHCEPH-4.3-MON" }, { "category": "default_component_of", "full_product_name": { "name": "python3-ceph-argparse-2:14.2.22-110.el8cp.ppc64le as a component of Red Hat Ceph Storage 4.3 MON", "product_id": "8Base-RHCEPH-4.3-MON:python3-ceph-argparse-2:14.2.22-110.el8cp.ppc64le" }, "product_reference": "python3-ceph-argparse-2:14.2.22-110.el8cp.ppc64le", "relates_to_product_reference": "8Base-RHCEPH-4.3-MON" }, { "category": "default_component_of", "full_product_name": { "name": "python3-ceph-argparse-2:14.2.22-110.el8cp.s390x as a component of Red Hat Ceph Storage 4.3 MON", "product_id": "8Base-RHCEPH-4.3-MON:python3-ceph-argparse-2:14.2.22-110.el8cp.s390x" }, "product_reference": "python3-ceph-argparse-2:14.2.22-110.el8cp.s390x", "relates_to_product_reference": "8Base-RHCEPH-4.3-MON" }, { "category": "default_component_of", "full_product_name": { "name": "python3-ceph-argparse-2:14.2.22-110.el8cp.x86_64 as a component of Red Hat Ceph Storage 4.3 MON", "product_id": "8Base-RHCEPH-4.3-MON:python3-ceph-argparse-2:14.2.22-110.el8cp.x86_64" }, "product_reference": "python3-ceph-argparse-2:14.2.22-110.el8cp.x86_64", "relates_to_product_reference": "8Base-RHCEPH-4.3-MON" }, { "category": "default_component_of", "full_product_name": { "name": "python3-cephfs-2:14.2.22-110.el8cp.ppc64le as a component of Red Hat Ceph Storage 4.3 MON", "product_id": "8Base-RHCEPH-4.3-MON:python3-cephfs-2:14.2.22-110.el8cp.ppc64le" }, "product_reference": "python3-cephfs-2:14.2.22-110.el8cp.ppc64le", "relates_to_product_reference": "8Base-RHCEPH-4.3-MON" }, { "category": "default_component_of", "full_product_name": { "name": "python3-cephfs-2:14.2.22-110.el8cp.s390x as a component of Red Hat Ceph Storage 4.3 MON", "product_id": "8Base-RHCEPH-4.3-MON:python3-cephfs-2:14.2.22-110.el8cp.s390x" }, "product_reference": "python3-cephfs-2:14.2.22-110.el8cp.s390x", "relates_to_product_reference": "8Base-RHCEPH-4.3-MON" }, { "category": "default_component_of", "full_product_name": { "name": "python3-cephfs-2:14.2.22-110.el8cp.x86_64 as a component of Red Hat Ceph Storage 4.3 MON", "product_id": "8Base-RHCEPH-4.3-MON:python3-cephfs-2:14.2.22-110.el8cp.x86_64" }, "product_reference": "python3-cephfs-2:14.2.22-110.el8cp.x86_64", "relates_to_product_reference": "8Base-RHCEPH-4.3-MON" }, { "category": "default_component_of", "full_product_name": { "name": "python3-cephfs-debuginfo-2:14.2.22-110.el8cp.ppc64le as a component of Red Hat Ceph Storage 4.3 MON", "product_id": "8Base-RHCEPH-4.3-MON:python3-cephfs-debuginfo-2:14.2.22-110.el8cp.ppc64le" }, "product_reference": "python3-cephfs-debuginfo-2:14.2.22-110.el8cp.ppc64le", "relates_to_product_reference": "8Base-RHCEPH-4.3-MON" }, { "category": "default_component_of", "full_product_name": { "name": "python3-cephfs-debuginfo-2:14.2.22-110.el8cp.s390x as a component of Red Hat Ceph Storage 4.3 MON", "product_id": "8Base-RHCEPH-4.3-MON:python3-cephfs-debuginfo-2:14.2.22-110.el8cp.s390x" }, "product_reference": "python3-cephfs-debuginfo-2:14.2.22-110.el8cp.s390x", "relates_to_product_reference": "8Base-RHCEPH-4.3-MON" }, { "category": "default_component_of", "full_product_name": { "name": "python3-cephfs-debuginfo-2:14.2.22-110.el8cp.x86_64 as a component of Red Hat Ceph Storage 4.3 MON", "product_id": "8Base-RHCEPH-4.3-MON:python3-cephfs-debuginfo-2:14.2.22-110.el8cp.x86_64" }, "product_reference": "python3-cephfs-debuginfo-2:14.2.22-110.el8cp.x86_64", "relates_to_product_reference": "8Base-RHCEPH-4.3-MON" }, { "category": "default_component_of", "full_product_name": { "name": "python3-rados-2:14.2.22-110.el8cp.ppc64le as a component of Red Hat Ceph Storage 4.3 MON", "product_id": "8Base-RHCEPH-4.3-MON:python3-rados-2:14.2.22-110.el8cp.ppc64le" }, "product_reference": "python3-rados-2:14.2.22-110.el8cp.ppc64le", "relates_to_product_reference": "8Base-RHCEPH-4.3-MON" }, { "category": "default_component_of", "full_product_name": { "name": "python3-rados-2:14.2.22-110.el8cp.s390x as a component of Red Hat Ceph Storage 4.3 MON", "product_id": "8Base-RHCEPH-4.3-MON:python3-rados-2:14.2.22-110.el8cp.s390x" }, "product_reference": "python3-rados-2:14.2.22-110.el8cp.s390x", "relates_to_product_reference": "8Base-RHCEPH-4.3-MON" }, { "category": "default_component_of", "full_product_name": { "name": "python3-rados-2:14.2.22-110.el8cp.x86_64 as a component of Red Hat Ceph Storage 4.3 MON", "product_id": "8Base-RHCEPH-4.3-MON:python3-rados-2:14.2.22-110.el8cp.x86_64" }, "product_reference": "python3-rados-2:14.2.22-110.el8cp.x86_64", "relates_to_product_reference": "8Base-RHCEPH-4.3-MON" }, { "category": "default_component_of", "full_product_name": { "name": "python3-rados-debuginfo-2:14.2.22-110.el8cp.ppc64le as a component of Red Hat Ceph Storage 4.3 MON", "product_id": "8Base-RHCEPH-4.3-MON:python3-rados-debuginfo-2:14.2.22-110.el8cp.ppc64le" }, "product_reference": "python3-rados-debuginfo-2:14.2.22-110.el8cp.ppc64le", "relates_to_product_reference": "8Base-RHCEPH-4.3-MON" }, { "category": "default_component_of", "full_product_name": { "name": "python3-rados-debuginfo-2:14.2.22-110.el8cp.s390x as a component of Red Hat Ceph Storage 4.3 MON", "product_id": "8Base-RHCEPH-4.3-MON:python3-rados-debuginfo-2:14.2.22-110.el8cp.s390x" }, "product_reference": "python3-rados-debuginfo-2:14.2.22-110.el8cp.s390x", "relates_to_product_reference": "8Base-RHCEPH-4.3-MON" }, { "category": "default_component_of", "full_product_name": { "name": "python3-rados-debuginfo-2:14.2.22-110.el8cp.x86_64 as a component of Red Hat Ceph Storage 4.3 MON", "product_id": "8Base-RHCEPH-4.3-MON:python3-rados-debuginfo-2:14.2.22-110.el8cp.x86_64" }, "product_reference": "python3-rados-debuginfo-2:14.2.22-110.el8cp.x86_64", "relates_to_product_reference": "8Base-RHCEPH-4.3-MON" }, { "category": "default_component_of", "full_product_name": { "name": "python3-rbd-2:14.2.22-110.el8cp.ppc64le as a component of Red Hat Ceph Storage 4.3 MON", "product_id": "8Base-RHCEPH-4.3-MON:python3-rbd-2:14.2.22-110.el8cp.ppc64le" }, "product_reference": "python3-rbd-2:14.2.22-110.el8cp.ppc64le", "relates_to_product_reference": "8Base-RHCEPH-4.3-MON" }, { "category": "default_component_of", "full_product_name": { "name": "python3-rbd-2:14.2.22-110.el8cp.s390x as a component of Red Hat Ceph Storage 4.3 MON", "product_id": "8Base-RHCEPH-4.3-MON:python3-rbd-2:14.2.22-110.el8cp.s390x" }, "product_reference": "python3-rbd-2:14.2.22-110.el8cp.s390x", "relates_to_product_reference": "8Base-RHCEPH-4.3-MON" }, { "category": "default_component_of", "full_product_name": { "name": "python3-rbd-2:14.2.22-110.el8cp.x86_64 as a component of Red Hat Ceph Storage 4.3 MON", "product_id": "8Base-RHCEPH-4.3-MON:python3-rbd-2:14.2.22-110.el8cp.x86_64" }, "product_reference": "python3-rbd-2:14.2.22-110.el8cp.x86_64", "relates_to_product_reference": "8Base-RHCEPH-4.3-MON" }, { "category": "default_component_of", "full_product_name": { "name": "python3-rbd-debuginfo-2:14.2.22-110.el8cp.ppc64le as a component of Red Hat Ceph Storage 4.3 MON", "product_id": "8Base-RHCEPH-4.3-MON:python3-rbd-debuginfo-2:14.2.22-110.el8cp.ppc64le" }, "product_reference": "python3-rbd-debuginfo-2:14.2.22-110.el8cp.ppc64le", "relates_to_product_reference": "8Base-RHCEPH-4.3-MON" }, { "category": "default_component_of", "full_product_name": { "name": "python3-rbd-debuginfo-2:14.2.22-110.el8cp.s390x as a component of Red Hat Ceph Storage 4.3 MON", "product_id": "8Base-RHCEPH-4.3-MON:python3-rbd-debuginfo-2:14.2.22-110.el8cp.s390x" }, "product_reference": "python3-rbd-debuginfo-2:14.2.22-110.el8cp.s390x", "relates_to_product_reference": "8Base-RHCEPH-4.3-MON" }, { "category": "default_component_of", "full_product_name": { "name": "python3-rbd-debuginfo-2:14.2.22-110.el8cp.x86_64 as a component of Red Hat Ceph Storage 4.3 MON", "product_id": "8Base-RHCEPH-4.3-MON:python3-rbd-debuginfo-2:14.2.22-110.el8cp.x86_64" }, "product_reference": "python3-rbd-debuginfo-2:14.2.22-110.el8cp.x86_64", "relates_to_product_reference": "8Base-RHCEPH-4.3-MON" }, { "category": "default_component_of", "full_product_name": { "name": "python3-rgw-2:14.2.22-110.el8cp.ppc64le as a component of Red Hat Ceph Storage 4.3 MON", "product_id": "8Base-RHCEPH-4.3-MON:python3-rgw-2:14.2.22-110.el8cp.ppc64le" }, "product_reference": "python3-rgw-2:14.2.22-110.el8cp.ppc64le", "relates_to_product_reference": "8Base-RHCEPH-4.3-MON" }, { "category": "default_component_of", "full_product_name": { "name": "python3-rgw-2:14.2.22-110.el8cp.s390x as a component of Red Hat Ceph Storage 4.3 MON", "product_id": "8Base-RHCEPH-4.3-MON:python3-rgw-2:14.2.22-110.el8cp.s390x" }, "product_reference": "python3-rgw-2:14.2.22-110.el8cp.s390x", "relates_to_product_reference": "8Base-RHCEPH-4.3-MON" }, { "category": "default_component_of", "full_product_name": { "name": "python3-rgw-2:14.2.22-110.el8cp.x86_64 as a component of Red Hat Ceph Storage 4.3 MON", "product_id": "8Base-RHCEPH-4.3-MON:python3-rgw-2:14.2.22-110.el8cp.x86_64" }, "product_reference": "python3-rgw-2:14.2.22-110.el8cp.x86_64", "relates_to_product_reference": "8Base-RHCEPH-4.3-MON" }, { "category": "default_component_of", "full_product_name": { "name": "python3-rgw-debuginfo-2:14.2.22-110.el8cp.ppc64le as a component of Red Hat Ceph Storage 4.3 MON", "product_id": "8Base-RHCEPH-4.3-MON:python3-rgw-debuginfo-2:14.2.22-110.el8cp.ppc64le" }, "product_reference": "python3-rgw-debuginfo-2:14.2.22-110.el8cp.ppc64le", "relates_to_product_reference": "8Base-RHCEPH-4.3-MON" }, { "category": "default_component_of", "full_product_name": { "name": "python3-rgw-debuginfo-2:14.2.22-110.el8cp.s390x as a component of Red Hat Ceph Storage 4.3 MON", "product_id": "8Base-RHCEPH-4.3-MON:python3-rgw-debuginfo-2:14.2.22-110.el8cp.s390x" }, "product_reference": "python3-rgw-debuginfo-2:14.2.22-110.el8cp.s390x", "relates_to_product_reference": "8Base-RHCEPH-4.3-MON" }, { "category": "default_component_of", "full_product_name": { "name": "python3-rgw-debuginfo-2:14.2.22-110.el8cp.x86_64 as a component of Red Hat Ceph Storage 4.3 MON", "product_id": "8Base-RHCEPH-4.3-MON:python3-rgw-debuginfo-2:14.2.22-110.el8cp.x86_64" }, "product_reference": "python3-rgw-debuginfo-2:14.2.22-110.el8cp.x86_64", "relates_to_product_reference": "8Base-RHCEPH-4.3-MON" }, { "category": "default_component_of", "full_product_name": { "name": "python3-rsa-0:4.8-1.el8cp.noarch as a component of Red Hat Ceph Storage 4.3 MON", "product_id": "8Base-RHCEPH-4.3-MON:python3-rsa-0:4.8-1.el8cp.noarch" }, "product_reference": "python3-rsa-0:4.8-1.el8cp.noarch", "relates_to_product_reference": "8Base-RHCEPH-4.3-MON" }, { "category": "default_component_of", "full_product_name": { "name": "rbd-fuse-debuginfo-2:14.2.22-110.el8cp.ppc64le as a component of Red Hat Ceph Storage 4.3 MON", "product_id": "8Base-RHCEPH-4.3-MON:rbd-fuse-debuginfo-2:14.2.22-110.el8cp.ppc64le" }, "product_reference": "rbd-fuse-debuginfo-2:14.2.22-110.el8cp.ppc64le", "relates_to_product_reference": "8Base-RHCEPH-4.3-MON" }, { "category": "default_component_of", "full_product_name": { "name": "rbd-fuse-debuginfo-2:14.2.22-110.el8cp.s390x as a component of Red Hat Ceph Storage 4.3 MON", "product_id": "8Base-RHCEPH-4.3-MON:rbd-fuse-debuginfo-2:14.2.22-110.el8cp.s390x" }, "product_reference": "rbd-fuse-debuginfo-2:14.2.22-110.el8cp.s390x", "relates_to_product_reference": "8Base-RHCEPH-4.3-MON" }, { "category": "default_component_of", "full_product_name": { "name": "rbd-fuse-debuginfo-2:14.2.22-110.el8cp.x86_64 as a component of Red Hat Ceph Storage 4.3 MON", "product_id": "8Base-RHCEPH-4.3-MON:rbd-fuse-debuginfo-2:14.2.22-110.el8cp.x86_64" }, "product_reference": "rbd-fuse-debuginfo-2:14.2.22-110.el8cp.x86_64", "relates_to_product_reference": "8Base-RHCEPH-4.3-MON" }, { "category": "default_component_of", "full_product_name": { "name": "rbd-mirror-2:14.2.22-110.el8cp.ppc64le as a component of Red Hat Ceph Storage 4.3 MON", "product_id": "8Base-RHCEPH-4.3-MON:rbd-mirror-2:14.2.22-110.el8cp.ppc64le" }, "product_reference": "rbd-mirror-2:14.2.22-110.el8cp.ppc64le", "relates_to_product_reference": "8Base-RHCEPH-4.3-MON" }, { "category": "default_component_of", "full_product_name": { "name": "rbd-mirror-2:14.2.22-110.el8cp.s390x as a component of Red Hat Ceph Storage 4.3 MON", "product_id": "8Base-RHCEPH-4.3-MON:rbd-mirror-2:14.2.22-110.el8cp.s390x" }, "product_reference": "rbd-mirror-2:14.2.22-110.el8cp.s390x", "relates_to_product_reference": "8Base-RHCEPH-4.3-MON" }, { "category": "default_component_of", "full_product_name": { "name": "rbd-mirror-2:14.2.22-110.el8cp.x86_64 as a component of Red Hat Ceph Storage 4.3 MON", "product_id": "8Base-RHCEPH-4.3-MON:rbd-mirror-2:14.2.22-110.el8cp.x86_64" }, "product_reference": "rbd-mirror-2:14.2.22-110.el8cp.x86_64", "relates_to_product_reference": "8Base-RHCEPH-4.3-MON" }, { "category": "default_component_of", "full_product_name": { "name": "rbd-mirror-debuginfo-2:14.2.22-110.el8cp.ppc64le as a component of Red Hat Ceph Storage 4.3 MON", "product_id": "8Base-RHCEPH-4.3-MON:rbd-mirror-debuginfo-2:14.2.22-110.el8cp.ppc64le" }, "product_reference": "rbd-mirror-debuginfo-2:14.2.22-110.el8cp.ppc64le", "relates_to_product_reference": "8Base-RHCEPH-4.3-MON" }, { "category": "default_component_of", "full_product_name": { "name": "rbd-mirror-debuginfo-2:14.2.22-110.el8cp.s390x as a component of Red Hat Ceph Storage 4.3 MON", "product_id": "8Base-RHCEPH-4.3-MON:rbd-mirror-debuginfo-2:14.2.22-110.el8cp.s390x" }, "product_reference": "rbd-mirror-debuginfo-2:14.2.22-110.el8cp.s390x", "relates_to_product_reference": "8Base-RHCEPH-4.3-MON" }, { "category": "default_component_of", "full_product_name": { "name": "rbd-mirror-debuginfo-2:14.2.22-110.el8cp.x86_64 as a component of Red Hat Ceph Storage 4.3 MON", "product_id": "8Base-RHCEPH-4.3-MON:rbd-mirror-debuginfo-2:14.2.22-110.el8cp.x86_64" }, "product_reference": "rbd-mirror-debuginfo-2:14.2.22-110.el8cp.x86_64", "relates_to_product_reference": "8Base-RHCEPH-4.3-MON" }, { "category": "default_component_of", "full_product_name": { "name": "rbd-nbd-2:14.2.22-110.el8cp.ppc64le as a component of Red Hat Ceph Storage 4.3 MON", "product_id": "8Base-RHCEPH-4.3-MON:rbd-nbd-2:14.2.22-110.el8cp.ppc64le" }, "product_reference": "rbd-nbd-2:14.2.22-110.el8cp.ppc64le", "relates_to_product_reference": "8Base-RHCEPH-4.3-MON" }, { "category": "default_component_of", "full_product_name": { "name": "rbd-nbd-2:14.2.22-110.el8cp.s390x as a component of Red Hat Ceph Storage 4.3 MON", "product_id": "8Base-RHCEPH-4.3-MON:rbd-nbd-2:14.2.22-110.el8cp.s390x" }, "product_reference": "rbd-nbd-2:14.2.22-110.el8cp.s390x", "relates_to_product_reference": "8Base-RHCEPH-4.3-MON" }, { "category": "default_component_of", "full_product_name": { "name": "rbd-nbd-2:14.2.22-110.el8cp.x86_64 as a component of Red Hat Ceph Storage 4.3 MON", "product_id": "8Base-RHCEPH-4.3-MON:rbd-nbd-2:14.2.22-110.el8cp.x86_64" }, "product_reference": "rbd-nbd-2:14.2.22-110.el8cp.x86_64", "relates_to_product_reference": "8Base-RHCEPH-4.3-MON" }, { "category": "default_component_of", "full_product_name": { "name": "rbd-nbd-debuginfo-2:14.2.22-110.el8cp.ppc64le as a component of Red Hat Ceph Storage 4.3 MON", "product_id": "8Base-RHCEPH-4.3-MON:rbd-nbd-debuginfo-2:14.2.22-110.el8cp.ppc64le" }, "product_reference": "rbd-nbd-debuginfo-2:14.2.22-110.el8cp.ppc64le", "relates_to_product_reference": "8Base-RHCEPH-4.3-MON" }, { "category": "default_component_of", "full_product_name": { "name": "rbd-nbd-debuginfo-2:14.2.22-110.el8cp.s390x as a component of Red Hat Ceph Storage 4.3 MON", "product_id": "8Base-RHCEPH-4.3-MON:rbd-nbd-debuginfo-2:14.2.22-110.el8cp.s390x" }, "product_reference": "rbd-nbd-debuginfo-2:14.2.22-110.el8cp.s390x", "relates_to_product_reference": "8Base-RHCEPH-4.3-MON" }, { "category": "default_component_of", "full_product_name": { "name": "rbd-nbd-debuginfo-2:14.2.22-110.el8cp.x86_64 as a component of Red Hat Ceph Storage 4.3 MON", "product_id": "8Base-RHCEPH-4.3-MON:rbd-nbd-debuginfo-2:14.2.22-110.el8cp.x86_64" }, "product_reference": "rbd-nbd-debuginfo-2:14.2.22-110.el8cp.x86_64", "relates_to_product_reference": "8Base-RHCEPH-4.3-MON" }, { "category": "default_component_of", "full_product_name": { "name": "ceph-2:14.2.22-110.el8cp.src as a component of Red Hat Ceph Storage 4.3 OSD", "product_id": "8Base-RHCEPH-4.3-OSD:ceph-2:14.2.22-110.el8cp.src" }, "product_reference": "ceph-2:14.2.22-110.el8cp.src", "relates_to_product_reference": "8Base-RHCEPH-4.3-OSD" }, { "category": "default_component_of", "full_product_name": { "name": "ceph-base-2:14.2.22-110.el8cp.ppc64le as a component of Red Hat Ceph Storage 4.3 OSD", "product_id": "8Base-RHCEPH-4.3-OSD:ceph-base-2:14.2.22-110.el8cp.ppc64le" }, "product_reference": "ceph-base-2:14.2.22-110.el8cp.ppc64le", "relates_to_product_reference": "8Base-RHCEPH-4.3-OSD" }, { "category": "default_component_of", "full_product_name": { "name": "ceph-base-2:14.2.22-110.el8cp.s390x as a component of Red Hat Ceph Storage 4.3 OSD", "product_id": "8Base-RHCEPH-4.3-OSD:ceph-base-2:14.2.22-110.el8cp.s390x" }, "product_reference": "ceph-base-2:14.2.22-110.el8cp.s390x", "relates_to_product_reference": "8Base-RHCEPH-4.3-OSD" }, { "category": "default_component_of", "full_product_name": { "name": "ceph-base-2:14.2.22-110.el8cp.x86_64 as a component of Red Hat Ceph Storage 4.3 OSD", "product_id": "8Base-RHCEPH-4.3-OSD:ceph-base-2:14.2.22-110.el8cp.x86_64" }, "product_reference": "ceph-base-2:14.2.22-110.el8cp.x86_64", "relates_to_product_reference": "8Base-RHCEPH-4.3-OSD" }, { "category": "default_component_of", "full_product_name": { "name": "ceph-base-debuginfo-2:14.2.22-110.el8cp.ppc64le as a component of Red Hat Ceph Storage 4.3 OSD", "product_id": "8Base-RHCEPH-4.3-OSD:ceph-base-debuginfo-2:14.2.22-110.el8cp.ppc64le" }, "product_reference": "ceph-base-debuginfo-2:14.2.22-110.el8cp.ppc64le", "relates_to_product_reference": "8Base-RHCEPH-4.3-OSD" }, { "category": "default_component_of", "full_product_name": { "name": "ceph-base-debuginfo-2:14.2.22-110.el8cp.s390x as a component of Red Hat Ceph Storage 4.3 OSD", "product_id": "8Base-RHCEPH-4.3-OSD:ceph-base-debuginfo-2:14.2.22-110.el8cp.s390x" }, "product_reference": "ceph-base-debuginfo-2:14.2.22-110.el8cp.s390x", "relates_to_product_reference": "8Base-RHCEPH-4.3-OSD" }, { "category": "default_component_of", "full_product_name": { "name": "ceph-base-debuginfo-2:14.2.22-110.el8cp.x86_64 as a component of Red Hat Ceph Storage 4.3 OSD", "product_id": "8Base-RHCEPH-4.3-OSD:ceph-base-debuginfo-2:14.2.22-110.el8cp.x86_64" }, "product_reference": "ceph-base-debuginfo-2:14.2.22-110.el8cp.x86_64", "relates_to_product_reference": "8Base-RHCEPH-4.3-OSD" }, { "category": "default_component_of", "full_product_name": { "name": "ceph-common-2:14.2.22-110.el8cp.ppc64le as a component of Red Hat Ceph Storage 4.3 OSD", "product_id": "8Base-RHCEPH-4.3-OSD:ceph-common-2:14.2.22-110.el8cp.ppc64le" }, "product_reference": "ceph-common-2:14.2.22-110.el8cp.ppc64le", "relates_to_product_reference": "8Base-RHCEPH-4.3-OSD" }, { "category": "default_component_of", "full_product_name": { "name": "ceph-common-2:14.2.22-110.el8cp.s390x as a component of Red Hat Ceph Storage 4.3 OSD", "product_id": "8Base-RHCEPH-4.3-OSD:ceph-common-2:14.2.22-110.el8cp.s390x" }, "product_reference": "ceph-common-2:14.2.22-110.el8cp.s390x", "relates_to_product_reference": "8Base-RHCEPH-4.3-OSD" }, { "category": "default_component_of", "full_product_name": { "name": "ceph-common-2:14.2.22-110.el8cp.x86_64 as a component of Red Hat Ceph Storage 4.3 OSD", "product_id": "8Base-RHCEPH-4.3-OSD:ceph-common-2:14.2.22-110.el8cp.x86_64" }, "product_reference": "ceph-common-2:14.2.22-110.el8cp.x86_64", "relates_to_product_reference": "8Base-RHCEPH-4.3-OSD" }, { "category": "default_component_of", "full_product_name": { "name": "ceph-common-debuginfo-2:14.2.22-110.el8cp.ppc64le as a component of Red Hat Ceph Storage 4.3 OSD", "product_id": "8Base-RHCEPH-4.3-OSD:ceph-common-debuginfo-2:14.2.22-110.el8cp.ppc64le" }, "product_reference": "ceph-common-debuginfo-2:14.2.22-110.el8cp.ppc64le", "relates_to_product_reference": "8Base-RHCEPH-4.3-OSD" }, { "category": "default_component_of", "full_product_name": { "name": "ceph-common-debuginfo-2:14.2.22-110.el8cp.s390x as a component of Red Hat Ceph Storage 4.3 OSD", "product_id": "8Base-RHCEPH-4.3-OSD:ceph-common-debuginfo-2:14.2.22-110.el8cp.s390x" }, "product_reference": "ceph-common-debuginfo-2:14.2.22-110.el8cp.s390x", "relates_to_product_reference": "8Base-RHCEPH-4.3-OSD" }, { "category": "default_component_of", "full_product_name": { "name": "ceph-common-debuginfo-2:14.2.22-110.el8cp.x86_64 as a component of Red Hat Ceph Storage 4.3 OSD", "product_id": "8Base-RHCEPH-4.3-OSD:ceph-common-debuginfo-2:14.2.22-110.el8cp.x86_64" }, "product_reference": "ceph-common-debuginfo-2:14.2.22-110.el8cp.x86_64", "relates_to_product_reference": "8Base-RHCEPH-4.3-OSD" }, { "category": "default_component_of", "full_product_name": { "name": "ceph-debugsource-2:14.2.22-110.el8cp.ppc64le as a component of Red Hat Ceph Storage 4.3 OSD", "product_id": "8Base-RHCEPH-4.3-OSD:ceph-debugsource-2:14.2.22-110.el8cp.ppc64le" }, "product_reference": "ceph-debugsource-2:14.2.22-110.el8cp.ppc64le", "relates_to_product_reference": "8Base-RHCEPH-4.3-OSD" }, { "category": "default_component_of", "full_product_name": { "name": "ceph-debugsource-2:14.2.22-110.el8cp.s390x as a component of Red Hat Ceph Storage 4.3 OSD", "product_id": "8Base-RHCEPH-4.3-OSD:ceph-debugsource-2:14.2.22-110.el8cp.s390x" }, "product_reference": "ceph-debugsource-2:14.2.22-110.el8cp.s390x", "relates_to_product_reference": "8Base-RHCEPH-4.3-OSD" }, { "category": "default_component_of", "full_product_name": { "name": "ceph-debugsource-2:14.2.22-110.el8cp.x86_64 as a component of Red Hat Ceph Storage 4.3 OSD", "product_id": "8Base-RHCEPH-4.3-OSD:ceph-debugsource-2:14.2.22-110.el8cp.x86_64" }, "product_reference": "ceph-debugsource-2:14.2.22-110.el8cp.x86_64", "relates_to_product_reference": "8Base-RHCEPH-4.3-OSD" }, { "category": "default_component_of", "full_product_name": { "name": "ceph-fuse-2:14.2.22-110.el8cp.ppc64le as a component of Red Hat Ceph Storage 4.3 OSD", "product_id": "8Base-RHCEPH-4.3-OSD:ceph-fuse-2:14.2.22-110.el8cp.ppc64le" }, "product_reference": "ceph-fuse-2:14.2.22-110.el8cp.ppc64le", "relates_to_product_reference": "8Base-RHCEPH-4.3-OSD" }, { "category": "default_component_of", "full_product_name": { "name": "ceph-fuse-2:14.2.22-110.el8cp.s390x as a component of Red Hat Ceph Storage 4.3 OSD", "product_id": "8Base-RHCEPH-4.3-OSD:ceph-fuse-2:14.2.22-110.el8cp.s390x" }, "product_reference": "ceph-fuse-2:14.2.22-110.el8cp.s390x", "relates_to_product_reference": "8Base-RHCEPH-4.3-OSD" }, { "category": "default_component_of", "full_product_name": { "name": "ceph-fuse-2:14.2.22-110.el8cp.x86_64 as a component of Red Hat Ceph Storage 4.3 OSD", "product_id": "8Base-RHCEPH-4.3-OSD:ceph-fuse-2:14.2.22-110.el8cp.x86_64" }, "product_reference": "ceph-fuse-2:14.2.22-110.el8cp.x86_64", "relates_to_product_reference": "8Base-RHCEPH-4.3-OSD" }, { "category": "default_component_of", "full_product_name": { "name": "ceph-fuse-debuginfo-2:14.2.22-110.el8cp.ppc64le as a component of Red Hat Ceph Storage 4.3 OSD", "product_id": "8Base-RHCEPH-4.3-OSD:ceph-fuse-debuginfo-2:14.2.22-110.el8cp.ppc64le" }, "product_reference": "ceph-fuse-debuginfo-2:14.2.22-110.el8cp.ppc64le", "relates_to_product_reference": "8Base-RHCEPH-4.3-OSD" }, { "category": "default_component_of", "full_product_name": { "name": "ceph-fuse-debuginfo-2:14.2.22-110.el8cp.s390x as a component of Red Hat Ceph Storage 4.3 OSD", "product_id": "8Base-RHCEPH-4.3-OSD:ceph-fuse-debuginfo-2:14.2.22-110.el8cp.s390x" }, "product_reference": "ceph-fuse-debuginfo-2:14.2.22-110.el8cp.s390x", "relates_to_product_reference": "8Base-RHCEPH-4.3-OSD" }, { "category": "default_component_of", "full_product_name": { "name": "ceph-fuse-debuginfo-2:14.2.22-110.el8cp.x86_64 as a component of Red Hat Ceph Storage 4.3 OSD", "product_id": "8Base-RHCEPH-4.3-OSD:ceph-fuse-debuginfo-2:14.2.22-110.el8cp.x86_64" }, "product_reference": "ceph-fuse-debuginfo-2:14.2.22-110.el8cp.x86_64", "relates_to_product_reference": "8Base-RHCEPH-4.3-OSD" }, { "category": "default_component_of", "full_product_name": { "name": "ceph-grafana-dashboards-2:14.2.22-110.el8cp.noarch as a component of Red Hat Ceph Storage 4.3 OSD", "product_id": "8Base-RHCEPH-4.3-OSD:ceph-grafana-dashboards-2:14.2.22-110.el8cp.noarch" }, "product_reference": "ceph-grafana-dashboards-2:14.2.22-110.el8cp.noarch", "relates_to_product_reference": "8Base-RHCEPH-4.3-OSD" }, { "category": "default_component_of", "full_product_name": { "name": "ceph-mds-2:14.2.22-110.el8cp.ppc64le as a component of Red Hat Ceph Storage 4.3 OSD", "product_id": "8Base-RHCEPH-4.3-OSD:ceph-mds-2:14.2.22-110.el8cp.ppc64le" }, "product_reference": "ceph-mds-2:14.2.22-110.el8cp.ppc64le", "relates_to_product_reference": "8Base-RHCEPH-4.3-OSD" }, { "category": "default_component_of", "full_product_name": { "name": "ceph-mds-2:14.2.22-110.el8cp.s390x as a component of Red Hat Ceph Storage 4.3 OSD", "product_id": "8Base-RHCEPH-4.3-OSD:ceph-mds-2:14.2.22-110.el8cp.s390x" }, "product_reference": "ceph-mds-2:14.2.22-110.el8cp.s390x", "relates_to_product_reference": "8Base-RHCEPH-4.3-OSD" }, { "category": "default_component_of", "full_product_name": { "name": "ceph-mds-2:14.2.22-110.el8cp.x86_64 as a component of Red Hat Ceph Storage 4.3 OSD", "product_id": "8Base-RHCEPH-4.3-OSD:ceph-mds-2:14.2.22-110.el8cp.x86_64" }, "product_reference": "ceph-mds-2:14.2.22-110.el8cp.x86_64", "relates_to_product_reference": "8Base-RHCEPH-4.3-OSD" }, { "category": "default_component_of", "full_product_name": { "name": "ceph-mds-debuginfo-2:14.2.22-110.el8cp.ppc64le as a component of Red Hat Ceph Storage 4.3 OSD", "product_id": "8Base-RHCEPH-4.3-OSD:ceph-mds-debuginfo-2:14.2.22-110.el8cp.ppc64le" }, "product_reference": "ceph-mds-debuginfo-2:14.2.22-110.el8cp.ppc64le", "relates_to_product_reference": "8Base-RHCEPH-4.3-OSD" }, { "category": "default_component_of", "full_product_name": { "name": "ceph-mds-debuginfo-2:14.2.22-110.el8cp.s390x as a component of Red Hat Ceph Storage 4.3 OSD", "product_id": "8Base-RHCEPH-4.3-OSD:ceph-mds-debuginfo-2:14.2.22-110.el8cp.s390x" }, "product_reference": "ceph-mds-debuginfo-2:14.2.22-110.el8cp.s390x", "relates_to_product_reference": "8Base-RHCEPH-4.3-OSD" }, { "category": "default_component_of", "full_product_name": { "name": "ceph-mds-debuginfo-2:14.2.22-110.el8cp.x86_64 as a component of Red Hat Ceph Storage 4.3 OSD", "product_id": "8Base-RHCEPH-4.3-OSD:ceph-mds-debuginfo-2:14.2.22-110.el8cp.x86_64" }, "product_reference": "ceph-mds-debuginfo-2:14.2.22-110.el8cp.x86_64", "relates_to_product_reference": "8Base-RHCEPH-4.3-OSD" }, { "category": "default_component_of", "full_product_name": { "name": "ceph-mgr-2:14.2.22-110.el8cp.ppc64le as a component of Red Hat Ceph Storage 4.3 OSD", "product_id": "8Base-RHCEPH-4.3-OSD:ceph-mgr-2:14.2.22-110.el8cp.ppc64le" }, "product_reference": "ceph-mgr-2:14.2.22-110.el8cp.ppc64le", "relates_to_product_reference": "8Base-RHCEPH-4.3-OSD" }, { "category": "default_component_of", "full_product_name": { "name": "ceph-mgr-2:14.2.22-110.el8cp.s390x as a component of Red Hat Ceph Storage 4.3 OSD", "product_id": "8Base-RHCEPH-4.3-OSD:ceph-mgr-2:14.2.22-110.el8cp.s390x" }, "product_reference": "ceph-mgr-2:14.2.22-110.el8cp.s390x", "relates_to_product_reference": "8Base-RHCEPH-4.3-OSD" }, { "category": "default_component_of", "full_product_name": { "name": "ceph-mgr-2:14.2.22-110.el8cp.x86_64 as a component of Red Hat Ceph Storage 4.3 OSD", "product_id": "8Base-RHCEPH-4.3-OSD:ceph-mgr-2:14.2.22-110.el8cp.x86_64" }, "product_reference": "ceph-mgr-2:14.2.22-110.el8cp.x86_64", "relates_to_product_reference": "8Base-RHCEPH-4.3-OSD" }, { "category": "default_component_of", "full_product_name": { "name": "ceph-mgr-dashboard-2:14.2.22-110.el8cp.noarch as a component of Red Hat Ceph Storage 4.3 OSD", "product_id": "8Base-RHCEPH-4.3-OSD:ceph-mgr-dashboard-2:14.2.22-110.el8cp.noarch" }, "product_reference": "ceph-mgr-dashboard-2:14.2.22-110.el8cp.noarch", "relates_to_product_reference": "8Base-RHCEPH-4.3-OSD" }, { "category": "default_component_of", "full_product_name": { "name": "ceph-mgr-debuginfo-2:14.2.22-110.el8cp.ppc64le as a component of Red Hat Ceph Storage 4.3 OSD", "product_id": "8Base-RHCEPH-4.3-OSD:ceph-mgr-debuginfo-2:14.2.22-110.el8cp.ppc64le" }, "product_reference": "ceph-mgr-debuginfo-2:14.2.22-110.el8cp.ppc64le", "relates_to_product_reference": "8Base-RHCEPH-4.3-OSD" }, { "category": "default_component_of", "full_product_name": { "name": "ceph-mgr-debuginfo-2:14.2.22-110.el8cp.s390x as a component of Red Hat Ceph Storage 4.3 OSD", "product_id": "8Base-RHCEPH-4.3-OSD:ceph-mgr-debuginfo-2:14.2.22-110.el8cp.s390x" }, "product_reference": "ceph-mgr-debuginfo-2:14.2.22-110.el8cp.s390x", "relates_to_product_reference": "8Base-RHCEPH-4.3-OSD" }, { "category": "default_component_of", "full_product_name": { "name": "ceph-mgr-debuginfo-2:14.2.22-110.el8cp.x86_64 as a component of Red Hat Ceph Storage 4.3 OSD", "product_id": "8Base-RHCEPH-4.3-OSD:ceph-mgr-debuginfo-2:14.2.22-110.el8cp.x86_64" }, "product_reference": "ceph-mgr-debuginfo-2:14.2.22-110.el8cp.x86_64", "relates_to_product_reference": "8Base-RHCEPH-4.3-OSD" }, { "category": "default_component_of", "full_product_name": { "name": "ceph-mgr-diskprediction-local-2:14.2.22-110.el8cp.noarch as a component of Red Hat Ceph Storage 4.3 OSD", "product_id": "8Base-RHCEPH-4.3-OSD:ceph-mgr-diskprediction-local-2:14.2.22-110.el8cp.noarch" }, "product_reference": "ceph-mgr-diskprediction-local-2:14.2.22-110.el8cp.noarch", "relates_to_product_reference": "8Base-RHCEPH-4.3-OSD" }, { "category": "default_component_of", "full_product_name": { "name": "ceph-mgr-k8sevents-2:14.2.22-110.el8cp.noarch as a component of Red Hat Ceph Storage 4.3 OSD", "product_id": "8Base-RHCEPH-4.3-OSD:ceph-mgr-k8sevents-2:14.2.22-110.el8cp.noarch" }, "product_reference": "ceph-mgr-k8sevents-2:14.2.22-110.el8cp.noarch", "relates_to_product_reference": "8Base-RHCEPH-4.3-OSD" }, { "category": "default_component_of", "full_product_name": { "name": "ceph-mgr-rook-2:14.2.22-110.el8cp.noarch as a component of Red Hat Ceph Storage 4.3 OSD", "product_id": "8Base-RHCEPH-4.3-OSD:ceph-mgr-rook-2:14.2.22-110.el8cp.noarch" }, "product_reference": "ceph-mgr-rook-2:14.2.22-110.el8cp.noarch", "relates_to_product_reference": "8Base-RHCEPH-4.3-OSD" }, { "category": "default_component_of", "full_product_name": { "name": "ceph-mon-2:14.2.22-110.el8cp.ppc64le as a component of Red Hat Ceph Storage 4.3 OSD", "product_id": "8Base-RHCEPH-4.3-OSD:ceph-mon-2:14.2.22-110.el8cp.ppc64le" }, "product_reference": "ceph-mon-2:14.2.22-110.el8cp.ppc64le", "relates_to_product_reference": "8Base-RHCEPH-4.3-OSD" }, { "category": "default_component_of", "full_product_name": { "name": "ceph-mon-2:14.2.22-110.el8cp.s390x as a component of Red Hat Ceph Storage 4.3 OSD", "product_id": "8Base-RHCEPH-4.3-OSD:ceph-mon-2:14.2.22-110.el8cp.s390x" }, "product_reference": "ceph-mon-2:14.2.22-110.el8cp.s390x", "relates_to_product_reference": "8Base-RHCEPH-4.3-OSD" }, { "category": "default_component_of", "full_product_name": { "name": "ceph-mon-2:14.2.22-110.el8cp.x86_64 as a component of Red Hat Ceph Storage 4.3 OSD", "product_id": "8Base-RHCEPH-4.3-OSD:ceph-mon-2:14.2.22-110.el8cp.x86_64" }, "product_reference": "ceph-mon-2:14.2.22-110.el8cp.x86_64", "relates_to_product_reference": "8Base-RHCEPH-4.3-OSD" }, { "category": "default_component_of", "full_product_name": { "name": "ceph-mon-debuginfo-2:14.2.22-110.el8cp.ppc64le as a component of Red Hat Ceph Storage 4.3 OSD", "product_id": "8Base-RHCEPH-4.3-OSD:ceph-mon-debuginfo-2:14.2.22-110.el8cp.ppc64le" }, "product_reference": "ceph-mon-debuginfo-2:14.2.22-110.el8cp.ppc64le", "relates_to_product_reference": "8Base-RHCEPH-4.3-OSD" }, { "category": "default_component_of", "full_product_name": { "name": "ceph-mon-debuginfo-2:14.2.22-110.el8cp.s390x as a component of Red Hat Ceph Storage 4.3 OSD", "product_id": "8Base-RHCEPH-4.3-OSD:ceph-mon-debuginfo-2:14.2.22-110.el8cp.s390x" }, "product_reference": "ceph-mon-debuginfo-2:14.2.22-110.el8cp.s390x", "relates_to_product_reference": "8Base-RHCEPH-4.3-OSD" }, { "category": "default_component_of", "full_product_name": { "name": "ceph-mon-debuginfo-2:14.2.22-110.el8cp.x86_64 as a component of Red Hat Ceph Storage 4.3 OSD", "product_id": "8Base-RHCEPH-4.3-OSD:ceph-mon-debuginfo-2:14.2.22-110.el8cp.x86_64" }, "product_reference": "ceph-mon-debuginfo-2:14.2.22-110.el8cp.x86_64", "relates_to_product_reference": "8Base-RHCEPH-4.3-OSD" }, { "category": "default_component_of", "full_product_name": { "name": "ceph-osd-2:14.2.22-110.el8cp.ppc64le as a component of Red Hat Ceph Storage 4.3 OSD", "product_id": "8Base-RHCEPH-4.3-OSD:ceph-osd-2:14.2.22-110.el8cp.ppc64le" }, "product_reference": "ceph-osd-2:14.2.22-110.el8cp.ppc64le", "relates_to_product_reference": "8Base-RHCEPH-4.3-OSD" }, { "category": "default_component_of", "full_product_name": { "name": "ceph-osd-2:14.2.22-110.el8cp.s390x as a component of Red Hat Ceph Storage 4.3 OSD", "product_id": "8Base-RHCEPH-4.3-OSD:ceph-osd-2:14.2.22-110.el8cp.s390x" }, "product_reference": "ceph-osd-2:14.2.22-110.el8cp.s390x", "relates_to_product_reference": "8Base-RHCEPH-4.3-OSD" }, { "category": "default_component_of", "full_product_name": { "name": "ceph-osd-2:14.2.22-110.el8cp.x86_64 as a component of Red Hat Ceph Storage 4.3 OSD", "product_id": "8Base-RHCEPH-4.3-OSD:ceph-osd-2:14.2.22-110.el8cp.x86_64" }, "product_reference": "ceph-osd-2:14.2.22-110.el8cp.x86_64", "relates_to_product_reference": "8Base-RHCEPH-4.3-OSD" }, { "category": "default_component_of", "full_product_name": { "name": "ceph-osd-debuginfo-2:14.2.22-110.el8cp.ppc64le as a component of Red Hat Ceph Storage 4.3 OSD", "product_id": "8Base-RHCEPH-4.3-OSD:ceph-osd-debuginfo-2:14.2.22-110.el8cp.ppc64le" }, "product_reference": "ceph-osd-debuginfo-2:14.2.22-110.el8cp.ppc64le", "relates_to_product_reference": "8Base-RHCEPH-4.3-OSD" }, { "category": "default_component_of", "full_product_name": { "name": "ceph-osd-debuginfo-2:14.2.22-110.el8cp.s390x as a component of Red Hat Ceph Storage 4.3 OSD", "product_id": "8Base-RHCEPH-4.3-OSD:ceph-osd-debuginfo-2:14.2.22-110.el8cp.s390x" }, "product_reference": "ceph-osd-debuginfo-2:14.2.22-110.el8cp.s390x", "relates_to_product_reference": "8Base-RHCEPH-4.3-OSD" }, { "category": "default_component_of", "full_product_name": { "name": "ceph-osd-debuginfo-2:14.2.22-110.el8cp.x86_64 as a component of Red Hat Ceph Storage 4.3 OSD", "product_id": "8Base-RHCEPH-4.3-OSD:ceph-osd-debuginfo-2:14.2.22-110.el8cp.x86_64" }, "product_reference": "ceph-osd-debuginfo-2:14.2.22-110.el8cp.x86_64", "relates_to_product_reference": "8Base-RHCEPH-4.3-OSD" }, { "category": "default_component_of", "full_product_name": { "name": "ceph-radosgw-2:14.2.22-110.el8cp.ppc64le as a component of Red Hat Ceph Storage 4.3 OSD", "product_id": "8Base-RHCEPH-4.3-OSD:ceph-radosgw-2:14.2.22-110.el8cp.ppc64le" }, "product_reference": "ceph-radosgw-2:14.2.22-110.el8cp.ppc64le", "relates_to_product_reference": "8Base-RHCEPH-4.3-OSD" }, { "category": "default_component_of", "full_product_name": { "name": "ceph-radosgw-2:14.2.22-110.el8cp.s390x as a component of Red Hat Ceph Storage 4.3 OSD", "product_id": "8Base-RHCEPH-4.3-OSD:ceph-radosgw-2:14.2.22-110.el8cp.s390x" }, "product_reference": "ceph-radosgw-2:14.2.22-110.el8cp.s390x", "relates_to_product_reference": "8Base-RHCEPH-4.3-OSD" }, { "category": "default_component_of", "full_product_name": { "name": "ceph-radosgw-2:14.2.22-110.el8cp.x86_64 as a component of Red Hat Ceph Storage 4.3 OSD", "product_id": "8Base-RHCEPH-4.3-OSD:ceph-radosgw-2:14.2.22-110.el8cp.x86_64" }, "product_reference": "ceph-radosgw-2:14.2.22-110.el8cp.x86_64", "relates_to_product_reference": "8Base-RHCEPH-4.3-OSD" }, { "category": "default_component_of", "full_product_name": { "name": "ceph-radosgw-debuginfo-2:14.2.22-110.el8cp.ppc64le as a component of Red Hat Ceph Storage 4.3 OSD", "product_id": "8Base-RHCEPH-4.3-OSD:ceph-radosgw-debuginfo-2:14.2.22-110.el8cp.ppc64le" }, "product_reference": "ceph-radosgw-debuginfo-2:14.2.22-110.el8cp.ppc64le", "relates_to_product_reference": "8Base-RHCEPH-4.3-OSD" }, { "category": "default_component_of", "full_product_name": { "name": "ceph-radosgw-debuginfo-2:14.2.22-110.el8cp.s390x as a component of Red Hat Ceph Storage 4.3 OSD", "product_id": "8Base-RHCEPH-4.3-OSD:ceph-radosgw-debuginfo-2:14.2.22-110.el8cp.s390x" }, "product_reference": "ceph-radosgw-debuginfo-2:14.2.22-110.el8cp.s390x", "relates_to_product_reference": "8Base-RHCEPH-4.3-OSD" }, { "category": "default_component_of", "full_product_name": { "name": "ceph-radosgw-debuginfo-2:14.2.22-110.el8cp.x86_64 as a component of Red Hat Ceph Storage 4.3 OSD", "product_id": "8Base-RHCEPH-4.3-OSD:ceph-radosgw-debuginfo-2:14.2.22-110.el8cp.x86_64" }, "product_reference": "ceph-radosgw-debuginfo-2:14.2.22-110.el8cp.x86_64", "relates_to_product_reference": "8Base-RHCEPH-4.3-OSD" }, { "category": "default_component_of", "full_product_name": { "name": "ceph-selinux-2:14.2.22-110.el8cp.ppc64le as a component of Red Hat Ceph Storage 4.3 OSD", "product_id": "8Base-RHCEPH-4.3-OSD:ceph-selinux-2:14.2.22-110.el8cp.ppc64le" }, "product_reference": "ceph-selinux-2:14.2.22-110.el8cp.ppc64le", "relates_to_product_reference": "8Base-RHCEPH-4.3-OSD" }, { "category": "default_component_of", "full_product_name": { "name": "ceph-selinux-2:14.2.22-110.el8cp.s390x as a component of Red Hat Ceph Storage 4.3 OSD", "product_id": "8Base-RHCEPH-4.3-OSD:ceph-selinux-2:14.2.22-110.el8cp.s390x" }, "product_reference": "ceph-selinux-2:14.2.22-110.el8cp.s390x", "relates_to_product_reference": "8Base-RHCEPH-4.3-OSD" }, { "category": "default_component_of", "full_product_name": { "name": "ceph-selinux-2:14.2.22-110.el8cp.x86_64 as a component of Red Hat Ceph Storage 4.3 OSD", "product_id": "8Base-RHCEPH-4.3-OSD:ceph-selinux-2:14.2.22-110.el8cp.x86_64" }, "product_reference": "ceph-selinux-2:14.2.22-110.el8cp.x86_64", "relates_to_product_reference": "8Base-RHCEPH-4.3-OSD" }, { "category": "default_component_of", "full_product_name": { "name": "ceph-test-2:14.2.22-110.el8cp.ppc64le as a component of Red Hat Ceph Storage 4.3 OSD", "product_id": "8Base-RHCEPH-4.3-OSD:ceph-test-2:14.2.22-110.el8cp.ppc64le" }, "product_reference": "ceph-test-2:14.2.22-110.el8cp.ppc64le", "relates_to_product_reference": "8Base-RHCEPH-4.3-OSD" }, { "category": "default_component_of", "full_product_name": { "name": "ceph-test-2:14.2.22-110.el8cp.s390x as a component of Red Hat Ceph Storage 4.3 OSD", "product_id": "8Base-RHCEPH-4.3-OSD:ceph-test-2:14.2.22-110.el8cp.s390x" }, "product_reference": "ceph-test-2:14.2.22-110.el8cp.s390x", "relates_to_product_reference": "8Base-RHCEPH-4.3-OSD" }, { "category": "default_component_of", "full_product_name": { "name": "ceph-test-2:14.2.22-110.el8cp.x86_64 as a component of Red Hat Ceph Storage 4.3 OSD", "product_id": "8Base-RHCEPH-4.3-OSD:ceph-test-2:14.2.22-110.el8cp.x86_64" }, "product_reference": "ceph-test-2:14.2.22-110.el8cp.x86_64", "relates_to_product_reference": "8Base-RHCEPH-4.3-OSD" }, { "category": "default_component_of", "full_product_name": { "name": "ceph-test-debuginfo-2:14.2.22-110.el8cp.ppc64le as a component of Red Hat Ceph Storage 4.3 OSD", "product_id": "8Base-RHCEPH-4.3-OSD:ceph-test-debuginfo-2:14.2.22-110.el8cp.ppc64le" }, "product_reference": "ceph-test-debuginfo-2:14.2.22-110.el8cp.ppc64le", "relates_to_product_reference": "8Base-RHCEPH-4.3-OSD" }, { "category": "default_component_of", "full_product_name": { "name": "ceph-test-debuginfo-2:14.2.22-110.el8cp.s390x as a component of Red Hat Ceph Storage 4.3 OSD", "product_id": "8Base-RHCEPH-4.3-OSD:ceph-test-debuginfo-2:14.2.22-110.el8cp.s390x" }, "product_reference": "ceph-test-debuginfo-2:14.2.22-110.el8cp.s390x", "relates_to_product_reference": "8Base-RHCEPH-4.3-OSD" }, { "category": "default_component_of", "full_product_name": { "name": "ceph-test-debuginfo-2:14.2.22-110.el8cp.x86_64 as a component of Red Hat Ceph Storage 4.3 OSD", "product_id": "8Base-RHCEPH-4.3-OSD:ceph-test-debuginfo-2:14.2.22-110.el8cp.x86_64" }, "product_reference": "ceph-test-debuginfo-2:14.2.22-110.el8cp.x86_64", "relates_to_product_reference": "8Base-RHCEPH-4.3-OSD" }, { "category": "default_component_of", "full_product_name": { "name": "libcephfs-devel-2:14.2.22-110.el8cp.ppc64le as a component of Red Hat Ceph Storage 4.3 OSD", "product_id": "8Base-RHCEPH-4.3-OSD:libcephfs-devel-2:14.2.22-110.el8cp.ppc64le" }, "product_reference": "libcephfs-devel-2:14.2.22-110.el8cp.ppc64le", "relates_to_product_reference": "8Base-RHCEPH-4.3-OSD" }, { "category": "default_component_of", "full_product_name": { "name": "libcephfs-devel-2:14.2.22-110.el8cp.s390x as a component of Red Hat Ceph Storage 4.3 OSD", "product_id": "8Base-RHCEPH-4.3-OSD:libcephfs-devel-2:14.2.22-110.el8cp.s390x" }, "product_reference": "libcephfs-devel-2:14.2.22-110.el8cp.s390x", "relates_to_product_reference": "8Base-RHCEPH-4.3-OSD" }, { "category": "default_component_of", "full_product_name": { "name": "libcephfs-devel-2:14.2.22-110.el8cp.x86_64 as a component of Red Hat Ceph Storage 4.3 OSD", "product_id": "8Base-RHCEPH-4.3-OSD:libcephfs-devel-2:14.2.22-110.el8cp.x86_64" }, "product_reference": "libcephfs-devel-2:14.2.22-110.el8cp.x86_64", "relates_to_product_reference": "8Base-RHCEPH-4.3-OSD" }, { "category": "default_component_of", "full_product_name": { "name": "libcephfs2-2:14.2.22-110.el8cp.ppc64le as a component of Red Hat Ceph Storage 4.3 OSD", "product_id": "8Base-RHCEPH-4.3-OSD:libcephfs2-2:14.2.22-110.el8cp.ppc64le" }, "product_reference": "libcephfs2-2:14.2.22-110.el8cp.ppc64le", "relates_to_product_reference": "8Base-RHCEPH-4.3-OSD" }, { "category": "default_component_of", "full_product_name": { "name": "libcephfs2-2:14.2.22-110.el8cp.s390x as a component of Red Hat Ceph Storage 4.3 OSD", "product_id": "8Base-RHCEPH-4.3-OSD:libcephfs2-2:14.2.22-110.el8cp.s390x" }, "product_reference": "libcephfs2-2:14.2.22-110.el8cp.s390x", "relates_to_product_reference": "8Base-RHCEPH-4.3-OSD" }, { "category": "default_component_of", "full_product_name": { "name": "libcephfs2-2:14.2.22-110.el8cp.x86_64 as a component of Red Hat Ceph Storage 4.3 OSD", "product_id": "8Base-RHCEPH-4.3-OSD:libcephfs2-2:14.2.22-110.el8cp.x86_64" }, "product_reference": "libcephfs2-2:14.2.22-110.el8cp.x86_64", "relates_to_product_reference": "8Base-RHCEPH-4.3-OSD" }, { "category": "default_component_of", "full_product_name": { "name": "libcephfs2-debuginfo-2:14.2.22-110.el8cp.ppc64le as a component of Red Hat Ceph Storage 4.3 OSD", "product_id": "8Base-RHCEPH-4.3-OSD:libcephfs2-debuginfo-2:14.2.22-110.el8cp.ppc64le" }, "product_reference": "libcephfs2-debuginfo-2:14.2.22-110.el8cp.ppc64le", "relates_to_product_reference": "8Base-RHCEPH-4.3-OSD" }, { "category": "default_component_of", "full_product_name": { "name": "libcephfs2-debuginfo-2:14.2.22-110.el8cp.s390x as a component of Red Hat Ceph Storage 4.3 OSD", "product_id": "8Base-RHCEPH-4.3-OSD:libcephfs2-debuginfo-2:14.2.22-110.el8cp.s390x" }, "product_reference": "libcephfs2-debuginfo-2:14.2.22-110.el8cp.s390x", "relates_to_product_reference": "8Base-RHCEPH-4.3-OSD" }, { "category": "default_component_of", "full_product_name": { "name": "libcephfs2-debuginfo-2:14.2.22-110.el8cp.x86_64 as a component of Red Hat Ceph Storage 4.3 OSD", "product_id": "8Base-RHCEPH-4.3-OSD:libcephfs2-debuginfo-2:14.2.22-110.el8cp.x86_64" }, "product_reference": "libcephfs2-debuginfo-2:14.2.22-110.el8cp.x86_64", "relates_to_product_reference": "8Base-RHCEPH-4.3-OSD" }, { "category": "default_component_of", "full_product_name": { "name": "librados-devel-2:14.2.22-110.el8cp.ppc64le as a component of Red Hat Ceph Storage 4.3 OSD", "product_id": "8Base-RHCEPH-4.3-OSD:librados-devel-2:14.2.22-110.el8cp.ppc64le" }, "product_reference": "librados-devel-2:14.2.22-110.el8cp.ppc64le", "relates_to_product_reference": "8Base-RHCEPH-4.3-OSD" }, { "category": "default_component_of", "full_product_name": { "name": "librados-devel-2:14.2.22-110.el8cp.s390x as a component of Red Hat Ceph Storage 4.3 OSD", "product_id": "8Base-RHCEPH-4.3-OSD:librados-devel-2:14.2.22-110.el8cp.s390x" }, "product_reference": "librados-devel-2:14.2.22-110.el8cp.s390x", "relates_to_product_reference": "8Base-RHCEPH-4.3-OSD" }, { "category": "default_component_of", "full_product_name": { "name": "librados-devel-2:14.2.22-110.el8cp.x86_64 as a component of Red Hat Ceph Storage 4.3 OSD", "product_id": "8Base-RHCEPH-4.3-OSD:librados-devel-2:14.2.22-110.el8cp.x86_64" }, "product_reference": "librados-devel-2:14.2.22-110.el8cp.x86_64", "relates_to_product_reference": "8Base-RHCEPH-4.3-OSD" }, { "category": "default_component_of", "full_product_name": { "name": "librados-devel-debuginfo-2:14.2.22-110.el8cp.ppc64le as a component of Red Hat Ceph Storage 4.3 OSD", "product_id": "8Base-RHCEPH-4.3-OSD:librados-devel-debuginfo-2:14.2.22-110.el8cp.ppc64le" }, "product_reference": "librados-devel-debuginfo-2:14.2.22-110.el8cp.ppc64le", "relates_to_product_reference": "8Base-RHCEPH-4.3-OSD" }, { "category": "default_component_of", "full_product_name": { "name": "librados-devel-debuginfo-2:14.2.22-110.el8cp.s390x as a component of Red Hat Ceph Storage 4.3 OSD", "product_id": "8Base-RHCEPH-4.3-OSD:librados-devel-debuginfo-2:14.2.22-110.el8cp.s390x" }, "product_reference": "librados-devel-debuginfo-2:14.2.22-110.el8cp.s390x", "relates_to_product_reference": "8Base-RHCEPH-4.3-OSD" }, { "category": "default_component_of", "full_product_name": { "name": "librados-devel-debuginfo-2:14.2.22-110.el8cp.x86_64 as a component of Red Hat Ceph Storage 4.3 OSD", "product_id": "8Base-RHCEPH-4.3-OSD:librados-devel-debuginfo-2:14.2.22-110.el8cp.x86_64" }, "product_reference": "librados-devel-debuginfo-2:14.2.22-110.el8cp.x86_64", "relates_to_product_reference": "8Base-RHCEPH-4.3-OSD" }, { "category": "default_component_of", "full_product_name": { "name": "librados2-2:14.2.22-110.el8cp.ppc64le as a component of Red Hat Ceph Storage 4.3 OSD", "product_id": "8Base-RHCEPH-4.3-OSD:librados2-2:14.2.22-110.el8cp.ppc64le" }, "product_reference": "librados2-2:14.2.22-110.el8cp.ppc64le", "relates_to_product_reference": "8Base-RHCEPH-4.3-OSD" }, { "category": "default_component_of", "full_product_name": { "name": "librados2-2:14.2.22-110.el8cp.s390x as a component of Red Hat Ceph Storage 4.3 OSD", "product_id": "8Base-RHCEPH-4.3-OSD:librados2-2:14.2.22-110.el8cp.s390x" }, "product_reference": "librados2-2:14.2.22-110.el8cp.s390x", "relates_to_product_reference": "8Base-RHCEPH-4.3-OSD" }, { "category": "default_component_of", "full_product_name": { "name": "librados2-2:14.2.22-110.el8cp.x86_64 as a component of Red Hat Ceph Storage 4.3 OSD", "product_id": "8Base-RHCEPH-4.3-OSD:librados2-2:14.2.22-110.el8cp.x86_64" }, "product_reference": "librados2-2:14.2.22-110.el8cp.x86_64", "relates_to_product_reference": "8Base-RHCEPH-4.3-OSD" }, { "category": "default_component_of", "full_product_name": { "name": "librados2-debuginfo-2:14.2.22-110.el8cp.ppc64le as a component of Red Hat Ceph Storage 4.3 OSD", "product_id": "8Base-RHCEPH-4.3-OSD:librados2-debuginfo-2:14.2.22-110.el8cp.ppc64le" }, "product_reference": "librados2-debuginfo-2:14.2.22-110.el8cp.ppc64le", "relates_to_product_reference": "8Base-RHCEPH-4.3-OSD" }, { "category": "default_component_of", "full_product_name": { "name": "librados2-debuginfo-2:14.2.22-110.el8cp.s390x as a component of Red Hat Ceph Storage 4.3 OSD", "product_id": "8Base-RHCEPH-4.3-OSD:librados2-debuginfo-2:14.2.22-110.el8cp.s390x" }, "product_reference": "librados2-debuginfo-2:14.2.22-110.el8cp.s390x", "relates_to_product_reference": "8Base-RHCEPH-4.3-OSD" }, { "category": "default_component_of", "full_product_name": { "name": "librados2-debuginfo-2:14.2.22-110.el8cp.x86_64 as a component of Red Hat Ceph Storage 4.3 OSD", "product_id": "8Base-RHCEPH-4.3-OSD:librados2-debuginfo-2:14.2.22-110.el8cp.x86_64" }, "product_reference": "librados2-debuginfo-2:14.2.22-110.el8cp.x86_64", "relates_to_product_reference": "8Base-RHCEPH-4.3-OSD" }, { "category": "default_component_of", "full_product_name": { "name": "libradospp-devel-2:14.2.22-110.el8cp.ppc64le as a component of Red Hat Ceph Storage 4.3 OSD", "product_id": "8Base-RHCEPH-4.3-OSD:libradospp-devel-2:14.2.22-110.el8cp.ppc64le" }, "product_reference": "libradospp-devel-2:14.2.22-110.el8cp.ppc64le", "relates_to_product_reference": "8Base-RHCEPH-4.3-OSD" }, { "category": "default_component_of", "full_product_name": { "name": "libradospp-devel-2:14.2.22-110.el8cp.s390x as a component of Red Hat Ceph Storage 4.3 OSD", "product_id": "8Base-RHCEPH-4.3-OSD:libradospp-devel-2:14.2.22-110.el8cp.s390x" }, "product_reference": "libradospp-devel-2:14.2.22-110.el8cp.s390x", "relates_to_product_reference": "8Base-RHCEPH-4.3-OSD" }, { "category": "default_component_of", "full_product_name": { "name": "libradospp-devel-2:14.2.22-110.el8cp.x86_64 as a component of Red Hat Ceph Storage 4.3 OSD", "product_id": "8Base-RHCEPH-4.3-OSD:libradospp-devel-2:14.2.22-110.el8cp.x86_64" }, "product_reference": "libradospp-devel-2:14.2.22-110.el8cp.x86_64", "relates_to_product_reference": "8Base-RHCEPH-4.3-OSD" }, { "category": "default_component_of", "full_product_name": { "name": "libradosstriper1-2:14.2.22-110.el8cp.ppc64le as a component of Red Hat Ceph Storage 4.3 OSD", "product_id": "8Base-RHCEPH-4.3-OSD:libradosstriper1-2:14.2.22-110.el8cp.ppc64le" }, "product_reference": "libradosstriper1-2:14.2.22-110.el8cp.ppc64le", "relates_to_product_reference": "8Base-RHCEPH-4.3-OSD" }, { "category": "default_component_of", "full_product_name": { "name": "libradosstriper1-2:14.2.22-110.el8cp.s390x as a component of Red Hat Ceph Storage 4.3 OSD", "product_id": "8Base-RHCEPH-4.3-OSD:libradosstriper1-2:14.2.22-110.el8cp.s390x" }, "product_reference": "libradosstriper1-2:14.2.22-110.el8cp.s390x", "relates_to_product_reference": "8Base-RHCEPH-4.3-OSD" }, { "category": "default_component_of", "full_product_name": { "name": "libradosstriper1-2:14.2.22-110.el8cp.x86_64 as a component of Red Hat Ceph Storage 4.3 OSD", "product_id": "8Base-RHCEPH-4.3-OSD:libradosstriper1-2:14.2.22-110.el8cp.x86_64" }, "product_reference": "libradosstriper1-2:14.2.22-110.el8cp.x86_64", "relates_to_product_reference": "8Base-RHCEPH-4.3-OSD" }, { "category": "default_component_of", "full_product_name": { "name": "libradosstriper1-debuginfo-2:14.2.22-110.el8cp.ppc64le as a component of Red Hat Ceph Storage 4.3 OSD", "product_id": "8Base-RHCEPH-4.3-OSD:libradosstriper1-debuginfo-2:14.2.22-110.el8cp.ppc64le" }, "product_reference": "libradosstriper1-debuginfo-2:14.2.22-110.el8cp.ppc64le", "relates_to_product_reference": "8Base-RHCEPH-4.3-OSD" }, { "category": "default_component_of", "full_product_name": { "name": "libradosstriper1-debuginfo-2:14.2.22-110.el8cp.s390x as a component of Red Hat Ceph Storage 4.3 OSD", "product_id": "8Base-RHCEPH-4.3-OSD:libradosstriper1-debuginfo-2:14.2.22-110.el8cp.s390x" }, "product_reference": "libradosstriper1-debuginfo-2:14.2.22-110.el8cp.s390x", "relates_to_product_reference": "8Base-RHCEPH-4.3-OSD" }, { "category": "default_component_of", "full_product_name": { "name": "libradosstriper1-debuginfo-2:14.2.22-110.el8cp.x86_64 as a component of Red Hat Ceph Storage 4.3 OSD", "product_id": "8Base-RHCEPH-4.3-OSD:libradosstriper1-debuginfo-2:14.2.22-110.el8cp.x86_64" }, "product_reference": "libradosstriper1-debuginfo-2:14.2.22-110.el8cp.x86_64", "relates_to_product_reference": "8Base-RHCEPH-4.3-OSD" }, { "category": "default_component_of", "full_product_name": { "name": "librbd-devel-2:14.2.22-110.el8cp.ppc64le as a component of Red Hat Ceph Storage 4.3 OSD", "product_id": "8Base-RHCEPH-4.3-OSD:librbd-devel-2:14.2.22-110.el8cp.ppc64le" }, "product_reference": "librbd-devel-2:14.2.22-110.el8cp.ppc64le", "relates_to_product_reference": "8Base-RHCEPH-4.3-OSD" }, { "category": "default_component_of", "full_product_name": { "name": "librbd-devel-2:14.2.22-110.el8cp.s390x as a component of Red Hat Ceph Storage 4.3 OSD", "product_id": "8Base-RHCEPH-4.3-OSD:librbd-devel-2:14.2.22-110.el8cp.s390x" }, "product_reference": "librbd-devel-2:14.2.22-110.el8cp.s390x", "relates_to_product_reference": "8Base-RHCEPH-4.3-OSD" }, { "category": "default_component_of", "full_product_name": { "name": "librbd-devel-2:14.2.22-110.el8cp.x86_64 as a component of Red Hat Ceph Storage 4.3 OSD", "product_id": "8Base-RHCEPH-4.3-OSD:librbd-devel-2:14.2.22-110.el8cp.x86_64" }, "product_reference": "librbd-devel-2:14.2.22-110.el8cp.x86_64", "relates_to_product_reference": "8Base-RHCEPH-4.3-OSD" }, { "category": "default_component_of", "full_product_name": { "name": "librbd1-2:14.2.22-110.el8cp.ppc64le as a component of Red Hat Ceph Storage 4.3 OSD", "product_id": "8Base-RHCEPH-4.3-OSD:librbd1-2:14.2.22-110.el8cp.ppc64le" }, "product_reference": "librbd1-2:14.2.22-110.el8cp.ppc64le", "relates_to_product_reference": "8Base-RHCEPH-4.3-OSD" }, { "category": "default_component_of", "full_product_name": { "name": "librbd1-2:14.2.22-110.el8cp.s390x as a component of Red Hat Ceph Storage 4.3 OSD", "product_id": "8Base-RHCEPH-4.3-OSD:librbd1-2:14.2.22-110.el8cp.s390x" }, "product_reference": "librbd1-2:14.2.22-110.el8cp.s390x", "relates_to_product_reference": "8Base-RHCEPH-4.3-OSD" }, { "category": "default_component_of", "full_product_name": { "name": "librbd1-2:14.2.22-110.el8cp.x86_64 as a component of Red Hat Ceph Storage 4.3 OSD", "product_id": "8Base-RHCEPH-4.3-OSD:librbd1-2:14.2.22-110.el8cp.x86_64" }, "product_reference": "librbd1-2:14.2.22-110.el8cp.x86_64", "relates_to_product_reference": "8Base-RHCEPH-4.3-OSD" }, { "category": "default_component_of", "full_product_name": { "name": "librbd1-debuginfo-2:14.2.22-110.el8cp.ppc64le as a component of Red Hat Ceph Storage 4.3 OSD", "product_id": "8Base-RHCEPH-4.3-OSD:librbd1-debuginfo-2:14.2.22-110.el8cp.ppc64le" }, "product_reference": "librbd1-debuginfo-2:14.2.22-110.el8cp.ppc64le", "relates_to_product_reference": "8Base-RHCEPH-4.3-OSD" }, { "category": "default_component_of", "full_product_name": { "name": "librbd1-debuginfo-2:14.2.22-110.el8cp.s390x as a component of Red Hat Ceph Storage 4.3 OSD", "product_id": "8Base-RHCEPH-4.3-OSD:librbd1-debuginfo-2:14.2.22-110.el8cp.s390x" }, "product_reference": "librbd1-debuginfo-2:14.2.22-110.el8cp.s390x", "relates_to_product_reference": "8Base-RHCEPH-4.3-OSD" }, { "category": "default_component_of", "full_product_name": { "name": "librbd1-debuginfo-2:14.2.22-110.el8cp.x86_64 as a component of Red Hat Ceph Storage 4.3 OSD", "product_id": "8Base-RHCEPH-4.3-OSD:librbd1-debuginfo-2:14.2.22-110.el8cp.x86_64" }, "product_reference": "librbd1-debuginfo-2:14.2.22-110.el8cp.x86_64", "relates_to_product_reference": "8Base-RHCEPH-4.3-OSD" }, { "category": "default_component_of", "full_product_name": { "name": "librgw-devel-2:14.2.22-110.el8cp.ppc64le as a component of Red Hat Ceph Storage 4.3 OSD", "product_id": "8Base-RHCEPH-4.3-OSD:librgw-devel-2:14.2.22-110.el8cp.ppc64le" }, "product_reference": "librgw-devel-2:14.2.22-110.el8cp.ppc64le", "relates_to_product_reference": "8Base-RHCEPH-4.3-OSD" }, { "category": "default_component_of", "full_product_name": { "name": "librgw-devel-2:14.2.22-110.el8cp.s390x as a component of Red Hat Ceph Storage 4.3 OSD", "product_id": "8Base-RHCEPH-4.3-OSD:librgw-devel-2:14.2.22-110.el8cp.s390x" }, "product_reference": "librgw-devel-2:14.2.22-110.el8cp.s390x", "relates_to_product_reference": "8Base-RHCEPH-4.3-OSD" }, { "category": "default_component_of", "full_product_name": { "name": "librgw-devel-2:14.2.22-110.el8cp.x86_64 as a component of Red Hat Ceph Storage 4.3 OSD", "product_id": "8Base-RHCEPH-4.3-OSD:librgw-devel-2:14.2.22-110.el8cp.x86_64" }, "product_reference": "librgw-devel-2:14.2.22-110.el8cp.x86_64", "relates_to_product_reference": "8Base-RHCEPH-4.3-OSD" }, { "category": "default_component_of", "full_product_name": { "name": "librgw2-2:14.2.22-110.el8cp.ppc64le as a component of Red Hat Ceph Storage 4.3 OSD", "product_id": "8Base-RHCEPH-4.3-OSD:librgw2-2:14.2.22-110.el8cp.ppc64le" }, "product_reference": "librgw2-2:14.2.22-110.el8cp.ppc64le", "relates_to_product_reference": "8Base-RHCEPH-4.3-OSD" }, { "category": "default_component_of", "full_product_name": { "name": "librgw2-2:14.2.22-110.el8cp.s390x as a component of Red Hat Ceph Storage 4.3 OSD", "product_id": "8Base-RHCEPH-4.3-OSD:librgw2-2:14.2.22-110.el8cp.s390x" }, "product_reference": "librgw2-2:14.2.22-110.el8cp.s390x", "relates_to_product_reference": "8Base-RHCEPH-4.3-OSD" }, { "category": "default_component_of", "full_product_name": { "name": "librgw2-2:14.2.22-110.el8cp.x86_64 as a component of Red Hat Ceph Storage 4.3 OSD", "product_id": "8Base-RHCEPH-4.3-OSD:librgw2-2:14.2.22-110.el8cp.x86_64" }, "product_reference": "librgw2-2:14.2.22-110.el8cp.x86_64", "relates_to_product_reference": "8Base-RHCEPH-4.3-OSD" }, { "category": "default_component_of", "full_product_name": { "name": "librgw2-debuginfo-2:14.2.22-110.el8cp.ppc64le as a component of Red Hat Ceph Storage 4.3 OSD", "product_id": "8Base-RHCEPH-4.3-OSD:librgw2-debuginfo-2:14.2.22-110.el8cp.ppc64le" }, "product_reference": "librgw2-debuginfo-2:14.2.22-110.el8cp.ppc64le", "relates_to_product_reference": "8Base-RHCEPH-4.3-OSD" }, { "category": "default_component_of", "full_product_name": { "name": "librgw2-debuginfo-2:14.2.22-110.el8cp.s390x as a component of Red Hat Ceph Storage 4.3 OSD", "product_id": "8Base-RHCEPH-4.3-OSD:librgw2-debuginfo-2:14.2.22-110.el8cp.s390x" }, "product_reference": "librgw2-debuginfo-2:14.2.22-110.el8cp.s390x", "relates_to_product_reference": "8Base-RHCEPH-4.3-OSD" }, { "category": "default_component_of", "full_product_name": { "name": "librgw2-debuginfo-2:14.2.22-110.el8cp.x86_64 as a component of Red Hat Ceph Storage 4.3 OSD", "product_id": "8Base-RHCEPH-4.3-OSD:librgw2-debuginfo-2:14.2.22-110.el8cp.x86_64" }, "product_reference": "librgw2-debuginfo-2:14.2.22-110.el8cp.x86_64", "relates_to_product_reference": "8Base-RHCEPH-4.3-OSD" }, { "category": "default_component_of", "full_product_name": { "name": "python3-ceph-argparse-2:14.2.22-110.el8cp.ppc64le as a component of Red Hat Ceph Storage 4.3 OSD", "product_id": "8Base-RHCEPH-4.3-OSD:python3-ceph-argparse-2:14.2.22-110.el8cp.ppc64le" }, "product_reference": "python3-ceph-argparse-2:14.2.22-110.el8cp.ppc64le", "relates_to_product_reference": "8Base-RHCEPH-4.3-OSD" }, { "category": "default_component_of", "full_product_name": { "name": "python3-ceph-argparse-2:14.2.22-110.el8cp.s390x as a component of Red Hat Ceph Storage 4.3 OSD", "product_id": "8Base-RHCEPH-4.3-OSD:python3-ceph-argparse-2:14.2.22-110.el8cp.s390x" }, "product_reference": "python3-ceph-argparse-2:14.2.22-110.el8cp.s390x", "relates_to_product_reference": "8Base-RHCEPH-4.3-OSD" }, { "category": "default_component_of", "full_product_name": { "name": "python3-ceph-argparse-2:14.2.22-110.el8cp.x86_64 as a component of Red Hat Ceph Storage 4.3 OSD", "product_id": "8Base-RHCEPH-4.3-OSD:python3-ceph-argparse-2:14.2.22-110.el8cp.x86_64" }, "product_reference": "python3-ceph-argparse-2:14.2.22-110.el8cp.x86_64", "relates_to_product_reference": "8Base-RHCEPH-4.3-OSD" }, { "category": "default_component_of", "full_product_name": { "name": "python3-cephfs-2:14.2.22-110.el8cp.ppc64le as a component of Red Hat Ceph Storage 4.3 OSD", "product_id": "8Base-RHCEPH-4.3-OSD:python3-cephfs-2:14.2.22-110.el8cp.ppc64le" }, "product_reference": "python3-cephfs-2:14.2.22-110.el8cp.ppc64le", "relates_to_product_reference": "8Base-RHCEPH-4.3-OSD" }, { "category": "default_component_of", "full_product_name": { "name": "python3-cephfs-2:14.2.22-110.el8cp.s390x as a component of Red Hat Ceph Storage 4.3 OSD", "product_id": "8Base-RHCEPH-4.3-OSD:python3-cephfs-2:14.2.22-110.el8cp.s390x" }, "product_reference": "python3-cephfs-2:14.2.22-110.el8cp.s390x", "relates_to_product_reference": "8Base-RHCEPH-4.3-OSD" }, { "category": "default_component_of", "full_product_name": { "name": "python3-cephfs-2:14.2.22-110.el8cp.x86_64 as a component of Red Hat Ceph Storage 4.3 OSD", "product_id": "8Base-RHCEPH-4.3-OSD:python3-cephfs-2:14.2.22-110.el8cp.x86_64" }, "product_reference": "python3-cephfs-2:14.2.22-110.el8cp.x86_64", "relates_to_product_reference": "8Base-RHCEPH-4.3-OSD" }, { "category": "default_component_of", "full_product_name": { "name": "python3-cephfs-debuginfo-2:14.2.22-110.el8cp.ppc64le as a component of Red Hat Ceph Storage 4.3 OSD", "product_id": "8Base-RHCEPH-4.3-OSD:python3-cephfs-debuginfo-2:14.2.22-110.el8cp.ppc64le" }, "product_reference": "python3-cephfs-debuginfo-2:14.2.22-110.el8cp.ppc64le", "relates_to_product_reference": "8Base-RHCEPH-4.3-OSD" }, { "category": "default_component_of", "full_product_name": { "name": "python3-cephfs-debuginfo-2:14.2.22-110.el8cp.s390x as a component of Red Hat Ceph Storage 4.3 OSD", "product_id": "8Base-RHCEPH-4.3-OSD:python3-cephfs-debuginfo-2:14.2.22-110.el8cp.s390x" }, "product_reference": "python3-cephfs-debuginfo-2:14.2.22-110.el8cp.s390x", "relates_to_product_reference": "8Base-RHCEPH-4.3-OSD" }, { "category": "default_component_of", "full_product_name": { "name": "python3-cephfs-debuginfo-2:14.2.22-110.el8cp.x86_64 as a component of Red Hat Ceph Storage 4.3 OSD", "product_id": "8Base-RHCEPH-4.3-OSD:python3-cephfs-debuginfo-2:14.2.22-110.el8cp.x86_64" }, "product_reference": "python3-cephfs-debuginfo-2:14.2.22-110.el8cp.x86_64", "relates_to_product_reference": "8Base-RHCEPH-4.3-OSD" }, { "category": "default_component_of", "full_product_name": { "name": "python3-rados-2:14.2.22-110.el8cp.ppc64le as a component of Red Hat Ceph Storage 4.3 OSD", "product_id": "8Base-RHCEPH-4.3-OSD:python3-rados-2:14.2.22-110.el8cp.ppc64le" }, "product_reference": "python3-rados-2:14.2.22-110.el8cp.ppc64le", "relates_to_product_reference": "8Base-RHCEPH-4.3-OSD" }, { "category": "default_component_of", "full_product_name": { "name": "python3-rados-2:14.2.22-110.el8cp.s390x as a component of Red Hat Ceph Storage 4.3 OSD", "product_id": "8Base-RHCEPH-4.3-OSD:python3-rados-2:14.2.22-110.el8cp.s390x" }, "product_reference": "python3-rados-2:14.2.22-110.el8cp.s390x", "relates_to_product_reference": "8Base-RHCEPH-4.3-OSD" }, { "category": "default_component_of", "full_product_name": { "name": "python3-rados-2:14.2.22-110.el8cp.x86_64 as a component of Red Hat Ceph Storage 4.3 OSD", "product_id": "8Base-RHCEPH-4.3-OSD:python3-rados-2:14.2.22-110.el8cp.x86_64" }, "product_reference": "python3-rados-2:14.2.22-110.el8cp.x86_64", "relates_to_product_reference": "8Base-RHCEPH-4.3-OSD" }, { "category": "default_component_of", "full_product_name": { "name": "python3-rados-debuginfo-2:14.2.22-110.el8cp.ppc64le as a component of Red Hat Ceph Storage 4.3 OSD", "product_id": "8Base-RHCEPH-4.3-OSD:python3-rados-debuginfo-2:14.2.22-110.el8cp.ppc64le" }, "product_reference": "python3-rados-debuginfo-2:14.2.22-110.el8cp.ppc64le", "relates_to_product_reference": "8Base-RHCEPH-4.3-OSD" }, { "category": "default_component_of", "full_product_name": { "name": "python3-rados-debuginfo-2:14.2.22-110.el8cp.s390x as a component of Red Hat Ceph Storage 4.3 OSD", "product_id": "8Base-RHCEPH-4.3-OSD:python3-rados-debuginfo-2:14.2.22-110.el8cp.s390x" }, "product_reference": "python3-rados-debuginfo-2:14.2.22-110.el8cp.s390x", "relates_to_product_reference": "8Base-RHCEPH-4.3-OSD" }, { "category": "default_component_of", "full_product_name": { "name": "python3-rados-debuginfo-2:14.2.22-110.el8cp.x86_64 as a component of Red Hat Ceph Storage 4.3 OSD", "product_id": "8Base-RHCEPH-4.3-OSD:python3-rados-debuginfo-2:14.2.22-110.el8cp.x86_64" }, "product_reference": "python3-rados-debuginfo-2:14.2.22-110.el8cp.x86_64", "relates_to_product_reference": "8Base-RHCEPH-4.3-OSD" }, { "category": "default_component_of", "full_product_name": { "name": "python3-rbd-2:14.2.22-110.el8cp.ppc64le as a component of Red Hat Ceph Storage 4.3 OSD", "product_id": "8Base-RHCEPH-4.3-OSD:python3-rbd-2:14.2.22-110.el8cp.ppc64le" }, "product_reference": "python3-rbd-2:14.2.22-110.el8cp.ppc64le", "relates_to_product_reference": "8Base-RHCEPH-4.3-OSD" }, { "category": "default_component_of", "full_product_name": { "name": "python3-rbd-2:14.2.22-110.el8cp.s390x as a component of Red Hat Ceph Storage 4.3 OSD", "product_id": "8Base-RHCEPH-4.3-OSD:python3-rbd-2:14.2.22-110.el8cp.s390x" }, "product_reference": "python3-rbd-2:14.2.22-110.el8cp.s390x", "relates_to_product_reference": "8Base-RHCEPH-4.3-OSD" }, { "category": "default_component_of", "full_product_name": { "name": "python3-rbd-2:14.2.22-110.el8cp.x86_64 as a component of Red Hat Ceph Storage 4.3 OSD", "product_id": "8Base-RHCEPH-4.3-OSD:python3-rbd-2:14.2.22-110.el8cp.x86_64" }, "product_reference": "python3-rbd-2:14.2.22-110.el8cp.x86_64", "relates_to_product_reference": "8Base-RHCEPH-4.3-OSD" }, { "category": "default_component_of", "full_product_name": { "name": "python3-rbd-debuginfo-2:14.2.22-110.el8cp.ppc64le as a component of Red Hat Ceph Storage 4.3 OSD", "product_id": "8Base-RHCEPH-4.3-OSD:python3-rbd-debuginfo-2:14.2.22-110.el8cp.ppc64le" }, "product_reference": "python3-rbd-debuginfo-2:14.2.22-110.el8cp.ppc64le", "relates_to_product_reference": "8Base-RHCEPH-4.3-OSD" }, { "category": "default_component_of", "full_product_name": { "name": "python3-rbd-debuginfo-2:14.2.22-110.el8cp.s390x as a component of Red Hat Ceph Storage 4.3 OSD", "product_id": "8Base-RHCEPH-4.3-OSD:python3-rbd-debuginfo-2:14.2.22-110.el8cp.s390x" }, "product_reference": "python3-rbd-debuginfo-2:14.2.22-110.el8cp.s390x", "relates_to_product_reference": "8Base-RHCEPH-4.3-OSD" }, { "category": "default_component_of", "full_product_name": { "name": "python3-rbd-debuginfo-2:14.2.22-110.el8cp.x86_64 as a component of Red Hat Ceph Storage 4.3 OSD", "product_id": "8Base-RHCEPH-4.3-OSD:python3-rbd-debuginfo-2:14.2.22-110.el8cp.x86_64" }, "product_reference": "python3-rbd-debuginfo-2:14.2.22-110.el8cp.x86_64", "relates_to_product_reference": "8Base-RHCEPH-4.3-OSD" }, { "category": "default_component_of", "full_product_name": { "name": "python3-rgw-2:14.2.22-110.el8cp.ppc64le as a component of Red Hat Ceph Storage 4.3 OSD", "product_id": "8Base-RHCEPH-4.3-OSD:python3-rgw-2:14.2.22-110.el8cp.ppc64le" }, "product_reference": "python3-rgw-2:14.2.22-110.el8cp.ppc64le", "relates_to_product_reference": "8Base-RHCEPH-4.3-OSD" }, { "category": "default_component_of", "full_product_name": { "name": "python3-rgw-2:14.2.22-110.el8cp.s390x as a component of Red Hat Ceph Storage 4.3 OSD", "product_id": "8Base-RHCEPH-4.3-OSD:python3-rgw-2:14.2.22-110.el8cp.s390x" }, "product_reference": "python3-rgw-2:14.2.22-110.el8cp.s390x", "relates_to_product_reference": "8Base-RHCEPH-4.3-OSD" }, { "category": "default_component_of", "full_product_name": { "name": "python3-rgw-2:14.2.22-110.el8cp.x86_64 as a component of Red Hat Ceph Storage 4.3 OSD", "product_id": "8Base-RHCEPH-4.3-OSD:python3-rgw-2:14.2.22-110.el8cp.x86_64" }, "product_reference": "python3-rgw-2:14.2.22-110.el8cp.x86_64", "relates_to_product_reference": "8Base-RHCEPH-4.3-OSD" }, { "category": "default_component_of", "full_product_name": { "name": "python3-rgw-debuginfo-2:14.2.22-110.el8cp.ppc64le as a component of Red Hat Ceph Storage 4.3 OSD", "product_id": "8Base-RHCEPH-4.3-OSD:python3-rgw-debuginfo-2:14.2.22-110.el8cp.ppc64le" }, "product_reference": "python3-rgw-debuginfo-2:14.2.22-110.el8cp.ppc64le", "relates_to_product_reference": "8Base-RHCEPH-4.3-OSD" }, { "category": "default_component_of", "full_product_name": { "name": "python3-rgw-debuginfo-2:14.2.22-110.el8cp.s390x as a component of Red Hat Ceph Storage 4.3 OSD", "product_id": "8Base-RHCEPH-4.3-OSD:python3-rgw-debuginfo-2:14.2.22-110.el8cp.s390x" }, "product_reference": "python3-rgw-debuginfo-2:14.2.22-110.el8cp.s390x", "relates_to_product_reference": "8Base-RHCEPH-4.3-OSD" }, { "category": "default_component_of", "full_product_name": { "name": "python3-rgw-debuginfo-2:14.2.22-110.el8cp.x86_64 as a component of Red Hat Ceph Storage 4.3 OSD", "product_id": "8Base-RHCEPH-4.3-OSD:python3-rgw-debuginfo-2:14.2.22-110.el8cp.x86_64" }, "product_reference": "python3-rgw-debuginfo-2:14.2.22-110.el8cp.x86_64", "relates_to_product_reference": "8Base-RHCEPH-4.3-OSD" }, { "category": "default_component_of", "full_product_name": { "name": "rbd-fuse-debuginfo-2:14.2.22-110.el8cp.ppc64le as a component of Red Hat Ceph Storage 4.3 OSD", "product_id": "8Base-RHCEPH-4.3-OSD:rbd-fuse-debuginfo-2:14.2.22-110.el8cp.ppc64le" }, "product_reference": "rbd-fuse-debuginfo-2:14.2.22-110.el8cp.ppc64le", "relates_to_product_reference": "8Base-RHCEPH-4.3-OSD" }, { "category": "default_component_of", "full_product_name": { "name": "rbd-fuse-debuginfo-2:14.2.22-110.el8cp.s390x as a component of Red Hat Ceph Storage 4.3 OSD", "product_id": "8Base-RHCEPH-4.3-OSD:rbd-fuse-debuginfo-2:14.2.22-110.el8cp.s390x" }, "product_reference": "rbd-fuse-debuginfo-2:14.2.22-110.el8cp.s390x", "relates_to_product_reference": "8Base-RHCEPH-4.3-OSD" }, { "category": "default_component_of", "full_product_name": { "name": "rbd-fuse-debuginfo-2:14.2.22-110.el8cp.x86_64 as a component of Red Hat Ceph Storage 4.3 OSD", "product_id": "8Base-RHCEPH-4.3-OSD:rbd-fuse-debuginfo-2:14.2.22-110.el8cp.x86_64" }, "product_reference": "rbd-fuse-debuginfo-2:14.2.22-110.el8cp.x86_64", "relates_to_product_reference": "8Base-RHCEPH-4.3-OSD" }, { "category": "default_component_of", "full_product_name": { "name": "rbd-mirror-2:14.2.22-110.el8cp.ppc64le as a component of Red Hat Ceph Storage 4.3 OSD", "product_id": "8Base-RHCEPH-4.3-OSD:rbd-mirror-2:14.2.22-110.el8cp.ppc64le" }, "product_reference": "rbd-mirror-2:14.2.22-110.el8cp.ppc64le", "relates_to_product_reference": "8Base-RHCEPH-4.3-OSD" }, { "category": "default_component_of", "full_product_name": { "name": "rbd-mirror-2:14.2.22-110.el8cp.s390x as a component of Red Hat Ceph Storage 4.3 OSD", "product_id": "8Base-RHCEPH-4.3-OSD:rbd-mirror-2:14.2.22-110.el8cp.s390x" }, "product_reference": "rbd-mirror-2:14.2.22-110.el8cp.s390x", "relates_to_product_reference": "8Base-RHCEPH-4.3-OSD" }, { "category": "default_component_of", "full_product_name": { "name": "rbd-mirror-2:14.2.22-110.el8cp.x86_64 as a component of Red Hat Ceph Storage 4.3 OSD", "product_id": "8Base-RHCEPH-4.3-OSD:rbd-mirror-2:14.2.22-110.el8cp.x86_64" }, "product_reference": "rbd-mirror-2:14.2.22-110.el8cp.x86_64", "relates_to_product_reference": "8Base-RHCEPH-4.3-OSD" }, { "category": "default_component_of", "full_product_name": { "name": "rbd-mirror-debuginfo-2:14.2.22-110.el8cp.ppc64le as a component of Red Hat Ceph Storage 4.3 OSD", "product_id": "8Base-RHCEPH-4.3-OSD:rbd-mirror-debuginfo-2:14.2.22-110.el8cp.ppc64le" }, "product_reference": "rbd-mirror-debuginfo-2:14.2.22-110.el8cp.ppc64le", "relates_to_product_reference": "8Base-RHCEPH-4.3-OSD" }, { "category": "default_component_of", "full_product_name": { "name": "rbd-mirror-debuginfo-2:14.2.22-110.el8cp.s390x as a component of Red Hat Ceph Storage 4.3 OSD", "product_id": "8Base-RHCEPH-4.3-OSD:rbd-mirror-debuginfo-2:14.2.22-110.el8cp.s390x" }, "product_reference": "rbd-mirror-debuginfo-2:14.2.22-110.el8cp.s390x", "relates_to_product_reference": "8Base-RHCEPH-4.3-OSD" }, { "category": "default_component_of", "full_product_name": { "name": "rbd-mirror-debuginfo-2:14.2.22-110.el8cp.x86_64 as a component of Red Hat Ceph Storage 4.3 OSD", "product_id": "8Base-RHCEPH-4.3-OSD:rbd-mirror-debuginfo-2:14.2.22-110.el8cp.x86_64" }, "product_reference": "rbd-mirror-debuginfo-2:14.2.22-110.el8cp.x86_64", "relates_to_product_reference": "8Base-RHCEPH-4.3-OSD" }, { "category": "default_component_of", "full_product_name": { "name": "rbd-nbd-2:14.2.22-110.el8cp.ppc64le as a component of Red Hat Ceph Storage 4.3 OSD", "product_id": "8Base-RHCEPH-4.3-OSD:rbd-nbd-2:14.2.22-110.el8cp.ppc64le" }, "product_reference": "rbd-nbd-2:14.2.22-110.el8cp.ppc64le", "relates_to_product_reference": "8Base-RHCEPH-4.3-OSD" }, { "category": "default_component_of", "full_product_name": { "name": "rbd-nbd-2:14.2.22-110.el8cp.s390x as a component of Red Hat Ceph Storage 4.3 OSD", "product_id": "8Base-RHCEPH-4.3-OSD:rbd-nbd-2:14.2.22-110.el8cp.s390x" }, "product_reference": "rbd-nbd-2:14.2.22-110.el8cp.s390x", "relates_to_product_reference": "8Base-RHCEPH-4.3-OSD" }, { "category": "default_component_of", "full_product_name": { "name": "rbd-nbd-2:14.2.22-110.el8cp.x86_64 as a component of Red Hat Ceph Storage 4.3 OSD", "product_id": "8Base-RHCEPH-4.3-OSD:rbd-nbd-2:14.2.22-110.el8cp.x86_64" }, "product_reference": "rbd-nbd-2:14.2.22-110.el8cp.x86_64", "relates_to_product_reference": "8Base-RHCEPH-4.3-OSD" }, { "category": "default_component_of", "full_product_name": { "name": "rbd-nbd-debuginfo-2:14.2.22-110.el8cp.ppc64le as a component of Red Hat Ceph Storage 4.3 OSD", "product_id": "8Base-RHCEPH-4.3-OSD:rbd-nbd-debuginfo-2:14.2.22-110.el8cp.ppc64le" }, "product_reference": "rbd-nbd-debuginfo-2:14.2.22-110.el8cp.ppc64le", "relates_to_product_reference": "8Base-RHCEPH-4.3-OSD" }, { "category": "default_component_of", "full_product_name": { "name": "rbd-nbd-debuginfo-2:14.2.22-110.el8cp.s390x as a component of Red Hat Ceph Storage 4.3 OSD", "product_id": "8Base-RHCEPH-4.3-OSD:rbd-nbd-debuginfo-2:14.2.22-110.el8cp.s390x" }, "product_reference": "rbd-nbd-debuginfo-2:14.2.22-110.el8cp.s390x", "relates_to_product_reference": "8Base-RHCEPH-4.3-OSD" }, { "category": "default_component_of", "full_product_name": { "name": "rbd-nbd-debuginfo-2:14.2.22-110.el8cp.x86_64 as a component of Red Hat Ceph Storage 4.3 OSD", "product_id": "8Base-RHCEPH-4.3-OSD:rbd-nbd-debuginfo-2:14.2.22-110.el8cp.x86_64" }, "product_reference": "rbd-nbd-debuginfo-2:14.2.22-110.el8cp.x86_64", "relates_to_product_reference": "8Base-RHCEPH-4.3-OSD" }, { "category": "default_component_of", "full_product_name": { "name": "ceph-2:14.2.22-110.el8cp.src as a component of Red Hat Ceph Storage 4.3 Tools", "product_id": "8Base-RHCEPH-4.3-Tools:ceph-2:14.2.22-110.el8cp.src" }, "product_reference": "ceph-2:14.2.22-110.el8cp.src", "relates_to_product_reference": "8Base-RHCEPH-4.3-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "ceph-ansible-0:4.0.70.3-1.el8cp.noarch as a component of Red Hat Ceph Storage 4.3 Tools", "product_id": "8Base-RHCEPH-4.3-Tools:ceph-ansible-0:4.0.70.3-1.el8cp.noarch" }, "product_reference": "ceph-ansible-0:4.0.70.3-1.el8cp.noarch", "relates_to_product_reference": "8Base-RHCEPH-4.3-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "ceph-ansible-0:4.0.70.3-1.el8cp.src as a component of Red Hat Ceph Storage 4.3 Tools", "product_id": "8Base-RHCEPH-4.3-Tools:ceph-ansible-0:4.0.70.3-1.el8cp.src" }, "product_reference": "ceph-ansible-0:4.0.70.3-1.el8cp.src", "relates_to_product_reference": "8Base-RHCEPH-4.3-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "ceph-base-2:14.2.22-110.el8cp.ppc64le as a component of Red Hat Ceph Storage 4.3 Tools", "product_id": "8Base-RHCEPH-4.3-Tools:ceph-base-2:14.2.22-110.el8cp.ppc64le" }, "product_reference": "ceph-base-2:14.2.22-110.el8cp.ppc64le", "relates_to_product_reference": "8Base-RHCEPH-4.3-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "ceph-base-2:14.2.22-110.el8cp.s390x as a component of Red Hat Ceph Storage 4.3 Tools", "product_id": "8Base-RHCEPH-4.3-Tools:ceph-base-2:14.2.22-110.el8cp.s390x" }, "product_reference": "ceph-base-2:14.2.22-110.el8cp.s390x", "relates_to_product_reference": "8Base-RHCEPH-4.3-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "ceph-base-2:14.2.22-110.el8cp.x86_64 as a component of Red Hat Ceph Storage 4.3 Tools", "product_id": "8Base-RHCEPH-4.3-Tools:ceph-base-2:14.2.22-110.el8cp.x86_64" }, "product_reference": "ceph-base-2:14.2.22-110.el8cp.x86_64", "relates_to_product_reference": "8Base-RHCEPH-4.3-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "ceph-base-debuginfo-2:14.2.22-110.el8cp.ppc64le as a component of Red Hat Ceph Storage 4.3 Tools", "product_id": "8Base-RHCEPH-4.3-Tools:ceph-base-debuginfo-2:14.2.22-110.el8cp.ppc64le" }, "product_reference": "ceph-base-debuginfo-2:14.2.22-110.el8cp.ppc64le", "relates_to_product_reference": "8Base-RHCEPH-4.3-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "ceph-base-debuginfo-2:14.2.22-110.el8cp.s390x as a component of Red Hat Ceph Storage 4.3 Tools", "product_id": "8Base-RHCEPH-4.3-Tools:ceph-base-debuginfo-2:14.2.22-110.el8cp.s390x" }, "product_reference": "ceph-base-debuginfo-2:14.2.22-110.el8cp.s390x", "relates_to_product_reference": "8Base-RHCEPH-4.3-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "ceph-base-debuginfo-2:14.2.22-110.el8cp.x86_64 as a component of Red Hat Ceph Storage 4.3 Tools", "product_id": "8Base-RHCEPH-4.3-Tools:ceph-base-debuginfo-2:14.2.22-110.el8cp.x86_64" }, "product_reference": "ceph-base-debuginfo-2:14.2.22-110.el8cp.x86_64", "relates_to_product_reference": "8Base-RHCEPH-4.3-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "ceph-common-2:14.2.22-110.el8cp.ppc64le as a component of Red Hat Ceph Storage 4.3 Tools", "product_id": "8Base-RHCEPH-4.3-Tools:ceph-common-2:14.2.22-110.el8cp.ppc64le" }, "product_reference": "ceph-common-2:14.2.22-110.el8cp.ppc64le", "relates_to_product_reference": "8Base-RHCEPH-4.3-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "ceph-common-2:14.2.22-110.el8cp.s390x as a component of Red Hat Ceph Storage 4.3 Tools", "product_id": "8Base-RHCEPH-4.3-Tools:ceph-common-2:14.2.22-110.el8cp.s390x" }, "product_reference": "ceph-common-2:14.2.22-110.el8cp.s390x", "relates_to_product_reference": "8Base-RHCEPH-4.3-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "ceph-common-2:14.2.22-110.el8cp.x86_64 as a component of Red Hat Ceph Storage 4.3 Tools", "product_id": "8Base-RHCEPH-4.3-Tools:ceph-common-2:14.2.22-110.el8cp.x86_64" }, "product_reference": "ceph-common-2:14.2.22-110.el8cp.x86_64", "relates_to_product_reference": "8Base-RHCEPH-4.3-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "ceph-common-debuginfo-2:14.2.22-110.el8cp.ppc64le as a component of Red Hat Ceph Storage 4.3 Tools", "product_id": "8Base-RHCEPH-4.3-Tools:ceph-common-debuginfo-2:14.2.22-110.el8cp.ppc64le" }, "product_reference": "ceph-common-debuginfo-2:14.2.22-110.el8cp.ppc64le", "relates_to_product_reference": "8Base-RHCEPH-4.3-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "ceph-common-debuginfo-2:14.2.22-110.el8cp.s390x as a component of Red Hat Ceph Storage 4.3 Tools", "product_id": "8Base-RHCEPH-4.3-Tools:ceph-common-debuginfo-2:14.2.22-110.el8cp.s390x" }, "product_reference": "ceph-common-debuginfo-2:14.2.22-110.el8cp.s390x", "relates_to_product_reference": "8Base-RHCEPH-4.3-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "ceph-common-debuginfo-2:14.2.22-110.el8cp.x86_64 as a component of Red Hat Ceph Storage 4.3 Tools", "product_id": "8Base-RHCEPH-4.3-Tools:ceph-common-debuginfo-2:14.2.22-110.el8cp.x86_64" }, "product_reference": "ceph-common-debuginfo-2:14.2.22-110.el8cp.x86_64", "relates_to_product_reference": "8Base-RHCEPH-4.3-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "ceph-debugsource-2:14.2.22-110.el8cp.ppc64le as a component of Red Hat Ceph Storage 4.3 Tools", "product_id": "8Base-RHCEPH-4.3-Tools:ceph-debugsource-2:14.2.22-110.el8cp.ppc64le" }, "product_reference": "ceph-debugsource-2:14.2.22-110.el8cp.ppc64le", "relates_to_product_reference": "8Base-RHCEPH-4.3-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "ceph-debugsource-2:14.2.22-110.el8cp.s390x as a component of Red Hat Ceph Storage 4.3 Tools", "product_id": "8Base-RHCEPH-4.3-Tools:ceph-debugsource-2:14.2.22-110.el8cp.s390x" }, "product_reference": "ceph-debugsource-2:14.2.22-110.el8cp.s390x", "relates_to_product_reference": "8Base-RHCEPH-4.3-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "ceph-debugsource-2:14.2.22-110.el8cp.x86_64 as a component of Red Hat Ceph Storage 4.3 Tools", "product_id": "8Base-RHCEPH-4.3-Tools:ceph-debugsource-2:14.2.22-110.el8cp.x86_64" }, "product_reference": "ceph-debugsource-2:14.2.22-110.el8cp.x86_64", "relates_to_product_reference": "8Base-RHCEPH-4.3-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "ceph-fuse-2:14.2.22-110.el8cp.ppc64le as a component of Red Hat Ceph Storage 4.3 Tools", "product_id": "8Base-RHCEPH-4.3-Tools:ceph-fuse-2:14.2.22-110.el8cp.ppc64le" }, "product_reference": "ceph-fuse-2:14.2.22-110.el8cp.ppc64le", "relates_to_product_reference": "8Base-RHCEPH-4.3-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "ceph-fuse-2:14.2.22-110.el8cp.s390x as a component of Red Hat Ceph Storage 4.3 Tools", "product_id": "8Base-RHCEPH-4.3-Tools:ceph-fuse-2:14.2.22-110.el8cp.s390x" }, "product_reference": "ceph-fuse-2:14.2.22-110.el8cp.s390x", "relates_to_product_reference": "8Base-RHCEPH-4.3-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "ceph-fuse-2:14.2.22-110.el8cp.x86_64 as a component of Red Hat Ceph Storage 4.3 Tools", "product_id": "8Base-RHCEPH-4.3-Tools:ceph-fuse-2:14.2.22-110.el8cp.x86_64" }, "product_reference": "ceph-fuse-2:14.2.22-110.el8cp.x86_64", "relates_to_product_reference": "8Base-RHCEPH-4.3-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "ceph-fuse-debuginfo-2:14.2.22-110.el8cp.ppc64le as a component of Red Hat Ceph Storage 4.3 Tools", "product_id": "8Base-RHCEPH-4.3-Tools:ceph-fuse-debuginfo-2:14.2.22-110.el8cp.ppc64le" }, "product_reference": "ceph-fuse-debuginfo-2:14.2.22-110.el8cp.ppc64le", "relates_to_product_reference": "8Base-RHCEPH-4.3-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "ceph-fuse-debuginfo-2:14.2.22-110.el8cp.s390x as a component of Red Hat Ceph Storage 4.3 Tools", "product_id": "8Base-RHCEPH-4.3-Tools:ceph-fuse-debuginfo-2:14.2.22-110.el8cp.s390x" }, "product_reference": "ceph-fuse-debuginfo-2:14.2.22-110.el8cp.s390x", "relates_to_product_reference": "8Base-RHCEPH-4.3-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "ceph-fuse-debuginfo-2:14.2.22-110.el8cp.x86_64 as a component of Red Hat Ceph Storage 4.3 Tools", "product_id": "8Base-RHCEPH-4.3-Tools:ceph-fuse-debuginfo-2:14.2.22-110.el8cp.x86_64" }, "product_reference": "ceph-fuse-debuginfo-2:14.2.22-110.el8cp.x86_64", "relates_to_product_reference": "8Base-RHCEPH-4.3-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "ceph-grafana-dashboards-2:14.2.22-110.el8cp.noarch as a component of Red Hat Ceph Storage 4.3 Tools", "product_id": "8Base-RHCEPH-4.3-Tools:ceph-grafana-dashboards-2:14.2.22-110.el8cp.noarch" }, "product_reference": "ceph-grafana-dashboards-2:14.2.22-110.el8cp.noarch", "relates_to_product_reference": "8Base-RHCEPH-4.3-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "ceph-iscsi-0:3.4-5.el8cp.noarch as a component of Red Hat Ceph Storage 4.3 Tools", "product_id": "8Base-RHCEPH-4.3-Tools:ceph-iscsi-0:3.4-5.el8cp.noarch" }, "product_reference": "ceph-iscsi-0:3.4-5.el8cp.noarch", "relates_to_product_reference": "8Base-RHCEPH-4.3-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "ceph-iscsi-0:3.4-5.el8cp.src as a component of Red Hat Ceph Storage 4.3 Tools", "product_id": "8Base-RHCEPH-4.3-Tools:ceph-iscsi-0:3.4-5.el8cp.src" }, "product_reference": "ceph-iscsi-0:3.4-5.el8cp.src", "relates_to_product_reference": "8Base-RHCEPH-4.3-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "ceph-mds-2:14.2.22-110.el8cp.ppc64le as a component of Red Hat Ceph Storage 4.3 Tools", "product_id": "8Base-RHCEPH-4.3-Tools:ceph-mds-2:14.2.22-110.el8cp.ppc64le" }, "product_reference": "ceph-mds-2:14.2.22-110.el8cp.ppc64le", "relates_to_product_reference": "8Base-RHCEPH-4.3-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "ceph-mds-2:14.2.22-110.el8cp.s390x as a component of Red Hat Ceph Storage 4.3 Tools", "product_id": "8Base-RHCEPH-4.3-Tools:ceph-mds-2:14.2.22-110.el8cp.s390x" }, "product_reference": "ceph-mds-2:14.2.22-110.el8cp.s390x", "relates_to_product_reference": "8Base-RHCEPH-4.3-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "ceph-mds-2:14.2.22-110.el8cp.x86_64 as a component of Red Hat Ceph Storage 4.3 Tools", "product_id": "8Base-RHCEPH-4.3-Tools:ceph-mds-2:14.2.22-110.el8cp.x86_64" }, "product_reference": "ceph-mds-2:14.2.22-110.el8cp.x86_64", "relates_to_product_reference": "8Base-RHCEPH-4.3-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "ceph-mds-debuginfo-2:14.2.22-110.el8cp.ppc64le as a component of Red Hat Ceph Storage 4.3 Tools", "product_id": "8Base-RHCEPH-4.3-Tools:ceph-mds-debuginfo-2:14.2.22-110.el8cp.ppc64le" }, "product_reference": "ceph-mds-debuginfo-2:14.2.22-110.el8cp.ppc64le", "relates_to_product_reference": "8Base-RHCEPH-4.3-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "ceph-mds-debuginfo-2:14.2.22-110.el8cp.s390x as a component of Red Hat Ceph Storage 4.3 Tools", "product_id": "8Base-RHCEPH-4.3-Tools:ceph-mds-debuginfo-2:14.2.22-110.el8cp.s390x" }, "product_reference": "ceph-mds-debuginfo-2:14.2.22-110.el8cp.s390x", "relates_to_product_reference": "8Base-RHCEPH-4.3-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "ceph-mds-debuginfo-2:14.2.22-110.el8cp.x86_64 as a component of Red Hat Ceph Storage 4.3 Tools", "product_id": "8Base-RHCEPH-4.3-Tools:ceph-mds-debuginfo-2:14.2.22-110.el8cp.x86_64" }, "product_reference": "ceph-mds-debuginfo-2:14.2.22-110.el8cp.x86_64", "relates_to_product_reference": "8Base-RHCEPH-4.3-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "ceph-mgr-2:14.2.22-110.el8cp.ppc64le as a component of Red Hat Ceph Storage 4.3 Tools", "product_id": "8Base-RHCEPH-4.3-Tools:ceph-mgr-2:14.2.22-110.el8cp.ppc64le" }, "product_reference": "ceph-mgr-2:14.2.22-110.el8cp.ppc64le", "relates_to_product_reference": "8Base-RHCEPH-4.3-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "ceph-mgr-2:14.2.22-110.el8cp.s390x as a component of Red Hat Ceph Storage 4.3 Tools", "product_id": "8Base-RHCEPH-4.3-Tools:ceph-mgr-2:14.2.22-110.el8cp.s390x" }, "product_reference": "ceph-mgr-2:14.2.22-110.el8cp.s390x", "relates_to_product_reference": "8Base-RHCEPH-4.3-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "ceph-mgr-2:14.2.22-110.el8cp.x86_64 as a component of Red Hat Ceph Storage 4.3 Tools", "product_id": "8Base-RHCEPH-4.3-Tools:ceph-mgr-2:14.2.22-110.el8cp.x86_64" }, "product_reference": "ceph-mgr-2:14.2.22-110.el8cp.x86_64", "relates_to_product_reference": "8Base-RHCEPH-4.3-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "ceph-mgr-dashboard-2:14.2.22-110.el8cp.noarch as a component of Red Hat Ceph Storage 4.3 Tools", "product_id": "8Base-RHCEPH-4.3-Tools:ceph-mgr-dashboard-2:14.2.22-110.el8cp.noarch" }, "product_reference": "ceph-mgr-dashboard-2:14.2.22-110.el8cp.noarch", "relates_to_product_reference": "8Base-RHCEPH-4.3-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "ceph-mgr-debuginfo-2:14.2.22-110.el8cp.ppc64le as a component of Red Hat Ceph Storage 4.3 Tools", "product_id": "8Base-RHCEPH-4.3-Tools:ceph-mgr-debuginfo-2:14.2.22-110.el8cp.ppc64le" }, "product_reference": "ceph-mgr-debuginfo-2:14.2.22-110.el8cp.ppc64le", "relates_to_product_reference": "8Base-RHCEPH-4.3-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "ceph-mgr-debuginfo-2:14.2.22-110.el8cp.s390x as a component of Red Hat Ceph Storage 4.3 Tools", "product_id": "8Base-RHCEPH-4.3-Tools:ceph-mgr-debuginfo-2:14.2.22-110.el8cp.s390x" }, "product_reference": "ceph-mgr-debuginfo-2:14.2.22-110.el8cp.s390x", "relates_to_product_reference": "8Base-RHCEPH-4.3-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "ceph-mgr-debuginfo-2:14.2.22-110.el8cp.x86_64 as a component of Red Hat Ceph Storage 4.3 Tools", "product_id": "8Base-RHCEPH-4.3-Tools:ceph-mgr-debuginfo-2:14.2.22-110.el8cp.x86_64" }, "product_reference": "ceph-mgr-debuginfo-2:14.2.22-110.el8cp.x86_64", "relates_to_product_reference": "8Base-RHCEPH-4.3-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "ceph-mgr-diskprediction-local-2:14.2.22-110.el8cp.noarch as a component of Red Hat Ceph Storage 4.3 Tools", "product_id": "8Base-RHCEPH-4.3-Tools:ceph-mgr-diskprediction-local-2:14.2.22-110.el8cp.noarch" }, "product_reference": "ceph-mgr-diskprediction-local-2:14.2.22-110.el8cp.noarch", "relates_to_product_reference": "8Base-RHCEPH-4.3-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "ceph-mgr-k8sevents-2:14.2.22-110.el8cp.noarch as a component of Red Hat Ceph Storage 4.3 Tools", "product_id": "8Base-RHCEPH-4.3-Tools:ceph-mgr-k8sevents-2:14.2.22-110.el8cp.noarch" }, "product_reference": "ceph-mgr-k8sevents-2:14.2.22-110.el8cp.noarch", "relates_to_product_reference": "8Base-RHCEPH-4.3-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "ceph-mgr-rook-2:14.2.22-110.el8cp.noarch as a component of Red Hat Ceph Storage 4.3 Tools", "product_id": "8Base-RHCEPH-4.3-Tools:ceph-mgr-rook-2:14.2.22-110.el8cp.noarch" }, "product_reference": "ceph-mgr-rook-2:14.2.22-110.el8cp.noarch", "relates_to_product_reference": "8Base-RHCEPH-4.3-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "ceph-mon-2:14.2.22-110.el8cp.ppc64le as a component of Red Hat Ceph Storage 4.3 Tools", "product_id": "8Base-RHCEPH-4.3-Tools:ceph-mon-2:14.2.22-110.el8cp.ppc64le" }, "product_reference": "ceph-mon-2:14.2.22-110.el8cp.ppc64le", "relates_to_product_reference": "8Base-RHCEPH-4.3-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "ceph-mon-2:14.2.22-110.el8cp.s390x as a component of Red Hat Ceph Storage 4.3 Tools", "product_id": "8Base-RHCEPH-4.3-Tools:ceph-mon-2:14.2.22-110.el8cp.s390x" }, "product_reference": "ceph-mon-2:14.2.22-110.el8cp.s390x", "relates_to_product_reference": "8Base-RHCEPH-4.3-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "ceph-mon-2:14.2.22-110.el8cp.x86_64 as a component of Red Hat Ceph Storage 4.3 Tools", "product_id": "8Base-RHCEPH-4.3-Tools:ceph-mon-2:14.2.22-110.el8cp.x86_64" }, "product_reference": "ceph-mon-2:14.2.22-110.el8cp.x86_64", "relates_to_product_reference": "8Base-RHCEPH-4.3-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "ceph-mon-debuginfo-2:14.2.22-110.el8cp.ppc64le as a component of Red Hat Ceph Storage 4.3 Tools", "product_id": "8Base-RHCEPH-4.3-Tools:ceph-mon-debuginfo-2:14.2.22-110.el8cp.ppc64le" }, "product_reference": "ceph-mon-debuginfo-2:14.2.22-110.el8cp.ppc64le", "relates_to_product_reference": "8Base-RHCEPH-4.3-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "ceph-mon-debuginfo-2:14.2.22-110.el8cp.s390x as a component of Red Hat Ceph Storage 4.3 Tools", "product_id": "8Base-RHCEPH-4.3-Tools:ceph-mon-debuginfo-2:14.2.22-110.el8cp.s390x" }, "product_reference": "ceph-mon-debuginfo-2:14.2.22-110.el8cp.s390x", "relates_to_product_reference": "8Base-RHCEPH-4.3-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "ceph-mon-debuginfo-2:14.2.22-110.el8cp.x86_64 as a component of Red Hat Ceph Storage 4.3 Tools", "product_id": "8Base-RHCEPH-4.3-Tools:ceph-mon-debuginfo-2:14.2.22-110.el8cp.x86_64" }, "product_reference": "ceph-mon-debuginfo-2:14.2.22-110.el8cp.x86_64", "relates_to_product_reference": "8Base-RHCEPH-4.3-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "ceph-osd-2:14.2.22-110.el8cp.ppc64le as a component of Red Hat Ceph Storage 4.3 Tools", "product_id": "8Base-RHCEPH-4.3-Tools:ceph-osd-2:14.2.22-110.el8cp.ppc64le" }, "product_reference": "ceph-osd-2:14.2.22-110.el8cp.ppc64le", "relates_to_product_reference": "8Base-RHCEPH-4.3-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "ceph-osd-2:14.2.22-110.el8cp.s390x as a component of Red Hat Ceph Storage 4.3 Tools", "product_id": "8Base-RHCEPH-4.3-Tools:ceph-osd-2:14.2.22-110.el8cp.s390x" }, "product_reference": "ceph-osd-2:14.2.22-110.el8cp.s390x", "relates_to_product_reference": "8Base-RHCEPH-4.3-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "ceph-osd-2:14.2.22-110.el8cp.x86_64 as a component of Red Hat Ceph Storage 4.3 Tools", "product_id": "8Base-RHCEPH-4.3-Tools:ceph-osd-2:14.2.22-110.el8cp.x86_64" }, "product_reference": "ceph-osd-2:14.2.22-110.el8cp.x86_64", "relates_to_product_reference": "8Base-RHCEPH-4.3-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "ceph-osd-debuginfo-2:14.2.22-110.el8cp.ppc64le as a component of Red Hat Ceph Storage 4.3 Tools", "product_id": "8Base-RHCEPH-4.3-Tools:ceph-osd-debuginfo-2:14.2.22-110.el8cp.ppc64le" }, "product_reference": "ceph-osd-debuginfo-2:14.2.22-110.el8cp.ppc64le", "relates_to_product_reference": "8Base-RHCEPH-4.3-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "ceph-osd-debuginfo-2:14.2.22-110.el8cp.s390x as a component of Red Hat Ceph Storage 4.3 Tools", "product_id": "8Base-RHCEPH-4.3-Tools:ceph-osd-debuginfo-2:14.2.22-110.el8cp.s390x" }, "product_reference": "ceph-osd-debuginfo-2:14.2.22-110.el8cp.s390x", "relates_to_product_reference": "8Base-RHCEPH-4.3-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "ceph-osd-debuginfo-2:14.2.22-110.el8cp.x86_64 as a component of Red Hat Ceph Storage 4.3 Tools", "product_id": "8Base-RHCEPH-4.3-Tools:ceph-osd-debuginfo-2:14.2.22-110.el8cp.x86_64" }, "product_reference": "ceph-osd-debuginfo-2:14.2.22-110.el8cp.x86_64", "relates_to_product_reference": "8Base-RHCEPH-4.3-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "ceph-radosgw-2:14.2.22-110.el8cp.ppc64le as a component of Red Hat Ceph Storage 4.3 Tools", "product_id": "8Base-RHCEPH-4.3-Tools:ceph-radosgw-2:14.2.22-110.el8cp.ppc64le" }, "product_reference": "ceph-radosgw-2:14.2.22-110.el8cp.ppc64le", "relates_to_product_reference": "8Base-RHCEPH-4.3-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "ceph-radosgw-2:14.2.22-110.el8cp.s390x as a component of Red Hat Ceph Storage 4.3 Tools", "product_id": "8Base-RHCEPH-4.3-Tools:ceph-radosgw-2:14.2.22-110.el8cp.s390x" }, "product_reference": "ceph-radosgw-2:14.2.22-110.el8cp.s390x", "relates_to_product_reference": "8Base-RHCEPH-4.3-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "ceph-radosgw-2:14.2.22-110.el8cp.x86_64 as a component of Red Hat Ceph Storage 4.3 Tools", "product_id": "8Base-RHCEPH-4.3-Tools:ceph-radosgw-2:14.2.22-110.el8cp.x86_64" }, "product_reference": "ceph-radosgw-2:14.2.22-110.el8cp.x86_64", "relates_to_product_reference": "8Base-RHCEPH-4.3-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "ceph-radosgw-debuginfo-2:14.2.22-110.el8cp.ppc64le as a component of Red Hat Ceph Storage 4.3 Tools", "product_id": "8Base-RHCEPH-4.3-Tools:ceph-radosgw-debuginfo-2:14.2.22-110.el8cp.ppc64le" }, "product_reference": "ceph-radosgw-debuginfo-2:14.2.22-110.el8cp.ppc64le", "relates_to_product_reference": "8Base-RHCEPH-4.3-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "ceph-radosgw-debuginfo-2:14.2.22-110.el8cp.s390x as a component of Red Hat Ceph Storage 4.3 Tools", "product_id": "8Base-RHCEPH-4.3-Tools:ceph-radosgw-debuginfo-2:14.2.22-110.el8cp.s390x" }, "product_reference": "ceph-radosgw-debuginfo-2:14.2.22-110.el8cp.s390x", "relates_to_product_reference": "8Base-RHCEPH-4.3-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "ceph-radosgw-debuginfo-2:14.2.22-110.el8cp.x86_64 as a component of Red Hat Ceph Storage 4.3 Tools", "product_id": "8Base-RHCEPH-4.3-Tools:ceph-radosgw-debuginfo-2:14.2.22-110.el8cp.x86_64" }, "product_reference": "ceph-radosgw-debuginfo-2:14.2.22-110.el8cp.x86_64", "relates_to_product_reference": "8Base-RHCEPH-4.3-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "ceph-selinux-2:14.2.22-110.el8cp.ppc64le as a component of Red Hat Ceph Storage 4.3 Tools", "product_id": "8Base-RHCEPH-4.3-Tools:ceph-selinux-2:14.2.22-110.el8cp.ppc64le" }, "product_reference": "ceph-selinux-2:14.2.22-110.el8cp.ppc64le", "relates_to_product_reference": "8Base-RHCEPH-4.3-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "ceph-selinux-2:14.2.22-110.el8cp.s390x as a component of Red Hat Ceph Storage 4.3 Tools", "product_id": "8Base-RHCEPH-4.3-Tools:ceph-selinux-2:14.2.22-110.el8cp.s390x" }, "product_reference": "ceph-selinux-2:14.2.22-110.el8cp.s390x", "relates_to_product_reference": "8Base-RHCEPH-4.3-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "ceph-selinux-2:14.2.22-110.el8cp.x86_64 as a component of Red Hat Ceph Storage 4.3 Tools", "product_id": "8Base-RHCEPH-4.3-Tools:ceph-selinux-2:14.2.22-110.el8cp.x86_64" }, "product_reference": "ceph-selinux-2:14.2.22-110.el8cp.x86_64", "relates_to_product_reference": "8Base-RHCEPH-4.3-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "ceph-test-2:14.2.22-110.el8cp.ppc64le as a component of Red Hat Ceph Storage 4.3 Tools", "product_id": "8Base-RHCEPH-4.3-Tools:ceph-test-2:14.2.22-110.el8cp.ppc64le" }, "product_reference": "ceph-test-2:14.2.22-110.el8cp.ppc64le", "relates_to_product_reference": "8Base-RHCEPH-4.3-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "ceph-test-2:14.2.22-110.el8cp.s390x as a component of Red Hat Ceph Storage 4.3 Tools", "product_id": "8Base-RHCEPH-4.3-Tools:ceph-test-2:14.2.22-110.el8cp.s390x" }, "product_reference": "ceph-test-2:14.2.22-110.el8cp.s390x", "relates_to_product_reference": "8Base-RHCEPH-4.3-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "ceph-test-2:14.2.22-110.el8cp.x86_64 as a component of Red Hat Ceph Storage 4.3 Tools", "product_id": "8Base-RHCEPH-4.3-Tools:ceph-test-2:14.2.22-110.el8cp.x86_64" }, "product_reference": "ceph-test-2:14.2.22-110.el8cp.x86_64", "relates_to_product_reference": "8Base-RHCEPH-4.3-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "ceph-test-debuginfo-2:14.2.22-110.el8cp.ppc64le as a component of Red Hat Ceph Storage 4.3 Tools", "product_id": "8Base-RHCEPH-4.3-Tools:ceph-test-debuginfo-2:14.2.22-110.el8cp.ppc64le" }, "product_reference": "ceph-test-debuginfo-2:14.2.22-110.el8cp.ppc64le", "relates_to_product_reference": "8Base-RHCEPH-4.3-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "ceph-test-debuginfo-2:14.2.22-110.el8cp.s390x as a component of Red Hat Ceph Storage 4.3 Tools", "product_id": "8Base-RHCEPH-4.3-Tools:ceph-test-debuginfo-2:14.2.22-110.el8cp.s390x" }, "product_reference": "ceph-test-debuginfo-2:14.2.22-110.el8cp.s390x", "relates_to_product_reference": "8Base-RHCEPH-4.3-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "ceph-test-debuginfo-2:14.2.22-110.el8cp.x86_64 as a component of Red Hat Ceph Storage 4.3 Tools", "product_id": "8Base-RHCEPH-4.3-Tools:ceph-test-debuginfo-2:14.2.22-110.el8cp.x86_64" }, "product_reference": "ceph-test-debuginfo-2:14.2.22-110.el8cp.x86_64", "relates_to_product_reference": "8Base-RHCEPH-4.3-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "libcephfs-devel-2:14.2.22-110.el8cp.ppc64le as a component of Red Hat Ceph Storage 4.3 Tools", "product_id": "8Base-RHCEPH-4.3-Tools:libcephfs-devel-2:14.2.22-110.el8cp.ppc64le" }, "product_reference": "libcephfs-devel-2:14.2.22-110.el8cp.ppc64le", "relates_to_product_reference": "8Base-RHCEPH-4.3-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "libcephfs-devel-2:14.2.22-110.el8cp.s390x as a component of Red Hat Ceph Storage 4.3 Tools", "product_id": "8Base-RHCEPH-4.3-Tools:libcephfs-devel-2:14.2.22-110.el8cp.s390x" }, "product_reference": "libcephfs-devel-2:14.2.22-110.el8cp.s390x", "relates_to_product_reference": "8Base-RHCEPH-4.3-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "libcephfs-devel-2:14.2.22-110.el8cp.x86_64 as a component of Red Hat Ceph Storage 4.3 Tools", "product_id": "8Base-RHCEPH-4.3-Tools:libcephfs-devel-2:14.2.22-110.el8cp.x86_64" }, "product_reference": "libcephfs-devel-2:14.2.22-110.el8cp.x86_64", "relates_to_product_reference": "8Base-RHCEPH-4.3-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "libcephfs2-2:14.2.22-110.el8cp.ppc64le as a component of Red Hat Ceph Storage 4.3 Tools", "product_id": "8Base-RHCEPH-4.3-Tools:libcephfs2-2:14.2.22-110.el8cp.ppc64le" }, "product_reference": "libcephfs2-2:14.2.22-110.el8cp.ppc64le", "relates_to_product_reference": "8Base-RHCEPH-4.3-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "libcephfs2-2:14.2.22-110.el8cp.s390x as a component of Red Hat Ceph Storage 4.3 Tools", "product_id": "8Base-RHCEPH-4.3-Tools:libcephfs2-2:14.2.22-110.el8cp.s390x" }, "product_reference": "libcephfs2-2:14.2.22-110.el8cp.s390x", "relates_to_product_reference": "8Base-RHCEPH-4.3-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "libcephfs2-2:14.2.22-110.el8cp.x86_64 as a component of Red Hat Ceph Storage 4.3 Tools", "product_id": "8Base-RHCEPH-4.3-Tools:libcephfs2-2:14.2.22-110.el8cp.x86_64" }, "product_reference": "libcephfs2-2:14.2.22-110.el8cp.x86_64", "relates_to_product_reference": "8Base-RHCEPH-4.3-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "libcephfs2-debuginfo-2:14.2.22-110.el8cp.ppc64le as a component of Red Hat Ceph Storage 4.3 Tools", "product_id": "8Base-RHCEPH-4.3-Tools:libcephfs2-debuginfo-2:14.2.22-110.el8cp.ppc64le" }, "product_reference": "libcephfs2-debuginfo-2:14.2.22-110.el8cp.ppc64le", "relates_to_product_reference": "8Base-RHCEPH-4.3-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "libcephfs2-debuginfo-2:14.2.22-110.el8cp.s390x as a component of Red Hat Ceph Storage 4.3 Tools", "product_id": "8Base-RHCEPH-4.3-Tools:libcephfs2-debuginfo-2:14.2.22-110.el8cp.s390x" }, "product_reference": "libcephfs2-debuginfo-2:14.2.22-110.el8cp.s390x", "relates_to_product_reference": "8Base-RHCEPH-4.3-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "libcephfs2-debuginfo-2:14.2.22-110.el8cp.x86_64 as a component of Red Hat Ceph Storage 4.3 Tools", "product_id": "8Base-RHCEPH-4.3-Tools:libcephfs2-debuginfo-2:14.2.22-110.el8cp.x86_64" }, "product_reference": "libcephfs2-debuginfo-2:14.2.22-110.el8cp.x86_64", "relates_to_product_reference": "8Base-RHCEPH-4.3-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "libntirpc-0:3.4-1.1.el8cp.ppc64le as a component of Red Hat Ceph Storage 4.3 Tools", "product_id": "8Base-RHCEPH-4.3-Tools:libntirpc-0:3.4-1.1.el8cp.ppc64le" }, "product_reference": "libntirpc-0:3.4-1.1.el8cp.ppc64le", "relates_to_product_reference": "8Base-RHCEPH-4.3-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "libntirpc-0:3.4-1.1.el8cp.s390x as a component of Red Hat Ceph Storage 4.3 Tools", "product_id": "8Base-RHCEPH-4.3-Tools:libntirpc-0:3.4-1.1.el8cp.s390x" }, "product_reference": "libntirpc-0:3.4-1.1.el8cp.s390x", "relates_to_product_reference": "8Base-RHCEPH-4.3-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "libntirpc-0:3.4-1.1.el8cp.src as a component of Red Hat Ceph Storage 4.3 Tools", "product_id": "8Base-RHCEPH-4.3-Tools:libntirpc-0:3.4-1.1.el8cp.src" }, "product_reference": "libntirpc-0:3.4-1.1.el8cp.src", "relates_to_product_reference": "8Base-RHCEPH-4.3-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "libntirpc-0:3.4-1.1.el8cp.x86_64 as a component of Red Hat Ceph Storage 4.3 Tools", "product_id": "8Base-RHCEPH-4.3-Tools:libntirpc-0:3.4-1.1.el8cp.x86_64" }, "product_reference": "libntirpc-0:3.4-1.1.el8cp.x86_64", "relates_to_product_reference": "8Base-RHCEPH-4.3-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "libntirpc-debuginfo-0:3.4-1.1.el8cp.ppc64le as a component of Red Hat Ceph Storage 4.3 Tools", "product_id": "8Base-RHCEPH-4.3-Tools:libntirpc-debuginfo-0:3.4-1.1.el8cp.ppc64le" }, "product_reference": "libntirpc-debuginfo-0:3.4-1.1.el8cp.ppc64le", "relates_to_product_reference": "8Base-RHCEPH-4.3-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "libntirpc-debuginfo-0:3.4-1.1.el8cp.s390x as a component of Red Hat Ceph Storage 4.3 Tools", "product_id": "8Base-RHCEPH-4.3-Tools:libntirpc-debuginfo-0:3.4-1.1.el8cp.s390x" }, "product_reference": "libntirpc-debuginfo-0:3.4-1.1.el8cp.s390x", "relates_to_product_reference": "8Base-RHCEPH-4.3-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "libntirpc-debuginfo-0:3.4-1.1.el8cp.x86_64 as a component of Red Hat Ceph Storage 4.3 Tools", "product_id": "8Base-RHCEPH-4.3-Tools:libntirpc-debuginfo-0:3.4-1.1.el8cp.x86_64" }, "product_reference": "libntirpc-debuginfo-0:3.4-1.1.el8cp.x86_64", "relates_to_product_reference": "8Base-RHCEPH-4.3-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "libntirpc-debugsource-0:3.4-1.1.el8cp.ppc64le as a component of Red Hat Ceph Storage 4.3 Tools", "product_id": "8Base-RHCEPH-4.3-Tools:libntirpc-debugsource-0:3.4-1.1.el8cp.ppc64le" }, "product_reference": "libntirpc-debugsource-0:3.4-1.1.el8cp.ppc64le", "relates_to_product_reference": "8Base-RHCEPH-4.3-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "libntirpc-debugsource-0:3.4-1.1.el8cp.s390x as a component of Red Hat Ceph Storage 4.3 Tools", "product_id": "8Base-RHCEPH-4.3-Tools:libntirpc-debugsource-0:3.4-1.1.el8cp.s390x" }, "product_reference": "libntirpc-debugsource-0:3.4-1.1.el8cp.s390x", "relates_to_product_reference": "8Base-RHCEPH-4.3-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "libntirpc-debugsource-0:3.4-1.1.el8cp.x86_64 as a component of Red Hat Ceph Storage 4.3 Tools", "product_id": "8Base-RHCEPH-4.3-Tools:libntirpc-debugsource-0:3.4-1.1.el8cp.x86_64" }, "product_reference": "libntirpc-debugsource-0:3.4-1.1.el8cp.x86_64", "relates_to_product_reference": "8Base-RHCEPH-4.3-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "librados-devel-2:14.2.22-110.el8cp.ppc64le as a component of Red Hat Ceph Storage 4.3 Tools", "product_id": "8Base-RHCEPH-4.3-Tools:librados-devel-2:14.2.22-110.el8cp.ppc64le" }, "product_reference": "librados-devel-2:14.2.22-110.el8cp.ppc64le", "relates_to_product_reference": "8Base-RHCEPH-4.3-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "librados-devel-2:14.2.22-110.el8cp.s390x as a component of Red Hat Ceph Storage 4.3 Tools", "product_id": "8Base-RHCEPH-4.3-Tools:librados-devel-2:14.2.22-110.el8cp.s390x" }, "product_reference": "librados-devel-2:14.2.22-110.el8cp.s390x", "relates_to_product_reference": "8Base-RHCEPH-4.3-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "librados-devel-2:14.2.22-110.el8cp.x86_64 as a component of Red Hat Ceph Storage 4.3 Tools", "product_id": "8Base-RHCEPH-4.3-Tools:librados-devel-2:14.2.22-110.el8cp.x86_64" }, "product_reference": "librados-devel-2:14.2.22-110.el8cp.x86_64", "relates_to_product_reference": "8Base-RHCEPH-4.3-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "librados-devel-debuginfo-2:14.2.22-110.el8cp.ppc64le as a component of Red Hat Ceph Storage 4.3 Tools", "product_id": "8Base-RHCEPH-4.3-Tools:librados-devel-debuginfo-2:14.2.22-110.el8cp.ppc64le" }, "product_reference": "librados-devel-debuginfo-2:14.2.22-110.el8cp.ppc64le", "relates_to_product_reference": "8Base-RHCEPH-4.3-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "librados-devel-debuginfo-2:14.2.22-110.el8cp.s390x as a component of Red Hat Ceph Storage 4.3 Tools", "product_id": "8Base-RHCEPH-4.3-Tools:librados-devel-debuginfo-2:14.2.22-110.el8cp.s390x" }, "product_reference": "librados-devel-debuginfo-2:14.2.22-110.el8cp.s390x", "relates_to_product_reference": "8Base-RHCEPH-4.3-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "librados-devel-debuginfo-2:14.2.22-110.el8cp.x86_64 as a component of Red Hat Ceph Storage 4.3 Tools", "product_id": "8Base-RHCEPH-4.3-Tools:librados-devel-debuginfo-2:14.2.22-110.el8cp.x86_64" }, "product_reference": "librados-devel-debuginfo-2:14.2.22-110.el8cp.x86_64", "relates_to_product_reference": "8Base-RHCEPH-4.3-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "librados2-2:14.2.22-110.el8cp.ppc64le as a component of Red Hat Ceph Storage 4.3 Tools", "product_id": "8Base-RHCEPH-4.3-Tools:librados2-2:14.2.22-110.el8cp.ppc64le" }, "product_reference": "librados2-2:14.2.22-110.el8cp.ppc64le", "relates_to_product_reference": "8Base-RHCEPH-4.3-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "librados2-2:14.2.22-110.el8cp.s390x as a component of Red Hat Ceph Storage 4.3 Tools", "product_id": "8Base-RHCEPH-4.3-Tools:librados2-2:14.2.22-110.el8cp.s390x" }, "product_reference": "librados2-2:14.2.22-110.el8cp.s390x", "relates_to_product_reference": "8Base-RHCEPH-4.3-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "librados2-2:14.2.22-110.el8cp.x86_64 as a component of Red Hat Ceph Storage 4.3 Tools", "product_id": "8Base-RHCEPH-4.3-Tools:librados2-2:14.2.22-110.el8cp.x86_64" }, "product_reference": "librados2-2:14.2.22-110.el8cp.x86_64", "relates_to_product_reference": "8Base-RHCEPH-4.3-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "librados2-debuginfo-2:14.2.22-110.el8cp.ppc64le as a component of Red Hat Ceph Storage 4.3 Tools", "product_id": "8Base-RHCEPH-4.3-Tools:librados2-debuginfo-2:14.2.22-110.el8cp.ppc64le" }, "product_reference": "librados2-debuginfo-2:14.2.22-110.el8cp.ppc64le", "relates_to_product_reference": "8Base-RHCEPH-4.3-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "librados2-debuginfo-2:14.2.22-110.el8cp.s390x as a component of Red Hat Ceph Storage 4.3 Tools", "product_id": "8Base-RHCEPH-4.3-Tools:librados2-debuginfo-2:14.2.22-110.el8cp.s390x" }, "product_reference": "librados2-debuginfo-2:14.2.22-110.el8cp.s390x", "relates_to_product_reference": "8Base-RHCEPH-4.3-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "librados2-debuginfo-2:14.2.22-110.el8cp.x86_64 as a component of Red Hat Ceph Storage 4.3 Tools", "product_id": "8Base-RHCEPH-4.3-Tools:librados2-debuginfo-2:14.2.22-110.el8cp.x86_64" }, "product_reference": "librados2-debuginfo-2:14.2.22-110.el8cp.x86_64", "relates_to_product_reference": "8Base-RHCEPH-4.3-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "libradospp-devel-2:14.2.22-110.el8cp.ppc64le as a component of Red Hat Ceph Storage 4.3 Tools", "product_id": "8Base-RHCEPH-4.3-Tools:libradospp-devel-2:14.2.22-110.el8cp.ppc64le" }, "product_reference": "libradospp-devel-2:14.2.22-110.el8cp.ppc64le", "relates_to_product_reference": "8Base-RHCEPH-4.3-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "libradospp-devel-2:14.2.22-110.el8cp.s390x as a component of Red Hat Ceph Storage 4.3 Tools", "product_id": "8Base-RHCEPH-4.3-Tools:libradospp-devel-2:14.2.22-110.el8cp.s390x" }, "product_reference": "libradospp-devel-2:14.2.22-110.el8cp.s390x", "relates_to_product_reference": "8Base-RHCEPH-4.3-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "libradospp-devel-2:14.2.22-110.el8cp.x86_64 as a component of Red Hat Ceph Storage 4.3 Tools", "product_id": "8Base-RHCEPH-4.3-Tools:libradospp-devel-2:14.2.22-110.el8cp.x86_64" }, "product_reference": "libradospp-devel-2:14.2.22-110.el8cp.x86_64", "relates_to_product_reference": "8Base-RHCEPH-4.3-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "libradosstriper1-2:14.2.22-110.el8cp.ppc64le as a component of Red Hat Ceph Storage 4.3 Tools", "product_id": "8Base-RHCEPH-4.3-Tools:libradosstriper1-2:14.2.22-110.el8cp.ppc64le" }, "product_reference": "libradosstriper1-2:14.2.22-110.el8cp.ppc64le", "relates_to_product_reference": "8Base-RHCEPH-4.3-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "libradosstriper1-2:14.2.22-110.el8cp.s390x as a component of Red Hat Ceph Storage 4.3 Tools", "product_id": "8Base-RHCEPH-4.3-Tools:libradosstriper1-2:14.2.22-110.el8cp.s390x" }, "product_reference": "libradosstriper1-2:14.2.22-110.el8cp.s390x", "relates_to_product_reference": "8Base-RHCEPH-4.3-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "libradosstriper1-2:14.2.22-110.el8cp.x86_64 as a component of Red Hat Ceph Storage 4.3 Tools", "product_id": "8Base-RHCEPH-4.3-Tools:libradosstriper1-2:14.2.22-110.el8cp.x86_64" }, "product_reference": "libradosstriper1-2:14.2.22-110.el8cp.x86_64", "relates_to_product_reference": "8Base-RHCEPH-4.3-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "libradosstriper1-debuginfo-2:14.2.22-110.el8cp.ppc64le as a component of Red Hat Ceph Storage 4.3 Tools", "product_id": "8Base-RHCEPH-4.3-Tools:libradosstriper1-debuginfo-2:14.2.22-110.el8cp.ppc64le" }, "product_reference": "libradosstriper1-debuginfo-2:14.2.22-110.el8cp.ppc64le", "relates_to_product_reference": "8Base-RHCEPH-4.3-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "libradosstriper1-debuginfo-2:14.2.22-110.el8cp.s390x as a component of Red Hat Ceph Storage 4.3 Tools", "product_id": "8Base-RHCEPH-4.3-Tools:libradosstriper1-debuginfo-2:14.2.22-110.el8cp.s390x" }, "product_reference": "libradosstriper1-debuginfo-2:14.2.22-110.el8cp.s390x", "relates_to_product_reference": "8Base-RHCEPH-4.3-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "libradosstriper1-debuginfo-2:14.2.22-110.el8cp.x86_64 as a component of Red Hat Ceph Storage 4.3 Tools", "product_id": "8Base-RHCEPH-4.3-Tools:libradosstriper1-debuginfo-2:14.2.22-110.el8cp.x86_64" }, "product_reference": "libradosstriper1-debuginfo-2:14.2.22-110.el8cp.x86_64", "relates_to_product_reference": "8Base-RHCEPH-4.3-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "librbd-devel-2:14.2.22-110.el8cp.ppc64le as a component of Red Hat Ceph Storage 4.3 Tools", "product_id": "8Base-RHCEPH-4.3-Tools:librbd-devel-2:14.2.22-110.el8cp.ppc64le" }, "product_reference": "librbd-devel-2:14.2.22-110.el8cp.ppc64le", "relates_to_product_reference": "8Base-RHCEPH-4.3-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "librbd-devel-2:14.2.22-110.el8cp.s390x as a component of Red Hat Ceph Storage 4.3 Tools", "product_id": "8Base-RHCEPH-4.3-Tools:librbd-devel-2:14.2.22-110.el8cp.s390x" }, "product_reference": "librbd-devel-2:14.2.22-110.el8cp.s390x", "relates_to_product_reference": "8Base-RHCEPH-4.3-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "librbd-devel-2:14.2.22-110.el8cp.x86_64 as a component of Red Hat Ceph Storage 4.3 Tools", "product_id": "8Base-RHCEPH-4.3-Tools:librbd-devel-2:14.2.22-110.el8cp.x86_64" }, "product_reference": "librbd-devel-2:14.2.22-110.el8cp.x86_64", "relates_to_product_reference": "8Base-RHCEPH-4.3-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "librbd1-2:14.2.22-110.el8cp.ppc64le as a component of Red Hat Ceph Storage 4.3 Tools", "product_id": "8Base-RHCEPH-4.3-Tools:librbd1-2:14.2.22-110.el8cp.ppc64le" }, "product_reference": "librbd1-2:14.2.22-110.el8cp.ppc64le", "relates_to_product_reference": "8Base-RHCEPH-4.3-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "librbd1-2:14.2.22-110.el8cp.s390x as a component of Red Hat Ceph Storage 4.3 Tools", "product_id": "8Base-RHCEPH-4.3-Tools:librbd1-2:14.2.22-110.el8cp.s390x" }, "product_reference": "librbd1-2:14.2.22-110.el8cp.s390x", "relates_to_product_reference": "8Base-RHCEPH-4.3-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "librbd1-2:14.2.22-110.el8cp.x86_64 as a component of Red Hat Ceph Storage 4.3 Tools", "product_id": "8Base-RHCEPH-4.3-Tools:librbd1-2:14.2.22-110.el8cp.x86_64" }, "product_reference": "librbd1-2:14.2.22-110.el8cp.x86_64", "relates_to_product_reference": "8Base-RHCEPH-4.3-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "librbd1-debuginfo-2:14.2.22-110.el8cp.ppc64le as a component of Red Hat Ceph Storage 4.3 Tools", "product_id": "8Base-RHCEPH-4.3-Tools:librbd1-debuginfo-2:14.2.22-110.el8cp.ppc64le" }, "product_reference": "librbd1-debuginfo-2:14.2.22-110.el8cp.ppc64le", "relates_to_product_reference": "8Base-RHCEPH-4.3-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "librbd1-debuginfo-2:14.2.22-110.el8cp.s390x as a component of Red Hat Ceph Storage 4.3 Tools", "product_id": "8Base-RHCEPH-4.3-Tools:librbd1-debuginfo-2:14.2.22-110.el8cp.s390x" }, "product_reference": "librbd1-debuginfo-2:14.2.22-110.el8cp.s390x", "relates_to_product_reference": "8Base-RHCEPH-4.3-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "librbd1-debuginfo-2:14.2.22-110.el8cp.x86_64 as a component of Red Hat Ceph Storage 4.3 Tools", "product_id": "8Base-RHCEPH-4.3-Tools:librbd1-debuginfo-2:14.2.22-110.el8cp.x86_64" }, "product_reference": "librbd1-debuginfo-2:14.2.22-110.el8cp.x86_64", "relates_to_product_reference": "8Base-RHCEPH-4.3-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "librgw-devel-2:14.2.22-110.el8cp.ppc64le as a component of Red Hat Ceph Storage 4.3 Tools", "product_id": "8Base-RHCEPH-4.3-Tools:librgw-devel-2:14.2.22-110.el8cp.ppc64le" }, "product_reference": "librgw-devel-2:14.2.22-110.el8cp.ppc64le", "relates_to_product_reference": "8Base-RHCEPH-4.3-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "librgw-devel-2:14.2.22-110.el8cp.s390x as a component of Red Hat Ceph Storage 4.3 Tools", "product_id": "8Base-RHCEPH-4.3-Tools:librgw-devel-2:14.2.22-110.el8cp.s390x" }, "product_reference": "librgw-devel-2:14.2.22-110.el8cp.s390x", "relates_to_product_reference": "8Base-RHCEPH-4.3-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "librgw-devel-2:14.2.22-110.el8cp.x86_64 as a component of Red Hat Ceph Storage 4.3 Tools", "product_id": "8Base-RHCEPH-4.3-Tools:librgw-devel-2:14.2.22-110.el8cp.x86_64" }, "product_reference": "librgw-devel-2:14.2.22-110.el8cp.x86_64", "relates_to_product_reference": "8Base-RHCEPH-4.3-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "librgw2-2:14.2.22-110.el8cp.ppc64le as a component of Red Hat Ceph Storage 4.3 Tools", "product_id": "8Base-RHCEPH-4.3-Tools:librgw2-2:14.2.22-110.el8cp.ppc64le" }, "product_reference": "librgw2-2:14.2.22-110.el8cp.ppc64le", "relates_to_product_reference": "8Base-RHCEPH-4.3-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "librgw2-2:14.2.22-110.el8cp.s390x as a component of Red Hat Ceph Storage 4.3 Tools", "product_id": "8Base-RHCEPH-4.3-Tools:librgw2-2:14.2.22-110.el8cp.s390x" }, "product_reference": "librgw2-2:14.2.22-110.el8cp.s390x", "relates_to_product_reference": "8Base-RHCEPH-4.3-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "librgw2-2:14.2.22-110.el8cp.x86_64 as a component of Red Hat Ceph Storage 4.3 Tools", "product_id": "8Base-RHCEPH-4.3-Tools:librgw2-2:14.2.22-110.el8cp.x86_64" }, "product_reference": "librgw2-2:14.2.22-110.el8cp.x86_64", "relates_to_product_reference": "8Base-RHCEPH-4.3-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "librgw2-debuginfo-2:14.2.22-110.el8cp.ppc64le as a component of Red Hat Ceph Storage 4.3 Tools", "product_id": "8Base-RHCEPH-4.3-Tools:librgw2-debuginfo-2:14.2.22-110.el8cp.ppc64le" }, "product_reference": "librgw2-debuginfo-2:14.2.22-110.el8cp.ppc64le", "relates_to_product_reference": "8Base-RHCEPH-4.3-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "librgw2-debuginfo-2:14.2.22-110.el8cp.s390x as a component of Red Hat Ceph Storage 4.3 Tools", "product_id": "8Base-RHCEPH-4.3-Tools:librgw2-debuginfo-2:14.2.22-110.el8cp.s390x" }, "product_reference": "librgw2-debuginfo-2:14.2.22-110.el8cp.s390x", "relates_to_product_reference": "8Base-RHCEPH-4.3-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "librgw2-debuginfo-2:14.2.22-110.el8cp.x86_64 as a component of Red Hat Ceph Storage 4.3 Tools", "product_id": "8Base-RHCEPH-4.3-Tools:librgw2-debuginfo-2:14.2.22-110.el8cp.x86_64" }, "product_reference": "librgw2-debuginfo-2:14.2.22-110.el8cp.x86_64", "relates_to_product_reference": "8Base-RHCEPH-4.3-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "libtcmu-0:1.5.2-5.el8cp.ppc64le as a component of Red Hat Ceph Storage 4.3 Tools", "product_id": "8Base-RHCEPH-4.3-Tools:libtcmu-0:1.5.2-5.el8cp.ppc64le" }, "product_reference": "libtcmu-0:1.5.2-5.el8cp.ppc64le", "relates_to_product_reference": "8Base-RHCEPH-4.3-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "libtcmu-0:1.5.2-5.el8cp.s390x as a component of Red Hat Ceph Storage 4.3 Tools", "product_id": "8Base-RHCEPH-4.3-Tools:libtcmu-0:1.5.2-5.el8cp.s390x" }, "product_reference": "libtcmu-0:1.5.2-5.el8cp.s390x", "relates_to_product_reference": "8Base-RHCEPH-4.3-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "libtcmu-0:1.5.2-5.el8cp.x86_64 as a component of Red Hat Ceph Storage 4.3 Tools", "product_id": "8Base-RHCEPH-4.3-Tools:libtcmu-0:1.5.2-5.el8cp.x86_64" }, "product_reference": "libtcmu-0:1.5.2-5.el8cp.x86_64", "relates_to_product_reference": "8Base-RHCEPH-4.3-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "nfs-ganesha-0:3.5-1.2.el8cp.ppc64le as a component of Red Hat Ceph Storage 4.3 Tools", "product_id": "8Base-RHCEPH-4.3-Tools:nfs-ganesha-0:3.5-1.2.el8cp.ppc64le" }, "product_reference": "nfs-ganesha-0:3.5-1.2.el8cp.ppc64le", "relates_to_product_reference": "8Base-RHCEPH-4.3-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "nfs-ganesha-0:3.5-1.2.el8cp.s390x as a component of Red Hat Ceph Storage 4.3 Tools", "product_id": "8Base-RHCEPH-4.3-Tools:nfs-ganesha-0:3.5-1.2.el8cp.s390x" }, "product_reference": "nfs-ganesha-0:3.5-1.2.el8cp.s390x", "relates_to_product_reference": "8Base-RHCEPH-4.3-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "nfs-ganesha-0:3.5-1.2.el8cp.src as a component of Red Hat Ceph Storage 4.3 Tools", "product_id": "8Base-RHCEPH-4.3-Tools:nfs-ganesha-0:3.5-1.2.el8cp.src" }, "product_reference": "nfs-ganesha-0:3.5-1.2.el8cp.src", "relates_to_product_reference": "8Base-RHCEPH-4.3-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "nfs-ganesha-0:3.5-1.2.el8cp.x86_64 as a component of Red Hat Ceph Storage 4.3 Tools", "product_id": "8Base-RHCEPH-4.3-Tools:nfs-ganesha-0:3.5-1.2.el8cp.x86_64" }, "product_reference": "nfs-ganesha-0:3.5-1.2.el8cp.x86_64", "relates_to_product_reference": "8Base-RHCEPH-4.3-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "nfs-ganesha-ceph-0:3.5-1.2.el8cp.ppc64le as a component of Red Hat Ceph Storage 4.3 Tools", "product_id": "8Base-RHCEPH-4.3-Tools:nfs-ganesha-ceph-0:3.5-1.2.el8cp.ppc64le" }, "product_reference": "nfs-ganesha-ceph-0:3.5-1.2.el8cp.ppc64le", "relates_to_product_reference": "8Base-RHCEPH-4.3-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "nfs-ganesha-ceph-0:3.5-1.2.el8cp.s390x as a component of Red Hat Ceph Storage 4.3 Tools", "product_id": "8Base-RHCEPH-4.3-Tools:nfs-ganesha-ceph-0:3.5-1.2.el8cp.s390x" }, "product_reference": "nfs-ganesha-ceph-0:3.5-1.2.el8cp.s390x", "relates_to_product_reference": "8Base-RHCEPH-4.3-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "nfs-ganesha-ceph-0:3.5-1.2.el8cp.x86_64 as a component of Red Hat Ceph Storage 4.3 Tools", "product_id": "8Base-RHCEPH-4.3-Tools:nfs-ganesha-ceph-0:3.5-1.2.el8cp.x86_64" }, "product_reference": "nfs-ganesha-ceph-0:3.5-1.2.el8cp.x86_64", "relates_to_product_reference": "8Base-RHCEPH-4.3-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "nfs-ganesha-ceph-debuginfo-0:3.5-1.2.el8cp.ppc64le as a component of Red Hat Ceph Storage 4.3 Tools", "product_id": "8Base-RHCEPH-4.3-Tools:nfs-ganesha-ceph-debuginfo-0:3.5-1.2.el8cp.ppc64le" }, "product_reference": "nfs-ganesha-ceph-debuginfo-0:3.5-1.2.el8cp.ppc64le", "relates_to_product_reference": "8Base-RHCEPH-4.3-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "nfs-ganesha-ceph-debuginfo-0:3.5-1.2.el8cp.s390x as a component of Red Hat Ceph Storage 4.3 Tools", "product_id": "8Base-RHCEPH-4.3-Tools:nfs-ganesha-ceph-debuginfo-0:3.5-1.2.el8cp.s390x" }, "product_reference": "nfs-ganesha-ceph-debuginfo-0:3.5-1.2.el8cp.s390x", "relates_to_product_reference": "8Base-RHCEPH-4.3-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "nfs-ganesha-ceph-debuginfo-0:3.5-1.2.el8cp.x86_64 as a component of Red Hat Ceph Storage 4.3 Tools", "product_id": "8Base-RHCEPH-4.3-Tools:nfs-ganesha-ceph-debuginfo-0:3.5-1.2.el8cp.x86_64" }, "product_reference": "nfs-ganesha-ceph-debuginfo-0:3.5-1.2.el8cp.x86_64", "relates_to_product_reference": "8Base-RHCEPH-4.3-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "nfs-ganesha-debuginfo-0:3.5-1.2.el8cp.ppc64le as a component of Red Hat Ceph Storage 4.3 Tools", "product_id": "8Base-RHCEPH-4.3-Tools:nfs-ganesha-debuginfo-0:3.5-1.2.el8cp.ppc64le" }, "product_reference": "nfs-ganesha-debuginfo-0:3.5-1.2.el8cp.ppc64le", "relates_to_product_reference": "8Base-RHCEPH-4.3-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "nfs-ganesha-debuginfo-0:3.5-1.2.el8cp.s390x as a component of Red Hat Ceph Storage 4.3 Tools", "product_id": "8Base-RHCEPH-4.3-Tools:nfs-ganesha-debuginfo-0:3.5-1.2.el8cp.s390x" }, "product_reference": "nfs-ganesha-debuginfo-0:3.5-1.2.el8cp.s390x", "relates_to_product_reference": "8Base-RHCEPH-4.3-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "nfs-ganesha-debuginfo-0:3.5-1.2.el8cp.x86_64 as a component of Red Hat Ceph Storage 4.3 Tools", "product_id": "8Base-RHCEPH-4.3-Tools:nfs-ganesha-debuginfo-0:3.5-1.2.el8cp.x86_64" }, "product_reference": "nfs-ganesha-debuginfo-0:3.5-1.2.el8cp.x86_64", "relates_to_product_reference": "8Base-RHCEPH-4.3-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "nfs-ganesha-debugsource-0:3.5-1.2.el8cp.ppc64le as a component of Red Hat Ceph Storage 4.3 Tools", "product_id": "8Base-RHCEPH-4.3-Tools:nfs-ganesha-debugsource-0:3.5-1.2.el8cp.ppc64le" }, "product_reference": "nfs-ganesha-debugsource-0:3.5-1.2.el8cp.ppc64le", "relates_to_product_reference": "8Base-RHCEPH-4.3-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "nfs-ganesha-debugsource-0:3.5-1.2.el8cp.s390x as a component of Red Hat Ceph Storage 4.3 Tools", "product_id": "8Base-RHCEPH-4.3-Tools:nfs-ganesha-debugsource-0:3.5-1.2.el8cp.s390x" }, "product_reference": "nfs-ganesha-debugsource-0:3.5-1.2.el8cp.s390x", "relates_to_product_reference": "8Base-RHCEPH-4.3-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "nfs-ganesha-debugsource-0:3.5-1.2.el8cp.x86_64 as a component of Red Hat Ceph Storage 4.3 Tools", "product_id": "8Base-RHCEPH-4.3-Tools:nfs-ganesha-debugsource-0:3.5-1.2.el8cp.x86_64" }, "product_reference": "nfs-ganesha-debugsource-0:3.5-1.2.el8cp.x86_64", "relates_to_product_reference": "8Base-RHCEPH-4.3-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "nfs-ganesha-proxy-0:3.5-1.2.el8cp.ppc64le as a component of Red Hat Ceph Storage 4.3 Tools", "product_id": "8Base-RHCEPH-4.3-Tools:nfs-ganesha-proxy-0:3.5-1.2.el8cp.ppc64le" }, "product_reference": "nfs-ganesha-proxy-0:3.5-1.2.el8cp.ppc64le", "relates_to_product_reference": "8Base-RHCEPH-4.3-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "nfs-ganesha-proxy-0:3.5-1.2.el8cp.s390x as a component of Red Hat Ceph Storage 4.3 Tools", "product_id": "8Base-RHCEPH-4.3-Tools:nfs-ganesha-proxy-0:3.5-1.2.el8cp.s390x" }, "product_reference": "nfs-ganesha-proxy-0:3.5-1.2.el8cp.s390x", "relates_to_product_reference": "8Base-RHCEPH-4.3-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "nfs-ganesha-proxy-0:3.5-1.2.el8cp.x86_64 as a component of Red Hat Ceph Storage 4.3 Tools", "product_id": "8Base-RHCEPH-4.3-Tools:nfs-ganesha-proxy-0:3.5-1.2.el8cp.x86_64" }, "product_reference": "nfs-ganesha-proxy-0:3.5-1.2.el8cp.x86_64", "relates_to_product_reference": "8Base-RHCEPH-4.3-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "nfs-ganesha-proxy-debuginfo-0:3.5-1.2.el8cp.ppc64le as a component of Red Hat Ceph Storage 4.3 Tools", "product_id": "8Base-RHCEPH-4.3-Tools:nfs-ganesha-proxy-debuginfo-0:3.5-1.2.el8cp.ppc64le" }, "product_reference": "nfs-ganesha-proxy-debuginfo-0:3.5-1.2.el8cp.ppc64le", "relates_to_product_reference": "8Base-RHCEPH-4.3-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "nfs-ganesha-proxy-debuginfo-0:3.5-1.2.el8cp.s390x as a component of Red Hat Ceph Storage 4.3 Tools", "product_id": "8Base-RHCEPH-4.3-Tools:nfs-ganesha-proxy-debuginfo-0:3.5-1.2.el8cp.s390x" }, "product_reference": "nfs-ganesha-proxy-debuginfo-0:3.5-1.2.el8cp.s390x", "relates_to_product_reference": "8Base-RHCEPH-4.3-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "nfs-ganesha-proxy-debuginfo-0:3.5-1.2.el8cp.x86_64 as a component of Red Hat Ceph Storage 4.3 Tools", "product_id": "8Base-RHCEPH-4.3-Tools:nfs-ganesha-proxy-debuginfo-0:3.5-1.2.el8cp.x86_64" }, "product_reference": "nfs-ganesha-proxy-debuginfo-0:3.5-1.2.el8cp.x86_64", "relates_to_product_reference": "8Base-RHCEPH-4.3-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "nfs-ganesha-rados-grace-0:3.5-1.2.el8cp.ppc64le as a component of Red Hat Ceph Storage 4.3 Tools", "product_id": "8Base-RHCEPH-4.3-Tools:nfs-ganesha-rados-grace-0:3.5-1.2.el8cp.ppc64le" }, "product_reference": "nfs-ganesha-rados-grace-0:3.5-1.2.el8cp.ppc64le", "relates_to_product_reference": "8Base-RHCEPH-4.3-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "nfs-ganesha-rados-grace-0:3.5-1.2.el8cp.s390x as a component of Red Hat Ceph Storage 4.3 Tools", "product_id": "8Base-RHCEPH-4.3-Tools:nfs-ganesha-rados-grace-0:3.5-1.2.el8cp.s390x" }, "product_reference": "nfs-ganesha-rados-grace-0:3.5-1.2.el8cp.s390x", "relates_to_product_reference": "8Base-RHCEPH-4.3-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "nfs-ganesha-rados-grace-0:3.5-1.2.el8cp.x86_64 as a component of Red Hat Ceph Storage 4.3 Tools", "product_id": "8Base-RHCEPH-4.3-Tools:nfs-ganesha-rados-grace-0:3.5-1.2.el8cp.x86_64" }, "product_reference": "nfs-ganesha-rados-grace-0:3.5-1.2.el8cp.x86_64", "relates_to_product_reference": "8Base-RHCEPH-4.3-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "nfs-ganesha-rados-grace-debuginfo-0:3.5-1.2.el8cp.ppc64le as a component of Red Hat Ceph Storage 4.3 Tools", "product_id": "8Base-RHCEPH-4.3-Tools:nfs-ganesha-rados-grace-debuginfo-0:3.5-1.2.el8cp.ppc64le" }, "product_reference": "nfs-ganesha-rados-grace-debuginfo-0:3.5-1.2.el8cp.ppc64le", "relates_to_product_reference": "8Base-RHCEPH-4.3-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "nfs-ganesha-rados-grace-debuginfo-0:3.5-1.2.el8cp.s390x as a component of Red Hat Ceph Storage 4.3 Tools", "product_id": "8Base-RHCEPH-4.3-Tools:nfs-ganesha-rados-grace-debuginfo-0:3.5-1.2.el8cp.s390x" }, "product_reference": "nfs-ganesha-rados-grace-debuginfo-0:3.5-1.2.el8cp.s390x", "relates_to_product_reference": "8Base-RHCEPH-4.3-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "nfs-ganesha-rados-grace-debuginfo-0:3.5-1.2.el8cp.x86_64 as a component of Red Hat Ceph Storage 4.3 Tools", "product_id": "8Base-RHCEPH-4.3-Tools:nfs-ganesha-rados-grace-debuginfo-0:3.5-1.2.el8cp.x86_64" }, "product_reference": "nfs-ganesha-rados-grace-debuginfo-0:3.5-1.2.el8cp.x86_64", "relates_to_product_reference": "8Base-RHCEPH-4.3-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "nfs-ganesha-rados-urls-0:3.5-1.2.el8cp.ppc64le as a component of Red Hat Ceph Storage 4.3 Tools", "product_id": "8Base-RHCEPH-4.3-Tools:nfs-ganesha-rados-urls-0:3.5-1.2.el8cp.ppc64le" }, "product_reference": "nfs-ganesha-rados-urls-0:3.5-1.2.el8cp.ppc64le", "relates_to_product_reference": "8Base-RHCEPH-4.3-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "nfs-ganesha-rados-urls-0:3.5-1.2.el8cp.s390x as a component of Red Hat Ceph Storage 4.3 Tools", "product_id": "8Base-RHCEPH-4.3-Tools:nfs-ganesha-rados-urls-0:3.5-1.2.el8cp.s390x" }, "product_reference": "nfs-ganesha-rados-urls-0:3.5-1.2.el8cp.s390x", "relates_to_product_reference": "8Base-RHCEPH-4.3-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "nfs-ganesha-rados-urls-0:3.5-1.2.el8cp.x86_64 as a component of Red Hat Ceph Storage 4.3 Tools", "product_id": "8Base-RHCEPH-4.3-Tools:nfs-ganesha-rados-urls-0:3.5-1.2.el8cp.x86_64" }, "product_reference": "nfs-ganesha-rados-urls-0:3.5-1.2.el8cp.x86_64", "relates_to_product_reference": "8Base-RHCEPH-4.3-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "nfs-ganesha-rados-urls-debuginfo-0:3.5-1.2.el8cp.ppc64le as a component of Red Hat Ceph Storage 4.3 Tools", "product_id": "8Base-RHCEPH-4.3-Tools:nfs-ganesha-rados-urls-debuginfo-0:3.5-1.2.el8cp.ppc64le" }, "product_reference": "nfs-ganesha-rados-urls-debuginfo-0:3.5-1.2.el8cp.ppc64le", "relates_to_product_reference": "8Base-RHCEPH-4.3-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "nfs-ganesha-rados-urls-debuginfo-0:3.5-1.2.el8cp.s390x as a component of Red Hat Ceph Storage 4.3 Tools", "product_id": "8Base-RHCEPH-4.3-Tools:nfs-ganesha-rados-urls-debuginfo-0:3.5-1.2.el8cp.s390x" }, "product_reference": "nfs-ganesha-rados-urls-debuginfo-0:3.5-1.2.el8cp.s390x", "relates_to_product_reference": "8Base-RHCEPH-4.3-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "nfs-ganesha-rados-urls-debuginfo-0:3.5-1.2.el8cp.x86_64 as a component of Red Hat Ceph Storage 4.3 Tools", "product_id": "8Base-RHCEPH-4.3-Tools:nfs-ganesha-rados-urls-debuginfo-0:3.5-1.2.el8cp.x86_64" }, "product_reference": "nfs-ganesha-rados-urls-debuginfo-0:3.5-1.2.el8cp.x86_64", "relates_to_product_reference": "8Base-RHCEPH-4.3-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "nfs-ganesha-rgw-0:3.5-1.2.el8cp.ppc64le as a component of Red Hat Ceph Storage 4.3 Tools", "product_id": "8Base-RHCEPH-4.3-Tools:nfs-ganesha-rgw-0:3.5-1.2.el8cp.ppc64le" }, "product_reference": "nfs-ganesha-rgw-0:3.5-1.2.el8cp.ppc64le", "relates_to_product_reference": "8Base-RHCEPH-4.3-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "nfs-ganesha-rgw-0:3.5-1.2.el8cp.s390x as a component of Red Hat Ceph Storage 4.3 Tools", "product_id": "8Base-RHCEPH-4.3-Tools:nfs-ganesha-rgw-0:3.5-1.2.el8cp.s390x" }, "product_reference": "nfs-ganesha-rgw-0:3.5-1.2.el8cp.s390x", "relates_to_product_reference": "8Base-RHCEPH-4.3-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "nfs-ganesha-rgw-0:3.5-1.2.el8cp.x86_64 as a component of Red Hat Ceph Storage 4.3 Tools", "product_id": "8Base-RHCEPH-4.3-Tools:nfs-ganesha-rgw-0:3.5-1.2.el8cp.x86_64" }, "product_reference": "nfs-ganesha-rgw-0:3.5-1.2.el8cp.x86_64", "relates_to_product_reference": "8Base-RHCEPH-4.3-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "nfs-ganesha-rgw-debuginfo-0:3.5-1.2.el8cp.ppc64le as a component of Red Hat Ceph Storage 4.3 Tools", "product_id": "8Base-RHCEPH-4.3-Tools:nfs-ganesha-rgw-debuginfo-0:3.5-1.2.el8cp.ppc64le" }, "product_reference": "nfs-ganesha-rgw-debuginfo-0:3.5-1.2.el8cp.ppc64le", "relates_to_product_reference": "8Base-RHCEPH-4.3-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "nfs-ganesha-rgw-debuginfo-0:3.5-1.2.el8cp.s390x as a component of Red Hat Ceph Storage 4.3 Tools", "product_id": "8Base-RHCEPH-4.3-Tools:nfs-ganesha-rgw-debuginfo-0:3.5-1.2.el8cp.s390x" }, "product_reference": "nfs-ganesha-rgw-debuginfo-0:3.5-1.2.el8cp.s390x", "relates_to_product_reference": "8Base-RHCEPH-4.3-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "nfs-ganesha-rgw-debuginfo-0:3.5-1.2.el8cp.x86_64 as a component of Red Hat Ceph Storage 4.3 Tools", "product_id": "8Base-RHCEPH-4.3-Tools:nfs-ganesha-rgw-debuginfo-0:3.5-1.2.el8cp.x86_64" }, "product_reference": "nfs-ganesha-rgw-debuginfo-0:3.5-1.2.el8cp.x86_64", "relates_to_product_reference": "8Base-RHCEPH-4.3-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "nfs-ganesha-selinux-0:3.5-1.2.el8cp.noarch as a component of Red Hat Ceph Storage 4.3 Tools", "product_id": "8Base-RHCEPH-4.3-Tools:nfs-ganesha-selinux-0:3.5-1.2.el8cp.noarch" }, "product_reference": "nfs-ganesha-selinux-0:3.5-1.2.el8cp.noarch", "relates_to_product_reference": "8Base-RHCEPH-4.3-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "nfs-ganesha-vfs-0:3.5-1.2.el8cp.ppc64le as a component of Red Hat Ceph Storage 4.3 Tools", "product_id": "8Base-RHCEPH-4.3-Tools:nfs-ganesha-vfs-0:3.5-1.2.el8cp.ppc64le" }, "product_reference": "nfs-ganesha-vfs-0:3.5-1.2.el8cp.ppc64le", "relates_to_product_reference": "8Base-RHCEPH-4.3-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "nfs-ganesha-vfs-0:3.5-1.2.el8cp.s390x as a component of Red Hat Ceph Storage 4.3 Tools", "product_id": "8Base-RHCEPH-4.3-Tools:nfs-ganesha-vfs-0:3.5-1.2.el8cp.s390x" }, "product_reference": "nfs-ganesha-vfs-0:3.5-1.2.el8cp.s390x", "relates_to_product_reference": "8Base-RHCEPH-4.3-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "nfs-ganesha-vfs-0:3.5-1.2.el8cp.x86_64 as a component of Red Hat Ceph Storage 4.3 Tools", "product_id": "8Base-RHCEPH-4.3-Tools:nfs-ganesha-vfs-0:3.5-1.2.el8cp.x86_64" }, "product_reference": "nfs-ganesha-vfs-0:3.5-1.2.el8cp.x86_64", "relates_to_product_reference": "8Base-RHCEPH-4.3-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "nfs-ganesha-vfs-debuginfo-0:3.5-1.2.el8cp.ppc64le as a component of Red Hat Ceph Storage 4.3 Tools", "product_id": "8Base-RHCEPH-4.3-Tools:nfs-ganesha-vfs-debuginfo-0:3.5-1.2.el8cp.ppc64le" }, "product_reference": "nfs-ganesha-vfs-debuginfo-0:3.5-1.2.el8cp.ppc64le", "relates_to_product_reference": "8Base-RHCEPH-4.3-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "nfs-ganesha-vfs-debuginfo-0:3.5-1.2.el8cp.s390x as a component of Red Hat Ceph Storage 4.3 Tools", "product_id": "8Base-RHCEPH-4.3-Tools:nfs-ganesha-vfs-debuginfo-0:3.5-1.2.el8cp.s390x" }, "product_reference": "nfs-ganesha-vfs-debuginfo-0:3.5-1.2.el8cp.s390x", "relates_to_product_reference": "8Base-RHCEPH-4.3-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "nfs-ganesha-vfs-debuginfo-0:3.5-1.2.el8cp.x86_64 as a component of Red Hat Ceph Storage 4.3 Tools", "product_id": "8Base-RHCEPH-4.3-Tools:nfs-ganesha-vfs-debuginfo-0:3.5-1.2.el8cp.x86_64" }, "product_reference": "nfs-ganesha-vfs-debuginfo-0:3.5-1.2.el8cp.x86_64", "relates_to_product_reference": "8Base-RHCEPH-4.3-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "python3-ceph-argparse-2:14.2.22-110.el8cp.ppc64le as a component of Red Hat Ceph Storage 4.3 Tools", "product_id": "8Base-RHCEPH-4.3-Tools:python3-ceph-argparse-2:14.2.22-110.el8cp.ppc64le" }, "product_reference": "python3-ceph-argparse-2:14.2.22-110.el8cp.ppc64le", "relates_to_product_reference": "8Base-RHCEPH-4.3-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "python3-ceph-argparse-2:14.2.22-110.el8cp.s390x as a component of Red Hat Ceph Storage 4.3 Tools", "product_id": "8Base-RHCEPH-4.3-Tools:python3-ceph-argparse-2:14.2.22-110.el8cp.s390x" }, "product_reference": "python3-ceph-argparse-2:14.2.22-110.el8cp.s390x", "relates_to_product_reference": "8Base-RHCEPH-4.3-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "python3-ceph-argparse-2:14.2.22-110.el8cp.x86_64 as a component of Red Hat Ceph Storage 4.3 Tools", "product_id": "8Base-RHCEPH-4.3-Tools:python3-ceph-argparse-2:14.2.22-110.el8cp.x86_64" }, "product_reference": "python3-ceph-argparse-2:14.2.22-110.el8cp.x86_64", "relates_to_product_reference": "8Base-RHCEPH-4.3-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "python3-cephfs-2:14.2.22-110.el8cp.ppc64le as a component of Red Hat Ceph Storage 4.3 Tools", "product_id": "8Base-RHCEPH-4.3-Tools:python3-cephfs-2:14.2.22-110.el8cp.ppc64le" }, "product_reference": "python3-cephfs-2:14.2.22-110.el8cp.ppc64le", "relates_to_product_reference": "8Base-RHCEPH-4.3-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "python3-cephfs-2:14.2.22-110.el8cp.s390x as a component of Red Hat Ceph Storage 4.3 Tools", "product_id": "8Base-RHCEPH-4.3-Tools:python3-cephfs-2:14.2.22-110.el8cp.s390x" }, "product_reference": "python3-cephfs-2:14.2.22-110.el8cp.s390x", "relates_to_product_reference": "8Base-RHCEPH-4.3-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "python3-cephfs-2:14.2.22-110.el8cp.x86_64 as a component of Red Hat Ceph Storage 4.3 Tools", "product_id": "8Base-RHCEPH-4.3-Tools:python3-cephfs-2:14.2.22-110.el8cp.x86_64" }, "product_reference": "python3-cephfs-2:14.2.22-110.el8cp.x86_64", "relates_to_product_reference": "8Base-RHCEPH-4.3-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "python3-cephfs-debuginfo-2:14.2.22-110.el8cp.ppc64le as a component of Red Hat Ceph Storage 4.3 Tools", "product_id": "8Base-RHCEPH-4.3-Tools:python3-cephfs-debuginfo-2:14.2.22-110.el8cp.ppc64le" }, "product_reference": "python3-cephfs-debuginfo-2:14.2.22-110.el8cp.ppc64le", "relates_to_product_reference": "8Base-RHCEPH-4.3-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "python3-cephfs-debuginfo-2:14.2.22-110.el8cp.s390x as a component of Red Hat Ceph Storage 4.3 Tools", "product_id": "8Base-RHCEPH-4.3-Tools:python3-cephfs-debuginfo-2:14.2.22-110.el8cp.s390x" }, "product_reference": "python3-cephfs-debuginfo-2:14.2.22-110.el8cp.s390x", "relates_to_product_reference": "8Base-RHCEPH-4.3-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "python3-cephfs-debuginfo-2:14.2.22-110.el8cp.x86_64 as a component of Red Hat Ceph Storage 4.3 Tools", "product_id": "8Base-RHCEPH-4.3-Tools:python3-cephfs-debuginfo-2:14.2.22-110.el8cp.x86_64" }, "product_reference": "python3-cephfs-debuginfo-2:14.2.22-110.el8cp.x86_64", "relates_to_product_reference": "8Base-RHCEPH-4.3-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "python3-rados-2:14.2.22-110.el8cp.ppc64le as a component of Red Hat Ceph Storage 4.3 Tools", "product_id": "8Base-RHCEPH-4.3-Tools:python3-rados-2:14.2.22-110.el8cp.ppc64le" }, "product_reference": "python3-rados-2:14.2.22-110.el8cp.ppc64le", "relates_to_product_reference": "8Base-RHCEPH-4.3-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "python3-rados-2:14.2.22-110.el8cp.s390x as a component of Red Hat Ceph Storage 4.3 Tools", "product_id": "8Base-RHCEPH-4.3-Tools:python3-rados-2:14.2.22-110.el8cp.s390x" }, "product_reference": "python3-rados-2:14.2.22-110.el8cp.s390x", "relates_to_product_reference": "8Base-RHCEPH-4.3-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "python3-rados-2:14.2.22-110.el8cp.x86_64 as a component of Red Hat Ceph Storage 4.3 Tools", "product_id": "8Base-RHCEPH-4.3-Tools:python3-rados-2:14.2.22-110.el8cp.x86_64" }, "product_reference": "python3-rados-2:14.2.22-110.el8cp.x86_64", "relates_to_product_reference": "8Base-RHCEPH-4.3-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "python3-rados-debuginfo-2:14.2.22-110.el8cp.ppc64le as a component of Red Hat Ceph Storage 4.3 Tools", "product_id": "8Base-RHCEPH-4.3-Tools:python3-rados-debuginfo-2:14.2.22-110.el8cp.ppc64le" }, "product_reference": "python3-rados-debuginfo-2:14.2.22-110.el8cp.ppc64le", "relates_to_product_reference": "8Base-RHCEPH-4.3-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "python3-rados-debuginfo-2:14.2.22-110.el8cp.s390x as a component of Red Hat Ceph Storage 4.3 Tools", "product_id": "8Base-RHCEPH-4.3-Tools:python3-rados-debuginfo-2:14.2.22-110.el8cp.s390x" }, "product_reference": "python3-rados-debuginfo-2:14.2.22-110.el8cp.s390x", "relates_to_product_reference": "8Base-RHCEPH-4.3-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "python3-rados-debuginfo-2:14.2.22-110.el8cp.x86_64 as a component of Red Hat Ceph Storage 4.3 Tools", "product_id": "8Base-RHCEPH-4.3-Tools:python3-rados-debuginfo-2:14.2.22-110.el8cp.x86_64" }, "product_reference": "python3-rados-debuginfo-2:14.2.22-110.el8cp.x86_64", "relates_to_product_reference": "8Base-RHCEPH-4.3-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "python3-rbd-2:14.2.22-110.el8cp.ppc64le as a component of Red Hat Ceph Storage 4.3 Tools", "product_id": "8Base-RHCEPH-4.3-Tools:python3-rbd-2:14.2.22-110.el8cp.ppc64le" }, "product_reference": "python3-rbd-2:14.2.22-110.el8cp.ppc64le", "relates_to_product_reference": "8Base-RHCEPH-4.3-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "python3-rbd-2:14.2.22-110.el8cp.s390x as a component of Red Hat Ceph Storage 4.3 Tools", "product_id": "8Base-RHCEPH-4.3-Tools:python3-rbd-2:14.2.22-110.el8cp.s390x" }, "product_reference": "python3-rbd-2:14.2.22-110.el8cp.s390x", "relates_to_product_reference": "8Base-RHCEPH-4.3-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "python3-rbd-2:14.2.22-110.el8cp.x86_64 as a component of Red Hat Ceph Storage 4.3 Tools", "product_id": "8Base-RHCEPH-4.3-Tools:python3-rbd-2:14.2.22-110.el8cp.x86_64" }, "product_reference": "python3-rbd-2:14.2.22-110.el8cp.x86_64", "relates_to_product_reference": "8Base-RHCEPH-4.3-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "python3-rbd-debuginfo-2:14.2.22-110.el8cp.ppc64le as a component of Red Hat Ceph Storage 4.3 Tools", "product_id": "8Base-RHCEPH-4.3-Tools:python3-rbd-debuginfo-2:14.2.22-110.el8cp.ppc64le" }, "product_reference": "python3-rbd-debuginfo-2:14.2.22-110.el8cp.ppc64le", "relates_to_product_reference": "8Base-RHCEPH-4.3-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "python3-rbd-debuginfo-2:14.2.22-110.el8cp.s390x as a component of Red Hat Ceph Storage 4.3 Tools", "product_id": "8Base-RHCEPH-4.3-Tools:python3-rbd-debuginfo-2:14.2.22-110.el8cp.s390x" }, "product_reference": "python3-rbd-debuginfo-2:14.2.22-110.el8cp.s390x", "relates_to_product_reference": "8Base-RHCEPH-4.3-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "python3-rbd-debuginfo-2:14.2.22-110.el8cp.x86_64 as a component of Red Hat Ceph Storage 4.3 Tools", "product_id": "8Base-RHCEPH-4.3-Tools:python3-rbd-debuginfo-2:14.2.22-110.el8cp.x86_64" }, "product_reference": "python3-rbd-debuginfo-2:14.2.22-110.el8cp.x86_64", "relates_to_product_reference": "8Base-RHCEPH-4.3-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "python3-rgw-2:14.2.22-110.el8cp.ppc64le as a component of Red Hat Ceph Storage 4.3 Tools", "product_id": "8Base-RHCEPH-4.3-Tools:python3-rgw-2:14.2.22-110.el8cp.ppc64le" }, "product_reference": "python3-rgw-2:14.2.22-110.el8cp.ppc64le", "relates_to_product_reference": "8Base-RHCEPH-4.3-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "python3-rgw-2:14.2.22-110.el8cp.s390x as a component of Red Hat Ceph Storage 4.3 Tools", "product_id": "8Base-RHCEPH-4.3-Tools:python3-rgw-2:14.2.22-110.el8cp.s390x" }, "product_reference": "python3-rgw-2:14.2.22-110.el8cp.s390x", "relates_to_product_reference": "8Base-RHCEPH-4.3-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "python3-rgw-2:14.2.22-110.el8cp.x86_64 as a component of Red Hat Ceph Storage 4.3 Tools", "product_id": "8Base-RHCEPH-4.3-Tools:python3-rgw-2:14.2.22-110.el8cp.x86_64" }, "product_reference": "python3-rgw-2:14.2.22-110.el8cp.x86_64", "relates_to_product_reference": "8Base-RHCEPH-4.3-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "python3-rgw-debuginfo-2:14.2.22-110.el8cp.ppc64le as a component of Red Hat Ceph Storage 4.3 Tools", "product_id": "8Base-RHCEPH-4.3-Tools:python3-rgw-debuginfo-2:14.2.22-110.el8cp.ppc64le" }, "product_reference": "python3-rgw-debuginfo-2:14.2.22-110.el8cp.ppc64le", "relates_to_product_reference": "8Base-RHCEPH-4.3-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "python3-rgw-debuginfo-2:14.2.22-110.el8cp.s390x as a component of Red Hat Ceph Storage 4.3 Tools", "product_id": "8Base-RHCEPH-4.3-Tools:python3-rgw-debuginfo-2:14.2.22-110.el8cp.s390x" }, "product_reference": "python3-rgw-debuginfo-2:14.2.22-110.el8cp.s390x", "relates_to_product_reference": "8Base-RHCEPH-4.3-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "python3-rgw-debuginfo-2:14.2.22-110.el8cp.x86_64 as a component of Red Hat Ceph Storage 4.3 Tools", "product_id": "8Base-RHCEPH-4.3-Tools:python3-rgw-debuginfo-2:14.2.22-110.el8cp.x86_64" }, "product_reference": "python3-rgw-debuginfo-2:14.2.22-110.el8cp.x86_64", "relates_to_product_reference": "8Base-RHCEPH-4.3-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "rbd-fuse-debuginfo-2:14.2.22-110.el8cp.ppc64le as a component of Red Hat Ceph Storage 4.3 Tools", "product_id": "8Base-RHCEPH-4.3-Tools:rbd-fuse-debuginfo-2:14.2.22-110.el8cp.ppc64le" }, "product_reference": "rbd-fuse-debuginfo-2:14.2.22-110.el8cp.ppc64le", "relates_to_product_reference": "8Base-RHCEPH-4.3-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "rbd-fuse-debuginfo-2:14.2.22-110.el8cp.s390x as a component of Red Hat Ceph Storage 4.3 Tools", "product_id": "8Base-RHCEPH-4.3-Tools:rbd-fuse-debuginfo-2:14.2.22-110.el8cp.s390x" }, "product_reference": "rbd-fuse-debuginfo-2:14.2.22-110.el8cp.s390x", "relates_to_product_reference": "8Base-RHCEPH-4.3-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "rbd-fuse-debuginfo-2:14.2.22-110.el8cp.x86_64 as a component of Red Hat Ceph Storage 4.3 Tools", "product_id": "8Base-RHCEPH-4.3-Tools:rbd-fuse-debuginfo-2:14.2.22-110.el8cp.x86_64" }, "product_reference": "rbd-fuse-debuginfo-2:14.2.22-110.el8cp.x86_64", "relates_to_product_reference": "8Base-RHCEPH-4.3-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "rbd-mirror-2:14.2.22-110.el8cp.ppc64le as a component of Red Hat Ceph Storage 4.3 Tools", "product_id": "8Base-RHCEPH-4.3-Tools:rbd-mirror-2:14.2.22-110.el8cp.ppc64le" }, "product_reference": "rbd-mirror-2:14.2.22-110.el8cp.ppc64le", "relates_to_product_reference": "8Base-RHCEPH-4.3-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "rbd-mirror-2:14.2.22-110.el8cp.s390x as a component of Red Hat Ceph Storage 4.3 Tools", "product_id": "8Base-RHCEPH-4.3-Tools:rbd-mirror-2:14.2.22-110.el8cp.s390x" }, "product_reference": "rbd-mirror-2:14.2.22-110.el8cp.s390x", "relates_to_product_reference": "8Base-RHCEPH-4.3-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "rbd-mirror-2:14.2.22-110.el8cp.x86_64 as a component of Red Hat Ceph Storage 4.3 Tools", "product_id": "8Base-RHCEPH-4.3-Tools:rbd-mirror-2:14.2.22-110.el8cp.x86_64" }, "product_reference": "rbd-mirror-2:14.2.22-110.el8cp.x86_64", "relates_to_product_reference": "8Base-RHCEPH-4.3-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "rbd-mirror-debuginfo-2:14.2.22-110.el8cp.ppc64le as a component of Red Hat Ceph Storage 4.3 Tools", "product_id": "8Base-RHCEPH-4.3-Tools:rbd-mirror-debuginfo-2:14.2.22-110.el8cp.ppc64le" }, "product_reference": "rbd-mirror-debuginfo-2:14.2.22-110.el8cp.ppc64le", "relates_to_product_reference": "8Base-RHCEPH-4.3-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "rbd-mirror-debuginfo-2:14.2.22-110.el8cp.s390x as a component of Red Hat Ceph Storage 4.3 Tools", "product_id": "8Base-RHCEPH-4.3-Tools:rbd-mirror-debuginfo-2:14.2.22-110.el8cp.s390x" }, "product_reference": "rbd-mirror-debuginfo-2:14.2.22-110.el8cp.s390x", "relates_to_product_reference": "8Base-RHCEPH-4.3-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "rbd-mirror-debuginfo-2:14.2.22-110.el8cp.x86_64 as a component of Red Hat Ceph Storage 4.3 Tools", "product_id": "8Base-RHCEPH-4.3-Tools:rbd-mirror-debuginfo-2:14.2.22-110.el8cp.x86_64" }, "product_reference": "rbd-mirror-debuginfo-2:14.2.22-110.el8cp.x86_64", "relates_to_product_reference": "8Base-RHCEPH-4.3-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "rbd-nbd-2:14.2.22-110.el8cp.ppc64le as a component of Red Hat Ceph Storage 4.3 Tools", "product_id": "8Base-RHCEPH-4.3-Tools:rbd-nbd-2:14.2.22-110.el8cp.ppc64le" }, "product_reference": "rbd-nbd-2:14.2.22-110.el8cp.ppc64le", "relates_to_product_reference": "8Base-RHCEPH-4.3-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "rbd-nbd-2:14.2.22-110.el8cp.s390x as a component of Red Hat Ceph Storage 4.3 Tools", "product_id": "8Base-RHCEPH-4.3-Tools:rbd-nbd-2:14.2.22-110.el8cp.s390x" }, "product_reference": "rbd-nbd-2:14.2.22-110.el8cp.s390x", "relates_to_product_reference": "8Base-RHCEPH-4.3-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "rbd-nbd-2:14.2.22-110.el8cp.x86_64 as a component of Red Hat Ceph Storage 4.3 Tools", "product_id": "8Base-RHCEPH-4.3-Tools:rbd-nbd-2:14.2.22-110.el8cp.x86_64" }, "product_reference": "rbd-nbd-2:14.2.22-110.el8cp.x86_64", "relates_to_product_reference": "8Base-RHCEPH-4.3-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "rbd-nbd-debuginfo-2:14.2.22-110.el8cp.ppc64le as a component of Red Hat Ceph Storage 4.3 Tools", "product_id": "8Base-RHCEPH-4.3-Tools:rbd-nbd-debuginfo-2:14.2.22-110.el8cp.ppc64le" }, "product_reference": "rbd-nbd-debuginfo-2:14.2.22-110.el8cp.ppc64le", "relates_to_product_reference": "8Base-RHCEPH-4.3-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "rbd-nbd-debuginfo-2:14.2.22-110.el8cp.s390x as a component of Red Hat Ceph Storage 4.3 Tools", "product_id": "8Base-RHCEPH-4.3-Tools:rbd-nbd-debuginfo-2:14.2.22-110.el8cp.s390x" }, "product_reference": "rbd-nbd-debuginfo-2:14.2.22-110.el8cp.s390x", "relates_to_product_reference": "8Base-RHCEPH-4.3-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "rbd-nbd-debuginfo-2:14.2.22-110.el8cp.x86_64 as a component of Red Hat Ceph Storage 4.3 Tools", "product_id": "8Base-RHCEPH-4.3-Tools:rbd-nbd-debuginfo-2:14.2.22-110.el8cp.x86_64" }, "product_reference": "rbd-nbd-debuginfo-2:14.2.22-110.el8cp.x86_64", "relates_to_product_reference": "8Base-RHCEPH-4.3-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "tcmu-runner-0:1.5.2-5.el8cp.ppc64le as a component of Red Hat Ceph Storage 4.3 Tools", "product_id": "8Base-RHCEPH-4.3-Tools:tcmu-runner-0:1.5.2-5.el8cp.ppc64le" }, "product_reference": "tcmu-runner-0:1.5.2-5.el8cp.ppc64le", "relates_to_product_reference": "8Base-RHCEPH-4.3-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "tcmu-runner-0:1.5.2-5.el8cp.s390x as a component of Red Hat Ceph Storage 4.3 Tools", "product_id": "8Base-RHCEPH-4.3-Tools:tcmu-runner-0:1.5.2-5.el8cp.s390x" }, "product_reference": "tcmu-runner-0:1.5.2-5.el8cp.s390x", "relates_to_product_reference": "8Base-RHCEPH-4.3-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "tcmu-runner-0:1.5.2-5.el8cp.src as a component of Red Hat Ceph Storage 4.3 Tools", "product_id": "8Base-RHCEPH-4.3-Tools:tcmu-runner-0:1.5.2-5.el8cp.src" }, "product_reference": "tcmu-runner-0:1.5.2-5.el8cp.src", "relates_to_product_reference": "8Base-RHCEPH-4.3-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "tcmu-runner-0:1.5.2-5.el8cp.x86_64 as a component of Red Hat Ceph Storage 4.3 Tools", "product_id": "8Base-RHCEPH-4.3-Tools:tcmu-runner-0:1.5.2-5.el8cp.x86_64" }, "product_reference": "tcmu-runner-0:1.5.2-5.el8cp.x86_64", "relates_to_product_reference": "8Base-RHCEPH-4.3-Tools" } ] }, "vulnerabilities": [ { "acknowledgments": [ { "names": [ "Hubert Kario" ], "organization": "Red Hat", "summary": "This issue was discovered by Red Hat." } ], "cve": "CVE-2020-25658", "cwe": { "id": "CWE-385", "name": "Covert Timing Channel" }, "discovery_date": "2020-10-21T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "7Server-RHEL-7-RHCEPH-4.3-MON:ceph-2:14.2.22-110.el7cp.src", "7Server-RHEL-7-RHCEPH-4.3-MON:ceph-base-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-MON:ceph-base-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-MON:ceph-common-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-MON:ceph-common-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-MON:ceph-debuginfo-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-MON:ceph-debuginfo-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-MON:ceph-fuse-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-MON:ceph-fuse-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-MON:ceph-grafana-dashboards-2:14.2.22-110.el7cp.noarch", "7Server-RHEL-7-RHCEPH-4.3-MON:ceph-mds-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-MON:ceph-mds-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-MON:ceph-mgr-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-MON:ceph-mgr-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-MON:ceph-mgr-dashboard-2:14.2.22-110.el7cp.noarch", "7Server-RHEL-7-RHCEPH-4.3-MON:ceph-mgr-diskprediction-local-2:14.2.22-110.el7cp.noarch", "7Server-RHEL-7-RHCEPH-4.3-MON:ceph-mgr-k8sevents-2:14.2.22-110.el7cp.noarch", "7Server-RHEL-7-RHCEPH-4.3-MON:ceph-mgr-rook-2:14.2.22-110.el7cp.noarch", "7Server-RHEL-7-RHCEPH-4.3-MON:ceph-mon-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-MON:ceph-mon-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-MON:ceph-osd-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-MON:ceph-osd-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-MON:ceph-radosgw-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-MON:ceph-radosgw-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-MON:ceph-selinux-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-MON:ceph-selinux-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-MON:ceph-test-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-MON:ceph-test-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-MON:libcephfs-devel-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-MON:libcephfs-devel-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-MON:libcephfs2-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-MON:libcephfs2-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-MON:librados-devel-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-MON:librados-devel-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-MON:librados2-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-MON:librados2-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-MON:libradospp-devel-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-MON:libradospp-devel-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-MON:libradosstriper1-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-MON:libradosstriper1-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-MON:librbd-devel-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-MON:librbd-devel-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-MON:librbd1-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-MON:librbd1-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-MON:librgw-devel-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-MON:librgw-devel-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-MON:librgw2-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-MON:librgw2-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-MON:python-ceph-argparse-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-MON:python-ceph-argparse-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-MON:python-cephfs-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-MON:python-cephfs-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-MON:python-rados-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-MON:python-rados-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-MON:python-rbd-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-MON:python-rbd-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-MON:python-rgw-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-MON:python-rgw-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-MON:rbd-mirror-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-MON:rbd-mirror-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-MON:rbd-nbd-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-MON:rbd-nbd-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-OSD:ceph-2:14.2.22-110.el7cp.src", "7Server-RHEL-7-RHCEPH-4.3-OSD:ceph-base-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-OSD:ceph-base-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-OSD:ceph-common-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-OSD:ceph-common-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-OSD:ceph-debuginfo-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-OSD:ceph-debuginfo-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-OSD:ceph-fuse-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-OSD:ceph-fuse-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-OSD:ceph-grafana-dashboards-2:14.2.22-110.el7cp.noarch", "7Server-RHEL-7-RHCEPH-4.3-OSD:ceph-mds-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-OSD:ceph-mds-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-OSD:ceph-mgr-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-OSD:ceph-mgr-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-OSD:ceph-mgr-dashboard-2:14.2.22-110.el7cp.noarch", "7Server-RHEL-7-RHCEPH-4.3-OSD:ceph-mgr-diskprediction-local-2:14.2.22-110.el7cp.noarch", "7Server-RHEL-7-RHCEPH-4.3-OSD:ceph-mgr-k8sevents-2:14.2.22-110.el7cp.noarch", "7Server-RHEL-7-RHCEPH-4.3-OSD:ceph-mgr-rook-2:14.2.22-110.el7cp.noarch", "7Server-RHEL-7-RHCEPH-4.3-OSD:ceph-mon-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-OSD:ceph-mon-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-OSD:ceph-osd-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-OSD:ceph-osd-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-OSD:ceph-radosgw-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-OSD:ceph-radosgw-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-OSD:ceph-selinux-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-OSD:ceph-selinux-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-OSD:ceph-test-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-OSD:ceph-test-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-OSD:libcephfs-devel-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-OSD:libcephfs-devel-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-OSD:libcephfs2-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-OSD:libcephfs2-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-OSD:librados-devel-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-OSD:librados-devel-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-OSD:librados2-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-OSD:librados2-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-OSD:libradospp-devel-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-OSD:libradospp-devel-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-OSD:libradosstriper1-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-OSD:libradosstriper1-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-OSD:librbd-devel-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-OSD:librbd-devel-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-OSD:librbd1-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-OSD:librbd1-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-OSD:librgw-devel-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-OSD:librgw-devel-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-OSD:librgw2-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-OSD:librgw2-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-OSD:python-ceph-argparse-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-OSD:python-ceph-argparse-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-OSD:python-cephfs-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-OSD:python-cephfs-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-OSD:python-rados-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-OSD:python-rados-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-OSD:python-rbd-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-OSD:python-rbd-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-OSD:python-rgw-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-OSD:python-rgw-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-OSD:rbd-mirror-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-OSD:rbd-mirror-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-OSD:rbd-nbd-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-OSD:rbd-nbd-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-Tools:ceph-2:14.2.22-110.el7cp.src", "7Server-RHEL-7-RHCEPH-4.3-Tools:ceph-ansible-0:4.0.70.3-1.el7cp.noarch", "7Server-RHEL-7-RHCEPH-4.3-Tools:ceph-ansible-0:4.0.70.3-1.el7cp.src", "7Server-RHEL-7-RHCEPH-4.3-Tools:ceph-base-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-Tools:ceph-base-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-Tools:ceph-common-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-Tools:ceph-common-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-Tools:ceph-debuginfo-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-Tools:ceph-debuginfo-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-Tools:ceph-fuse-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-Tools:ceph-fuse-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-Tools:ceph-grafana-dashboards-2:14.2.22-110.el7cp.noarch", "7Server-RHEL-7-RHCEPH-4.3-Tools:ceph-iscsi-0:3.4-5.el7cp.noarch", "7Server-RHEL-7-RHCEPH-4.3-Tools:ceph-iscsi-0:3.4-5.el7cp.src", "7Server-RHEL-7-RHCEPH-4.3-Tools:ceph-mds-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-Tools:ceph-mds-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-Tools:ceph-mgr-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-Tools:ceph-mgr-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-Tools:ceph-mgr-dashboard-2:14.2.22-110.el7cp.noarch", "7Server-RHEL-7-RHCEPH-4.3-Tools:ceph-mgr-diskprediction-local-2:14.2.22-110.el7cp.noarch", "7Server-RHEL-7-RHCEPH-4.3-Tools:ceph-mgr-k8sevents-2:14.2.22-110.el7cp.noarch", "7Server-RHEL-7-RHCEPH-4.3-Tools:ceph-mgr-rook-2:14.2.22-110.el7cp.noarch", "7Server-RHEL-7-RHCEPH-4.3-Tools:ceph-mon-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-Tools:ceph-mon-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-Tools:ceph-osd-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-Tools:ceph-osd-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-Tools:ceph-radosgw-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-Tools:ceph-radosgw-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-Tools:ceph-selinux-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-Tools:ceph-selinux-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-Tools:ceph-test-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-Tools:ceph-test-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-Tools:libcephfs-devel-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-Tools:libcephfs-devel-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-Tools:libcephfs2-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-Tools:libcephfs2-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-Tools:libntirpc-0:3.4-1.1.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-Tools:libntirpc-0:3.4-1.1.el7cp.src", "7Server-RHEL-7-RHCEPH-4.3-Tools:libntirpc-0:3.4-1.1.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-Tools:libntirpc-debuginfo-0:3.4-1.1.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-Tools:libntirpc-debuginfo-0:3.4-1.1.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-Tools:librados-devel-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-Tools:librados-devel-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-Tools:librados2-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-Tools:librados2-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-Tools:libradospp-devel-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-Tools:libradospp-devel-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-Tools:libradosstriper1-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-Tools:libradosstriper1-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-Tools:librbd-devel-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-Tools:librbd-devel-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-Tools:librbd1-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-Tools:librbd1-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-Tools:librgw-devel-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-Tools:librgw-devel-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-Tools:librgw2-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-Tools:librgw2-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-Tools:libtcmu-0:1.5.2-5.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-Tools:libtcmu-0:1.5.2-5.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-Tools:nfs-ganesha-0:3.5-1.2.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-Tools:nfs-ganesha-0:3.5-1.2.el7cp.src", "7Server-RHEL-7-RHCEPH-4.3-Tools:nfs-ganesha-0:3.5-1.2.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-Tools:nfs-ganesha-ceph-0:3.5-1.2.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-Tools:nfs-ganesha-ceph-0:3.5-1.2.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-Tools:nfs-ganesha-debuginfo-0:3.5-1.2.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-Tools:nfs-ganesha-debuginfo-0:3.5-1.2.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-Tools:nfs-ganesha-proxy-0:3.5-1.2.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-Tools:nfs-ganesha-proxy-0:3.5-1.2.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-Tools:nfs-ganesha-rados-grace-0:3.5-1.2.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-Tools:nfs-ganesha-rados-grace-0:3.5-1.2.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-Tools:nfs-ganesha-rados-urls-0:3.5-1.2.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-Tools:nfs-ganesha-rados-urls-0:3.5-1.2.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-Tools:nfs-ganesha-rgw-0:3.5-1.2.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-Tools:nfs-ganesha-rgw-0:3.5-1.2.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-Tools:nfs-ganesha-selinux-0:3.5-1.2.el7cp.noarch", "7Server-RHEL-7-RHCEPH-4.3-Tools:nfs-ganesha-vfs-0:3.5-1.2.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-Tools:nfs-ganesha-vfs-0:3.5-1.2.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-Tools:python-ceph-argparse-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-Tools:python-ceph-argparse-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-Tools:python-cephfs-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-Tools:python-cephfs-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-Tools:python-rados-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-Tools:python-rados-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-Tools:python-rbd-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-Tools:python-rbd-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-Tools:python-rgw-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-Tools:python-rgw-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-Tools:rbd-mirror-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-Tools:rbd-mirror-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-Tools:rbd-nbd-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-Tools:rbd-nbd-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-Tools:tcmu-runner-0:1.5.2-5.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-Tools:tcmu-runner-0:1.5.2-5.el7cp.src", "7Server-RHEL-7-RHCEPH-4.3-Tools:tcmu-runner-0:1.5.2-5.el7cp.x86_64", "8Base-RHCEPH-4.3-MON:ceph-2:14.2.22-110.el8cp.src", "8Base-RHCEPH-4.3-MON:ceph-base-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-MON:ceph-base-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-MON:ceph-base-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-MON:ceph-base-debuginfo-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-MON:ceph-base-debuginfo-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-MON:ceph-base-debuginfo-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-MON:ceph-common-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-MON:ceph-common-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-MON:ceph-common-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-MON:ceph-common-debuginfo-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-MON:ceph-common-debuginfo-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-MON:ceph-common-debuginfo-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-MON:ceph-debugsource-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-MON:ceph-debugsource-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-MON:ceph-debugsource-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-MON:ceph-fuse-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-MON:ceph-fuse-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-MON:ceph-fuse-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-MON:ceph-fuse-debuginfo-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-MON:ceph-fuse-debuginfo-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-MON:ceph-fuse-debuginfo-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-MON:ceph-grafana-dashboards-2:14.2.22-110.el8cp.noarch", "8Base-RHCEPH-4.3-MON:ceph-mds-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-MON:ceph-mds-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-MON:ceph-mds-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-MON:ceph-mds-debuginfo-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-MON:ceph-mds-debuginfo-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-MON:ceph-mds-debuginfo-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-MON:ceph-mgr-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-MON:ceph-mgr-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-MON:ceph-mgr-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-MON:ceph-mgr-dashboard-2:14.2.22-110.el8cp.noarch", "8Base-RHCEPH-4.3-MON:ceph-mgr-debuginfo-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-MON:ceph-mgr-debuginfo-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-MON:ceph-mgr-debuginfo-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-MON:ceph-mgr-diskprediction-local-2:14.2.22-110.el8cp.noarch", "8Base-RHCEPH-4.3-MON:ceph-mgr-k8sevents-2:14.2.22-110.el8cp.noarch", "8Base-RHCEPH-4.3-MON:ceph-mgr-rook-2:14.2.22-110.el8cp.noarch", "8Base-RHCEPH-4.3-MON:ceph-mon-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-MON:ceph-mon-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-MON:ceph-mon-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-MON:ceph-mon-debuginfo-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-MON:ceph-mon-debuginfo-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-MON:ceph-mon-debuginfo-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-MON:ceph-osd-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-MON:ceph-osd-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-MON:ceph-osd-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-MON:ceph-osd-debuginfo-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-MON:ceph-osd-debuginfo-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-MON:ceph-osd-debuginfo-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-MON:ceph-radosgw-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-MON:ceph-radosgw-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-MON:ceph-radosgw-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-MON:ceph-radosgw-debuginfo-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-MON:ceph-radosgw-debuginfo-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-MON:ceph-radosgw-debuginfo-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-MON:ceph-selinux-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-MON:ceph-selinux-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-MON:ceph-selinux-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-MON:ceph-test-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-MON:ceph-test-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-MON:ceph-test-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-MON:ceph-test-debuginfo-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-MON:ceph-test-debuginfo-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-MON:ceph-test-debuginfo-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-MON:libcephfs-devel-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-MON:libcephfs-devel-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-MON:libcephfs-devel-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-MON:libcephfs2-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-MON:libcephfs2-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-MON:libcephfs2-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-MON:libcephfs2-debuginfo-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-MON:libcephfs2-debuginfo-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-MON:libcephfs2-debuginfo-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-MON:librados-devel-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-MON:librados-devel-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-MON:librados-devel-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-MON:librados-devel-debuginfo-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-MON:librados-devel-debuginfo-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-MON:librados-devel-debuginfo-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-MON:librados2-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-MON:librados2-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-MON:librados2-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-MON:librados2-debuginfo-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-MON:librados2-debuginfo-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-MON:librados2-debuginfo-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-MON:libradospp-devel-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-MON:libradospp-devel-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-MON:libradospp-devel-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-MON:libradosstriper1-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-MON:libradosstriper1-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-MON:libradosstriper1-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-MON:libradosstriper1-debuginfo-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-MON:libradosstriper1-debuginfo-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-MON:libradosstriper1-debuginfo-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-MON:librbd-devel-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-MON:librbd-devel-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-MON:librbd-devel-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-MON:librbd1-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-MON:librbd1-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-MON:librbd1-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-MON:librbd1-debuginfo-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-MON:librbd1-debuginfo-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-MON:librbd1-debuginfo-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-MON:librgw-devel-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-MON:librgw-devel-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-MON:librgw-devel-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-MON:librgw2-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-MON:librgw2-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-MON:librgw2-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-MON:librgw2-debuginfo-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-MON:librgw2-debuginfo-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-MON:librgw2-debuginfo-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-MON:python3-ceph-argparse-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-MON:python3-ceph-argparse-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-MON:python3-ceph-argparse-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-MON:python3-cephfs-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-MON:python3-cephfs-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-MON:python3-cephfs-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-MON:python3-cephfs-debuginfo-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-MON:python3-cephfs-debuginfo-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-MON:python3-cephfs-debuginfo-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-MON:python3-rados-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-MON:python3-rados-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-MON:python3-rados-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-MON:python3-rados-debuginfo-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-MON:python3-rados-debuginfo-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-MON:python3-rados-debuginfo-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-MON:python3-rbd-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-MON:python3-rbd-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-MON:python3-rbd-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-MON:python3-rbd-debuginfo-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-MON:python3-rbd-debuginfo-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-MON:python3-rbd-debuginfo-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-MON:python3-rgw-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-MON:python3-rgw-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-MON:python3-rgw-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-MON:python3-rgw-debuginfo-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-MON:python3-rgw-debuginfo-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-MON:python3-rgw-debuginfo-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-MON:rbd-fuse-debuginfo-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-MON:rbd-fuse-debuginfo-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-MON:rbd-fuse-debuginfo-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-MON:rbd-mirror-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-MON:rbd-mirror-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-MON:rbd-mirror-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-MON:rbd-mirror-debuginfo-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-MON:rbd-mirror-debuginfo-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-MON:rbd-mirror-debuginfo-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-MON:rbd-nbd-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-MON:rbd-nbd-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-MON:rbd-nbd-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-MON:rbd-nbd-debuginfo-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-MON:rbd-nbd-debuginfo-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-MON:rbd-nbd-debuginfo-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-OSD:ceph-2:14.2.22-110.el8cp.src", "8Base-RHCEPH-4.3-OSD:ceph-base-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-OSD:ceph-base-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-OSD:ceph-base-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-OSD:ceph-base-debuginfo-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-OSD:ceph-base-debuginfo-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-OSD:ceph-base-debuginfo-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-OSD:ceph-common-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-OSD:ceph-common-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-OSD:ceph-common-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-OSD:ceph-common-debuginfo-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-OSD:ceph-common-debuginfo-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-OSD:ceph-common-debuginfo-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-OSD:ceph-debugsource-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-OSD:ceph-debugsource-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-OSD:ceph-debugsource-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-OSD:ceph-fuse-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-OSD:ceph-fuse-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-OSD:ceph-fuse-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-OSD:ceph-fuse-debuginfo-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-OSD:ceph-fuse-debuginfo-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-OSD:ceph-fuse-debuginfo-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-OSD:ceph-grafana-dashboards-2:14.2.22-110.el8cp.noarch", "8Base-RHCEPH-4.3-OSD:ceph-mds-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-OSD:ceph-mds-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-OSD:ceph-mds-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-OSD:ceph-mds-debuginfo-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-OSD:ceph-mds-debuginfo-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-OSD:ceph-mds-debuginfo-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-OSD:ceph-mgr-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-OSD:ceph-mgr-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-OSD:ceph-mgr-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-OSD:ceph-mgr-dashboard-2:14.2.22-110.el8cp.noarch", "8Base-RHCEPH-4.3-OSD:ceph-mgr-debuginfo-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-OSD:ceph-mgr-debuginfo-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-OSD:ceph-mgr-debuginfo-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-OSD:ceph-mgr-diskprediction-local-2:14.2.22-110.el8cp.noarch", "8Base-RHCEPH-4.3-OSD:ceph-mgr-k8sevents-2:14.2.22-110.el8cp.noarch", "8Base-RHCEPH-4.3-OSD:ceph-mgr-rook-2:14.2.22-110.el8cp.noarch", "8Base-RHCEPH-4.3-OSD:ceph-mon-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-OSD:ceph-mon-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-OSD:ceph-mon-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-OSD:ceph-mon-debuginfo-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-OSD:ceph-mon-debuginfo-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-OSD:ceph-mon-debuginfo-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-OSD:ceph-osd-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-OSD:ceph-osd-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-OSD:ceph-osd-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-OSD:ceph-osd-debuginfo-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-OSD:ceph-osd-debuginfo-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-OSD:ceph-osd-debuginfo-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-OSD:ceph-radosgw-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-OSD:ceph-radosgw-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-OSD:ceph-radosgw-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-OSD:ceph-radosgw-debuginfo-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-OSD:ceph-radosgw-debuginfo-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-OSD:ceph-radosgw-debuginfo-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-OSD:ceph-selinux-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-OSD:ceph-selinux-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-OSD:ceph-selinux-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-OSD:ceph-test-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-OSD:ceph-test-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-OSD:ceph-test-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-OSD:ceph-test-debuginfo-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-OSD:ceph-test-debuginfo-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-OSD:ceph-test-debuginfo-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-OSD:libcephfs-devel-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-OSD:libcephfs-devel-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-OSD:libcephfs-devel-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-OSD:libcephfs2-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-OSD:libcephfs2-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-OSD:libcephfs2-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-OSD:libcephfs2-debuginfo-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-OSD:libcephfs2-debuginfo-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-OSD:libcephfs2-debuginfo-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-OSD:librados-devel-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-OSD:librados-devel-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-OSD:librados-devel-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-OSD:librados-devel-debuginfo-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-OSD:librados-devel-debuginfo-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-OSD:librados-devel-debuginfo-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-OSD:librados2-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-OSD:librados2-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-OSD:librados2-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-OSD:librados2-debuginfo-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-OSD:librados2-debuginfo-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-OSD:librados2-debuginfo-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-OSD:libradospp-devel-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-OSD:libradospp-devel-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-OSD:libradospp-devel-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-OSD:libradosstriper1-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-OSD:libradosstriper1-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-OSD:libradosstriper1-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-OSD:libradosstriper1-debuginfo-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-OSD:libradosstriper1-debuginfo-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-OSD:libradosstriper1-debuginfo-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-OSD:librbd-devel-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-OSD:librbd-devel-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-OSD:librbd-devel-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-OSD:librbd1-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-OSD:librbd1-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-OSD:librbd1-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-OSD:librbd1-debuginfo-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-OSD:librbd1-debuginfo-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-OSD:librbd1-debuginfo-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-OSD:librgw-devel-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-OSD:librgw-devel-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-OSD:librgw-devel-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-OSD:librgw2-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-OSD:librgw2-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-OSD:librgw2-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-OSD:librgw2-debuginfo-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-OSD:librgw2-debuginfo-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-OSD:librgw2-debuginfo-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-OSD:python3-ceph-argparse-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-OSD:python3-ceph-argparse-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-OSD:python3-ceph-argparse-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-OSD:python3-cephfs-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-OSD:python3-cephfs-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-OSD:python3-cephfs-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-OSD:python3-cephfs-debuginfo-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-OSD:python3-cephfs-debuginfo-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-OSD:python3-cephfs-debuginfo-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-OSD:python3-rados-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-OSD:python3-rados-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-OSD:python3-rados-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-OSD:python3-rados-debuginfo-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-OSD:python3-rados-debuginfo-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-OSD:python3-rados-debuginfo-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-OSD:python3-rbd-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-OSD:python3-rbd-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-OSD:python3-rbd-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-OSD:python3-rbd-debuginfo-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-OSD:python3-rbd-debuginfo-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-OSD:python3-rbd-debuginfo-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-OSD:python3-rgw-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-OSD:python3-rgw-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-OSD:python3-rgw-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-OSD:python3-rgw-debuginfo-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-OSD:python3-rgw-debuginfo-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-OSD:python3-rgw-debuginfo-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-OSD:rbd-fuse-debuginfo-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-OSD:rbd-fuse-debuginfo-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-OSD:rbd-fuse-debuginfo-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-OSD:rbd-mirror-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-OSD:rbd-mirror-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-OSD:rbd-mirror-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-OSD:rbd-mirror-debuginfo-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-OSD:rbd-mirror-debuginfo-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-OSD:rbd-mirror-debuginfo-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-OSD:rbd-nbd-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-OSD:rbd-nbd-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-OSD:rbd-nbd-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-OSD:rbd-nbd-debuginfo-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-OSD:rbd-nbd-debuginfo-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-OSD:rbd-nbd-debuginfo-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-Tools:ceph-2:14.2.22-110.el8cp.src", "8Base-RHCEPH-4.3-Tools:ceph-ansible-0:4.0.70.3-1.el8cp.noarch", "8Base-RHCEPH-4.3-Tools:ceph-ansible-0:4.0.70.3-1.el8cp.src", "8Base-RHCEPH-4.3-Tools:ceph-base-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-Tools:ceph-base-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-Tools:ceph-base-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-Tools:ceph-base-debuginfo-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-Tools:ceph-base-debuginfo-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-Tools:ceph-base-debuginfo-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-Tools:ceph-common-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-Tools:ceph-common-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-Tools:ceph-common-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-Tools:ceph-common-debuginfo-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-Tools:ceph-common-debuginfo-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-Tools:ceph-common-debuginfo-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-Tools:ceph-debugsource-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-Tools:ceph-debugsource-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-Tools:ceph-debugsource-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-Tools:ceph-fuse-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-Tools:ceph-fuse-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-Tools:ceph-fuse-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-Tools:ceph-fuse-debuginfo-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-Tools:ceph-fuse-debuginfo-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-Tools:ceph-fuse-debuginfo-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-Tools:ceph-grafana-dashboards-2:14.2.22-110.el8cp.noarch", "8Base-RHCEPH-4.3-Tools:ceph-iscsi-0:3.4-5.el8cp.noarch", "8Base-RHCEPH-4.3-Tools:ceph-iscsi-0:3.4-5.el8cp.src", "8Base-RHCEPH-4.3-Tools:ceph-mds-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-Tools:ceph-mds-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-Tools:ceph-mds-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-Tools:ceph-mds-debuginfo-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-Tools:ceph-mds-debuginfo-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-Tools:ceph-mds-debuginfo-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-Tools:ceph-mgr-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-Tools:ceph-mgr-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-Tools:ceph-mgr-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-Tools:ceph-mgr-dashboard-2:14.2.22-110.el8cp.noarch", "8Base-RHCEPH-4.3-Tools:ceph-mgr-debuginfo-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-Tools:ceph-mgr-debuginfo-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-Tools:ceph-mgr-debuginfo-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-Tools:ceph-mgr-diskprediction-local-2:14.2.22-110.el8cp.noarch", "8Base-RHCEPH-4.3-Tools:ceph-mgr-k8sevents-2:14.2.22-110.el8cp.noarch", "8Base-RHCEPH-4.3-Tools:ceph-mgr-rook-2:14.2.22-110.el8cp.noarch", "8Base-RHCEPH-4.3-Tools:ceph-mon-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-Tools:ceph-mon-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-Tools:ceph-mon-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-Tools:ceph-mon-debuginfo-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-Tools:ceph-mon-debuginfo-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-Tools:ceph-mon-debuginfo-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-Tools:ceph-osd-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-Tools:ceph-osd-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-Tools:ceph-osd-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-Tools:ceph-osd-debuginfo-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-Tools:ceph-osd-debuginfo-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-Tools:ceph-osd-debuginfo-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-Tools:ceph-radosgw-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-Tools:ceph-radosgw-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-Tools:ceph-radosgw-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-Tools:ceph-radosgw-debuginfo-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-Tools:ceph-radosgw-debuginfo-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-Tools:ceph-radosgw-debuginfo-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-Tools:ceph-selinux-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-Tools:ceph-selinux-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-Tools:ceph-selinux-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-Tools:ceph-test-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-Tools:ceph-test-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-Tools:ceph-test-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-Tools:ceph-test-debuginfo-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-Tools:ceph-test-debuginfo-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-Tools:ceph-test-debuginfo-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-Tools:libcephfs-devel-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-Tools:libcephfs-devel-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-Tools:libcephfs-devel-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-Tools:libcephfs2-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-Tools:libcephfs2-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-Tools:libcephfs2-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-Tools:libcephfs2-debuginfo-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-Tools:libcephfs2-debuginfo-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-Tools:libcephfs2-debuginfo-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-Tools:libntirpc-0:3.4-1.1.el8cp.ppc64le", "8Base-RHCEPH-4.3-Tools:libntirpc-0:3.4-1.1.el8cp.s390x", "8Base-RHCEPH-4.3-Tools:libntirpc-0:3.4-1.1.el8cp.src", "8Base-RHCEPH-4.3-Tools:libntirpc-0:3.4-1.1.el8cp.x86_64", "8Base-RHCEPH-4.3-Tools:libntirpc-debuginfo-0:3.4-1.1.el8cp.ppc64le", "8Base-RHCEPH-4.3-Tools:libntirpc-debuginfo-0:3.4-1.1.el8cp.s390x", "8Base-RHCEPH-4.3-Tools:libntirpc-debuginfo-0:3.4-1.1.el8cp.x86_64", "8Base-RHCEPH-4.3-Tools:libntirpc-debugsource-0:3.4-1.1.el8cp.ppc64le", "8Base-RHCEPH-4.3-Tools:libntirpc-debugsource-0:3.4-1.1.el8cp.s390x", "8Base-RHCEPH-4.3-Tools:libntirpc-debugsource-0:3.4-1.1.el8cp.x86_64", "8Base-RHCEPH-4.3-Tools:librados-devel-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-Tools:librados-devel-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-Tools:librados-devel-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-Tools:librados-devel-debuginfo-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-Tools:librados-devel-debuginfo-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-Tools:librados-devel-debuginfo-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-Tools:librados2-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-Tools:librados2-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-Tools:librados2-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-Tools:librados2-debuginfo-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-Tools:librados2-debuginfo-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-Tools:librados2-debuginfo-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-Tools:libradospp-devel-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-Tools:libradospp-devel-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-Tools:libradospp-devel-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-Tools:libradosstriper1-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-Tools:libradosstriper1-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-Tools:libradosstriper1-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-Tools:libradosstriper1-debuginfo-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-Tools:libradosstriper1-debuginfo-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-Tools:libradosstriper1-debuginfo-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-Tools:librbd-devel-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-Tools:librbd-devel-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-Tools:librbd-devel-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-Tools:librbd1-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-Tools:librbd1-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-Tools:librbd1-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-Tools:librbd1-debuginfo-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-Tools:librbd1-debuginfo-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-Tools:librbd1-debuginfo-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-Tools:librgw-devel-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-Tools:librgw-devel-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-Tools:librgw-devel-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-Tools:librgw2-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-Tools:librgw2-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-Tools:librgw2-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-Tools:librgw2-debuginfo-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-Tools:librgw2-debuginfo-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-Tools:librgw2-debuginfo-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-Tools:libtcmu-0:1.5.2-5.el8cp.ppc64le", "8Base-RHCEPH-4.3-Tools:libtcmu-0:1.5.2-5.el8cp.s390x", "8Base-RHCEPH-4.3-Tools:libtcmu-0:1.5.2-5.el8cp.x86_64", "8Base-RHCEPH-4.3-Tools:nfs-ganesha-0:3.5-1.2.el8cp.ppc64le", "8Base-RHCEPH-4.3-Tools:nfs-ganesha-0:3.5-1.2.el8cp.s390x", "8Base-RHCEPH-4.3-Tools:nfs-ganesha-0:3.5-1.2.el8cp.src", "8Base-RHCEPH-4.3-Tools:nfs-ganesha-0:3.5-1.2.el8cp.x86_64", "8Base-RHCEPH-4.3-Tools:nfs-ganesha-ceph-0:3.5-1.2.el8cp.ppc64le", "8Base-RHCEPH-4.3-Tools:nfs-ganesha-ceph-0:3.5-1.2.el8cp.s390x", "8Base-RHCEPH-4.3-Tools:nfs-ganesha-ceph-0:3.5-1.2.el8cp.x86_64", "8Base-RHCEPH-4.3-Tools:nfs-ganesha-ceph-debuginfo-0:3.5-1.2.el8cp.ppc64le", "8Base-RHCEPH-4.3-Tools:nfs-ganesha-ceph-debuginfo-0:3.5-1.2.el8cp.s390x", "8Base-RHCEPH-4.3-Tools:nfs-ganesha-ceph-debuginfo-0:3.5-1.2.el8cp.x86_64", "8Base-RHCEPH-4.3-Tools:nfs-ganesha-debuginfo-0:3.5-1.2.el8cp.ppc64le", "8Base-RHCEPH-4.3-Tools:nfs-ganesha-debuginfo-0:3.5-1.2.el8cp.s390x", "8Base-RHCEPH-4.3-Tools:nfs-ganesha-debuginfo-0:3.5-1.2.el8cp.x86_64", "8Base-RHCEPH-4.3-Tools:nfs-ganesha-debugsource-0:3.5-1.2.el8cp.ppc64le", "8Base-RHCEPH-4.3-Tools:nfs-ganesha-debugsource-0:3.5-1.2.el8cp.s390x", "8Base-RHCEPH-4.3-Tools:nfs-ganesha-debugsource-0:3.5-1.2.el8cp.x86_64", "8Base-RHCEPH-4.3-Tools:nfs-ganesha-proxy-0:3.5-1.2.el8cp.ppc64le", "8Base-RHCEPH-4.3-Tools:nfs-ganesha-proxy-0:3.5-1.2.el8cp.s390x", "8Base-RHCEPH-4.3-Tools:nfs-ganesha-proxy-0:3.5-1.2.el8cp.x86_64", "8Base-RHCEPH-4.3-Tools:nfs-ganesha-proxy-debuginfo-0:3.5-1.2.el8cp.ppc64le", "8Base-RHCEPH-4.3-Tools:nfs-ganesha-proxy-debuginfo-0:3.5-1.2.el8cp.s390x", "8Base-RHCEPH-4.3-Tools:nfs-ganesha-proxy-debuginfo-0:3.5-1.2.el8cp.x86_64", "8Base-RHCEPH-4.3-Tools:nfs-ganesha-rados-grace-0:3.5-1.2.el8cp.ppc64le", "8Base-RHCEPH-4.3-Tools:nfs-ganesha-rados-grace-0:3.5-1.2.el8cp.s390x", "8Base-RHCEPH-4.3-Tools:nfs-ganesha-rados-grace-0:3.5-1.2.el8cp.x86_64", "8Base-RHCEPH-4.3-Tools:nfs-ganesha-rados-grace-debuginfo-0:3.5-1.2.el8cp.ppc64le", "8Base-RHCEPH-4.3-Tools:nfs-ganesha-rados-grace-debuginfo-0:3.5-1.2.el8cp.s390x", "8Base-RHCEPH-4.3-Tools:nfs-ganesha-rados-grace-debuginfo-0:3.5-1.2.el8cp.x86_64", "8Base-RHCEPH-4.3-Tools:nfs-ganesha-rados-urls-0:3.5-1.2.el8cp.ppc64le", "8Base-RHCEPH-4.3-Tools:nfs-ganesha-rados-urls-0:3.5-1.2.el8cp.s390x", "8Base-RHCEPH-4.3-Tools:nfs-ganesha-rados-urls-0:3.5-1.2.el8cp.x86_64", "8Base-RHCEPH-4.3-Tools:nfs-ganesha-rados-urls-debuginfo-0:3.5-1.2.el8cp.ppc64le", "8Base-RHCEPH-4.3-Tools:nfs-ganesha-rados-urls-debuginfo-0:3.5-1.2.el8cp.s390x", "8Base-RHCEPH-4.3-Tools:nfs-ganesha-rados-urls-debuginfo-0:3.5-1.2.el8cp.x86_64", "8Base-RHCEPH-4.3-Tools:nfs-ganesha-rgw-0:3.5-1.2.el8cp.ppc64le", "8Base-RHCEPH-4.3-Tools:nfs-ganesha-rgw-0:3.5-1.2.el8cp.s390x", "8Base-RHCEPH-4.3-Tools:nfs-ganesha-rgw-0:3.5-1.2.el8cp.x86_64", "8Base-RHCEPH-4.3-Tools:nfs-ganesha-rgw-debuginfo-0:3.5-1.2.el8cp.ppc64le", "8Base-RHCEPH-4.3-Tools:nfs-ganesha-rgw-debuginfo-0:3.5-1.2.el8cp.s390x", "8Base-RHCEPH-4.3-Tools:nfs-ganesha-rgw-debuginfo-0:3.5-1.2.el8cp.x86_64", "8Base-RHCEPH-4.3-Tools:nfs-ganesha-selinux-0:3.5-1.2.el8cp.noarch", "8Base-RHCEPH-4.3-Tools:nfs-ganesha-vfs-0:3.5-1.2.el8cp.ppc64le", "8Base-RHCEPH-4.3-Tools:nfs-ganesha-vfs-0:3.5-1.2.el8cp.s390x", "8Base-RHCEPH-4.3-Tools:nfs-ganesha-vfs-0:3.5-1.2.el8cp.x86_64", "8Base-RHCEPH-4.3-Tools:nfs-ganesha-vfs-debuginfo-0:3.5-1.2.el8cp.ppc64le", "8Base-RHCEPH-4.3-Tools:nfs-ganesha-vfs-debuginfo-0:3.5-1.2.el8cp.s390x", "8Base-RHCEPH-4.3-Tools:nfs-ganesha-vfs-debuginfo-0:3.5-1.2.el8cp.x86_64", "8Base-RHCEPH-4.3-Tools:python3-ceph-argparse-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-Tools:python3-ceph-argparse-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-Tools:python3-ceph-argparse-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-Tools:python3-cephfs-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-Tools:python3-cephfs-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-Tools:python3-cephfs-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-Tools:python3-cephfs-debuginfo-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-Tools:python3-cephfs-debuginfo-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-Tools:python3-cephfs-debuginfo-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-Tools:python3-rados-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-Tools:python3-rados-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-Tools:python3-rados-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-Tools:python3-rados-debuginfo-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-Tools:python3-rados-debuginfo-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-Tools:python3-rados-debuginfo-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-Tools:python3-rbd-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-Tools:python3-rbd-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-Tools:python3-rbd-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-Tools:python3-rbd-debuginfo-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-Tools:python3-rbd-debuginfo-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-Tools:python3-rbd-debuginfo-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-Tools:python3-rgw-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-Tools:python3-rgw-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-Tools:python3-rgw-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-Tools:python3-rgw-debuginfo-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-Tools:python3-rgw-debuginfo-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-Tools:python3-rgw-debuginfo-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-Tools:rbd-fuse-debuginfo-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-Tools:rbd-fuse-debuginfo-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-Tools:rbd-fuse-debuginfo-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-Tools:rbd-mirror-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-Tools:rbd-mirror-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-Tools:rbd-mirror-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-Tools:rbd-mirror-debuginfo-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-Tools:rbd-mirror-debuginfo-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-Tools:rbd-mirror-debuginfo-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-Tools:rbd-nbd-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-Tools:rbd-nbd-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-Tools:rbd-nbd-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-Tools:rbd-nbd-debuginfo-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-Tools:rbd-nbd-debuginfo-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-Tools:rbd-nbd-debuginfo-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-Tools:tcmu-runner-0:1.5.2-5.el8cp.ppc64le", "8Base-RHCEPH-4.3-Tools:tcmu-runner-0:1.5.2-5.el8cp.s390x", "8Base-RHCEPH-4.3-Tools:tcmu-runner-0:1.5.2-5.el8cp.src", "8Base-RHCEPH-4.3-Tools:tcmu-runner-0:1.5.2-5.el8cp.x86_64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1889972" } ], "notes": [ { "category": "description", "text": "A flaw was found in python-rsa, where it is vulnerable to Bleichenbacher timing attacks. This flaw allows an attacker, via the RSA decryption API, to decrypt parts of the ciphertext encrypted with RSA. The highest threat from this vulnerability is to confidentiality.", "title": "Vulnerability description" }, { "category": "summary", "text": "python-rsa: bleichenbacher timing oracle attack against RSA decryption", "title": "Vulnerability summary" }, { "category": "other", "text": "In Red Hat OpenStack Platform, because the flaw has a lower impact and the fix would require a substantial amount of development, no update will be provided at this time for the RHOSP python-rsa package.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RHCEPH-4.3-MON:python-rsa-0:4.8-1.el8cp.src", "8Base-RHCEPH-4.3-MON:python3-rsa-0:4.8-1.el8cp.noarch" ], "known_not_affected": [ "7Server-RHEL-7-RHCEPH-4.3-MON:ceph-2:14.2.22-110.el7cp.src", "7Server-RHEL-7-RHCEPH-4.3-MON:ceph-base-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-MON:ceph-base-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-MON:ceph-common-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-MON:ceph-common-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-MON:ceph-debuginfo-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-MON:ceph-debuginfo-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-MON:ceph-fuse-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-MON:ceph-fuse-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-MON:ceph-grafana-dashboards-2:14.2.22-110.el7cp.noarch", "7Server-RHEL-7-RHCEPH-4.3-MON:ceph-mds-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-MON:ceph-mds-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-MON:ceph-mgr-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-MON:ceph-mgr-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-MON:ceph-mgr-dashboard-2:14.2.22-110.el7cp.noarch", "7Server-RHEL-7-RHCEPH-4.3-MON:ceph-mgr-diskprediction-local-2:14.2.22-110.el7cp.noarch", "7Server-RHEL-7-RHCEPH-4.3-MON:ceph-mgr-k8sevents-2:14.2.22-110.el7cp.noarch", "7Server-RHEL-7-RHCEPH-4.3-MON:ceph-mgr-rook-2:14.2.22-110.el7cp.noarch", "7Server-RHEL-7-RHCEPH-4.3-MON:ceph-mon-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-MON:ceph-mon-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-MON:ceph-osd-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-MON:ceph-osd-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-MON:ceph-radosgw-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-MON:ceph-radosgw-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-MON:ceph-selinux-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-MON:ceph-selinux-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-MON:ceph-test-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-MON:ceph-test-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-MON:libcephfs-devel-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-MON:libcephfs-devel-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-MON:libcephfs2-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-MON:libcephfs2-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-MON:librados-devel-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-MON:librados-devel-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-MON:librados2-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-MON:librados2-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-MON:libradospp-devel-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-MON:libradospp-devel-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-MON:libradosstriper1-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-MON:libradosstriper1-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-MON:librbd-devel-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-MON:librbd-devel-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-MON:librbd1-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-MON:librbd1-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-MON:librgw-devel-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-MON:librgw-devel-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-MON:librgw2-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-MON:librgw2-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-MON:python-ceph-argparse-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-MON:python-ceph-argparse-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-MON:python-cephfs-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-MON:python-cephfs-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-MON:python-rados-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-MON:python-rados-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-MON:python-rbd-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-MON:python-rbd-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-MON:python-rgw-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-MON:python-rgw-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-MON:rbd-mirror-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-MON:rbd-mirror-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-MON:rbd-nbd-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-MON:rbd-nbd-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-OSD:ceph-2:14.2.22-110.el7cp.src", "7Server-RHEL-7-RHCEPH-4.3-OSD:ceph-base-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-OSD:ceph-base-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-OSD:ceph-common-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-OSD:ceph-common-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-OSD:ceph-debuginfo-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-OSD:ceph-debuginfo-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-OSD:ceph-fuse-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-OSD:ceph-fuse-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-OSD:ceph-grafana-dashboards-2:14.2.22-110.el7cp.noarch", "7Server-RHEL-7-RHCEPH-4.3-OSD:ceph-mds-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-OSD:ceph-mds-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-OSD:ceph-mgr-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-OSD:ceph-mgr-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-OSD:ceph-mgr-dashboard-2:14.2.22-110.el7cp.noarch", "7Server-RHEL-7-RHCEPH-4.3-OSD:ceph-mgr-diskprediction-local-2:14.2.22-110.el7cp.noarch", "7Server-RHEL-7-RHCEPH-4.3-OSD:ceph-mgr-k8sevents-2:14.2.22-110.el7cp.noarch", "7Server-RHEL-7-RHCEPH-4.3-OSD:ceph-mgr-rook-2:14.2.22-110.el7cp.noarch", "7Server-RHEL-7-RHCEPH-4.3-OSD:ceph-mon-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-OSD:ceph-mon-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-OSD:ceph-osd-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-OSD:ceph-osd-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-OSD:ceph-radosgw-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-OSD:ceph-radosgw-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-OSD:ceph-selinux-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-OSD:ceph-selinux-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-OSD:ceph-test-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-OSD:ceph-test-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-OSD:libcephfs-devel-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-OSD:libcephfs-devel-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-OSD:libcephfs2-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-OSD:libcephfs2-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-OSD:librados-devel-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-OSD:librados-devel-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-OSD:librados2-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-OSD:librados2-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-OSD:libradospp-devel-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-OSD:libradospp-devel-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-OSD:libradosstriper1-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-OSD:libradosstriper1-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-OSD:librbd-devel-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-OSD:librbd-devel-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-OSD:librbd1-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-OSD:librbd1-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-OSD:librgw-devel-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-OSD:librgw-devel-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-OSD:librgw2-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-OSD:librgw2-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-OSD:python-ceph-argparse-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-OSD:python-ceph-argparse-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-OSD:python-cephfs-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-OSD:python-cephfs-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-OSD:python-rados-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-OSD:python-rados-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-OSD:python-rbd-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-OSD:python-rbd-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-OSD:python-rgw-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-OSD:python-rgw-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-OSD:rbd-mirror-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-OSD:rbd-mirror-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-OSD:rbd-nbd-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-OSD:rbd-nbd-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-Tools:ceph-2:14.2.22-110.el7cp.src", "7Server-RHEL-7-RHCEPH-4.3-Tools:ceph-ansible-0:4.0.70.3-1.el7cp.noarch", "7Server-RHEL-7-RHCEPH-4.3-Tools:ceph-ansible-0:4.0.70.3-1.el7cp.src", "7Server-RHEL-7-RHCEPH-4.3-Tools:ceph-base-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-Tools:ceph-base-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-Tools:ceph-common-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-Tools:ceph-common-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-Tools:ceph-debuginfo-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-Tools:ceph-debuginfo-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-Tools:ceph-fuse-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-Tools:ceph-fuse-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-Tools:ceph-grafana-dashboards-2:14.2.22-110.el7cp.noarch", "7Server-RHEL-7-RHCEPH-4.3-Tools:ceph-iscsi-0:3.4-5.el7cp.noarch", "7Server-RHEL-7-RHCEPH-4.3-Tools:ceph-iscsi-0:3.4-5.el7cp.src", "7Server-RHEL-7-RHCEPH-4.3-Tools:ceph-mds-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-Tools:ceph-mds-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-Tools:ceph-mgr-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-Tools:ceph-mgr-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-Tools:ceph-mgr-dashboard-2:14.2.22-110.el7cp.noarch", "7Server-RHEL-7-RHCEPH-4.3-Tools:ceph-mgr-diskprediction-local-2:14.2.22-110.el7cp.noarch", "7Server-RHEL-7-RHCEPH-4.3-Tools:ceph-mgr-k8sevents-2:14.2.22-110.el7cp.noarch", "7Server-RHEL-7-RHCEPH-4.3-Tools:ceph-mgr-rook-2:14.2.22-110.el7cp.noarch", "7Server-RHEL-7-RHCEPH-4.3-Tools:ceph-mon-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-Tools:ceph-mon-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-Tools:ceph-osd-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-Tools:ceph-osd-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-Tools:ceph-radosgw-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-Tools:ceph-radosgw-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-Tools:ceph-selinux-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-Tools:ceph-selinux-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-Tools:ceph-test-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-Tools:ceph-test-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-Tools:libcephfs-devel-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-Tools:libcephfs-devel-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-Tools:libcephfs2-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-Tools:libcephfs2-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-Tools:libntirpc-0:3.4-1.1.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-Tools:libntirpc-0:3.4-1.1.el7cp.src", "7Server-RHEL-7-RHCEPH-4.3-Tools:libntirpc-0:3.4-1.1.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-Tools:libntirpc-debuginfo-0:3.4-1.1.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-Tools:libntirpc-debuginfo-0:3.4-1.1.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-Tools:librados-devel-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-Tools:librados-devel-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-Tools:librados2-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-Tools:librados2-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-Tools:libradospp-devel-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-Tools:libradospp-devel-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-Tools:libradosstriper1-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-Tools:libradosstriper1-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-Tools:librbd-devel-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-Tools:librbd-devel-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-Tools:librbd1-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-Tools:librbd1-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-Tools:librgw-devel-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-Tools:librgw-devel-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-Tools:librgw2-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-Tools:librgw2-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-Tools:libtcmu-0:1.5.2-5.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-Tools:libtcmu-0:1.5.2-5.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-Tools:nfs-ganesha-0:3.5-1.2.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-Tools:nfs-ganesha-0:3.5-1.2.el7cp.src", "7Server-RHEL-7-RHCEPH-4.3-Tools:nfs-ganesha-0:3.5-1.2.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-Tools:nfs-ganesha-ceph-0:3.5-1.2.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-Tools:nfs-ganesha-ceph-0:3.5-1.2.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-Tools:nfs-ganesha-debuginfo-0:3.5-1.2.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-Tools:nfs-ganesha-debuginfo-0:3.5-1.2.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-Tools:nfs-ganesha-proxy-0:3.5-1.2.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-Tools:nfs-ganesha-proxy-0:3.5-1.2.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-Tools:nfs-ganesha-rados-grace-0:3.5-1.2.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-Tools:nfs-ganesha-rados-grace-0:3.5-1.2.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-Tools:nfs-ganesha-rados-urls-0:3.5-1.2.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-Tools:nfs-ganesha-rados-urls-0:3.5-1.2.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-Tools:nfs-ganesha-rgw-0:3.5-1.2.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-Tools:nfs-ganesha-rgw-0:3.5-1.2.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-Tools:nfs-ganesha-selinux-0:3.5-1.2.el7cp.noarch", "7Server-RHEL-7-RHCEPH-4.3-Tools:nfs-ganesha-vfs-0:3.5-1.2.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-Tools:nfs-ganesha-vfs-0:3.5-1.2.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-Tools:python-ceph-argparse-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-Tools:python-ceph-argparse-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-Tools:python-cephfs-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-Tools:python-cephfs-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-Tools:python-rados-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-Tools:python-rados-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-Tools:python-rbd-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-Tools:python-rbd-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-Tools:python-rgw-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-Tools:python-rgw-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-Tools:rbd-mirror-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-Tools:rbd-mirror-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-Tools:rbd-nbd-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-Tools:rbd-nbd-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-Tools:tcmu-runner-0:1.5.2-5.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-Tools:tcmu-runner-0:1.5.2-5.el7cp.src", "7Server-RHEL-7-RHCEPH-4.3-Tools:tcmu-runner-0:1.5.2-5.el7cp.x86_64", "8Base-RHCEPH-4.3-MON:ceph-2:14.2.22-110.el8cp.src", "8Base-RHCEPH-4.3-MON:ceph-base-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-MON:ceph-base-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-MON:ceph-base-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-MON:ceph-base-debuginfo-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-MON:ceph-base-debuginfo-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-MON:ceph-base-debuginfo-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-MON:ceph-common-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-MON:ceph-common-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-MON:ceph-common-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-MON:ceph-common-debuginfo-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-MON:ceph-common-debuginfo-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-MON:ceph-common-debuginfo-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-MON:ceph-debugsource-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-MON:ceph-debugsource-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-MON:ceph-debugsource-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-MON:ceph-fuse-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-MON:ceph-fuse-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-MON:ceph-fuse-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-MON:ceph-fuse-debuginfo-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-MON:ceph-fuse-debuginfo-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-MON:ceph-fuse-debuginfo-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-MON:ceph-grafana-dashboards-2:14.2.22-110.el8cp.noarch", "8Base-RHCEPH-4.3-MON:ceph-mds-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-MON:ceph-mds-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-MON:ceph-mds-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-MON:ceph-mds-debuginfo-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-MON:ceph-mds-debuginfo-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-MON:ceph-mds-debuginfo-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-MON:ceph-mgr-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-MON:ceph-mgr-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-MON:ceph-mgr-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-MON:ceph-mgr-dashboard-2:14.2.22-110.el8cp.noarch", "8Base-RHCEPH-4.3-MON:ceph-mgr-debuginfo-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-MON:ceph-mgr-debuginfo-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-MON:ceph-mgr-debuginfo-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-MON:ceph-mgr-diskprediction-local-2:14.2.22-110.el8cp.noarch", "8Base-RHCEPH-4.3-MON:ceph-mgr-k8sevents-2:14.2.22-110.el8cp.noarch", "8Base-RHCEPH-4.3-MON:ceph-mgr-rook-2:14.2.22-110.el8cp.noarch", "8Base-RHCEPH-4.3-MON:ceph-mon-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-MON:ceph-mon-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-MON:ceph-mon-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-MON:ceph-mon-debuginfo-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-MON:ceph-mon-debuginfo-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-MON:ceph-mon-debuginfo-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-MON:ceph-osd-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-MON:ceph-osd-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-MON:ceph-osd-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-MON:ceph-osd-debuginfo-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-MON:ceph-osd-debuginfo-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-MON:ceph-osd-debuginfo-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-MON:ceph-radosgw-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-MON:ceph-radosgw-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-MON:ceph-radosgw-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-MON:ceph-radosgw-debuginfo-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-MON:ceph-radosgw-debuginfo-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-MON:ceph-radosgw-debuginfo-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-MON:ceph-selinux-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-MON:ceph-selinux-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-MON:ceph-selinux-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-MON:ceph-test-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-MON:ceph-test-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-MON:ceph-test-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-MON:ceph-test-debuginfo-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-MON:ceph-test-debuginfo-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-MON:ceph-test-debuginfo-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-MON:libcephfs-devel-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-MON:libcephfs-devel-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-MON:libcephfs-devel-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-MON:libcephfs2-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-MON:libcephfs2-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-MON:libcephfs2-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-MON:libcephfs2-debuginfo-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-MON:libcephfs2-debuginfo-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-MON:libcephfs2-debuginfo-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-MON:librados-devel-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-MON:librados-devel-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-MON:librados-devel-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-MON:librados-devel-debuginfo-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-MON:librados-devel-debuginfo-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-MON:librados-devel-debuginfo-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-MON:librados2-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-MON:librados2-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-MON:librados2-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-MON:librados2-debuginfo-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-MON:librados2-debuginfo-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-MON:librados2-debuginfo-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-MON:libradospp-devel-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-MON:libradospp-devel-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-MON:libradospp-devel-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-MON:libradosstriper1-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-MON:libradosstriper1-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-MON:libradosstriper1-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-MON:libradosstriper1-debuginfo-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-MON:libradosstriper1-debuginfo-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-MON:libradosstriper1-debuginfo-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-MON:librbd-devel-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-MON:librbd-devel-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-MON:librbd-devel-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-MON:librbd1-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-MON:librbd1-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-MON:librbd1-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-MON:librbd1-debuginfo-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-MON:librbd1-debuginfo-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-MON:librbd1-debuginfo-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-MON:librgw-devel-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-MON:librgw-devel-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-MON:librgw-devel-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-MON:librgw2-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-MON:librgw2-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-MON:librgw2-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-MON:librgw2-debuginfo-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-MON:librgw2-debuginfo-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-MON:librgw2-debuginfo-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-MON:python3-ceph-argparse-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-MON:python3-ceph-argparse-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-MON:python3-ceph-argparse-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-MON:python3-cephfs-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-MON:python3-cephfs-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-MON:python3-cephfs-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-MON:python3-cephfs-debuginfo-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-MON:python3-cephfs-debuginfo-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-MON:python3-cephfs-debuginfo-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-MON:python3-rados-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-MON:python3-rados-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-MON:python3-rados-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-MON:python3-rados-debuginfo-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-MON:python3-rados-debuginfo-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-MON:python3-rados-debuginfo-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-MON:python3-rbd-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-MON:python3-rbd-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-MON:python3-rbd-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-MON:python3-rbd-debuginfo-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-MON:python3-rbd-debuginfo-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-MON:python3-rbd-debuginfo-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-MON:python3-rgw-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-MON:python3-rgw-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-MON:python3-rgw-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-MON:python3-rgw-debuginfo-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-MON:python3-rgw-debuginfo-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-MON:python3-rgw-debuginfo-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-MON:rbd-fuse-debuginfo-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-MON:rbd-fuse-debuginfo-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-MON:rbd-fuse-debuginfo-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-MON:rbd-mirror-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-MON:rbd-mirror-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-MON:rbd-mirror-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-MON:rbd-mirror-debuginfo-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-MON:rbd-mirror-debuginfo-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-MON:rbd-mirror-debuginfo-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-MON:rbd-nbd-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-MON:rbd-nbd-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-MON:rbd-nbd-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-MON:rbd-nbd-debuginfo-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-MON:rbd-nbd-debuginfo-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-MON:rbd-nbd-debuginfo-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-OSD:ceph-2:14.2.22-110.el8cp.src", "8Base-RHCEPH-4.3-OSD:ceph-base-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-OSD:ceph-base-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-OSD:ceph-base-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-OSD:ceph-base-debuginfo-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-OSD:ceph-base-debuginfo-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-OSD:ceph-base-debuginfo-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-OSD:ceph-common-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-OSD:ceph-common-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-OSD:ceph-common-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-OSD:ceph-common-debuginfo-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-OSD:ceph-common-debuginfo-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-OSD:ceph-common-debuginfo-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-OSD:ceph-debugsource-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-OSD:ceph-debugsource-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-OSD:ceph-debugsource-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-OSD:ceph-fuse-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-OSD:ceph-fuse-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-OSD:ceph-fuse-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-OSD:ceph-fuse-debuginfo-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-OSD:ceph-fuse-debuginfo-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-OSD:ceph-fuse-debuginfo-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-OSD:ceph-grafana-dashboards-2:14.2.22-110.el8cp.noarch", "8Base-RHCEPH-4.3-OSD:ceph-mds-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-OSD:ceph-mds-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-OSD:ceph-mds-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-OSD:ceph-mds-debuginfo-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-OSD:ceph-mds-debuginfo-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-OSD:ceph-mds-debuginfo-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-OSD:ceph-mgr-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-OSD:ceph-mgr-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-OSD:ceph-mgr-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-OSD:ceph-mgr-dashboard-2:14.2.22-110.el8cp.noarch", "8Base-RHCEPH-4.3-OSD:ceph-mgr-debuginfo-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-OSD:ceph-mgr-debuginfo-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-OSD:ceph-mgr-debuginfo-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-OSD:ceph-mgr-diskprediction-local-2:14.2.22-110.el8cp.noarch", "8Base-RHCEPH-4.3-OSD:ceph-mgr-k8sevents-2:14.2.22-110.el8cp.noarch", "8Base-RHCEPH-4.3-OSD:ceph-mgr-rook-2:14.2.22-110.el8cp.noarch", "8Base-RHCEPH-4.3-OSD:ceph-mon-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-OSD:ceph-mon-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-OSD:ceph-mon-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-OSD:ceph-mon-debuginfo-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-OSD:ceph-mon-debuginfo-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-OSD:ceph-mon-debuginfo-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-OSD:ceph-osd-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-OSD:ceph-osd-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-OSD:ceph-osd-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-OSD:ceph-osd-debuginfo-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-OSD:ceph-osd-debuginfo-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-OSD:ceph-osd-debuginfo-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-OSD:ceph-radosgw-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-OSD:ceph-radosgw-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-OSD:ceph-radosgw-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-OSD:ceph-radosgw-debuginfo-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-OSD:ceph-radosgw-debuginfo-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-OSD:ceph-radosgw-debuginfo-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-OSD:ceph-selinux-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-OSD:ceph-selinux-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-OSD:ceph-selinux-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-OSD:ceph-test-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-OSD:ceph-test-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-OSD:ceph-test-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-OSD:ceph-test-debuginfo-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-OSD:ceph-test-debuginfo-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-OSD:ceph-test-debuginfo-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-OSD:libcephfs-devel-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-OSD:libcephfs-devel-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-OSD:libcephfs-devel-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-OSD:libcephfs2-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-OSD:libcephfs2-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-OSD:libcephfs2-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-OSD:libcephfs2-debuginfo-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-OSD:libcephfs2-debuginfo-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-OSD:libcephfs2-debuginfo-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-OSD:librados-devel-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-OSD:librados-devel-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-OSD:librados-devel-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-OSD:librados-devel-debuginfo-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-OSD:librados-devel-debuginfo-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-OSD:librados-devel-debuginfo-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-OSD:librados2-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-OSD:librados2-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-OSD:librados2-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-OSD:librados2-debuginfo-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-OSD:librados2-debuginfo-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-OSD:librados2-debuginfo-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-OSD:libradospp-devel-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-OSD:libradospp-devel-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-OSD:libradospp-devel-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-OSD:libradosstriper1-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-OSD:libradosstriper1-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-OSD:libradosstriper1-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-OSD:libradosstriper1-debuginfo-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-OSD:libradosstriper1-debuginfo-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-OSD:libradosstriper1-debuginfo-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-OSD:librbd-devel-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-OSD:librbd-devel-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-OSD:librbd-devel-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-OSD:librbd1-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-OSD:librbd1-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-OSD:librbd1-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-OSD:librbd1-debuginfo-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-OSD:librbd1-debuginfo-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-OSD:librbd1-debuginfo-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-OSD:librgw-devel-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-OSD:librgw-devel-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-OSD:librgw-devel-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-OSD:librgw2-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-OSD:librgw2-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-OSD:librgw2-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-OSD:librgw2-debuginfo-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-OSD:librgw2-debuginfo-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-OSD:librgw2-debuginfo-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-OSD:python3-ceph-argparse-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-OSD:python3-ceph-argparse-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-OSD:python3-ceph-argparse-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-OSD:python3-cephfs-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-OSD:python3-cephfs-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-OSD:python3-cephfs-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-OSD:python3-cephfs-debuginfo-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-OSD:python3-cephfs-debuginfo-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-OSD:python3-cephfs-debuginfo-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-OSD:python3-rados-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-OSD:python3-rados-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-OSD:python3-rados-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-OSD:python3-rados-debuginfo-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-OSD:python3-rados-debuginfo-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-OSD:python3-rados-debuginfo-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-OSD:python3-rbd-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-OSD:python3-rbd-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-OSD:python3-rbd-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-OSD:python3-rbd-debuginfo-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-OSD:python3-rbd-debuginfo-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-OSD:python3-rbd-debuginfo-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-OSD:python3-rgw-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-OSD:python3-rgw-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-OSD:python3-rgw-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-OSD:python3-rgw-debuginfo-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-OSD:python3-rgw-debuginfo-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-OSD:python3-rgw-debuginfo-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-OSD:rbd-fuse-debuginfo-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-OSD:rbd-fuse-debuginfo-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-OSD:rbd-fuse-debuginfo-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-OSD:rbd-mirror-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-OSD:rbd-mirror-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-OSD:rbd-mirror-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-OSD:rbd-mirror-debuginfo-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-OSD:rbd-mirror-debuginfo-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-OSD:rbd-mirror-debuginfo-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-OSD:rbd-nbd-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-OSD:rbd-nbd-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-OSD:rbd-nbd-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-OSD:rbd-nbd-debuginfo-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-OSD:rbd-nbd-debuginfo-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-OSD:rbd-nbd-debuginfo-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-Tools:ceph-2:14.2.22-110.el8cp.src", "8Base-RHCEPH-4.3-Tools:ceph-ansible-0:4.0.70.3-1.el8cp.noarch", "8Base-RHCEPH-4.3-Tools:ceph-ansible-0:4.0.70.3-1.el8cp.src", "8Base-RHCEPH-4.3-Tools:ceph-base-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-Tools:ceph-base-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-Tools:ceph-base-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-Tools:ceph-base-debuginfo-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-Tools:ceph-base-debuginfo-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-Tools:ceph-base-debuginfo-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-Tools:ceph-common-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-Tools:ceph-common-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-Tools:ceph-common-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-Tools:ceph-common-debuginfo-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-Tools:ceph-common-debuginfo-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-Tools:ceph-common-debuginfo-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-Tools:ceph-debugsource-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-Tools:ceph-debugsource-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-Tools:ceph-debugsource-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-Tools:ceph-fuse-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-Tools:ceph-fuse-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-Tools:ceph-fuse-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-Tools:ceph-fuse-debuginfo-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-Tools:ceph-fuse-debuginfo-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-Tools:ceph-fuse-debuginfo-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-Tools:ceph-grafana-dashboards-2:14.2.22-110.el8cp.noarch", "8Base-RHCEPH-4.3-Tools:ceph-iscsi-0:3.4-5.el8cp.noarch", "8Base-RHCEPH-4.3-Tools:ceph-iscsi-0:3.4-5.el8cp.src", "8Base-RHCEPH-4.3-Tools:ceph-mds-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-Tools:ceph-mds-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-Tools:ceph-mds-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-Tools:ceph-mds-debuginfo-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-Tools:ceph-mds-debuginfo-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-Tools:ceph-mds-debuginfo-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-Tools:ceph-mgr-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-Tools:ceph-mgr-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-Tools:ceph-mgr-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-Tools:ceph-mgr-dashboard-2:14.2.22-110.el8cp.noarch", "8Base-RHCEPH-4.3-Tools:ceph-mgr-debuginfo-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-Tools:ceph-mgr-debuginfo-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-Tools:ceph-mgr-debuginfo-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-Tools:ceph-mgr-diskprediction-local-2:14.2.22-110.el8cp.noarch", "8Base-RHCEPH-4.3-Tools:ceph-mgr-k8sevents-2:14.2.22-110.el8cp.noarch", "8Base-RHCEPH-4.3-Tools:ceph-mgr-rook-2:14.2.22-110.el8cp.noarch", "8Base-RHCEPH-4.3-Tools:ceph-mon-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-Tools:ceph-mon-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-Tools:ceph-mon-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-Tools:ceph-mon-debuginfo-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-Tools:ceph-mon-debuginfo-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-Tools:ceph-mon-debuginfo-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-Tools:ceph-osd-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-Tools:ceph-osd-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-Tools:ceph-osd-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-Tools:ceph-osd-debuginfo-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-Tools:ceph-osd-debuginfo-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-Tools:ceph-osd-debuginfo-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-Tools:ceph-radosgw-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-Tools:ceph-radosgw-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-Tools:ceph-radosgw-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-Tools:ceph-radosgw-debuginfo-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-Tools:ceph-radosgw-debuginfo-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-Tools:ceph-radosgw-debuginfo-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-Tools:ceph-selinux-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-Tools:ceph-selinux-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-Tools:ceph-selinux-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-Tools:ceph-test-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-Tools:ceph-test-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-Tools:ceph-test-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-Tools:ceph-test-debuginfo-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-Tools:ceph-test-debuginfo-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-Tools:ceph-test-debuginfo-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-Tools:libcephfs-devel-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-Tools:libcephfs-devel-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-Tools:libcephfs-devel-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-Tools:libcephfs2-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-Tools:libcephfs2-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-Tools:libcephfs2-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-Tools:libcephfs2-debuginfo-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-Tools:libcephfs2-debuginfo-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-Tools:libcephfs2-debuginfo-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-Tools:libntirpc-0:3.4-1.1.el8cp.ppc64le", "8Base-RHCEPH-4.3-Tools:libntirpc-0:3.4-1.1.el8cp.s390x", "8Base-RHCEPH-4.3-Tools:libntirpc-0:3.4-1.1.el8cp.src", "8Base-RHCEPH-4.3-Tools:libntirpc-0:3.4-1.1.el8cp.x86_64", "8Base-RHCEPH-4.3-Tools:libntirpc-debuginfo-0:3.4-1.1.el8cp.ppc64le", "8Base-RHCEPH-4.3-Tools:libntirpc-debuginfo-0:3.4-1.1.el8cp.s390x", "8Base-RHCEPH-4.3-Tools:libntirpc-debuginfo-0:3.4-1.1.el8cp.x86_64", "8Base-RHCEPH-4.3-Tools:libntirpc-debugsource-0:3.4-1.1.el8cp.ppc64le", "8Base-RHCEPH-4.3-Tools:libntirpc-debugsource-0:3.4-1.1.el8cp.s390x", "8Base-RHCEPH-4.3-Tools:libntirpc-debugsource-0:3.4-1.1.el8cp.x86_64", "8Base-RHCEPH-4.3-Tools:librados-devel-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-Tools:librados-devel-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-Tools:librados-devel-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-Tools:librados-devel-debuginfo-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-Tools:librados-devel-debuginfo-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-Tools:librados-devel-debuginfo-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-Tools:librados2-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-Tools:librados2-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-Tools:librados2-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-Tools:librados2-debuginfo-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-Tools:librados2-debuginfo-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-Tools:librados2-debuginfo-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-Tools:libradospp-devel-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-Tools:libradospp-devel-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-Tools:libradospp-devel-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-Tools:libradosstriper1-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-Tools:libradosstriper1-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-Tools:libradosstriper1-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-Tools:libradosstriper1-debuginfo-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-Tools:libradosstriper1-debuginfo-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-Tools:libradosstriper1-debuginfo-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-Tools:librbd-devel-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-Tools:librbd-devel-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-Tools:librbd-devel-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-Tools:librbd1-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-Tools:librbd1-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-Tools:librbd1-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-Tools:librbd1-debuginfo-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-Tools:librbd1-debuginfo-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-Tools:librbd1-debuginfo-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-Tools:librgw-devel-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-Tools:librgw-devel-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-Tools:librgw-devel-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-Tools:librgw2-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-Tools:librgw2-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-Tools:librgw2-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-Tools:librgw2-debuginfo-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-Tools:librgw2-debuginfo-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-Tools:librgw2-debuginfo-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-Tools:libtcmu-0:1.5.2-5.el8cp.ppc64le", "8Base-RHCEPH-4.3-Tools:libtcmu-0:1.5.2-5.el8cp.s390x", "8Base-RHCEPH-4.3-Tools:libtcmu-0:1.5.2-5.el8cp.x86_64", "8Base-RHCEPH-4.3-Tools:nfs-ganesha-0:3.5-1.2.el8cp.ppc64le", "8Base-RHCEPH-4.3-Tools:nfs-ganesha-0:3.5-1.2.el8cp.s390x", "8Base-RHCEPH-4.3-Tools:nfs-ganesha-0:3.5-1.2.el8cp.src", "8Base-RHCEPH-4.3-Tools:nfs-ganesha-0:3.5-1.2.el8cp.x86_64", "8Base-RHCEPH-4.3-Tools:nfs-ganesha-ceph-0:3.5-1.2.el8cp.ppc64le", "8Base-RHCEPH-4.3-Tools:nfs-ganesha-ceph-0:3.5-1.2.el8cp.s390x", "8Base-RHCEPH-4.3-Tools:nfs-ganesha-ceph-0:3.5-1.2.el8cp.x86_64", "8Base-RHCEPH-4.3-Tools:nfs-ganesha-ceph-debuginfo-0:3.5-1.2.el8cp.ppc64le", "8Base-RHCEPH-4.3-Tools:nfs-ganesha-ceph-debuginfo-0:3.5-1.2.el8cp.s390x", "8Base-RHCEPH-4.3-Tools:nfs-ganesha-ceph-debuginfo-0:3.5-1.2.el8cp.x86_64", "8Base-RHCEPH-4.3-Tools:nfs-ganesha-debuginfo-0:3.5-1.2.el8cp.ppc64le", "8Base-RHCEPH-4.3-Tools:nfs-ganesha-debuginfo-0:3.5-1.2.el8cp.s390x", "8Base-RHCEPH-4.3-Tools:nfs-ganesha-debuginfo-0:3.5-1.2.el8cp.x86_64", "8Base-RHCEPH-4.3-Tools:nfs-ganesha-debugsource-0:3.5-1.2.el8cp.ppc64le", "8Base-RHCEPH-4.3-Tools:nfs-ganesha-debugsource-0:3.5-1.2.el8cp.s390x", "8Base-RHCEPH-4.3-Tools:nfs-ganesha-debugsource-0:3.5-1.2.el8cp.x86_64", "8Base-RHCEPH-4.3-Tools:nfs-ganesha-proxy-0:3.5-1.2.el8cp.ppc64le", "8Base-RHCEPH-4.3-Tools:nfs-ganesha-proxy-0:3.5-1.2.el8cp.s390x", "8Base-RHCEPH-4.3-Tools:nfs-ganesha-proxy-0:3.5-1.2.el8cp.x86_64", "8Base-RHCEPH-4.3-Tools:nfs-ganesha-proxy-debuginfo-0:3.5-1.2.el8cp.ppc64le", "8Base-RHCEPH-4.3-Tools:nfs-ganesha-proxy-debuginfo-0:3.5-1.2.el8cp.s390x", "8Base-RHCEPH-4.3-Tools:nfs-ganesha-proxy-debuginfo-0:3.5-1.2.el8cp.x86_64", "8Base-RHCEPH-4.3-Tools:nfs-ganesha-rados-grace-0:3.5-1.2.el8cp.ppc64le", "8Base-RHCEPH-4.3-Tools:nfs-ganesha-rados-grace-0:3.5-1.2.el8cp.s390x", "8Base-RHCEPH-4.3-Tools:nfs-ganesha-rados-grace-0:3.5-1.2.el8cp.x86_64", "8Base-RHCEPH-4.3-Tools:nfs-ganesha-rados-grace-debuginfo-0:3.5-1.2.el8cp.ppc64le", "8Base-RHCEPH-4.3-Tools:nfs-ganesha-rados-grace-debuginfo-0:3.5-1.2.el8cp.s390x", "8Base-RHCEPH-4.3-Tools:nfs-ganesha-rados-grace-debuginfo-0:3.5-1.2.el8cp.x86_64", "8Base-RHCEPH-4.3-Tools:nfs-ganesha-rados-urls-0:3.5-1.2.el8cp.ppc64le", "8Base-RHCEPH-4.3-Tools:nfs-ganesha-rados-urls-0:3.5-1.2.el8cp.s390x", "8Base-RHCEPH-4.3-Tools:nfs-ganesha-rados-urls-0:3.5-1.2.el8cp.x86_64", "8Base-RHCEPH-4.3-Tools:nfs-ganesha-rados-urls-debuginfo-0:3.5-1.2.el8cp.ppc64le", "8Base-RHCEPH-4.3-Tools:nfs-ganesha-rados-urls-debuginfo-0:3.5-1.2.el8cp.s390x", "8Base-RHCEPH-4.3-Tools:nfs-ganesha-rados-urls-debuginfo-0:3.5-1.2.el8cp.x86_64", "8Base-RHCEPH-4.3-Tools:nfs-ganesha-rgw-0:3.5-1.2.el8cp.ppc64le", "8Base-RHCEPH-4.3-Tools:nfs-ganesha-rgw-0:3.5-1.2.el8cp.s390x", "8Base-RHCEPH-4.3-Tools:nfs-ganesha-rgw-0:3.5-1.2.el8cp.x86_64", "8Base-RHCEPH-4.3-Tools:nfs-ganesha-rgw-debuginfo-0:3.5-1.2.el8cp.ppc64le", "8Base-RHCEPH-4.3-Tools:nfs-ganesha-rgw-debuginfo-0:3.5-1.2.el8cp.s390x", "8Base-RHCEPH-4.3-Tools:nfs-ganesha-rgw-debuginfo-0:3.5-1.2.el8cp.x86_64", "8Base-RHCEPH-4.3-Tools:nfs-ganesha-selinux-0:3.5-1.2.el8cp.noarch", "8Base-RHCEPH-4.3-Tools:nfs-ganesha-vfs-0:3.5-1.2.el8cp.ppc64le", "8Base-RHCEPH-4.3-Tools:nfs-ganesha-vfs-0:3.5-1.2.el8cp.s390x", "8Base-RHCEPH-4.3-Tools:nfs-ganesha-vfs-0:3.5-1.2.el8cp.x86_64", "8Base-RHCEPH-4.3-Tools:nfs-ganesha-vfs-debuginfo-0:3.5-1.2.el8cp.ppc64le", "8Base-RHCEPH-4.3-Tools:nfs-ganesha-vfs-debuginfo-0:3.5-1.2.el8cp.s390x", "8Base-RHCEPH-4.3-Tools:nfs-ganesha-vfs-debuginfo-0:3.5-1.2.el8cp.x86_64", "8Base-RHCEPH-4.3-Tools:python3-ceph-argparse-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-Tools:python3-ceph-argparse-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-Tools:python3-ceph-argparse-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-Tools:python3-cephfs-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-Tools:python3-cephfs-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-Tools:python3-cephfs-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-Tools:python3-cephfs-debuginfo-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-Tools:python3-cephfs-debuginfo-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-Tools:python3-cephfs-debuginfo-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-Tools:python3-rados-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-Tools:python3-rados-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-Tools:python3-rados-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-Tools:python3-rados-debuginfo-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-Tools:python3-rados-debuginfo-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-Tools:python3-rados-debuginfo-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-Tools:python3-rbd-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-Tools:python3-rbd-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-Tools:python3-rbd-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-Tools:python3-rbd-debuginfo-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-Tools:python3-rbd-debuginfo-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-Tools:python3-rbd-debuginfo-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-Tools:python3-rgw-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-Tools:python3-rgw-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-Tools:python3-rgw-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-Tools:python3-rgw-debuginfo-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-Tools:python3-rgw-debuginfo-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-Tools:python3-rgw-debuginfo-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-Tools:rbd-fuse-debuginfo-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-Tools:rbd-fuse-debuginfo-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-Tools:rbd-fuse-debuginfo-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-Tools:rbd-mirror-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-Tools:rbd-mirror-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-Tools:rbd-mirror-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-Tools:rbd-mirror-debuginfo-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-Tools:rbd-mirror-debuginfo-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-Tools:rbd-mirror-debuginfo-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-Tools:rbd-nbd-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-Tools:rbd-nbd-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-Tools:rbd-nbd-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-Tools:rbd-nbd-debuginfo-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-Tools:rbd-nbd-debuginfo-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-Tools:rbd-nbd-debuginfo-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-Tools:tcmu-runner-0:1.5.2-5.el8cp.ppc64le", "8Base-RHCEPH-4.3-Tools:tcmu-runner-0:1.5.2-5.el8cp.s390x", "8Base-RHCEPH-4.3-Tools:tcmu-runner-0:1.5.2-5.el8cp.src", "8Base-RHCEPH-4.3-Tools:tcmu-runner-0:1.5.2-5.el8cp.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-25658" }, { "category": "external", "summary": "RHBZ#1889972", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1889972" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-25658", "url": "https://www.cve.org/CVERecord?id=CVE-2020-25658" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-25658", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-25658" }, { "category": "external", "summary": "https://github.com/sybrenstuvel/python-rsa/issues/165", "url": "https://github.com/sybrenstuvel/python-rsa/issues/165" } ], "release_date": "2020-11-09T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-05-05T07:56:42+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nFor supported configurations, refer to:\n\nhttps://access.redhat.com/articles/1548993", "product_ids": [ "8Base-RHCEPH-4.3-MON:python-rsa-0:4.8-1.el8cp.src", "8Base-RHCEPH-4.3-MON:python3-rsa-0:4.8-1.el8cp.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:1716" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "8Base-RHCEPH-4.3-MON:python-rsa-0:4.8-1.el8cp.src", "8Base-RHCEPH-4.3-MON:python3-rsa-0:4.8-1.el8cp.noarch" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "python-rsa: bleichenbacher timing oracle attack against RSA decryption" }, { "acknowledgments": [ { "names": [ "Sergey Bobrov" ], "organization": "Kaspersky" } ], "cve": "CVE-2021-3524", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2021-04-15T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "7Server-RHEL-7-RHCEPH-4.3-Tools:ceph-ansible-0:4.0.70.3-1.el7cp.noarch", "7Server-RHEL-7-RHCEPH-4.3-Tools:ceph-ansible-0:4.0.70.3-1.el7cp.src", "7Server-RHEL-7-RHCEPH-4.3-Tools:ceph-iscsi-0:3.4-5.el7cp.noarch", "7Server-RHEL-7-RHCEPH-4.3-Tools:ceph-iscsi-0:3.4-5.el7cp.src", "7Server-RHEL-7-RHCEPH-4.3-Tools:libntirpc-0:3.4-1.1.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-Tools:libntirpc-0:3.4-1.1.el7cp.src", "7Server-RHEL-7-RHCEPH-4.3-Tools:libntirpc-0:3.4-1.1.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-Tools:libntirpc-debuginfo-0:3.4-1.1.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-Tools:libntirpc-debuginfo-0:3.4-1.1.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-Tools:libtcmu-0:1.5.2-5.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-Tools:libtcmu-0:1.5.2-5.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-Tools:nfs-ganesha-0:3.5-1.2.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-Tools:nfs-ganesha-0:3.5-1.2.el7cp.src", "7Server-RHEL-7-RHCEPH-4.3-Tools:nfs-ganesha-0:3.5-1.2.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-Tools:nfs-ganesha-ceph-0:3.5-1.2.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-Tools:nfs-ganesha-ceph-0:3.5-1.2.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-Tools:nfs-ganesha-debuginfo-0:3.5-1.2.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-Tools:nfs-ganesha-debuginfo-0:3.5-1.2.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-Tools:nfs-ganesha-proxy-0:3.5-1.2.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-Tools:nfs-ganesha-proxy-0:3.5-1.2.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-Tools:nfs-ganesha-rados-grace-0:3.5-1.2.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-Tools:nfs-ganesha-rados-grace-0:3.5-1.2.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-Tools:nfs-ganesha-rados-urls-0:3.5-1.2.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-Tools:nfs-ganesha-rados-urls-0:3.5-1.2.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-Tools:nfs-ganesha-rgw-0:3.5-1.2.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-Tools:nfs-ganesha-rgw-0:3.5-1.2.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-Tools:nfs-ganesha-selinux-0:3.5-1.2.el7cp.noarch", "7Server-RHEL-7-RHCEPH-4.3-Tools:nfs-ganesha-vfs-0:3.5-1.2.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-Tools:nfs-ganesha-vfs-0:3.5-1.2.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-Tools:tcmu-runner-0:1.5.2-5.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-Tools:tcmu-runner-0:1.5.2-5.el7cp.src", "7Server-RHEL-7-RHCEPH-4.3-Tools:tcmu-runner-0:1.5.2-5.el7cp.x86_64", "8Base-RHCEPH-4.3-MON:python-rsa-0:4.8-1.el8cp.src", "8Base-RHCEPH-4.3-MON:python3-rsa-0:4.8-1.el8cp.noarch", "8Base-RHCEPH-4.3-Tools:ceph-ansible-0:4.0.70.3-1.el8cp.noarch", "8Base-RHCEPH-4.3-Tools:ceph-ansible-0:4.0.70.3-1.el8cp.src", "8Base-RHCEPH-4.3-Tools:ceph-iscsi-0:3.4-5.el8cp.noarch", "8Base-RHCEPH-4.3-Tools:ceph-iscsi-0:3.4-5.el8cp.src", "8Base-RHCEPH-4.3-Tools:libntirpc-0:3.4-1.1.el8cp.ppc64le", "8Base-RHCEPH-4.3-Tools:libntirpc-0:3.4-1.1.el8cp.s390x", "8Base-RHCEPH-4.3-Tools:libntirpc-0:3.4-1.1.el8cp.src", "8Base-RHCEPH-4.3-Tools:libntirpc-0:3.4-1.1.el8cp.x86_64", "8Base-RHCEPH-4.3-Tools:libntirpc-debuginfo-0:3.4-1.1.el8cp.ppc64le", "8Base-RHCEPH-4.3-Tools:libntirpc-debuginfo-0:3.4-1.1.el8cp.s390x", "8Base-RHCEPH-4.3-Tools:libntirpc-debuginfo-0:3.4-1.1.el8cp.x86_64", "8Base-RHCEPH-4.3-Tools:libntirpc-debugsource-0:3.4-1.1.el8cp.ppc64le", "8Base-RHCEPH-4.3-Tools:libntirpc-debugsource-0:3.4-1.1.el8cp.s390x", "8Base-RHCEPH-4.3-Tools:libntirpc-debugsource-0:3.4-1.1.el8cp.x86_64", "8Base-RHCEPH-4.3-Tools:libtcmu-0:1.5.2-5.el8cp.ppc64le", "8Base-RHCEPH-4.3-Tools:libtcmu-0:1.5.2-5.el8cp.s390x", "8Base-RHCEPH-4.3-Tools:libtcmu-0:1.5.2-5.el8cp.x86_64", "8Base-RHCEPH-4.3-Tools:nfs-ganesha-0:3.5-1.2.el8cp.ppc64le", "8Base-RHCEPH-4.3-Tools:nfs-ganesha-0:3.5-1.2.el8cp.s390x", "8Base-RHCEPH-4.3-Tools:nfs-ganesha-0:3.5-1.2.el8cp.src", "8Base-RHCEPH-4.3-Tools:nfs-ganesha-0:3.5-1.2.el8cp.x86_64", "8Base-RHCEPH-4.3-Tools:nfs-ganesha-ceph-0:3.5-1.2.el8cp.ppc64le", "8Base-RHCEPH-4.3-Tools:nfs-ganesha-ceph-0:3.5-1.2.el8cp.s390x", "8Base-RHCEPH-4.3-Tools:nfs-ganesha-ceph-0:3.5-1.2.el8cp.x86_64", "8Base-RHCEPH-4.3-Tools:nfs-ganesha-ceph-debuginfo-0:3.5-1.2.el8cp.ppc64le", "8Base-RHCEPH-4.3-Tools:nfs-ganesha-ceph-debuginfo-0:3.5-1.2.el8cp.s390x", "8Base-RHCEPH-4.3-Tools:nfs-ganesha-ceph-debuginfo-0:3.5-1.2.el8cp.x86_64", "8Base-RHCEPH-4.3-Tools:nfs-ganesha-debuginfo-0:3.5-1.2.el8cp.ppc64le", "8Base-RHCEPH-4.3-Tools:nfs-ganesha-debuginfo-0:3.5-1.2.el8cp.s390x", "8Base-RHCEPH-4.3-Tools:nfs-ganesha-debuginfo-0:3.5-1.2.el8cp.x86_64", "8Base-RHCEPH-4.3-Tools:nfs-ganesha-debugsource-0:3.5-1.2.el8cp.ppc64le", "8Base-RHCEPH-4.3-Tools:nfs-ganesha-debugsource-0:3.5-1.2.el8cp.s390x", "8Base-RHCEPH-4.3-Tools:nfs-ganesha-debugsource-0:3.5-1.2.el8cp.x86_64", "8Base-RHCEPH-4.3-Tools:nfs-ganesha-proxy-0:3.5-1.2.el8cp.ppc64le", "8Base-RHCEPH-4.3-Tools:nfs-ganesha-proxy-0:3.5-1.2.el8cp.s390x", "8Base-RHCEPH-4.3-Tools:nfs-ganesha-proxy-0:3.5-1.2.el8cp.x86_64", "8Base-RHCEPH-4.3-Tools:nfs-ganesha-proxy-debuginfo-0:3.5-1.2.el8cp.ppc64le", "8Base-RHCEPH-4.3-Tools:nfs-ganesha-proxy-debuginfo-0:3.5-1.2.el8cp.s390x", "8Base-RHCEPH-4.3-Tools:nfs-ganesha-proxy-debuginfo-0:3.5-1.2.el8cp.x86_64", "8Base-RHCEPH-4.3-Tools:nfs-ganesha-rados-grace-0:3.5-1.2.el8cp.ppc64le", "8Base-RHCEPH-4.3-Tools:nfs-ganesha-rados-grace-0:3.5-1.2.el8cp.s390x", "8Base-RHCEPH-4.3-Tools:nfs-ganesha-rados-grace-0:3.5-1.2.el8cp.x86_64", "8Base-RHCEPH-4.3-Tools:nfs-ganesha-rados-grace-debuginfo-0:3.5-1.2.el8cp.ppc64le", "8Base-RHCEPH-4.3-Tools:nfs-ganesha-rados-grace-debuginfo-0:3.5-1.2.el8cp.s390x", "8Base-RHCEPH-4.3-Tools:nfs-ganesha-rados-grace-debuginfo-0:3.5-1.2.el8cp.x86_64", "8Base-RHCEPH-4.3-Tools:nfs-ganesha-rados-urls-0:3.5-1.2.el8cp.ppc64le", "8Base-RHCEPH-4.3-Tools:nfs-ganesha-rados-urls-0:3.5-1.2.el8cp.s390x", "8Base-RHCEPH-4.3-Tools:nfs-ganesha-rados-urls-0:3.5-1.2.el8cp.x86_64", "8Base-RHCEPH-4.3-Tools:nfs-ganesha-rados-urls-debuginfo-0:3.5-1.2.el8cp.ppc64le", "8Base-RHCEPH-4.3-Tools:nfs-ganesha-rados-urls-debuginfo-0:3.5-1.2.el8cp.s390x", "8Base-RHCEPH-4.3-Tools:nfs-ganesha-rados-urls-debuginfo-0:3.5-1.2.el8cp.x86_64", "8Base-RHCEPH-4.3-Tools:nfs-ganesha-rgw-0:3.5-1.2.el8cp.ppc64le", "8Base-RHCEPH-4.3-Tools:nfs-ganesha-rgw-0:3.5-1.2.el8cp.s390x", "8Base-RHCEPH-4.3-Tools:nfs-ganesha-rgw-0:3.5-1.2.el8cp.x86_64", "8Base-RHCEPH-4.3-Tools:nfs-ganesha-rgw-debuginfo-0:3.5-1.2.el8cp.ppc64le", "8Base-RHCEPH-4.3-Tools:nfs-ganesha-rgw-debuginfo-0:3.5-1.2.el8cp.s390x", "8Base-RHCEPH-4.3-Tools:nfs-ganesha-rgw-debuginfo-0:3.5-1.2.el8cp.x86_64", "8Base-RHCEPH-4.3-Tools:nfs-ganesha-selinux-0:3.5-1.2.el8cp.noarch", "8Base-RHCEPH-4.3-Tools:nfs-ganesha-vfs-0:3.5-1.2.el8cp.ppc64le", "8Base-RHCEPH-4.3-Tools:nfs-ganesha-vfs-0:3.5-1.2.el8cp.s390x", "8Base-RHCEPH-4.3-Tools:nfs-ganesha-vfs-0:3.5-1.2.el8cp.x86_64", "8Base-RHCEPH-4.3-Tools:nfs-ganesha-vfs-debuginfo-0:3.5-1.2.el8cp.ppc64le", "8Base-RHCEPH-4.3-Tools:nfs-ganesha-vfs-debuginfo-0:3.5-1.2.el8cp.s390x", "8Base-RHCEPH-4.3-Tools:nfs-ganesha-vfs-debuginfo-0:3.5-1.2.el8cp.x86_64", "8Base-RHCEPH-4.3-Tools:tcmu-runner-0:1.5.2-5.el8cp.ppc64le", "8Base-RHCEPH-4.3-Tools:tcmu-runner-0:1.5.2-5.el8cp.s390x", "8Base-RHCEPH-4.3-Tools:tcmu-runner-0:1.5.2-5.el8cp.src", "8Base-RHCEPH-4.3-Tools:tcmu-runner-0:1.5.2-5.el8cp.x86_64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1951674" } ], "notes": [ { "category": "description", "text": "A flaw was found in the Red Hat Ceph Storage RadosGW (Ceph Object Gateway). The vulnerability is related to the injection of HTTP headers via a CORS ExposeHeader tag. The newline character in the ExposeHeader tag in the CORS configuration file generates a header injection in the response when making the CORS request. The highest threat from this vulnerability is to integrity.", "title": "Vulnerability description" }, { "category": "summary", "text": "gateway: radosgw: CRLF injection", "title": "Vulnerability summary" }, { "category": "other", "text": "* Red Hat Ceph Storage (RHCS) 4 is affected by this vulnerability. Note: although this issue affects the RadosGW S3 API, it does not affect the Swift API.\n* Red Hat OpenShift Container Storage (RHOCS) 4 shipped ceph package for the usage of RHOCS 4.2 only which has reached End of Life. The shipped version of ceph package is neither used nor supported with the release of RHOCS 4.3.\n* Red Hat Enterprise Linux 7 and 8 are not affected by this flaw, as the shipped versions of `ceph` are not compiled with RadosGW support.\n* Red Hat OpenStack Platform deployments use the ceph package directly from the Ceph channel; the RHOSP package will not be updated at this time.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RHEL-7-RHCEPH-4.3-MON:ceph-2:14.2.22-110.el7cp.src", "7Server-RHEL-7-RHCEPH-4.3-MON:ceph-base-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-MON:ceph-base-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-MON:ceph-common-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-MON:ceph-common-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-MON:ceph-debuginfo-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-MON:ceph-debuginfo-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-MON:ceph-fuse-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-MON:ceph-fuse-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-MON:ceph-grafana-dashboards-2:14.2.22-110.el7cp.noarch", "7Server-RHEL-7-RHCEPH-4.3-MON:ceph-mds-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-MON:ceph-mds-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-MON:ceph-mgr-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-MON:ceph-mgr-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-MON:ceph-mgr-dashboard-2:14.2.22-110.el7cp.noarch", "7Server-RHEL-7-RHCEPH-4.3-MON:ceph-mgr-diskprediction-local-2:14.2.22-110.el7cp.noarch", "7Server-RHEL-7-RHCEPH-4.3-MON:ceph-mgr-k8sevents-2:14.2.22-110.el7cp.noarch", "7Server-RHEL-7-RHCEPH-4.3-MON:ceph-mgr-rook-2:14.2.22-110.el7cp.noarch", "7Server-RHEL-7-RHCEPH-4.3-MON:ceph-mon-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-MON:ceph-mon-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-MON:ceph-osd-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-MON:ceph-osd-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-MON:ceph-radosgw-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-MON:ceph-radosgw-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-MON:ceph-selinux-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-MON:ceph-selinux-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-MON:ceph-test-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-MON:ceph-test-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-MON:libcephfs-devel-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-MON:libcephfs-devel-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-MON:libcephfs2-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-MON:libcephfs2-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-MON:librados-devel-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-MON:librados-devel-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-MON:librados2-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-MON:librados2-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-MON:libradospp-devel-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-MON:libradospp-devel-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-MON:libradosstriper1-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-MON:libradosstriper1-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-MON:librbd-devel-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-MON:librbd-devel-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-MON:librbd1-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-MON:librbd1-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-MON:librgw-devel-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-MON:librgw-devel-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-MON:librgw2-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-MON:librgw2-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-MON:python-ceph-argparse-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-MON:python-ceph-argparse-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-MON:python-cephfs-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-MON:python-cephfs-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-MON:python-rados-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-MON:python-rados-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-MON:python-rbd-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-MON:python-rbd-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-MON:python-rgw-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-MON:python-rgw-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-MON:rbd-mirror-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-MON:rbd-mirror-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-MON:rbd-nbd-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-MON:rbd-nbd-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-OSD:ceph-2:14.2.22-110.el7cp.src", "7Server-RHEL-7-RHCEPH-4.3-OSD:ceph-base-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-OSD:ceph-base-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-OSD:ceph-common-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-OSD:ceph-common-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-OSD:ceph-debuginfo-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-OSD:ceph-debuginfo-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-OSD:ceph-fuse-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-OSD:ceph-fuse-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-OSD:ceph-grafana-dashboards-2:14.2.22-110.el7cp.noarch", "7Server-RHEL-7-RHCEPH-4.3-OSD:ceph-mds-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-OSD:ceph-mds-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-OSD:ceph-mgr-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-OSD:ceph-mgr-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-OSD:ceph-mgr-dashboard-2:14.2.22-110.el7cp.noarch", "7Server-RHEL-7-RHCEPH-4.3-OSD:ceph-mgr-diskprediction-local-2:14.2.22-110.el7cp.noarch", "7Server-RHEL-7-RHCEPH-4.3-OSD:ceph-mgr-k8sevents-2:14.2.22-110.el7cp.noarch", "7Server-RHEL-7-RHCEPH-4.3-OSD:ceph-mgr-rook-2:14.2.22-110.el7cp.noarch", "7Server-RHEL-7-RHCEPH-4.3-OSD:ceph-mon-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-OSD:ceph-mon-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-OSD:ceph-osd-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-OSD:ceph-osd-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-OSD:ceph-radosgw-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-OSD:ceph-radosgw-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-OSD:ceph-selinux-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-OSD:ceph-selinux-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-OSD:ceph-test-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-OSD:ceph-test-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-OSD:libcephfs-devel-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-OSD:libcephfs-devel-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-OSD:libcephfs2-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-OSD:libcephfs2-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-OSD:librados-devel-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-OSD:librados-devel-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-OSD:librados2-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-OSD:librados2-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-OSD:libradospp-devel-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-OSD:libradospp-devel-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-OSD:libradosstriper1-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-OSD:libradosstriper1-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-OSD:librbd-devel-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-OSD:librbd-devel-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-OSD:librbd1-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-OSD:librbd1-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-OSD:librgw-devel-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-OSD:librgw-devel-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-OSD:librgw2-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-OSD:librgw2-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-OSD:python-ceph-argparse-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-OSD:python-ceph-argparse-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-OSD:python-cephfs-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-OSD:python-cephfs-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-OSD:python-rados-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-OSD:python-rados-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-OSD:python-rbd-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-OSD:python-rbd-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-OSD:python-rgw-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-OSD:python-rgw-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-OSD:rbd-mirror-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-OSD:rbd-mirror-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-OSD:rbd-nbd-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-OSD:rbd-nbd-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-Tools:ceph-2:14.2.22-110.el7cp.src", "7Server-RHEL-7-RHCEPH-4.3-Tools:ceph-base-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-Tools:ceph-base-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-Tools:ceph-common-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-Tools:ceph-common-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-Tools:ceph-debuginfo-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-Tools:ceph-debuginfo-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-Tools:ceph-fuse-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-Tools:ceph-fuse-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-Tools:ceph-grafana-dashboards-2:14.2.22-110.el7cp.noarch", "7Server-RHEL-7-RHCEPH-4.3-Tools:ceph-mds-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-Tools:ceph-mds-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-Tools:ceph-mgr-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-Tools:ceph-mgr-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-Tools:ceph-mgr-dashboard-2:14.2.22-110.el7cp.noarch", "7Server-RHEL-7-RHCEPH-4.3-Tools:ceph-mgr-diskprediction-local-2:14.2.22-110.el7cp.noarch", "7Server-RHEL-7-RHCEPH-4.3-Tools:ceph-mgr-k8sevents-2:14.2.22-110.el7cp.noarch", "7Server-RHEL-7-RHCEPH-4.3-Tools:ceph-mgr-rook-2:14.2.22-110.el7cp.noarch", "7Server-RHEL-7-RHCEPH-4.3-Tools:ceph-mon-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-Tools:ceph-mon-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-Tools:ceph-osd-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-Tools:ceph-osd-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-Tools:ceph-radosgw-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-Tools:ceph-radosgw-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-Tools:ceph-selinux-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-Tools:ceph-selinux-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-Tools:ceph-test-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-Tools:ceph-test-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-Tools:libcephfs-devel-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-Tools:libcephfs-devel-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-Tools:libcephfs2-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-Tools:libcephfs2-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-Tools:librados-devel-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-Tools:librados-devel-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-Tools:librados2-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-Tools:librados2-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-Tools:libradospp-devel-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-Tools:libradospp-devel-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-Tools:libradosstriper1-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-Tools:libradosstriper1-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-Tools:librbd-devel-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-Tools:librbd-devel-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-Tools:librbd1-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-Tools:librbd1-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-Tools:librgw-devel-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-Tools:librgw-devel-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-Tools:librgw2-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-Tools:librgw2-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-Tools:python-ceph-argparse-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-Tools:python-ceph-argparse-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-Tools:python-cephfs-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-Tools:python-cephfs-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-Tools:python-rados-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-Tools:python-rados-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-Tools:python-rbd-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-Tools:python-rbd-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-Tools:python-rgw-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-Tools:python-rgw-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-Tools:rbd-mirror-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-Tools:rbd-mirror-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-Tools:rbd-nbd-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-Tools:rbd-nbd-2:14.2.22-110.el7cp.x86_64", "8Base-RHCEPH-4.3-MON:ceph-2:14.2.22-110.el8cp.src", "8Base-RHCEPH-4.3-MON:ceph-base-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-MON:ceph-base-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-MON:ceph-base-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-MON:ceph-base-debuginfo-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-MON:ceph-base-debuginfo-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-MON:ceph-base-debuginfo-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-MON:ceph-common-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-MON:ceph-common-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-MON:ceph-common-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-MON:ceph-common-debuginfo-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-MON:ceph-common-debuginfo-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-MON:ceph-common-debuginfo-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-MON:ceph-debugsource-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-MON:ceph-debugsource-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-MON:ceph-debugsource-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-MON:ceph-fuse-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-MON:ceph-fuse-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-MON:ceph-fuse-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-MON:ceph-fuse-debuginfo-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-MON:ceph-fuse-debuginfo-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-MON:ceph-fuse-debuginfo-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-MON:ceph-grafana-dashboards-2:14.2.22-110.el8cp.noarch", "8Base-RHCEPH-4.3-MON:ceph-mds-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-MON:ceph-mds-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-MON:ceph-mds-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-MON:ceph-mds-debuginfo-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-MON:ceph-mds-debuginfo-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-MON:ceph-mds-debuginfo-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-MON:ceph-mgr-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-MON:ceph-mgr-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-MON:ceph-mgr-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-MON:ceph-mgr-dashboard-2:14.2.22-110.el8cp.noarch", "8Base-RHCEPH-4.3-MON:ceph-mgr-debuginfo-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-MON:ceph-mgr-debuginfo-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-MON:ceph-mgr-debuginfo-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-MON:ceph-mgr-diskprediction-local-2:14.2.22-110.el8cp.noarch", "8Base-RHCEPH-4.3-MON:ceph-mgr-k8sevents-2:14.2.22-110.el8cp.noarch", "8Base-RHCEPH-4.3-MON:ceph-mgr-rook-2:14.2.22-110.el8cp.noarch", "8Base-RHCEPH-4.3-MON:ceph-mon-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-MON:ceph-mon-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-MON:ceph-mon-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-MON:ceph-mon-debuginfo-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-MON:ceph-mon-debuginfo-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-MON:ceph-mon-debuginfo-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-MON:ceph-osd-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-MON:ceph-osd-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-MON:ceph-osd-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-MON:ceph-osd-debuginfo-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-MON:ceph-osd-debuginfo-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-MON:ceph-osd-debuginfo-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-MON:ceph-radosgw-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-MON:ceph-radosgw-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-MON:ceph-radosgw-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-MON:ceph-radosgw-debuginfo-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-MON:ceph-radosgw-debuginfo-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-MON:ceph-radosgw-debuginfo-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-MON:ceph-selinux-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-MON:ceph-selinux-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-MON:ceph-selinux-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-MON:ceph-test-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-MON:ceph-test-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-MON:ceph-test-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-MON:ceph-test-debuginfo-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-MON:ceph-test-debuginfo-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-MON:ceph-test-debuginfo-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-MON:libcephfs-devel-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-MON:libcephfs-devel-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-MON:libcephfs-devel-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-MON:libcephfs2-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-MON:libcephfs2-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-MON:libcephfs2-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-MON:libcephfs2-debuginfo-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-MON:libcephfs2-debuginfo-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-MON:libcephfs2-debuginfo-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-MON:librados-devel-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-MON:librados-devel-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-MON:librados-devel-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-MON:librados-devel-debuginfo-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-MON:librados-devel-debuginfo-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-MON:librados-devel-debuginfo-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-MON:librados2-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-MON:librados2-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-MON:librados2-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-MON:librados2-debuginfo-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-MON:librados2-debuginfo-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-MON:librados2-debuginfo-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-MON:libradospp-devel-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-MON:libradospp-devel-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-MON:libradospp-devel-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-MON:libradosstriper1-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-MON:libradosstriper1-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-MON:libradosstriper1-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-MON:libradosstriper1-debuginfo-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-MON:libradosstriper1-debuginfo-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-MON:libradosstriper1-debuginfo-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-MON:librbd-devel-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-MON:librbd-devel-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-MON:librbd-devel-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-MON:librbd1-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-MON:librbd1-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-MON:librbd1-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-MON:librbd1-debuginfo-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-MON:librbd1-debuginfo-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-MON:librbd1-debuginfo-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-MON:librgw-devel-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-MON:librgw-devel-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-MON:librgw-devel-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-MON:librgw2-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-MON:librgw2-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-MON:librgw2-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-MON:librgw2-debuginfo-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-MON:librgw2-debuginfo-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-MON:librgw2-debuginfo-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-MON:python3-ceph-argparse-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-MON:python3-ceph-argparse-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-MON:python3-ceph-argparse-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-MON:python3-cephfs-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-MON:python3-cephfs-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-MON:python3-cephfs-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-MON:python3-cephfs-debuginfo-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-MON:python3-cephfs-debuginfo-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-MON:python3-cephfs-debuginfo-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-MON:python3-rados-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-MON:python3-rados-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-MON:python3-rados-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-MON:python3-rados-debuginfo-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-MON:python3-rados-debuginfo-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-MON:python3-rados-debuginfo-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-MON:python3-rbd-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-MON:python3-rbd-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-MON:python3-rbd-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-MON:python3-rbd-debuginfo-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-MON:python3-rbd-debuginfo-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-MON:python3-rbd-debuginfo-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-MON:python3-rgw-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-MON:python3-rgw-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-MON:python3-rgw-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-MON:python3-rgw-debuginfo-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-MON:python3-rgw-debuginfo-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-MON:python3-rgw-debuginfo-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-MON:rbd-fuse-debuginfo-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-MON:rbd-fuse-debuginfo-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-MON:rbd-fuse-debuginfo-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-MON:rbd-mirror-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-MON:rbd-mirror-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-MON:rbd-mirror-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-MON:rbd-mirror-debuginfo-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-MON:rbd-mirror-debuginfo-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-MON:rbd-mirror-debuginfo-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-MON:rbd-nbd-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-MON:rbd-nbd-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-MON:rbd-nbd-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-MON:rbd-nbd-debuginfo-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-MON:rbd-nbd-debuginfo-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-MON:rbd-nbd-debuginfo-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-OSD:ceph-2:14.2.22-110.el8cp.src", "8Base-RHCEPH-4.3-OSD:ceph-base-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-OSD:ceph-base-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-OSD:ceph-base-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-OSD:ceph-base-debuginfo-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-OSD:ceph-base-debuginfo-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-OSD:ceph-base-debuginfo-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-OSD:ceph-common-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-OSD:ceph-common-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-OSD:ceph-common-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-OSD:ceph-common-debuginfo-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-OSD:ceph-common-debuginfo-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-OSD:ceph-common-debuginfo-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-OSD:ceph-debugsource-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-OSD:ceph-debugsource-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-OSD:ceph-debugsource-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-OSD:ceph-fuse-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-OSD:ceph-fuse-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-OSD:ceph-fuse-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-OSD:ceph-fuse-debuginfo-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-OSD:ceph-fuse-debuginfo-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-OSD:ceph-fuse-debuginfo-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-OSD:ceph-grafana-dashboards-2:14.2.22-110.el8cp.noarch", "8Base-RHCEPH-4.3-OSD:ceph-mds-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-OSD:ceph-mds-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-OSD:ceph-mds-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-OSD:ceph-mds-debuginfo-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-OSD:ceph-mds-debuginfo-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-OSD:ceph-mds-debuginfo-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-OSD:ceph-mgr-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-OSD:ceph-mgr-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-OSD:ceph-mgr-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-OSD:ceph-mgr-dashboard-2:14.2.22-110.el8cp.noarch", "8Base-RHCEPH-4.3-OSD:ceph-mgr-debuginfo-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-OSD:ceph-mgr-debuginfo-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-OSD:ceph-mgr-debuginfo-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-OSD:ceph-mgr-diskprediction-local-2:14.2.22-110.el8cp.noarch", "8Base-RHCEPH-4.3-OSD:ceph-mgr-k8sevents-2:14.2.22-110.el8cp.noarch", "8Base-RHCEPH-4.3-OSD:ceph-mgr-rook-2:14.2.22-110.el8cp.noarch", "8Base-RHCEPH-4.3-OSD:ceph-mon-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-OSD:ceph-mon-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-OSD:ceph-mon-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-OSD:ceph-mon-debuginfo-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-OSD:ceph-mon-debuginfo-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-OSD:ceph-mon-debuginfo-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-OSD:ceph-osd-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-OSD:ceph-osd-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-OSD:ceph-osd-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-OSD:ceph-osd-debuginfo-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-OSD:ceph-osd-debuginfo-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-OSD:ceph-osd-debuginfo-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-OSD:ceph-radosgw-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-OSD:ceph-radosgw-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-OSD:ceph-radosgw-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-OSD:ceph-radosgw-debuginfo-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-OSD:ceph-radosgw-debuginfo-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-OSD:ceph-radosgw-debuginfo-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-OSD:ceph-selinux-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-OSD:ceph-selinux-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-OSD:ceph-selinux-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-OSD:ceph-test-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-OSD:ceph-test-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-OSD:ceph-test-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-OSD:ceph-test-debuginfo-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-OSD:ceph-test-debuginfo-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-OSD:ceph-test-debuginfo-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-OSD:libcephfs-devel-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-OSD:libcephfs-devel-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-OSD:libcephfs-devel-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-OSD:libcephfs2-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-OSD:libcephfs2-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-OSD:libcephfs2-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-OSD:libcephfs2-debuginfo-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-OSD:libcephfs2-debuginfo-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-OSD:libcephfs2-debuginfo-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-OSD:librados-devel-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-OSD:librados-devel-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-OSD:librados-devel-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-OSD:librados-devel-debuginfo-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-OSD:librados-devel-debuginfo-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-OSD:librados-devel-debuginfo-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-OSD:librados2-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-OSD:librados2-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-OSD:librados2-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-OSD:librados2-debuginfo-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-OSD:librados2-debuginfo-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-OSD:librados2-debuginfo-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-OSD:libradospp-devel-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-OSD:libradospp-devel-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-OSD:libradospp-devel-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-OSD:libradosstriper1-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-OSD:libradosstriper1-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-OSD:libradosstriper1-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-OSD:libradosstriper1-debuginfo-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-OSD:libradosstriper1-debuginfo-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-OSD:libradosstriper1-debuginfo-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-OSD:librbd-devel-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-OSD:librbd-devel-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-OSD:librbd-devel-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-OSD:librbd1-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-OSD:librbd1-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-OSD:librbd1-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-OSD:librbd1-debuginfo-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-OSD:librbd1-debuginfo-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-OSD:librbd1-debuginfo-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-OSD:librgw-devel-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-OSD:librgw-devel-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-OSD:librgw-devel-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-OSD:librgw2-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-OSD:librgw2-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-OSD:librgw2-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-OSD:librgw2-debuginfo-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-OSD:librgw2-debuginfo-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-OSD:librgw2-debuginfo-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-OSD:python3-ceph-argparse-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-OSD:python3-ceph-argparse-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-OSD:python3-ceph-argparse-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-OSD:python3-cephfs-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-OSD:python3-cephfs-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-OSD:python3-cephfs-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-OSD:python3-cephfs-debuginfo-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-OSD:python3-cephfs-debuginfo-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-OSD:python3-cephfs-debuginfo-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-OSD:python3-rados-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-OSD:python3-rados-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-OSD:python3-rados-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-OSD:python3-rados-debuginfo-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-OSD:python3-rados-debuginfo-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-OSD:python3-rados-debuginfo-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-OSD:python3-rbd-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-OSD:python3-rbd-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-OSD:python3-rbd-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-OSD:python3-rbd-debuginfo-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-OSD:python3-rbd-debuginfo-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-OSD:python3-rbd-debuginfo-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-OSD:python3-rgw-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-OSD:python3-rgw-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-OSD:python3-rgw-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-OSD:python3-rgw-debuginfo-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-OSD:python3-rgw-debuginfo-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-OSD:python3-rgw-debuginfo-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-OSD:rbd-fuse-debuginfo-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-OSD:rbd-fuse-debuginfo-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-OSD:rbd-fuse-debuginfo-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-OSD:rbd-mirror-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-OSD:rbd-mirror-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-OSD:rbd-mirror-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-OSD:rbd-mirror-debuginfo-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-OSD:rbd-mirror-debuginfo-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-OSD:rbd-mirror-debuginfo-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-OSD:rbd-nbd-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-OSD:rbd-nbd-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-OSD:rbd-nbd-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-OSD:rbd-nbd-debuginfo-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-OSD:rbd-nbd-debuginfo-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-OSD:rbd-nbd-debuginfo-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-Tools:ceph-2:14.2.22-110.el8cp.src", "8Base-RHCEPH-4.3-Tools:ceph-base-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-Tools:ceph-base-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-Tools:ceph-base-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-Tools:ceph-base-debuginfo-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-Tools:ceph-base-debuginfo-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-Tools:ceph-base-debuginfo-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-Tools:ceph-common-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-Tools:ceph-common-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-Tools:ceph-common-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-Tools:ceph-common-debuginfo-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-Tools:ceph-common-debuginfo-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-Tools:ceph-common-debuginfo-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-Tools:ceph-debugsource-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-Tools:ceph-debugsource-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-Tools:ceph-debugsource-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-Tools:ceph-fuse-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-Tools:ceph-fuse-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-Tools:ceph-fuse-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-Tools:ceph-fuse-debuginfo-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-Tools:ceph-fuse-debuginfo-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-Tools:ceph-fuse-debuginfo-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-Tools:ceph-grafana-dashboards-2:14.2.22-110.el8cp.noarch", "8Base-RHCEPH-4.3-Tools:ceph-mds-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-Tools:ceph-mds-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-Tools:ceph-mds-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-Tools:ceph-mds-debuginfo-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-Tools:ceph-mds-debuginfo-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-Tools:ceph-mds-debuginfo-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-Tools:ceph-mgr-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-Tools:ceph-mgr-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-Tools:ceph-mgr-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-Tools:ceph-mgr-dashboard-2:14.2.22-110.el8cp.noarch", "8Base-RHCEPH-4.3-Tools:ceph-mgr-debuginfo-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-Tools:ceph-mgr-debuginfo-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-Tools:ceph-mgr-debuginfo-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-Tools:ceph-mgr-diskprediction-local-2:14.2.22-110.el8cp.noarch", "8Base-RHCEPH-4.3-Tools:ceph-mgr-k8sevents-2:14.2.22-110.el8cp.noarch", "8Base-RHCEPH-4.3-Tools:ceph-mgr-rook-2:14.2.22-110.el8cp.noarch", "8Base-RHCEPH-4.3-Tools:ceph-mon-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-Tools:ceph-mon-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-Tools:ceph-mon-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-Tools:ceph-mon-debuginfo-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-Tools:ceph-mon-debuginfo-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-Tools:ceph-mon-debuginfo-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-Tools:ceph-osd-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-Tools:ceph-osd-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-Tools:ceph-osd-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-Tools:ceph-osd-debuginfo-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-Tools:ceph-osd-debuginfo-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-Tools:ceph-osd-debuginfo-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-Tools:ceph-radosgw-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-Tools:ceph-radosgw-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-Tools:ceph-radosgw-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-Tools:ceph-radosgw-debuginfo-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-Tools:ceph-radosgw-debuginfo-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-Tools:ceph-radosgw-debuginfo-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-Tools:ceph-selinux-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-Tools:ceph-selinux-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-Tools:ceph-selinux-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-Tools:ceph-test-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-Tools:ceph-test-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-Tools:ceph-test-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-Tools:ceph-test-debuginfo-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-Tools:ceph-test-debuginfo-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-Tools:ceph-test-debuginfo-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-Tools:libcephfs-devel-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-Tools:libcephfs-devel-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-Tools:libcephfs-devel-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-Tools:libcephfs2-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-Tools:libcephfs2-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-Tools:libcephfs2-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-Tools:libcephfs2-debuginfo-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-Tools:libcephfs2-debuginfo-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-Tools:libcephfs2-debuginfo-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-Tools:librados-devel-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-Tools:librados-devel-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-Tools:librados-devel-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-Tools:librados-devel-debuginfo-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-Tools:librados-devel-debuginfo-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-Tools:librados-devel-debuginfo-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-Tools:librados2-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-Tools:librados2-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-Tools:librados2-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-Tools:librados2-debuginfo-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-Tools:librados2-debuginfo-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-Tools:librados2-debuginfo-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-Tools:libradospp-devel-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-Tools:libradospp-devel-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-Tools:libradospp-devel-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-Tools:libradosstriper1-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-Tools:libradosstriper1-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-Tools:libradosstriper1-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-Tools:libradosstriper1-debuginfo-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-Tools:libradosstriper1-debuginfo-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-Tools:libradosstriper1-debuginfo-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-Tools:librbd-devel-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-Tools:librbd-devel-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-Tools:librbd-devel-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-Tools:librbd1-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-Tools:librbd1-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-Tools:librbd1-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-Tools:librbd1-debuginfo-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-Tools:librbd1-debuginfo-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-Tools:librbd1-debuginfo-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-Tools:librgw-devel-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-Tools:librgw-devel-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-Tools:librgw-devel-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-Tools:librgw2-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-Tools:librgw2-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-Tools:librgw2-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-Tools:librgw2-debuginfo-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-Tools:librgw2-debuginfo-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-Tools:librgw2-debuginfo-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-Tools:python3-ceph-argparse-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-Tools:python3-ceph-argparse-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-Tools:python3-ceph-argparse-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-Tools:python3-cephfs-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-Tools:python3-cephfs-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-Tools:python3-cephfs-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-Tools:python3-cephfs-debuginfo-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-Tools:python3-cephfs-debuginfo-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-Tools:python3-cephfs-debuginfo-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-Tools:python3-rados-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-Tools:python3-rados-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-Tools:python3-rados-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-Tools:python3-rados-debuginfo-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-Tools:python3-rados-debuginfo-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-Tools:python3-rados-debuginfo-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-Tools:python3-rbd-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-Tools:python3-rbd-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-Tools:python3-rbd-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-Tools:python3-rbd-debuginfo-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-Tools:python3-rbd-debuginfo-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-Tools:python3-rbd-debuginfo-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-Tools:python3-rgw-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-Tools:python3-rgw-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-Tools:python3-rgw-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-Tools:python3-rgw-debuginfo-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-Tools:python3-rgw-debuginfo-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-Tools:python3-rgw-debuginfo-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-Tools:rbd-fuse-debuginfo-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-Tools:rbd-fuse-debuginfo-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-Tools:rbd-fuse-debuginfo-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-Tools:rbd-mirror-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-Tools:rbd-mirror-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-Tools:rbd-mirror-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-Tools:rbd-mirror-debuginfo-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-Tools:rbd-mirror-debuginfo-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-Tools:rbd-mirror-debuginfo-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-Tools:rbd-nbd-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-Tools:rbd-nbd-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-Tools:rbd-nbd-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-Tools:rbd-nbd-debuginfo-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-Tools:rbd-nbd-debuginfo-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-Tools:rbd-nbd-debuginfo-2:14.2.22-110.el8cp.x86_64" ], "known_not_affected": [ "7Server-RHEL-7-RHCEPH-4.3-Tools:ceph-ansible-0:4.0.70.3-1.el7cp.noarch", "7Server-RHEL-7-RHCEPH-4.3-Tools:ceph-ansible-0:4.0.70.3-1.el7cp.src", "7Server-RHEL-7-RHCEPH-4.3-Tools:ceph-iscsi-0:3.4-5.el7cp.noarch", "7Server-RHEL-7-RHCEPH-4.3-Tools:ceph-iscsi-0:3.4-5.el7cp.src", "7Server-RHEL-7-RHCEPH-4.3-Tools:libntirpc-0:3.4-1.1.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-Tools:libntirpc-0:3.4-1.1.el7cp.src", "7Server-RHEL-7-RHCEPH-4.3-Tools:libntirpc-0:3.4-1.1.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-Tools:libntirpc-debuginfo-0:3.4-1.1.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-Tools:libntirpc-debuginfo-0:3.4-1.1.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-Tools:libtcmu-0:1.5.2-5.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-Tools:libtcmu-0:1.5.2-5.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-Tools:nfs-ganesha-0:3.5-1.2.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-Tools:nfs-ganesha-0:3.5-1.2.el7cp.src", "7Server-RHEL-7-RHCEPH-4.3-Tools:nfs-ganesha-0:3.5-1.2.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-Tools:nfs-ganesha-ceph-0:3.5-1.2.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-Tools:nfs-ganesha-ceph-0:3.5-1.2.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-Tools:nfs-ganesha-debuginfo-0:3.5-1.2.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-Tools:nfs-ganesha-debuginfo-0:3.5-1.2.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-Tools:nfs-ganesha-proxy-0:3.5-1.2.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-Tools:nfs-ganesha-proxy-0:3.5-1.2.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-Tools:nfs-ganesha-rados-grace-0:3.5-1.2.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-Tools:nfs-ganesha-rados-grace-0:3.5-1.2.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-Tools:nfs-ganesha-rados-urls-0:3.5-1.2.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-Tools:nfs-ganesha-rados-urls-0:3.5-1.2.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-Tools:nfs-ganesha-rgw-0:3.5-1.2.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-Tools:nfs-ganesha-rgw-0:3.5-1.2.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-Tools:nfs-ganesha-selinux-0:3.5-1.2.el7cp.noarch", "7Server-RHEL-7-RHCEPH-4.3-Tools:nfs-ganesha-vfs-0:3.5-1.2.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-Tools:nfs-ganesha-vfs-0:3.5-1.2.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-Tools:tcmu-runner-0:1.5.2-5.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-Tools:tcmu-runner-0:1.5.2-5.el7cp.src", "7Server-RHEL-7-RHCEPH-4.3-Tools:tcmu-runner-0:1.5.2-5.el7cp.x86_64", "8Base-RHCEPH-4.3-MON:python-rsa-0:4.8-1.el8cp.src", "8Base-RHCEPH-4.3-MON:python3-rsa-0:4.8-1.el8cp.noarch", "8Base-RHCEPH-4.3-Tools:ceph-ansible-0:4.0.70.3-1.el8cp.noarch", "8Base-RHCEPH-4.3-Tools:ceph-ansible-0:4.0.70.3-1.el8cp.src", "8Base-RHCEPH-4.3-Tools:ceph-iscsi-0:3.4-5.el8cp.noarch", "8Base-RHCEPH-4.3-Tools:ceph-iscsi-0:3.4-5.el8cp.src", "8Base-RHCEPH-4.3-Tools:libntirpc-0:3.4-1.1.el8cp.ppc64le", "8Base-RHCEPH-4.3-Tools:libntirpc-0:3.4-1.1.el8cp.s390x", "8Base-RHCEPH-4.3-Tools:libntirpc-0:3.4-1.1.el8cp.src", "8Base-RHCEPH-4.3-Tools:libntirpc-0:3.4-1.1.el8cp.x86_64", "8Base-RHCEPH-4.3-Tools:libntirpc-debuginfo-0:3.4-1.1.el8cp.ppc64le", "8Base-RHCEPH-4.3-Tools:libntirpc-debuginfo-0:3.4-1.1.el8cp.s390x", "8Base-RHCEPH-4.3-Tools:libntirpc-debuginfo-0:3.4-1.1.el8cp.x86_64", "8Base-RHCEPH-4.3-Tools:libntirpc-debugsource-0:3.4-1.1.el8cp.ppc64le", "8Base-RHCEPH-4.3-Tools:libntirpc-debugsource-0:3.4-1.1.el8cp.s390x", "8Base-RHCEPH-4.3-Tools:libntirpc-debugsource-0:3.4-1.1.el8cp.x86_64", "8Base-RHCEPH-4.3-Tools:libtcmu-0:1.5.2-5.el8cp.ppc64le", "8Base-RHCEPH-4.3-Tools:libtcmu-0:1.5.2-5.el8cp.s390x", "8Base-RHCEPH-4.3-Tools:libtcmu-0:1.5.2-5.el8cp.x86_64", "8Base-RHCEPH-4.3-Tools:nfs-ganesha-0:3.5-1.2.el8cp.ppc64le", "8Base-RHCEPH-4.3-Tools:nfs-ganesha-0:3.5-1.2.el8cp.s390x", "8Base-RHCEPH-4.3-Tools:nfs-ganesha-0:3.5-1.2.el8cp.src", "8Base-RHCEPH-4.3-Tools:nfs-ganesha-0:3.5-1.2.el8cp.x86_64", "8Base-RHCEPH-4.3-Tools:nfs-ganesha-ceph-0:3.5-1.2.el8cp.ppc64le", "8Base-RHCEPH-4.3-Tools:nfs-ganesha-ceph-0:3.5-1.2.el8cp.s390x", "8Base-RHCEPH-4.3-Tools:nfs-ganesha-ceph-0:3.5-1.2.el8cp.x86_64", "8Base-RHCEPH-4.3-Tools:nfs-ganesha-ceph-debuginfo-0:3.5-1.2.el8cp.ppc64le", "8Base-RHCEPH-4.3-Tools:nfs-ganesha-ceph-debuginfo-0:3.5-1.2.el8cp.s390x", "8Base-RHCEPH-4.3-Tools:nfs-ganesha-ceph-debuginfo-0:3.5-1.2.el8cp.x86_64", "8Base-RHCEPH-4.3-Tools:nfs-ganesha-debuginfo-0:3.5-1.2.el8cp.ppc64le", "8Base-RHCEPH-4.3-Tools:nfs-ganesha-debuginfo-0:3.5-1.2.el8cp.s390x", "8Base-RHCEPH-4.3-Tools:nfs-ganesha-debuginfo-0:3.5-1.2.el8cp.x86_64", "8Base-RHCEPH-4.3-Tools:nfs-ganesha-debugsource-0:3.5-1.2.el8cp.ppc64le", "8Base-RHCEPH-4.3-Tools:nfs-ganesha-debugsource-0:3.5-1.2.el8cp.s390x", "8Base-RHCEPH-4.3-Tools:nfs-ganesha-debugsource-0:3.5-1.2.el8cp.x86_64", "8Base-RHCEPH-4.3-Tools:nfs-ganesha-proxy-0:3.5-1.2.el8cp.ppc64le", "8Base-RHCEPH-4.3-Tools:nfs-ganesha-proxy-0:3.5-1.2.el8cp.s390x", "8Base-RHCEPH-4.3-Tools:nfs-ganesha-proxy-0:3.5-1.2.el8cp.x86_64", "8Base-RHCEPH-4.3-Tools:nfs-ganesha-proxy-debuginfo-0:3.5-1.2.el8cp.ppc64le", "8Base-RHCEPH-4.3-Tools:nfs-ganesha-proxy-debuginfo-0:3.5-1.2.el8cp.s390x", "8Base-RHCEPH-4.3-Tools:nfs-ganesha-proxy-debuginfo-0:3.5-1.2.el8cp.x86_64", "8Base-RHCEPH-4.3-Tools:nfs-ganesha-rados-grace-0:3.5-1.2.el8cp.ppc64le", "8Base-RHCEPH-4.3-Tools:nfs-ganesha-rados-grace-0:3.5-1.2.el8cp.s390x", "8Base-RHCEPH-4.3-Tools:nfs-ganesha-rados-grace-0:3.5-1.2.el8cp.x86_64", "8Base-RHCEPH-4.3-Tools:nfs-ganesha-rados-grace-debuginfo-0:3.5-1.2.el8cp.ppc64le", "8Base-RHCEPH-4.3-Tools:nfs-ganesha-rados-grace-debuginfo-0:3.5-1.2.el8cp.s390x", "8Base-RHCEPH-4.3-Tools:nfs-ganesha-rados-grace-debuginfo-0:3.5-1.2.el8cp.x86_64", "8Base-RHCEPH-4.3-Tools:nfs-ganesha-rados-urls-0:3.5-1.2.el8cp.ppc64le", "8Base-RHCEPH-4.3-Tools:nfs-ganesha-rados-urls-0:3.5-1.2.el8cp.s390x", "8Base-RHCEPH-4.3-Tools:nfs-ganesha-rados-urls-0:3.5-1.2.el8cp.x86_64", "8Base-RHCEPH-4.3-Tools:nfs-ganesha-rados-urls-debuginfo-0:3.5-1.2.el8cp.ppc64le", "8Base-RHCEPH-4.3-Tools:nfs-ganesha-rados-urls-debuginfo-0:3.5-1.2.el8cp.s390x", "8Base-RHCEPH-4.3-Tools:nfs-ganesha-rados-urls-debuginfo-0:3.5-1.2.el8cp.x86_64", "8Base-RHCEPH-4.3-Tools:nfs-ganesha-rgw-0:3.5-1.2.el8cp.ppc64le", "8Base-RHCEPH-4.3-Tools:nfs-ganesha-rgw-0:3.5-1.2.el8cp.s390x", "8Base-RHCEPH-4.3-Tools:nfs-ganesha-rgw-0:3.5-1.2.el8cp.x86_64", "8Base-RHCEPH-4.3-Tools:nfs-ganesha-rgw-debuginfo-0:3.5-1.2.el8cp.ppc64le", "8Base-RHCEPH-4.3-Tools:nfs-ganesha-rgw-debuginfo-0:3.5-1.2.el8cp.s390x", "8Base-RHCEPH-4.3-Tools:nfs-ganesha-rgw-debuginfo-0:3.5-1.2.el8cp.x86_64", "8Base-RHCEPH-4.3-Tools:nfs-ganesha-selinux-0:3.5-1.2.el8cp.noarch", "8Base-RHCEPH-4.3-Tools:nfs-ganesha-vfs-0:3.5-1.2.el8cp.ppc64le", "8Base-RHCEPH-4.3-Tools:nfs-ganesha-vfs-0:3.5-1.2.el8cp.s390x", "8Base-RHCEPH-4.3-Tools:nfs-ganesha-vfs-0:3.5-1.2.el8cp.x86_64", "8Base-RHCEPH-4.3-Tools:nfs-ganesha-vfs-debuginfo-0:3.5-1.2.el8cp.ppc64le", "8Base-RHCEPH-4.3-Tools:nfs-ganesha-vfs-debuginfo-0:3.5-1.2.el8cp.s390x", "8Base-RHCEPH-4.3-Tools:nfs-ganesha-vfs-debuginfo-0:3.5-1.2.el8cp.x86_64", "8Base-RHCEPH-4.3-Tools:tcmu-runner-0:1.5.2-5.el8cp.ppc64le", "8Base-RHCEPH-4.3-Tools:tcmu-runner-0:1.5.2-5.el8cp.s390x", "8Base-RHCEPH-4.3-Tools:tcmu-runner-0:1.5.2-5.el8cp.src", "8Base-RHCEPH-4.3-Tools:tcmu-runner-0:1.5.2-5.el8cp.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-3524" }, { "category": "external", "summary": "RHBZ#1951674", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1951674" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-3524", "url": "https://www.cve.org/CVERecord?id=CVE-2021-3524" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3524", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3524" } ], "release_date": "2021-04-15T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-05-05T07:56:42+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nFor supported configurations, refer to:\n\nhttps://access.redhat.com/articles/1548993", "product_ids": [ "7Server-RHEL-7-RHCEPH-4.3-MON:ceph-2:14.2.22-110.el7cp.src", "7Server-RHEL-7-RHCEPH-4.3-MON:ceph-base-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-MON:ceph-base-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-MON:ceph-common-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-MON:ceph-common-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-MON:ceph-debuginfo-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-MON:ceph-debuginfo-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-MON:ceph-fuse-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-MON:ceph-fuse-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-MON:ceph-grafana-dashboards-2:14.2.22-110.el7cp.noarch", "7Server-RHEL-7-RHCEPH-4.3-MON:ceph-mds-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-MON:ceph-mds-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-MON:ceph-mgr-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-MON:ceph-mgr-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-MON:ceph-mgr-dashboard-2:14.2.22-110.el7cp.noarch", "7Server-RHEL-7-RHCEPH-4.3-MON:ceph-mgr-diskprediction-local-2:14.2.22-110.el7cp.noarch", "7Server-RHEL-7-RHCEPH-4.3-MON:ceph-mgr-k8sevents-2:14.2.22-110.el7cp.noarch", "7Server-RHEL-7-RHCEPH-4.3-MON:ceph-mgr-rook-2:14.2.22-110.el7cp.noarch", "7Server-RHEL-7-RHCEPH-4.3-MON:ceph-mon-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-MON:ceph-mon-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-MON:ceph-osd-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-MON:ceph-osd-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-MON:ceph-radosgw-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-MON:ceph-radosgw-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-MON:ceph-selinux-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-MON:ceph-selinux-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-MON:ceph-test-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-MON:ceph-test-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-MON:libcephfs-devel-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-MON:libcephfs-devel-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-MON:libcephfs2-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-MON:libcephfs2-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-MON:librados-devel-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-MON:librados-devel-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-MON:librados2-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-MON:librados2-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-MON:libradospp-devel-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-MON:libradospp-devel-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-MON:libradosstriper1-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-MON:libradosstriper1-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-MON:librbd-devel-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-MON:librbd-devel-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-MON:librbd1-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-MON:librbd1-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-MON:librgw-devel-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-MON:librgw-devel-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-MON:librgw2-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-MON:librgw2-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-MON:python-ceph-argparse-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-MON:python-ceph-argparse-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-MON:python-cephfs-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-MON:python-cephfs-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-MON:python-rados-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-MON:python-rados-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-MON:python-rbd-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-MON:python-rbd-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-MON:python-rgw-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-MON:python-rgw-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-MON:rbd-mirror-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-MON:rbd-mirror-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-MON:rbd-nbd-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-MON:rbd-nbd-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-OSD:ceph-2:14.2.22-110.el7cp.src", "7Server-RHEL-7-RHCEPH-4.3-OSD:ceph-base-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-OSD:ceph-base-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-OSD:ceph-common-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-OSD:ceph-common-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-OSD:ceph-debuginfo-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-OSD:ceph-debuginfo-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-OSD:ceph-fuse-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-OSD:ceph-fuse-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-OSD:ceph-grafana-dashboards-2:14.2.22-110.el7cp.noarch", "7Server-RHEL-7-RHCEPH-4.3-OSD:ceph-mds-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-OSD:ceph-mds-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-OSD:ceph-mgr-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-OSD:ceph-mgr-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-OSD:ceph-mgr-dashboard-2:14.2.22-110.el7cp.noarch", "7Server-RHEL-7-RHCEPH-4.3-OSD:ceph-mgr-diskprediction-local-2:14.2.22-110.el7cp.noarch", "7Server-RHEL-7-RHCEPH-4.3-OSD:ceph-mgr-k8sevents-2:14.2.22-110.el7cp.noarch", "7Server-RHEL-7-RHCEPH-4.3-OSD:ceph-mgr-rook-2:14.2.22-110.el7cp.noarch", "7Server-RHEL-7-RHCEPH-4.3-OSD:ceph-mon-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-OSD:ceph-mon-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-OSD:ceph-osd-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-OSD:ceph-osd-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-OSD:ceph-radosgw-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-OSD:ceph-radosgw-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-OSD:ceph-selinux-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-OSD:ceph-selinux-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-OSD:ceph-test-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-OSD:ceph-test-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-OSD:libcephfs-devel-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-OSD:libcephfs-devel-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-OSD:libcephfs2-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-OSD:libcephfs2-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-OSD:librados-devel-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-OSD:librados-devel-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-OSD:librados2-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-OSD:librados2-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-OSD:libradospp-devel-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-OSD:libradospp-devel-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-OSD:libradosstriper1-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-OSD:libradosstriper1-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-OSD:librbd-devel-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-OSD:librbd-devel-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-OSD:librbd1-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-OSD:librbd1-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-OSD:librgw-devel-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-OSD:librgw-devel-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-OSD:librgw2-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-OSD:librgw2-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-OSD:python-ceph-argparse-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-OSD:python-ceph-argparse-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-OSD:python-cephfs-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-OSD:python-cephfs-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-OSD:python-rados-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-OSD:python-rados-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-OSD:python-rbd-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-OSD:python-rbd-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-OSD:python-rgw-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-OSD:python-rgw-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-OSD:rbd-mirror-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-OSD:rbd-mirror-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-OSD:rbd-nbd-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-OSD:rbd-nbd-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-Tools:ceph-2:14.2.22-110.el7cp.src", "7Server-RHEL-7-RHCEPH-4.3-Tools:ceph-base-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-Tools:ceph-base-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-Tools:ceph-common-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-Tools:ceph-common-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-Tools:ceph-debuginfo-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-Tools:ceph-debuginfo-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-Tools:ceph-fuse-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-Tools:ceph-fuse-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-Tools:ceph-grafana-dashboards-2:14.2.22-110.el7cp.noarch", "7Server-RHEL-7-RHCEPH-4.3-Tools:ceph-mds-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-Tools:ceph-mds-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-Tools:ceph-mgr-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-Tools:ceph-mgr-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-Tools:ceph-mgr-dashboard-2:14.2.22-110.el7cp.noarch", "7Server-RHEL-7-RHCEPH-4.3-Tools:ceph-mgr-diskprediction-local-2:14.2.22-110.el7cp.noarch", "7Server-RHEL-7-RHCEPH-4.3-Tools:ceph-mgr-k8sevents-2:14.2.22-110.el7cp.noarch", "7Server-RHEL-7-RHCEPH-4.3-Tools:ceph-mgr-rook-2:14.2.22-110.el7cp.noarch", "7Server-RHEL-7-RHCEPH-4.3-Tools:ceph-mon-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-Tools:ceph-mon-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-Tools:ceph-osd-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-Tools:ceph-osd-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-Tools:ceph-radosgw-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-Tools:ceph-radosgw-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-Tools:ceph-selinux-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-Tools:ceph-selinux-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-Tools:ceph-test-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-Tools:ceph-test-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-Tools:libcephfs-devel-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-Tools:libcephfs-devel-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-Tools:libcephfs2-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-Tools:libcephfs2-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-Tools:librados-devel-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-Tools:librados-devel-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-Tools:librados2-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-Tools:librados2-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-Tools:libradospp-devel-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-Tools:libradospp-devel-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-Tools:libradosstriper1-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-Tools:libradosstriper1-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-Tools:librbd-devel-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-Tools:librbd-devel-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-Tools:librbd1-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-Tools:librbd1-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-Tools:librgw-devel-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-Tools:librgw-devel-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-Tools:librgw2-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-Tools:librgw2-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-Tools:python-ceph-argparse-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-Tools:python-ceph-argparse-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-Tools:python-cephfs-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-Tools:python-cephfs-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-Tools:python-rados-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-Tools:python-rados-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-Tools:python-rbd-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-Tools:python-rbd-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-Tools:python-rgw-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-Tools:python-rgw-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-Tools:rbd-mirror-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-Tools:rbd-mirror-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-Tools:rbd-nbd-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-Tools:rbd-nbd-2:14.2.22-110.el7cp.x86_64", "8Base-RHCEPH-4.3-MON:ceph-2:14.2.22-110.el8cp.src", "8Base-RHCEPH-4.3-MON:ceph-base-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-MON:ceph-base-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-MON:ceph-base-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-MON:ceph-base-debuginfo-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-MON:ceph-base-debuginfo-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-MON:ceph-base-debuginfo-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-MON:ceph-common-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-MON:ceph-common-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-MON:ceph-common-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-MON:ceph-common-debuginfo-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-MON:ceph-common-debuginfo-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-MON:ceph-common-debuginfo-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-MON:ceph-debugsource-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-MON:ceph-debugsource-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-MON:ceph-debugsource-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-MON:ceph-fuse-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-MON:ceph-fuse-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-MON:ceph-fuse-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-MON:ceph-fuse-debuginfo-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-MON:ceph-fuse-debuginfo-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-MON:ceph-fuse-debuginfo-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-MON:ceph-grafana-dashboards-2:14.2.22-110.el8cp.noarch", "8Base-RHCEPH-4.3-MON:ceph-mds-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-MON:ceph-mds-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-MON:ceph-mds-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-MON:ceph-mds-debuginfo-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-MON:ceph-mds-debuginfo-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-MON:ceph-mds-debuginfo-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-MON:ceph-mgr-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-MON:ceph-mgr-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-MON:ceph-mgr-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-MON:ceph-mgr-dashboard-2:14.2.22-110.el8cp.noarch", "8Base-RHCEPH-4.3-MON:ceph-mgr-debuginfo-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-MON:ceph-mgr-debuginfo-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-MON:ceph-mgr-debuginfo-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-MON:ceph-mgr-diskprediction-local-2:14.2.22-110.el8cp.noarch", "8Base-RHCEPH-4.3-MON:ceph-mgr-k8sevents-2:14.2.22-110.el8cp.noarch", "8Base-RHCEPH-4.3-MON:ceph-mgr-rook-2:14.2.22-110.el8cp.noarch", "8Base-RHCEPH-4.3-MON:ceph-mon-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-MON:ceph-mon-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-MON:ceph-mon-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-MON:ceph-mon-debuginfo-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-MON:ceph-mon-debuginfo-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-MON:ceph-mon-debuginfo-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-MON:ceph-osd-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-MON:ceph-osd-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-MON:ceph-osd-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-MON:ceph-osd-debuginfo-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-MON:ceph-osd-debuginfo-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-MON:ceph-osd-debuginfo-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-MON:ceph-radosgw-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-MON:ceph-radosgw-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-MON:ceph-radosgw-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-MON:ceph-radosgw-debuginfo-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-MON:ceph-radosgw-debuginfo-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-MON:ceph-radosgw-debuginfo-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-MON:ceph-selinux-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-MON:ceph-selinux-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-MON:ceph-selinux-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-MON:ceph-test-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-MON:ceph-test-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-MON:ceph-test-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-MON:ceph-test-debuginfo-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-MON:ceph-test-debuginfo-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-MON:ceph-test-debuginfo-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-MON:libcephfs-devel-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-MON:libcephfs-devel-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-MON:libcephfs-devel-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-MON:libcephfs2-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-MON:libcephfs2-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-MON:libcephfs2-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-MON:libcephfs2-debuginfo-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-MON:libcephfs2-debuginfo-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-MON:libcephfs2-debuginfo-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-MON:librados-devel-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-MON:librados-devel-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-MON:librados-devel-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-MON:librados-devel-debuginfo-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-MON:librados-devel-debuginfo-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-MON:librados-devel-debuginfo-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-MON:librados2-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-MON:librados2-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-MON:librados2-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-MON:librados2-debuginfo-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-MON:librados2-debuginfo-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-MON:librados2-debuginfo-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-MON:libradospp-devel-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-MON:libradospp-devel-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-MON:libradospp-devel-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-MON:libradosstriper1-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-MON:libradosstriper1-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-MON:libradosstriper1-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-MON:libradosstriper1-debuginfo-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-MON:libradosstriper1-debuginfo-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-MON:libradosstriper1-debuginfo-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-MON:librbd-devel-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-MON:librbd-devel-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-MON:librbd-devel-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-MON:librbd1-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-MON:librbd1-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-MON:librbd1-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-MON:librbd1-debuginfo-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-MON:librbd1-debuginfo-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-MON:librbd1-debuginfo-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-MON:librgw-devel-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-MON:librgw-devel-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-MON:librgw-devel-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-MON:librgw2-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-MON:librgw2-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-MON:librgw2-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-MON:librgw2-debuginfo-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-MON:librgw2-debuginfo-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-MON:librgw2-debuginfo-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-MON:python3-ceph-argparse-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-MON:python3-ceph-argparse-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-MON:python3-ceph-argparse-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-MON:python3-cephfs-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-MON:python3-cephfs-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-MON:python3-cephfs-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-MON:python3-cephfs-debuginfo-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-MON:python3-cephfs-debuginfo-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-MON:python3-cephfs-debuginfo-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-MON:python3-rados-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-MON:python3-rados-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-MON:python3-rados-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-MON:python3-rados-debuginfo-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-MON:python3-rados-debuginfo-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-MON:python3-rados-debuginfo-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-MON:python3-rbd-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-MON:python3-rbd-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-MON:python3-rbd-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-MON:python3-rbd-debuginfo-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-MON:python3-rbd-debuginfo-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-MON:python3-rbd-debuginfo-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-MON:python3-rgw-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-MON:python3-rgw-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-MON:python3-rgw-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-MON:python3-rgw-debuginfo-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-MON:python3-rgw-debuginfo-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-MON:python3-rgw-debuginfo-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-MON:rbd-fuse-debuginfo-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-MON:rbd-fuse-debuginfo-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-MON:rbd-fuse-debuginfo-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-MON:rbd-mirror-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-MON:rbd-mirror-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-MON:rbd-mirror-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-MON:rbd-mirror-debuginfo-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-MON:rbd-mirror-debuginfo-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-MON:rbd-mirror-debuginfo-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-MON:rbd-nbd-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-MON:rbd-nbd-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-MON:rbd-nbd-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-MON:rbd-nbd-debuginfo-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-MON:rbd-nbd-debuginfo-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-MON:rbd-nbd-debuginfo-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-OSD:ceph-2:14.2.22-110.el8cp.src", "8Base-RHCEPH-4.3-OSD:ceph-base-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-OSD:ceph-base-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-OSD:ceph-base-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-OSD:ceph-base-debuginfo-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-OSD:ceph-base-debuginfo-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-OSD:ceph-base-debuginfo-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-OSD:ceph-common-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-OSD:ceph-common-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-OSD:ceph-common-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-OSD:ceph-common-debuginfo-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-OSD:ceph-common-debuginfo-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-OSD:ceph-common-debuginfo-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-OSD:ceph-debugsource-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-OSD:ceph-debugsource-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-OSD:ceph-debugsource-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-OSD:ceph-fuse-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-OSD:ceph-fuse-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-OSD:ceph-fuse-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-OSD:ceph-fuse-debuginfo-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-OSD:ceph-fuse-debuginfo-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-OSD:ceph-fuse-debuginfo-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-OSD:ceph-grafana-dashboards-2:14.2.22-110.el8cp.noarch", "8Base-RHCEPH-4.3-OSD:ceph-mds-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-OSD:ceph-mds-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-OSD:ceph-mds-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-OSD:ceph-mds-debuginfo-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-OSD:ceph-mds-debuginfo-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-OSD:ceph-mds-debuginfo-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-OSD:ceph-mgr-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-OSD:ceph-mgr-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-OSD:ceph-mgr-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-OSD:ceph-mgr-dashboard-2:14.2.22-110.el8cp.noarch", "8Base-RHCEPH-4.3-OSD:ceph-mgr-debuginfo-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-OSD:ceph-mgr-debuginfo-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-OSD:ceph-mgr-debuginfo-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-OSD:ceph-mgr-diskprediction-local-2:14.2.22-110.el8cp.noarch", "8Base-RHCEPH-4.3-OSD:ceph-mgr-k8sevents-2:14.2.22-110.el8cp.noarch", "8Base-RHCEPH-4.3-OSD:ceph-mgr-rook-2:14.2.22-110.el8cp.noarch", "8Base-RHCEPH-4.3-OSD:ceph-mon-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-OSD:ceph-mon-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-OSD:ceph-mon-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-OSD:ceph-mon-debuginfo-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-OSD:ceph-mon-debuginfo-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-OSD:ceph-mon-debuginfo-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-OSD:ceph-osd-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-OSD:ceph-osd-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-OSD:ceph-osd-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-OSD:ceph-osd-debuginfo-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-OSD:ceph-osd-debuginfo-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-OSD:ceph-osd-debuginfo-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-OSD:ceph-radosgw-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-OSD:ceph-radosgw-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-OSD:ceph-radosgw-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-OSD:ceph-radosgw-debuginfo-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-OSD:ceph-radosgw-debuginfo-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-OSD:ceph-radosgw-debuginfo-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-OSD:ceph-selinux-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-OSD:ceph-selinux-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-OSD:ceph-selinux-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-OSD:ceph-test-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-OSD:ceph-test-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-OSD:ceph-test-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-OSD:ceph-test-debuginfo-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-OSD:ceph-test-debuginfo-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-OSD:ceph-test-debuginfo-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-OSD:libcephfs-devel-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-OSD:libcephfs-devel-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-OSD:libcephfs-devel-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-OSD:libcephfs2-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-OSD:libcephfs2-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-OSD:libcephfs2-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-OSD:libcephfs2-debuginfo-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-OSD:libcephfs2-debuginfo-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-OSD:libcephfs2-debuginfo-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-OSD:librados-devel-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-OSD:librados-devel-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-OSD:librados-devel-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-OSD:librados-devel-debuginfo-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-OSD:librados-devel-debuginfo-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-OSD:librados-devel-debuginfo-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-OSD:librados2-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-OSD:librados2-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-OSD:librados2-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-OSD:librados2-debuginfo-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-OSD:librados2-debuginfo-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-OSD:librados2-debuginfo-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-OSD:libradospp-devel-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-OSD:libradospp-devel-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-OSD:libradospp-devel-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-OSD:libradosstriper1-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-OSD:libradosstriper1-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-OSD:libradosstriper1-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-OSD:libradosstriper1-debuginfo-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-OSD:libradosstriper1-debuginfo-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-OSD:libradosstriper1-debuginfo-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-OSD:librbd-devel-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-OSD:librbd-devel-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-OSD:librbd-devel-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-OSD:librbd1-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-OSD:librbd1-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-OSD:librbd1-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-OSD:librbd1-debuginfo-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-OSD:librbd1-debuginfo-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-OSD:librbd1-debuginfo-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-OSD:librgw-devel-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-OSD:librgw-devel-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-OSD:librgw-devel-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-OSD:librgw2-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-OSD:librgw2-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-OSD:librgw2-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-OSD:librgw2-debuginfo-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-OSD:librgw2-debuginfo-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-OSD:librgw2-debuginfo-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-OSD:python3-ceph-argparse-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-OSD:python3-ceph-argparse-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-OSD:python3-ceph-argparse-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-OSD:python3-cephfs-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-OSD:python3-cephfs-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-OSD:python3-cephfs-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-OSD:python3-cephfs-debuginfo-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-OSD:python3-cephfs-debuginfo-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-OSD:python3-cephfs-debuginfo-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-OSD:python3-rados-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-OSD:python3-rados-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-OSD:python3-rados-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-OSD:python3-rados-debuginfo-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-OSD:python3-rados-debuginfo-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-OSD:python3-rados-debuginfo-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-OSD:python3-rbd-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-OSD:python3-rbd-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-OSD:python3-rbd-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-OSD:python3-rbd-debuginfo-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-OSD:python3-rbd-debuginfo-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-OSD:python3-rbd-debuginfo-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-OSD:python3-rgw-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-OSD:python3-rgw-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-OSD:python3-rgw-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-OSD:python3-rgw-debuginfo-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-OSD:python3-rgw-debuginfo-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-OSD:python3-rgw-debuginfo-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-OSD:rbd-fuse-debuginfo-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-OSD:rbd-fuse-debuginfo-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-OSD:rbd-fuse-debuginfo-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-OSD:rbd-mirror-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-OSD:rbd-mirror-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-OSD:rbd-mirror-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-OSD:rbd-mirror-debuginfo-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-OSD:rbd-mirror-debuginfo-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-OSD:rbd-mirror-debuginfo-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-OSD:rbd-nbd-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-OSD:rbd-nbd-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-OSD:rbd-nbd-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-OSD:rbd-nbd-debuginfo-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-OSD:rbd-nbd-debuginfo-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-OSD:rbd-nbd-debuginfo-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-Tools:ceph-2:14.2.22-110.el8cp.src", "8Base-RHCEPH-4.3-Tools:ceph-base-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-Tools:ceph-base-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-Tools:ceph-base-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-Tools:ceph-base-debuginfo-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-Tools:ceph-base-debuginfo-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-Tools:ceph-base-debuginfo-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-Tools:ceph-common-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-Tools:ceph-common-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-Tools:ceph-common-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-Tools:ceph-common-debuginfo-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-Tools:ceph-common-debuginfo-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-Tools:ceph-common-debuginfo-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-Tools:ceph-debugsource-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-Tools:ceph-debugsource-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-Tools:ceph-debugsource-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-Tools:ceph-fuse-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-Tools:ceph-fuse-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-Tools:ceph-fuse-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-Tools:ceph-fuse-debuginfo-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-Tools:ceph-fuse-debuginfo-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-Tools:ceph-fuse-debuginfo-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-Tools:ceph-grafana-dashboards-2:14.2.22-110.el8cp.noarch", "8Base-RHCEPH-4.3-Tools:ceph-mds-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-Tools:ceph-mds-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-Tools:ceph-mds-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-Tools:ceph-mds-debuginfo-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-Tools:ceph-mds-debuginfo-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-Tools:ceph-mds-debuginfo-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-Tools:ceph-mgr-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-Tools:ceph-mgr-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-Tools:ceph-mgr-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-Tools:ceph-mgr-dashboard-2:14.2.22-110.el8cp.noarch", "8Base-RHCEPH-4.3-Tools:ceph-mgr-debuginfo-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-Tools:ceph-mgr-debuginfo-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-Tools:ceph-mgr-debuginfo-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-Tools:ceph-mgr-diskprediction-local-2:14.2.22-110.el8cp.noarch", "8Base-RHCEPH-4.3-Tools:ceph-mgr-k8sevents-2:14.2.22-110.el8cp.noarch", "8Base-RHCEPH-4.3-Tools:ceph-mgr-rook-2:14.2.22-110.el8cp.noarch", "8Base-RHCEPH-4.3-Tools:ceph-mon-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-Tools:ceph-mon-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-Tools:ceph-mon-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-Tools:ceph-mon-debuginfo-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-Tools:ceph-mon-debuginfo-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-Tools:ceph-mon-debuginfo-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-Tools:ceph-osd-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-Tools:ceph-osd-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-Tools:ceph-osd-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-Tools:ceph-osd-debuginfo-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-Tools:ceph-osd-debuginfo-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-Tools:ceph-osd-debuginfo-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-Tools:ceph-radosgw-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-Tools:ceph-radosgw-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-Tools:ceph-radosgw-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-Tools:ceph-radosgw-debuginfo-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-Tools:ceph-radosgw-debuginfo-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-Tools:ceph-radosgw-debuginfo-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-Tools:ceph-selinux-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-Tools:ceph-selinux-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-Tools:ceph-selinux-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-Tools:ceph-test-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-Tools:ceph-test-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-Tools:ceph-test-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-Tools:ceph-test-debuginfo-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-Tools:ceph-test-debuginfo-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-Tools:ceph-test-debuginfo-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-Tools:libcephfs-devel-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-Tools:libcephfs-devel-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-Tools:libcephfs-devel-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-Tools:libcephfs2-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-Tools:libcephfs2-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-Tools:libcephfs2-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-Tools:libcephfs2-debuginfo-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-Tools:libcephfs2-debuginfo-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-Tools:libcephfs2-debuginfo-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-Tools:librados-devel-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-Tools:librados-devel-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-Tools:librados-devel-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-Tools:librados-devel-debuginfo-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-Tools:librados-devel-debuginfo-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-Tools:librados-devel-debuginfo-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-Tools:librados2-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-Tools:librados2-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-Tools:librados2-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-Tools:librados2-debuginfo-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-Tools:librados2-debuginfo-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-Tools:librados2-debuginfo-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-Tools:libradospp-devel-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-Tools:libradospp-devel-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-Tools:libradospp-devel-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-Tools:libradosstriper1-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-Tools:libradosstriper1-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-Tools:libradosstriper1-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-Tools:libradosstriper1-debuginfo-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-Tools:libradosstriper1-debuginfo-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-Tools:libradosstriper1-debuginfo-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-Tools:librbd-devel-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-Tools:librbd-devel-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-Tools:librbd-devel-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-Tools:librbd1-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-Tools:librbd1-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-Tools:librbd1-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-Tools:librbd1-debuginfo-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-Tools:librbd1-debuginfo-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-Tools:librbd1-debuginfo-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-Tools:librgw-devel-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-Tools:librgw-devel-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-Tools:librgw-devel-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-Tools:librgw2-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-Tools:librgw2-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-Tools:librgw2-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-Tools:librgw2-debuginfo-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-Tools:librgw2-debuginfo-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-Tools:librgw2-debuginfo-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-Tools:python3-ceph-argparse-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-Tools:python3-ceph-argparse-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-Tools:python3-ceph-argparse-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-Tools:python3-cephfs-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-Tools:python3-cephfs-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-Tools:python3-cephfs-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-Tools:python3-cephfs-debuginfo-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-Tools:python3-cephfs-debuginfo-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-Tools:python3-cephfs-debuginfo-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-Tools:python3-rados-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-Tools:python3-rados-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-Tools:python3-rados-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-Tools:python3-rados-debuginfo-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-Tools:python3-rados-debuginfo-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-Tools:python3-rados-debuginfo-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-Tools:python3-rbd-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-Tools:python3-rbd-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-Tools:python3-rbd-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-Tools:python3-rbd-debuginfo-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-Tools:python3-rbd-debuginfo-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-Tools:python3-rbd-debuginfo-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-Tools:python3-rgw-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-Tools:python3-rgw-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-Tools:python3-rgw-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-Tools:python3-rgw-debuginfo-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-Tools:python3-rgw-debuginfo-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-Tools:python3-rgw-debuginfo-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-Tools:rbd-fuse-debuginfo-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-Tools:rbd-fuse-debuginfo-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-Tools:rbd-fuse-debuginfo-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-Tools:rbd-mirror-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-Tools:rbd-mirror-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-Tools:rbd-mirror-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-Tools:rbd-mirror-debuginfo-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-Tools:rbd-mirror-debuginfo-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-Tools:rbd-mirror-debuginfo-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-Tools:rbd-nbd-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-Tools:rbd-nbd-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-Tools:rbd-nbd-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-Tools:rbd-nbd-debuginfo-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-Tools:rbd-nbd-debuginfo-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-Tools:rbd-nbd-debuginfo-2:14.2.22-110.el8cp.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:1716" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "7Server-RHEL-7-RHCEPH-4.3-MON:ceph-2:14.2.22-110.el7cp.src", "7Server-RHEL-7-RHCEPH-4.3-MON:ceph-base-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-MON:ceph-base-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-MON:ceph-common-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-MON:ceph-common-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-MON:ceph-debuginfo-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-MON:ceph-debuginfo-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-MON:ceph-fuse-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-MON:ceph-fuse-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-MON:ceph-grafana-dashboards-2:14.2.22-110.el7cp.noarch", "7Server-RHEL-7-RHCEPH-4.3-MON:ceph-mds-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-MON:ceph-mds-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-MON:ceph-mgr-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-MON:ceph-mgr-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-MON:ceph-mgr-dashboard-2:14.2.22-110.el7cp.noarch", "7Server-RHEL-7-RHCEPH-4.3-MON:ceph-mgr-diskprediction-local-2:14.2.22-110.el7cp.noarch", "7Server-RHEL-7-RHCEPH-4.3-MON:ceph-mgr-k8sevents-2:14.2.22-110.el7cp.noarch", "7Server-RHEL-7-RHCEPH-4.3-MON:ceph-mgr-rook-2:14.2.22-110.el7cp.noarch", "7Server-RHEL-7-RHCEPH-4.3-MON:ceph-mon-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-MON:ceph-mon-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-MON:ceph-osd-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-MON:ceph-osd-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-MON:ceph-radosgw-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-MON:ceph-radosgw-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-MON:ceph-selinux-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-MON:ceph-selinux-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-MON:ceph-test-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-MON:ceph-test-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-MON:libcephfs-devel-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-MON:libcephfs-devel-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-MON:libcephfs2-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-MON:libcephfs2-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-MON:librados-devel-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-MON:librados-devel-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-MON:librados2-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-MON:librados2-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-MON:libradospp-devel-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-MON:libradospp-devel-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-MON:libradosstriper1-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-MON:libradosstriper1-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-MON:librbd-devel-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-MON:librbd-devel-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-MON:librbd1-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-MON:librbd1-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-MON:librgw-devel-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-MON:librgw-devel-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-MON:librgw2-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-MON:librgw2-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-MON:python-ceph-argparse-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-MON:python-ceph-argparse-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-MON:python-cephfs-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-MON:python-cephfs-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-MON:python-rados-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-MON:python-rados-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-MON:python-rbd-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-MON:python-rbd-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-MON:python-rgw-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-MON:python-rgw-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-MON:rbd-mirror-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-MON:rbd-mirror-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-MON:rbd-nbd-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-MON:rbd-nbd-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-OSD:ceph-2:14.2.22-110.el7cp.src", "7Server-RHEL-7-RHCEPH-4.3-OSD:ceph-base-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-OSD:ceph-base-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-OSD:ceph-common-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-OSD:ceph-common-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-OSD:ceph-debuginfo-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-OSD:ceph-debuginfo-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-OSD:ceph-fuse-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-OSD:ceph-fuse-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-OSD:ceph-grafana-dashboards-2:14.2.22-110.el7cp.noarch", "7Server-RHEL-7-RHCEPH-4.3-OSD:ceph-mds-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-OSD:ceph-mds-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-OSD:ceph-mgr-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-OSD:ceph-mgr-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-OSD:ceph-mgr-dashboard-2:14.2.22-110.el7cp.noarch", "7Server-RHEL-7-RHCEPH-4.3-OSD:ceph-mgr-diskprediction-local-2:14.2.22-110.el7cp.noarch", "7Server-RHEL-7-RHCEPH-4.3-OSD:ceph-mgr-k8sevents-2:14.2.22-110.el7cp.noarch", "7Server-RHEL-7-RHCEPH-4.3-OSD:ceph-mgr-rook-2:14.2.22-110.el7cp.noarch", "7Server-RHEL-7-RHCEPH-4.3-OSD:ceph-mon-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-OSD:ceph-mon-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-OSD:ceph-osd-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-OSD:ceph-osd-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-OSD:ceph-radosgw-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-OSD:ceph-radosgw-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-OSD:ceph-selinux-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-OSD:ceph-selinux-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-OSD:ceph-test-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-OSD:ceph-test-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-OSD:libcephfs-devel-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-OSD:libcephfs-devel-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-OSD:libcephfs2-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-OSD:libcephfs2-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-OSD:librados-devel-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-OSD:librados-devel-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-OSD:librados2-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-OSD:librados2-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-OSD:libradospp-devel-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-OSD:libradospp-devel-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-OSD:libradosstriper1-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-OSD:libradosstriper1-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-OSD:librbd-devel-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-OSD:librbd-devel-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-OSD:librbd1-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-OSD:librbd1-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-OSD:librgw-devel-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-OSD:librgw-devel-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-OSD:librgw2-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-OSD:librgw2-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-OSD:python-ceph-argparse-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-OSD:python-ceph-argparse-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-OSD:python-cephfs-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-OSD:python-cephfs-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-OSD:python-rados-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-OSD:python-rados-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-OSD:python-rbd-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-OSD:python-rbd-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-OSD:python-rgw-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-OSD:python-rgw-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-OSD:rbd-mirror-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-OSD:rbd-mirror-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-OSD:rbd-nbd-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-OSD:rbd-nbd-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-Tools:ceph-2:14.2.22-110.el7cp.src", "7Server-RHEL-7-RHCEPH-4.3-Tools:ceph-ansible-0:4.0.70.3-1.el7cp.noarch", "7Server-RHEL-7-RHCEPH-4.3-Tools:ceph-ansible-0:4.0.70.3-1.el7cp.src", "7Server-RHEL-7-RHCEPH-4.3-Tools:ceph-base-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-Tools:ceph-base-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-Tools:ceph-common-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-Tools:ceph-common-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-Tools:ceph-debuginfo-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-Tools:ceph-debuginfo-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-Tools:ceph-fuse-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-Tools:ceph-fuse-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-Tools:ceph-grafana-dashboards-2:14.2.22-110.el7cp.noarch", "7Server-RHEL-7-RHCEPH-4.3-Tools:ceph-iscsi-0:3.4-5.el7cp.noarch", "7Server-RHEL-7-RHCEPH-4.3-Tools:ceph-iscsi-0:3.4-5.el7cp.src", "7Server-RHEL-7-RHCEPH-4.3-Tools:ceph-mds-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-Tools:ceph-mds-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-Tools:ceph-mgr-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-Tools:ceph-mgr-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-Tools:ceph-mgr-dashboard-2:14.2.22-110.el7cp.noarch", "7Server-RHEL-7-RHCEPH-4.3-Tools:ceph-mgr-diskprediction-local-2:14.2.22-110.el7cp.noarch", "7Server-RHEL-7-RHCEPH-4.3-Tools:ceph-mgr-k8sevents-2:14.2.22-110.el7cp.noarch", "7Server-RHEL-7-RHCEPH-4.3-Tools:ceph-mgr-rook-2:14.2.22-110.el7cp.noarch", "7Server-RHEL-7-RHCEPH-4.3-Tools:ceph-mon-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-Tools:ceph-mon-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-Tools:ceph-osd-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-Tools:ceph-osd-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-Tools:ceph-radosgw-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-Tools:ceph-radosgw-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-Tools:ceph-selinux-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-Tools:ceph-selinux-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-Tools:ceph-test-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-Tools:ceph-test-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-Tools:libcephfs-devel-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-Tools:libcephfs-devel-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-Tools:libcephfs2-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-Tools:libcephfs2-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-Tools:libntirpc-0:3.4-1.1.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-Tools:libntirpc-0:3.4-1.1.el7cp.src", "7Server-RHEL-7-RHCEPH-4.3-Tools:libntirpc-0:3.4-1.1.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-Tools:libntirpc-debuginfo-0:3.4-1.1.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-Tools:libntirpc-debuginfo-0:3.4-1.1.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-Tools:librados-devel-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-Tools:librados-devel-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-Tools:librados2-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-Tools:librados2-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-Tools:libradospp-devel-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-Tools:libradospp-devel-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-Tools:libradosstriper1-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-Tools:libradosstriper1-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-Tools:librbd-devel-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-Tools:librbd-devel-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-Tools:librbd1-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-Tools:librbd1-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-Tools:librgw-devel-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-Tools:librgw-devel-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-Tools:librgw2-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-Tools:librgw2-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-Tools:libtcmu-0:1.5.2-5.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-Tools:libtcmu-0:1.5.2-5.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-Tools:nfs-ganesha-0:3.5-1.2.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-Tools:nfs-ganesha-0:3.5-1.2.el7cp.src", "7Server-RHEL-7-RHCEPH-4.3-Tools:nfs-ganesha-0:3.5-1.2.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-Tools:nfs-ganesha-ceph-0:3.5-1.2.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-Tools:nfs-ganesha-ceph-0:3.5-1.2.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-Tools:nfs-ganesha-debuginfo-0:3.5-1.2.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-Tools:nfs-ganesha-debuginfo-0:3.5-1.2.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-Tools:nfs-ganesha-proxy-0:3.5-1.2.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-Tools:nfs-ganesha-proxy-0:3.5-1.2.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-Tools:nfs-ganesha-rados-grace-0:3.5-1.2.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-Tools:nfs-ganesha-rados-grace-0:3.5-1.2.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-Tools:nfs-ganesha-rados-urls-0:3.5-1.2.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-Tools:nfs-ganesha-rados-urls-0:3.5-1.2.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-Tools:nfs-ganesha-rgw-0:3.5-1.2.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-Tools:nfs-ganesha-rgw-0:3.5-1.2.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-Tools:nfs-ganesha-selinux-0:3.5-1.2.el7cp.noarch", "7Server-RHEL-7-RHCEPH-4.3-Tools:nfs-ganesha-vfs-0:3.5-1.2.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-Tools:nfs-ganesha-vfs-0:3.5-1.2.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-Tools:python-ceph-argparse-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-Tools:python-ceph-argparse-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-Tools:python-cephfs-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-Tools:python-cephfs-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-Tools:python-rados-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-Tools:python-rados-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-Tools:python-rbd-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-Tools:python-rbd-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-Tools:python-rgw-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-Tools:python-rgw-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-Tools:rbd-mirror-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-Tools:rbd-mirror-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-Tools:rbd-nbd-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-Tools:rbd-nbd-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-Tools:tcmu-runner-0:1.5.2-5.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-Tools:tcmu-runner-0:1.5.2-5.el7cp.src", "7Server-RHEL-7-RHCEPH-4.3-Tools:tcmu-runner-0:1.5.2-5.el7cp.x86_64", "8Base-RHCEPH-4.3-MON:ceph-2:14.2.22-110.el8cp.src", "8Base-RHCEPH-4.3-MON:ceph-base-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-MON:ceph-base-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-MON:ceph-base-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-MON:ceph-base-debuginfo-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-MON:ceph-base-debuginfo-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-MON:ceph-base-debuginfo-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-MON:ceph-common-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-MON:ceph-common-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-MON:ceph-common-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-MON:ceph-common-debuginfo-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-MON:ceph-common-debuginfo-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-MON:ceph-common-debuginfo-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-MON:ceph-debugsource-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-MON:ceph-debugsource-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-MON:ceph-debugsource-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-MON:ceph-fuse-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-MON:ceph-fuse-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-MON:ceph-fuse-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-MON:ceph-fuse-debuginfo-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-MON:ceph-fuse-debuginfo-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-MON:ceph-fuse-debuginfo-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-MON:ceph-grafana-dashboards-2:14.2.22-110.el8cp.noarch", "8Base-RHCEPH-4.3-MON:ceph-mds-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-MON:ceph-mds-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-MON:ceph-mds-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-MON:ceph-mds-debuginfo-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-MON:ceph-mds-debuginfo-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-MON:ceph-mds-debuginfo-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-MON:ceph-mgr-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-MON:ceph-mgr-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-MON:ceph-mgr-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-MON:ceph-mgr-dashboard-2:14.2.22-110.el8cp.noarch", "8Base-RHCEPH-4.3-MON:ceph-mgr-debuginfo-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-MON:ceph-mgr-debuginfo-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-MON:ceph-mgr-debuginfo-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-MON:ceph-mgr-diskprediction-local-2:14.2.22-110.el8cp.noarch", "8Base-RHCEPH-4.3-MON:ceph-mgr-k8sevents-2:14.2.22-110.el8cp.noarch", "8Base-RHCEPH-4.3-MON:ceph-mgr-rook-2:14.2.22-110.el8cp.noarch", "8Base-RHCEPH-4.3-MON:ceph-mon-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-MON:ceph-mon-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-MON:ceph-mon-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-MON:ceph-mon-debuginfo-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-MON:ceph-mon-debuginfo-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-MON:ceph-mon-debuginfo-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-MON:ceph-osd-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-MON:ceph-osd-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-MON:ceph-osd-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-MON:ceph-osd-debuginfo-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-MON:ceph-osd-debuginfo-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-MON:ceph-osd-debuginfo-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-MON:ceph-radosgw-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-MON:ceph-radosgw-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-MON:ceph-radosgw-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-MON:ceph-radosgw-debuginfo-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-MON:ceph-radosgw-debuginfo-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-MON:ceph-radosgw-debuginfo-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-MON:ceph-selinux-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-MON:ceph-selinux-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-MON:ceph-selinux-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-MON:ceph-test-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-MON:ceph-test-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-MON:ceph-test-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-MON:ceph-test-debuginfo-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-MON:ceph-test-debuginfo-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-MON:ceph-test-debuginfo-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-MON:libcephfs-devel-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-MON:libcephfs-devel-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-MON:libcephfs-devel-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-MON:libcephfs2-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-MON:libcephfs2-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-MON:libcephfs2-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-MON:libcephfs2-debuginfo-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-MON:libcephfs2-debuginfo-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-MON:libcephfs2-debuginfo-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-MON:librados-devel-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-MON:librados-devel-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-MON:librados-devel-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-MON:librados-devel-debuginfo-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-MON:librados-devel-debuginfo-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-MON:librados-devel-debuginfo-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-MON:librados2-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-MON:librados2-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-MON:librados2-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-MON:librados2-debuginfo-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-MON:librados2-debuginfo-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-MON:librados2-debuginfo-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-MON:libradospp-devel-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-MON:libradospp-devel-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-MON:libradospp-devel-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-MON:libradosstriper1-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-MON:libradosstriper1-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-MON:libradosstriper1-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-MON:libradosstriper1-debuginfo-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-MON:libradosstriper1-debuginfo-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-MON:libradosstriper1-debuginfo-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-MON:librbd-devel-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-MON:librbd-devel-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-MON:librbd-devel-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-MON:librbd1-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-MON:librbd1-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-MON:librbd1-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-MON:librbd1-debuginfo-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-MON:librbd1-debuginfo-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-MON:librbd1-debuginfo-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-MON:librgw-devel-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-MON:librgw-devel-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-MON:librgw-devel-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-MON:librgw2-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-MON:librgw2-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-MON:librgw2-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-MON:librgw2-debuginfo-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-MON:librgw2-debuginfo-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-MON:librgw2-debuginfo-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-MON:python-rsa-0:4.8-1.el8cp.src", "8Base-RHCEPH-4.3-MON:python3-ceph-argparse-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-MON:python3-ceph-argparse-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-MON:python3-ceph-argparse-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-MON:python3-cephfs-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-MON:python3-cephfs-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-MON:python3-cephfs-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-MON:python3-cephfs-debuginfo-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-MON:python3-cephfs-debuginfo-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-MON:python3-cephfs-debuginfo-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-MON:python3-rados-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-MON:python3-rados-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-MON:python3-rados-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-MON:python3-rados-debuginfo-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-MON:python3-rados-debuginfo-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-MON:python3-rados-debuginfo-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-MON:python3-rbd-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-MON:python3-rbd-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-MON:python3-rbd-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-MON:python3-rbd-debuginfo-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-MON:python3-rbd-debuginfo-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-MON:python3-rbd-debuginfo-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-MON:python3-rgw-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-MON:python3-rgw-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-MON:python3-rgw-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-MON:python3-rgw-debuginfo-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-MON:python3-rgw-debuginfo-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-MON:python3-rgw-debuginfo-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-MON:python3-rsa-0:4.8-1.el8cp.noarch", "8Base-RHCEPH-4.3-MON:rbd-fuse-debuginfo-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-MON:rbd-fuse-debuginfo-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-MON:rbd-fuse-debuginfo-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-MON:rbd-mirror-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-MON:rbd-mirror-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-MON:rbd-mirror-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-MON:rbd-mirror-debuginfo-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-MON:rbd-mirror-debuginfo-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-MON:rbd-mirror-debuginfo-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-MON:rbd-nbd-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-MON:rbd-nbd-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-MON:rbd-nbd-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-MON:rbd-nbd-debuginfo-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-MON:rbd-nbd-debuginfo-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-MON:rbd-nbd-debuginfo-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-OSD:ceph-2:14.2.22-110.el8cp.src", "8Base-RHCEPH-4.3-OSD:ceph-base-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-OSD:ceph-base-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-OSD:ceph-base-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-OSD:ceph-base-debuginfo-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-OSD:ceph-base-debuginfo-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-OSD:ceph-base-debuginfo-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-OSD:ceph-common-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-OSD:ceph-common-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-OSD:ceph-common-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-OSD:ceph-common-debuginfo-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-OSD:ceph-common-debuginfo-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-OSD:ceph-common-debuginfo-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-OSD:ceph-debugsource-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-OSD:ceph-debugsource-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-OSD:ceph-debugsource-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-OSD:ceph-fuse-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-OSD:ceph-fuse-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-OSD:ceph-fuse-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-OSD:ceph-fuse-debuginfo-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-OSD:ceph-fuse-debuginfo-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-OSD:ceph-fuse-debuginfo-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-OSD:ceph-grafana-dashboards-2:14.2.22-110.el8cp.noarch", "8Base-RHCEPH-4.3-OSD:ceph-mds-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-OSD:ceph-mds-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-OSD:ceph-mds-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-OSD:ceph-mds-debuginfo-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-OSD:ceph-mds-debuginfo-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-OSD:ceph-mds-debuginfo-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-OSD:ceph-mgr-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-OSD:ceph-mgr-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-OSD:ceph-mgr-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-OSD:ceph-mgr-dashboard-2:14.2.22-110.el8cp.noarch", "8Base-RHCEPH-4.3-OSD:ceph-mgr-debuginfo-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-OSD:ceph-mgr-debuginfo-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-OSD:ceph-mgr-debuginfo-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-OSD:ceph-mgr-diskprediction-local-2:14.2.22-110.el8cp.noarch", "8Base-RHCEPH-4.3-OSD:ceph-mgr-k8sevents-2:14.2.22-110.el8cp.noarch", "8Base-RHCEPH-4.3-OSD:ceph-mgr-rook-2:14.2.22-110.el8cp.noarch", "8Base-RHCEPH-4.3-OSD:ceph-mon-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-OSD:ceph-mon-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-OSD:ceph-mon-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-OSD:ceph-mon-debuginfo-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-OSD:ceph-mon-debuginfo-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-OSD:ceph-mon-debuginfo-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-OSD:ceph-osd-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-OSD:ceph-osd-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-OSD:ceph-osd-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-OSD:ceph-osd-debuginfo-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-OSD:ceph-osd-debuginfo-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-OSD:ceph-osd-debuginfo-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-OSD:ceph-radosgw-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-OSD:ceph-radosgw-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-OSD:ceph-radosgw-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-OSD:ceph-radosgw-debuginfo-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-OSD:ceph-radosgw-debuginfo-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-OSD:ceph-radosgw-debuginfo-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-OSD:ceph-selinux-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-OSD:ceph-selinux-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-OSD:ceph-selinux-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-OSD:ceph-test-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-OSD:ceph-test-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-OSD:ceph-test-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-OSD:ceph-test-debuginfo-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-OSD:ceph-test-debuginfo-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-OSD:ceph-test-debuginfo-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-OSD:libcephfs-devel-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-OSD:libcephfs-devel-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-OSD:libcephfs-devel-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-OSD:libcephfs2-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-OSD:libcephfs2-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-OSD:libcephfs2-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-OSD:libcephfs2-debuginfo-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-OSD:libcephfs2-debuginfo-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-OSD:libcephfs2-debuginfo-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-OSD:librados-devel-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-OSD:librados-devel-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-OSD:librados-devel-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-OSD:librados-devel-debuginfo-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-OSD:librados-devel-debuginfo-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-OSD:librados-devel-debuginfo-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-OSD:librados2-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-OSD:librados2-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-OSD:librados2-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-OSD:librados2-debuginfo-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-OSD:librados2-debuginfo-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-OSD:librados2-debuginfo-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-OSD:libradospp-devel-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-OSD:libradospp-devel-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-OSD:libradospp-devel-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-OSD:libradosstriper1-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-OSD:libradosstriper1-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-OSD:libradosstriper1-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-OSD:libradosstriper1-debuginfo-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-OSD:libradosstriper1-debuginfo-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-OSD:libradosstriper1-debuginfo-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-OSD:librbd-devel-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-OSD:librbd-devel-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-OSD:librbd-devel-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-OSD:librbd1-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-OSD:librbd1-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-OSD:librbd1-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-OSD:librbd1-debuginfo-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-OSD:librbd1-debuginfo-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-OSD:librbd1-debuginfo-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-OSD:librgw-devel-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-OSD:librgw-devel-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-OSD:librgw-devel-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-OSD:librgw2-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-OSD:librgw2-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-OSD:librgw2-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-OSD:librgw2-debuginfo-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-OSD:librgw2-debuginfo-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-OSD:librgw2-debuginfo-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-OSD:python3-ceph-argparse-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-OSD:python3-ceph-argparse-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-OSD:python3-ceph-argparse-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-OSD:python3-cephfs-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-OSD:python3-cephfs-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-OSD:python3-cephfs-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-OSD:python3-cephfs-debuginfo-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-OSD:python3-cephfs-debuginfo-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-OSD:python3-cephfs-debuginfo-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-OSD:python3-rados-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-OSD:python3-rados-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-OSD:python3-rados-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-OSD:python3-rados-debuginfo-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-OSD:python3-rados-debuginfo-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-OSD:python3-rados-debuginfo-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-OSD:python3-rbd-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-OSD:python3-rbd-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-OSD:python3-rbd-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-OSD:python3-rbd-debuginfo-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-OSD:python3-rbd-debuginfo-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-OSD:python3-rbd-debuginfo-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-OSD:python3-rgw-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-OSD:python3-rgw-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-OSD:python3-rgw-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-OSD:python3-rgw-debuginfo-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-OSD:python3-rgw-debuginfo-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-OSD:python3-rgw-debuginfo-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-OSD:rbd-fuse-debuginfo-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-OSD:rbd-fuse-debuginfo-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-OSD:rbd-fuse-debuginfo-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-OSD:rbd-mirror-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-OSD:rbd-mirror-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-OSD:rbd-mirror-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-OSD:rbd-mirror-debuginfo-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-OSD:rbd-mirror-debuginfo-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-OSD:rbd-mirror-debuginfo-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-OSD:rbd-nbd-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-OSD:rbd-nbd-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-OSD:rbd-nbd-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-OSD:rbd-nbd-debuginfo-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-OSD:rbd-nbd-debuginfo-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-OSD:rbd-nbd-debuginfo-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-Tools:ceph-2:14.2.22-110.el8cp.src", "8Base-RHCEPH-4.3-Tools:ceph-ansible-0:4.0.70.3-1.el8cp.noarch", "8Base-RHCEPH-4.3-Tools:ceph-ansible-0:4.0.70.3-1.el8cp.src", "8Base-RHCEPH-4.3-Tools:ceph-base-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-Tools:ceph-base-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-Tools:ceph-base-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-Tools:ceph-base-debuginfo-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-Tools:ceph-base-debuginfo-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-Tools:ceph-base-debuginfo-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-Tools:ceph-common-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-Tools:ceph-common-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-Tools:ceph-common-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-Tools:ceph-common-debuginfo-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-Tools:ceph-common-debuginfo-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-Tools:ceph-common-debuginfo-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-Tools:ceph-debugsource-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-Tools:ceph-debugsource-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-Tools:ceph-debugsource-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-Tools:ceph-fuse-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-Tools:ceph-fuse-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-Tools:ceph-fuse-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-Tools:ceph-fuse-debuginfo-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-Tools:ceph-fuse-debuginfo-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-Tools:ceph-fuse-debuginfo-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-Tools:ceph-grafana-dashboards-2:14.2.22-110.el8cp.noarch", "8Base-RHCEPH-4.3-Tools:ceph-iscsi-0:3.4-5.el8cp.noarch", "8Base-RHCEPH-4.3-Tools:ceph-iscsi-0:3.4-5.el8cp.src", "8Base-RHCEPH-4.3-Tools:ceph-mds-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-Tools:ceph-mds-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-Tools:ceph-mds-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-Tools:ceph-mds-debuginfo-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-Tools:ceph-mds-debuginfo-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-Tools:ceph-mds-debuginfo-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-Tools:ceph-mgr-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-Tools:ceph-mgr-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-Tools:ceph-mgr-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-Tools:ceph-mgr-dashboard-2:14.2.22-110.el8cp.noarch", "8Base-RHCEPH-4.3-Tools:ceph-mgr-debuginfo-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-Tools:ceph-mgr-debuginfo-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-Tools:ceph-mgr-debuginfo-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-Tools:ceph-mgr-diskprediction-local-2:14.2.22-110.el8cp.noarch", "8Base-RHCEPH-4.3-Tools:ceph-mgr-k8sevents-2:14.2.22-110.el8cp.noarch", "8Base-RHCEPH-4.3-Tools:ceph-mgr-rook-2:14.2.22-110.el8cp.noarch", "8Base-RHCEPH-4.3-Tools:ceph-mon-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-Tools:ceph-mon-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-Tools:ceph-mon-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-Tools:ceph-mon-debuginfo-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-Tools:ceph-mon-debuginfo-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-Tools:ceph-mon-debuginfo-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-Tools:ceph-osd-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-Tools:ceph-osd-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-Tools:ceph-osd-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-Tools:ceph-osd-debuginfo-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-Tools:ceph-osd-debuginfo-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-Tools:ceph-osd-debuginfo-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-Tools:ceph-radosgw-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-Tools:ceph-radosgw-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-Tools:ceph-radosgw-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-Tools:ceph-radosgw-debuginfo-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-Tools:ceph-radosgw-debuginfo-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-Tools:ceph-radosgw-debuginfo-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-Tools:ceph-selinux-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-Tools:ceph-selinux-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-Tools:ceph-selinux-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-Tools:ceph-test-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-Tools:ceph-test-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-Tools:ceph-test-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-Tools:ceph-test-debuginfo-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-Tools:ceph-test-debuginfo-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-Tools:ceph-test-debuginfo-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-Tools:libcephfs-devel-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-Tools:libcephfs-devel-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-Tools:libcephfs-devel-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-Tools:libcephfs2-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-Tools:libcephfs2-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-Tools:libcephfs2-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-Tools:libcephfs2-debuginfo-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-Tools:libcephfs2-debuginfo-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-Tools:libcephfs2-debuginfo-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-Tools:libntirpc-0:3.4-1.1.el8cp.ppc64le", "8Base-RHCEPH-4.3-Tools:libntirpc-0:3.4-1.1.el8cp.s390x", "8Base-RHCEPH-4.3-Tools:libntirpc-0:3.4-1.1.el8cp.src", "8Base-RHCEPH-4.3-Tools:libntirpc-0:3.4-1.1.el8cp.x86_64", "8Base-RHCEPH-4.3-Tools:libntirpc-debuginfo-0:3.4-1.1.el8cp.ppc64le", "8Base-RHCEPH-4.3-Tools:libntirpc-debuginfo-0:3.4-1.1.el8cp.s390x", "8Base-RHCEPH-4.3-Tools:libntirpc-debuginfo-0:3.4-1.1.el8cp.x86_64", "8Base-RHCEPH-4.3-Tools:libntirpc-debugsource-0:3.4-1.1.el8cp.ppc64le", "8Base-RHCEPH-4.3-Tools:libntirpc-debugsource-0:3.4-1.1.el8cp.s390x", "8Base-RHCEPH-4.3-Tools:libntirpc-debugsource-0:3.4-1.1.el8cp.x86_64", "8Base-RHCEPH-4.3-Tools:librados-devel-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-Tools:librados-devel-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-Tools:librados-devel-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-Tools:librados-devel-debuginfo-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-Tools:librados-devel-debuginfo-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-Tools:librados-devel-debuginfo-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-Tools:librados2-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-Tools:librados2-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-Tools:librados2-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-Tools:librados2-debuginfo-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-Tools:librados2-debuginfo-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-Tools:librados2-debuginfo-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-Tools:libradospp-devel-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-Tools:libradospp-devel-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-Tools:libradospp-devel-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-Tools:libradosstriper1-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-Tools:libradosstriper1-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-Tools:libradosstriper1-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-Tools:libradosstriper1-debuginfo-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-Tools:libradosstriper1-debuginfo-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-Tools:libradosstriper1-debuginfo-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-Tools:librbd-devel-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-Tools:librbd-devel-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-Tools:librbd-devel-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-Tools:librbd1-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-Tools:librbd1-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-Tools:librbd1-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-Tools:librbd1-debuginfo-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-Tools:librbd1-debuginfo-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-Tools:librbd1-debuginfo-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-Tools:librgw-devel-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-Tools:librgw-devel-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-Tools:librgw-devel-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-Tools:librgw2-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-Tools:librgw2-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-Tools:librgw2-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-Tools:librgw2-debuginfo-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-Tools:librgw2-debuginfo-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-Tools:librgw2-debuginfo-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-Tools:libtcmu-0:1.5.2-5.el8cp.ppc64le", "8Base-RHCEPH-4.3-Tools:libtcmu-0:1.5.2-5.el8cp.s390x", "8Base-RHCEPH-4.3-Tools:libtcmu-0:1.5.2-5.el8cp.x86_64", "8Base-RHCEPH-4.3-Tools:nfs-ganesha-0:3.5-1.2.el8cp.ppc64le", "8Base-RHCEPH-4.3-Tools:nfs-ganesha-0:3.5-1.2.el8cp.s390x", "8Base-RHCEPH-4.3-Tools:nfs-ganesha-0:3.5-1.2.el8cp.src", "8Base-RHCEPH-4.3-Tools:nfs-ganesha-0:3.5-1.2.el8cp.x86_64", "8Base-RHCEPH-4.3-Tools:nfs-ganesha-ceph-0:3.5-1.2.el8cp.ppc64le", "8Base-RHCEPH-4.3-Tools:nfs-ganesha-ceph-0:3.5-1.2.el8cp.s390x", "8Base-RHCEPH-4.3-Tools:nfs-ganesha-ceph-0:3.5-1.2.el8cp.x86_64", "8Base-RHCEPH-4.3-Tools:nfs-ganesha-ceph-debuginfo-0:3.5-1.2.el8cp.ppc64le", "8Base-RHCEPH-4.3-Tools:nfs-ganesha-ceph-debuginfo-0:3.5-1.2.el8cp.s390x", "8Base-RHCEPH-4.3-Tools:nfs-ganesha-ceph-debuginfo-0:3.5-1.2.el8cp.x86_64", "8Base-RHCEPH-4.3-Tools:nfs-ganesha-debuginfo-0:3.5-1.2.el8cp.ppc64le", "8Base-RHCEPH-4.3-Tools:nfs-ganesha-debuginfo-0:3.5-1.2.el8cp.s390x", "8Base-RHCEPH-4.3-Tools:nfs-ganesha-debuginfo-0:3.5-1.2.el8cp.x86_64", "8Base-RHCEPH-4.3-Tools:nfs-ganesha-debugsource-0:3.5-1.2.el8cp.ppc64le", "8Base-RHCEPH-4.3-Tools:nfs-ganesha-debugsource-0:3.5-1.2.el8cp.s390x", "8Base-RHCEPH-4.3-Tools:nfs-ganesha-debugsource-0:3.5-1.2.el8cp.x86_64", "8Base-RHCEPH-4.3-Tools:nfs-ganesha-proxy-0:3.5-1.2.el8cp.ppc64le", "8Base-RHCEPH-4.3-Tools:nfs-ganesha-proxy-0:3.5-1.2.el8cp.s390x", "8Base-RHCEPH-4.3-Tools:nfs-ganesha-proxy-0:3.5-1.2.el8cp.x86_64", "8Base-RHCEPH-4.3-Tools:nfs-ganesha-proxy-debuginfo-0:3.5-1.2.el8cp.ppc64le", "8Base-RHCEPH-4.3-Tools:nfs-ganesha-proxy-debuginfo-0:3.5-1.2.el8cp.s390x", "8Base-RHCEPH-4.3-Tools:nfs-ganesha-proxy-debuginfo-0:3.5-1.2.el8cp.x86_64", "8Base-RHCEPH-4.3-Tools:nfs-ganesha-rados-grace-0:3.5-1.2.el8cp.ppc64le", "8Base-RHCEPH-4.3-Tools:nfs-ganesha-rados-grace-0:3.5-1.2.el8cp.s390x", "8Base-RHCEPH-4.3-Tools:nfs-ganesha-rados-grace-0:3.5-1.2.el8cp.x86_64", "8Base-RHCEPH-4.3-Tools:nfs-ganesha-rados-grace-debuginfo-0:3.5-1.2.el8cp.ppc64le", "8Base-RHCEPH-4.3-Tools:nfs-ganesha-rados-grace-debuginfo-0:3.5-1.2.el8cp.s390x", "8Base-RHCEPH-4.3-Tools:nfs-ganesha-rados-grace-debuginfo-0:3.5-1.2.el8cp.x86_64", "8Base-RHCEPH-4.3-Tools:nfs-ganesha-rados-urls-0:3.5-1.2.el8cp.ppc64le", "8Base-RHCEPH-4.3-Tools:nfs-ganesha-rados-urls-0:3.5-1.2.el8cp.s390x", "8Base-RHCEPH-4.3-Tools:nfs-ganesha-rados-urls-0:3.5-1.2.el8cp.x86_64", "8Base-RHCEPH-4.3-Tools:nfs-ganesha-rados-urls-debuginfo-0:3.5-1.2.el8cp.ppc64le", "8Base-RHCEPH-4.3-Tools:nfs-ganesha-rados-urls-debuginfo-0:3.5-1.2.el8cp.s390x", "8Base-RHCEPH-4.3-Tools:nfs-ganesha-rados-urls-debuginfo-0:3.5-1.2.el8cp.x86_64", "8Base-RHCEPH-4.3-Tools:nfs-ganesha-rgw-0:3.5-1.2.el8cp.ppc64le", "8Base-RHCEPH-4.3-Tools:nfs-ganesha-rgw-0:3.5-1.2.el8cp.s390x", "8Base-RHCEPH-4.3-Tools:nfs-ganesha-rgw-0:3.5-1.2.el8cp.x86_64", "8Base-RHCEPH-4.3-Tools:nfs-ganesha-rgw-debuginfo-0:3.5-1.2.el8cp.ppc64le", "8Base-RHCEPH-4.3-Tools:nfs-ganesha-rgw-debuginfo-0:3.5-1.2.el8cp.s390x", "8Base-RHCEPH-4.3-Tools:nfs-ganesha-rgw-debuginfo-0:3.5-1.2.el8cp.x86_64", "8Base-RHCEPH-4.3-Tools:nfs-ganesha-selinux-0:3.5-1.2.el8cp.noarch", "8Base-RHCEPH-4.3-Tools:nfs-ganesha-vfs-0:3.5-1.2.el8cp.ppc64le", "8Base-RHCEPH-4.3-Tools:nfs-ganesha-vfs-0:3.5-1.2.el8cp.s390x", "8Base-RHCEPH-4.3-Tools:nfs-ganesha-vfs-0:3.5-1.2.el8cp.x86_64", "8Base-RHCEPH-4.3-Tools:nfs-ganesha-vfs-debuginfo-0:3.5-1.2.el8cp.ppc64le", "8Base-RHCEPH-4.3-Tools:nfs-ganesha-vfs-debuginfo-0:3.5-1.2.el8cp.s390x", "8Base-RHCEPH-4.3-Tools:nfs-ganesha-vfs-debuginfo-0:3.5-1.2.el8cp.x86_64", "8Base-RHCEPH-4.3-Tools:python3-ceph-argparse-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-Tools:python3-ceph-argparse-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-Tools:python3-ceph-argparse-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-Tools:python3-cephfs-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-Tools:python3-cephfs-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-Tools:python3-cephfs-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-Tools:python3-cephfs-debuginfo-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-Tools:python3-cephfs-debuginfo-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-Tools:python3-cephfs-debuginfo-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-Tools:python3-rados-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-Tools:python3-rados-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-Tools:python3-rados-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-Tools:python3-rados-debuginfo-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-Tools:python3-rados-debuginfo-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-Tools:python3-rados-debuginfo-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-Tools:python3-rbd-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-Tools:python3-rbd-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-Tools:python3-rbd-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-Tools:python3-rbd-debuginfo-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-Tools:python3-rbd-debuginfo-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-Tools:python3-rbd-debuginfo-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-Tools:python3-rgw-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-Tools:python3-rgw-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-Tools:python3-rgw-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-Tools:python3-rgw-debuginfo-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-Tools:python3-rgw-debuginfo-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-Tools:python3-rgw-debuginfo-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-Tools:rbd-fuse-debuginfo-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-Tools:rbd-fuse-debuginfo-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-Tools:rbd-fuse-debuginfo-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-Tools:rbd-mirror-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-Tools:rbd-mirror-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-Tools:rbd-mirror-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-Tools:rbd-mirror-debuginfo-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-Tools:rbd-mirror-debuginfo-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-Tools:rbd-mirror-debuginfo-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-Tools:rbd-nbd-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-Tools:rbd-nbd-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-Tools:rbd-nbd-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-Tools:rbd-nbd-debuginfo-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-Tools:rbd-nbd-debuginfo-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-Tools:rbd-nbd-debuginfo-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-Tools:tcmu-runner-0:1.5.2-5.el8cp.ppc64le", "8Base-RHCEPH-4.3-Tools:tcmu-runner-0:1.5.2-5.el8cp.s390x", "8Base-RHCEPH-4.3-Tools:tcmu-runner-0:1.5.2-5.el8cp.src", "8Base-RHCEPH-4.3-Tools:tcmu-runner-0:1.5.2-5.el8cp.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "7Server-RHEL-7-RHCEPH-4.3-MON:ceph-2:14.2.22-110.el7cp.src", "7Server-RHEL-7-RHCEPH-4.3-MON:ceph-base-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-MON:ceph-base-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-MON:ceph-common-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-MON:ceph-common-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-MON:ceph-debuginfo-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-MON:ceph-debuginfo-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-MON:ceph-fuse-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-MON:ceph-fuse-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-MON:ceph-grafana-dashboards-2:14.2.22-110.el7cp.noarch", "7Server-RHEL-7-RHCEPH-4.3-MON:ceph-mds-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-MON:ceph-mds-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-MON:ceph-mgr-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-MON:ceph-mgr-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-MON:ceph-mgr-dashboard-2:14.2.22-110.el7cp.noarch", "7Server-RHEL-7-RHCEPH-4.3-MON:ceph-mgr-diskprediction-local-2:14.2.22-110.el7cp.noarch", "7Server-RHEL-7-RHCEPH-4.3-MON:ceph-mgr-k8sevents-2:14.2.22-110.el7cp.noarch", "7Server-RHEL-7-RHCEPH-4.3-MON:ceph-mgr-rook-2:14.2.22-110.el7cp.noarch", "7Server-RHEL-7-RHCEPH-4.3-MON:ceph-mon-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-MON:ceph-mon-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-MON:ceph-osd-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-MON:ceph-osd-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-MON:ceph-radosgw-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-MON:ceph-radosgw-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-MON:ceph-selinux-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-MON:ceph-selinux-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-MON:ceph-test-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-MON:ceph-test-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-MON:libcephfs-devel-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-MON:libcephfs-devel-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-MON:libcephfs2-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-MON:libcephfs2-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-MON:librados-devel-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-MON:librados-devel-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-MON:librados2-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-MON:librados2-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-MON:libradospp-devel-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-MON:libradospp-devel-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-MON:libradosstriper1-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-MON:libradosstriper1-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-MON:librbd-devel-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-MON:librbd-devel-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-MON:librbd1-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-MON:librbd1-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-MON:librgw-devel-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-MON:librgw-devel-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-MON:librgw2-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-MON:librgw2-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-MON:python-ceph-argparse-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-MON:python-ceph-argparse-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-MON:python-cephfs-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-MON:python-cephfs-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-MON:python-rados-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-MON:python-rados-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-MON:python-rbd-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-MON:python-rbd-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-MON:python-rgw-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-MON:python-rgw-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-MON:rbd-mirror-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-MON:rbd-mirror-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-MON:rbd-nbd-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-MON:rbd-nbd-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-OSD:ceph-2:14.2.22-110.el7cp.src", "7Server-RHEL-7-RHCEPH-4.3-OSD:ceph-base-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-OSD:ceph-base-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-OSD:ceph-common-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-OSD:ceph-common-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-OSD:ceph-debuginfo-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-OSD:ceph-debuginfo-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-OSD:ceph-fuse-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-OSD:ceph-fuse-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-OSD:ceph-grafana-dashboards-2:14.2.22-110.el7cp.noarch", "7Server-RHEL-7-RHCEPH-4.3-OSD:ceph-mds-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-OSD:ceph-mds-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-OSD:ceph-mgr-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-OSD:ceph-mgr-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-OSD:ceph-mgr-dashboard-2:14.2.22-110.el7cp.noarch", "7Server-RHEL-7-RHCEPH-4.3-OSD:ceph-mgr-diskprediction-local-2:14.2.22-110.el7cp.noarch", "7Server-RHEL-7-RHCEPH-4.3-OSD:ceph-mgr-k8sevents-2:14.2.22-110.el7cp.noarch", "7Server-RHEL-7-RHCEPH-4.3-OSD:ceph-mgr-rook-2:14.2.22-110.el7cp.noarch", "7Server-RHEL-7-RHCEPH-4.3-OSD:ceph-mon-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-OSD:ceph-mon-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-OSD:ceph-osd-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-OSD:ceph-osd-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-OSD:ceph-radosgw-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-OSD:ceph-radosgw-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-OSD:ceph-selinux-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-OSD:ceph-selinux-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-OSD:ceph-test-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-OSD:ceph-test-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-OSD:libcephfs-devel-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-OSD:libcephfs-devel-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-OSD:libcephfs2-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-OSD:libcephfs2-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-OSD:librados-devel-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-OSD:librados-devel-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-OSD:librados2-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-OSD:librados2-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-OSD:libradospp-devel-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-OSD:libradospp-devel-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-OSD:libradosstriper1-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-OSD:libradosstriper1-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-OSD:librbd-devel-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-OSD:librbd-devel-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-OSD:librbd1-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-OSD:librbd1-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-OSD:librgw-devel-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-OSD:librgw-devel-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-OSD:librgw2-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-OSD:librgw2-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-OSD:python-ceph-argparse-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-OSD:python-ceph-argparse-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-OSD:python-cephfs-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-OSD:python-cephfs-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-OSD:python-rados-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-OSD:python-rados-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-OSD:python-rbd-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-OSD:python-rbd-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-OSD:python-rgw-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-OSD:python-rgw-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-OSD:rbd-mirror-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-OSD:rbd-mirror-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-OSD:rbd-nbd-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-OSD:rbd-nbd-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-Tools:ceph-2:14.2.22-110.el7cp.src", "7Server-RHEL-7-RHCEPH-4.3-Tools:ceph-base-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-Tools:ceph-base-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-Tools:ceph-common-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-Tools:ceph-common-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-Tools:ceph-debuginfo-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-Tools:ceph-debuginfo-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-Tools:ceph-fuse-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-Tools:ceph-fuse-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-Tools:ceph-grafana-dashboards-2:14.2.22-110.el7cp.noarch", "7Server-RHEL-7-RHCEPH-4.3-Tools:ceph-mds-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-Tools:ceph-mds-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-Tools:ceph-mgr-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-Tools:ceph-mgr-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-Tools:ceph-mgr-dashboard-2:14.2.22-110.el7cp.noarch", "7Server-RHEL-7-RHCEPH-4.3-Tools:ceph-mgr-diskprediction-local-2:14.2.22-110.el7cp.noarch", "7Server-RHEL-7-RHCEPH-4.3-Tools:ceph-mgr-k8sevents-2:14.2.22-110.el7cp.noarch", "7Server-RHEL-7-RHCEPH-4.3-Tools:ceph-mgr-rook-2:14.2.22-110.el7cp.noarch", "7Server-RHEL-7-RHCEPH-4.3-Tools:ceph-mon-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-Tools:ceph-mon-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-Tools:ceph-osd-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-Tools:ceph-osd-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-Tools:ceph-radosgw-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-Tools:ceph-radosgw-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-Tools:ceph-selinux-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-Tools:ceph-selinux-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-Tools:ceph-test-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-Tools:ceph-test-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-Tools:libcephfs-devel-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-Tools:libcephfs-devel-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-Tools:libcephfs2-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-Tools:libcephfs2-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-Tools:librados-devel-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-Tools:librados-devel-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-Tools:librados2-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-Tools:librados2-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-Tools:libradospp-devel-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-Tools:libradospp-devel-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-Tools:libradosstriper1-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-Tools:libradosstriper1-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-Tools:librbd-devel-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-Tools:librbd-devel-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-Tools:librbd1-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-Tools:librbd1-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-Tools:librgw-devel-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-Tools:librgw-devel-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-Tools:librgw2-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-Tools:librgw2-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-Tools:python-ceph-argparse-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-Tools:python-ceph-argparse-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-Tools:python-cephfs-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-Tools:python-cephfs-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-Tools:python-rados-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-Tools:python-rados-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-Tools:python-rbd-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-Tools:python-rbd-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-Tools:python-rgw-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-Tools:python-rgw-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-Tools:rbd-mirror-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-Tools:rbd-mirror-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-Tools:rbd-nbd-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-Tools:rbd-nbd-2:14.2.22-110.el7cp.x86_64", "8Base-RHCEPH-4.3-MON:ceph-2:14.2.22-110.el8cp.src", "8Base-RHCEPH-4.3-MON:ceph-base-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-MON:ceph-base-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-MON:ceph-base-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-MON:ceph-base-debuginfo-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-MON:ceph-base-debuginfo-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-MON:ceph-base-debuginfo-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-MON:ceph-common-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-MON:ceph-common-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-MON:ceph-common-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-MON:ceph-common-debuginfo-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-MON:ceph-common-debuginfo-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-MON:ceph-common-debuginfo-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-MON:ceph-debugsource-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-MON:ceph-debugsource-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-MON:ceph-debugsource-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-MON:ceph-fuse-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-MON:ceph-fuse-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-MON:ceph-fuse-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-MON:ceph-fuse-debuginfo-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-MON:ceph-fuse-debuginfo-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-MON:ceph-fuse-debuginfo-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-MON:ceph-grafana-dashboards-2:14.2.22-110.el8cp.noarch", "8Base-RHCEPH-4.3-MON:ceph-mds-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-MON:ceph-mds-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-MON:ceph-mds-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-MON:ceph-mds-debuginfo-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-MON:ceph-mds-debuginfo-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-MON:ceph-mds-debuginfo-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-MON:ceph-mgr-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-MON:ceph-mgr-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-MON:ceph-mgr-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-MON:ceph-mgr-dashboard-2:14.2.22-110.el8cp.noarch", "8Base-RHCEPH-4.3-MON:ceph-mgr-debuginfo-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-MON:ceph-mgr-debuginfo-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-MON:ceph-mgr-debuginfo-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-MON:ceph-mgr-diskprediction-local-2:14.2.22-110.el8cp.noarch", "8Base-RHCEPH-4.3-MON:ceph-mgr-k8sevents-2:14.2.22-110.el8cp.noarch", "8Base-RHCEPH-4.3-MON:ceph-mgr-rook-2:14.2.22-110.el8cp.noarch", "8Base-RHCEPH-4.3-MON:ceph-mon-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-MON:ceph-mon-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-MON:ceph-mon-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-MON:ceph-mon-debuginfo-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-MON:ceph-mon-debuginfo-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-MON:ceph-mon-debuginfo-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-MON:ceph-osd-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-MON:ceph-osd-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-MON:ceph-osd-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-MON:ceph-osd-debuginfo-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-MON:ceph-osd-debuginfo-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-MON:ceph-osd-debuginfo-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-MON:ceph-radosgw-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-MON:ceph-radosgw-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-MON:ceph-radosgw-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-MON:ceph-radosgw-debuginfo-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-MON:ceph-radosgw-debuginfo-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-MON:ceph-radosgw-debuginfo-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-MON:ceph-selinux-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-MON:ceph-selinux-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-MON:ceph-selinux-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-MON:ceph-test-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-MON:ceph-test-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-MON:ceph-test-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-MON:ceph-test-debuginfo-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-MON:ceph-test-debuginfo-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-MON:ceph-test-debuginfo-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-MON:libcephfs-devel-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-MON:libcephfs-devel-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-MON:libcephfs-devel-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-MON:libcephfs2-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-MON:libcephfs2-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-MON:libcephfs2-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-MON:libcephfs2-debuginfo-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-MON:libcephfs2-debuginfo-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-MON:libcephfs2-debuginfo-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-MON:librados-devel-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-MON:librados-devel-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-MON:librados-devel-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-MON:librados-devel-debuginfo-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-MON:librados-devel-debuginfo-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-MON:librados-devel-debuginfo-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-MON:librados2-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-MON:librados2-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-MON:librados2-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-MON:librados2-debuginfo-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-MON:librados2-debuginfo-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-MON:librados2-debuginfo-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-MON:libradospp-devel-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-MON:libradospp-devel-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-MON:libradospp-devel-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-MON:libradosstriper1-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-MON:libradosstriper1-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-MON:libradosstriper1-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-MON:libradosstriper1-debuginfo-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-MON:libradosstriper1-debuginfo-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-MON:libradosstriper1-debuginfo-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-MON:librbd-devel-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-MON:librbd-devel-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-MON:librbd-devel-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-MON:librbd1-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-MON:librbd1-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-MON:librbd1-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-MON:librbd1-debuginfo-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-MON:librbd1-debuginfo-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-MON:librbd1-debuginfo-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-MON:librgw-devel-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-MON:librgw-devel-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-MON:librgw-devel-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-MON:librgw2-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-MON:librgw2-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-MON:librgw2-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-MON:librgw2-debuginfo-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-MON:librgw2-debuginfo-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-MON:librgw2-debuginfo-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-MON:python3-ceph-argparse-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-MON:python3-ceph-argparse-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-MON:python3-ceph-argparse-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-MON:python3-cephfs-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-MON:python3-cephfs-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-MON:python3-cephfs-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-MON:python3-cephfs-debuginfo-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-MON:python3-cephfs-debuginfo-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-MON:python3-cephfs-debuginfo-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-MON:python3-rados-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-MON:python3-rados-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-MON:python3-rados-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-MON:python3-rados-debuginfo-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-MON:python3-rados-debuginfo-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-MON:python3-rados-debuginfo-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-MON:python3-rbd-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-MON:python3-rbd-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-MON:python3-rbd-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-MON:python3-rbd-debuginfo-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-MON:python3-rbd-debuginfo-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-MON:python3-rbd-debuginfo-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-MON:python3-rgw-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-MON:python3-rgw-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-MON:python3-rgw-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-MON:python3-rgw-debuginfo-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-MON:python3-rgw-debuginfo-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-MON:python3-rgw-debuginfo-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-MON:rbd-fuse-debuginfo-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-MON:rbd-fuse-debuginfo-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-MON:rbd-fuse-debuginfo-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-MON:rbd-mirror-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-MON:rbd-mirror-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-MON:rbd-mirror-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-MON:rbd-mirror-debuginfo-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-MON:rbd-mirror-debuginfo-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-MON:rbd-mirror-debuginfo-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-MON:rbd-nbd-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-MON:rbd-nbd-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-MON:rbd-nbd-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-MON:rbd-nbd-debuginfo-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-MON:rbd-nbd-debuginfo-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-MON:rbd-nbd-debuginfo-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-OSD:ceph-2:14.2.22-110.el8cp.src", "8Base-RHCEPH-4.3-OSD:ceph-base-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-OSD:ceph-base-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-OSD:ceph-base-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-OSD:ceph-base-debuginfo-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-OSD:ceph-base-debuginfo-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-OSD:ceph-base-debuginfo-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-OSD:ceph-common-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-OSD:ceph-common-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-OSD:ceph-common-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-OSD:ceph-common-debuginfo-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-OSD:ceph-common-debuginfo-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-OSD:ceph-common-debuginfo-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-OSD:ceph-debugsource-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-OSD:ceph-debugsource-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-OSD:ceph-debugsource-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-OSD:ceph-fuse-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-OSD:ceph-fuse-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-OSD:ceph-fuse-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-OSD:ceph-fuse-debuginfo-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-OSD:ceph-fuse-debuginfo-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-OSD:ceph-fuse-debuginfo-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-OSD:ceph-grafana-dashboards-2:14.2.22-110.el8cp.noarch", "8Base-RHCEPH-4.3-OSD:ceph-mds-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-OSD:ceph-mds-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-OSD:ceph-mds-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-OSD:ceph-mds-debuginfo-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-OSD:ceph-mds-debuginfo-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-OSD:ceph-mds-debuginfo-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-OSD:ceph-mgr-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-OSD:ceph-mgr-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-OSD:ceph-mgr-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-OSD:ceph-mgr-dashboard-2:14.2.22-110.el8cp.noarch", "8Base-RHCEPH-4.3-OSD:ceph-mgr-debuginfo-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-OSD:ceph-mgr-debuginfo-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-OSD:ceph-mgr-debuginfo-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-OSD:ceph-mgr-diskprediction-local-2:14.2.22-110.el8cp.noarch", "8Base-RHCEPH-4.3-OSD:ceph-mgr-k8sevents-2:14.2.22-110.el8cp.noarch", "8Base-RHCEPH-4.3-OSD:ceph-mgr-rook-2:14.2.22-110.el8cp.noarch", "8Base-RHCEPH-4.3-OSD:ceph-mon-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-OSD:ceph-mon-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-OSD:ceph-mon-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-OSD:ceph-mon-debuginfo-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-OSD:ceph-mon-debuginfo-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-OSD:ceph-mon-debuginfo-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-OSD:ceph-osd-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-OSD:ceph-osd-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-OSD:ceph-osd-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-OSD:ceph-osd-debuginfo-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-OSD:ceph-osd-debuginfo-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-OSD:ceph-osd-debuginfo-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-OSD:ceph-radosgw-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-OSD:ceph-radosgw-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-OSD:ceph-radosgw-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-OSD:ceph-radosgw-debuginfo-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-OSD:ceph-radosgw-debuginfo-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-OSD:ceph-radosgw-debuginfo-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-OSD:ceph-selinux-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-OSD:ceph-selinux-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-OSD:ceph-selinux-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-OSD:ceph-test-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-OSD:ceph-test-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-OSD:ceph-test-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-OSD:ceph-test-debuginfo-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-OSD:ceph-test-debuginfo-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-OSD:ceph-test-debuginfo-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-OSD:libcephfs-devel-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-OSD:libcephfs-devel-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-OSD:libcephfs-devel-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-OSD:libcephfs2-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-OSD:libcephfs2-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-OSD:libcephfs2-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-OSD:libcephfs2-debuginfo-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-OSD:libcephfs2-debuginfo-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-OSD:libcephfs2-debuginfo-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-OSD:librados-devel-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-OSD:librados-devel-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-OSD:librados-devel-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-OSD:librados-devel-debuginfo-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-OSD:librados-devel-debuginfo-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-OSD:librados-devel-debuginfo-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-OSD:librados2-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-OSD:librados2-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-OSD:librados2-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-OSD:librados2-debuginfo-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-OSD:librados2-debuginfo-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-OSD:librados2-debuginfo-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-OSD:libradospp-devel-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-OSD:libradospp-devel-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-OSD:libradospp-devel-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-OSD:libradosstriper1-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-OSD:libradosstriper1-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-OSD:libradosstriper1-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-OSD:libradosstriper1-debuginfo-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-OSD:libradosstriper1-debuginfo-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-OSD:libradosstriper1-debuginfo-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-OSD:librbd-devel-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-OSD:librbd-devel-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-OSD:librbd-devel-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-OSD:librbd1-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-OSD:librbd1-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-OSD:librbd1-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-OSD:librbd1-debuginfo-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-OSD:librbd1-debuginfo-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-OSD:librbd1-debuginfo-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-OSD:librgw-devel-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-OSD:librgw-devel-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-OSD:librgw-devel-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-OSD:librgw2-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-OSD:librgw2-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-OSD:librgw2-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-OSD:librgw2-debuginfo-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-OSD:librgw2-debuginfo-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-OSD:librgw2-debuginfo-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-OSD:python3-ceph-argparse-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-OSD:python3-ceph-argparse-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-OSD:python3-ceph-argparse-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-OSD:python3-cephfs-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-OSD:python3-cephfs-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-OSD:python3-cephfs-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-OSD:python3-cephfs-debuginfo-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-OSD:python3-cephfs-debuginfo-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-OSD:python3-cephfs-debuginfo-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-OSD:python3-rados-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-OSD:python3-rados-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-OSD:python3-rados-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-OSD:python3-rados-debuginfo-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-OSD:python3-rados-debuginfo-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-OSD:python3-rados-debuginfo-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-OSD:python3-rbd-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-OSD:python3-rbd-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-OSD:python3-rbd-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-OSD:python3-rbd-debuginfo-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-OSD:python3-rbd-debuginfo-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-OSD:python3-rbd-debuginfo-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-OSD:python3-rgw-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-OSD:python3-rgw-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-OSD:python3-rgw-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-OSD:python3-rgw-debuginfo-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-OSD:python3-rgw-debuginfo-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-OSD:python3-rgw-debuginfo-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-OSD:rbd-fuse-debuginfo-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-OSD:rbd-fuse-debuginfo-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-OSD:rbd-fuse-debuginfo-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-OSD:rbd-mirror-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-OSD:rbd-mirror-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-OSD:rbd-mirror-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-OSD:rbd-mirror-debuginfo-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-OSD:rbd-mirror-debuginfo-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-OSD:rbd-mirror-debuginfo-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-OSD:rbd-nbd-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-OSD:rbd-nbd-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-OSD:rbd-nbd-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-OSD:rbd-nbd-debuginfo-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-OSD:rbd-nbd-debuginfo-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-OSD:rbd-nbd-debuginfo-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-Tools:ceph-2:14.2.22-110.el8cp.src", "8Base-RHCEPH-4.3-Tools:ceph-base-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-Tools:ceph-base-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-Tools:ceph-base-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-Tools:ceph-base-debuginfo-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-Tools:ceph-base-debuginfo-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-Tools:ceph-base-debuginfo-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-Tools:ceph-common-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-Tools:ceph-common-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-Tools:ceph-common-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-Tools:ceph-common-debuginfo-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-Tools:ceph-common-debuginfo-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-Tools:ceph-common-debuginfo-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-Tools:ceph-debugsource-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-Tools:ceph-debugsource-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-Tools:ceph-debugsource-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-Tools:ceph-fuse-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-Tools:ceph-fuse-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-Tools:ceph-fuse-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-Tools:ceph-fuse-debuginfo-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-Tools:ceph-fuse-debuginfo-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-Tools:ceph-fuse-debuginfo-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-Tools:ceph-grafana-dashboards-2:14.2.22-110.el8cp.noarch", "8Base-RHCEPH-4.3-Tools:ceph-mds-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-Tools:ceph-mds-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-Tools:ceph-mds-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-Tools:ceph-mds-debuginfo-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-Tools:ceph-mds-debuginfo-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-Tools:ceph-mds-debuginfo-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-Tools:ceph-mgr-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-Tools:ceph-mgr-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-Tools:ceph-mgr-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-Tools:ceph-mgr-dashboard-2:14.2.22-110.el8cp.noarch", "8Base-RHCEPH-4.3-Tools:ceph-mgr-debuginfo-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-Tools:ceph-mgr-debuginfo-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-Tools:ceph-mgr-debuginfo-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-Tools:ceph-mgr-diskprediction-local-2:14.2.22-110.el8cp.noarch", "8Base-RHCEPH-4.3-Tools:ceph-mgr-k8sevents-2:14.2.22-110.el8cp.noarch", "8Base-RHCEPH-4.3-Tools:ceph-mgr-rook-2:14.2.22-110.el8cp.noarch", "8Base-RHCEPH-4.3-Tools:ceph-mon-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-Tools:ceph-mon-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-Tools:ceph-mon-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-Tools:ceph-mon-debuginfo-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-Tools:ceph-mon-debuginfo-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-Tools:ceph-mon-debuginfo-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-Tools:ceph-osd-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-Tools:ceph-osd-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-Tools:ceph-osd-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-Tools:ceph-osd-debuginfo-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-Tools:ceph-osd-debuginfo-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-Tools:ceph-osd-debuginfo-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-Tools:ceph-radosgw-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-Tools:ceph-radosgw-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-Tools:ceph-radosgw-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-Tools:ceph-radosgw-debuginfo-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-Tools:ceph-radosgw-debuginfo-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-Tools:ceph-radosgw-debuginfo-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-Tools:ceph-selinux-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-Tools:ceph-selinux-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-Tools:ceph-selinux-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-Tools:ceph-test-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-Tools:ceph-test-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-Tools:ceph-test-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-Tools:ceph-test-debuginfo-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-Tools:ceph-test-debuginfo-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-Tools:ceph-test-debuginfo-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-Tools:libcephfs-devel-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-Tools:libcephfs-devel-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-Tools:libcephfs-devel-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-Tools:libcephfs2-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-Tools:libcephfs2-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-Tools:libcephfs2-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-Tools:libcephfs2-debuginfo-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-Tools:libcephfs2-debuginfo-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-Tools:libcephfs2-debuginfo-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-Tools:librados-devel-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-Tools:librados-devel-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-Tools:librados-devel-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-Tools:librados-devel-debuginfo-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-Tools:librados-devel-debuginfo-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-Tools:librados-devel-debuginfo-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-Tools:librados2-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-Tools:librados2-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-Tools:librados2-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-Tools:librados2-debuginfo-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-Tools:librados2-debuginfo-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-Tools:librados2-debuginfo-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-Tools:libradospp-devel-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-Tools:libradospp-devel-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-Tools:libradospp-devel-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-Tools:libradosstriper1-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-Tools:libradosstriper1-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-Tools:libradosstriper1-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-Tools:libradosstriper1-debuginfo-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-Tools:libradosstriper1-debuginfo-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-Tools:libradosstriper1-debuginfo-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-Tools:librbd-devel-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-Tools:librbd-devel-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-Tools:librbd-devel-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-Tools:librbd1-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-Tools:librbd1-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-Tools:librbd1-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-Tools:librbd1-debuginfo-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-Tools:librbd1-debuginfo-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-Tools:librbd1-debuginfo-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-Tools:librgw-devel-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-Tools:librgw-devel-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-Tools:librgw-devel-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-Tools:librgw2-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-Tools:librgw2-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-Tools:librgw2-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-Tools:librgw2-debuginfo-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-Tools:librgw2-debuginfo-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-Tools:librgw2-debuginfo-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-Tools:python3-ceph-argparse-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-Tools:python3-ceph-argparse-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-Tools:python3-ceph-argparse-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-Tools:python3-cephfs-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-Tools:python3-cephfs-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-Tools:python3-cephfs-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-Tools:python3-cephfs-debuginfo-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-Tools:python3-cephfs-debuginfo-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-Tools:python3-cephfs-debuginfo-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-Tools:python3-rados-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-Tools:python3-rados-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-Tools:python3-rados-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-Tools:python3-rados-debuginfo-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-Tools:python3-rados-debuginfo-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-Tools:python3-rados-debuginfo-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-Tools:python3-rbd-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-Tools:python3-rbd-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-Tools:python3-rbd-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-Tools:python3-rbd-debuginfo-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-Tools:python3-rbd-debuginfo-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-Tools:python3-rbd-debuginfo-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-Tools:python3-rgw-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-Tools:python3-rgw-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-Tools:python3-rgw-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-Tools:python3-rgw-debuginfo-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-Tools:python3-rgw-debuginfo-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-Tools:python3-rgw-debuginfo-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-Tools:rbd-fuse-debuginfo-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-Tools:rbd-fuse-debuginfo-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-Tools:rbd-fuse-debuginfo-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-Tools:rbd-mirror-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-Tools:rbd-mirror-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-Tools:rbd-mirror-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-Tools:rbd-mirror-debuginfo-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-Tools:rbd-mirror-debuginfo-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-Tools:rbd-mirror-debuginfo-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-Tools:rbd-nbd-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-Tools:rbd-nbd-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-Tools:rbd-nbd-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-Tools:rbd-nbd-debuginfo-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-Tools:rbd-nbd-debuginfo-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-Tools:rbd-nbd-debuginfo-2:14.2.22-110.el8cp.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "gateway: radosgw: CRLF injection" }, { "acknowledgments": [ { "names": [ "Mark Kirkwood" ], "organization": "Catalyst Cloud" } ], "cve": "CVE-2021-3979", "cwe": { "id": "CWE-287", "name": "Improper Authentication" }, "discovery_date": "2021-11-18T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "7Server-RHEL-7-RHCEPH-4.3-Tools:ceph-ansible-0:4.0.70.3-1.el7cp.noarch", "7Server-RHEL-7-RHCEPH-4.3-Tools:ceph-ansible-0:4.0.70.3-1.el7cp.src", "7Server-RHEL-7-RHCEPH-4.3-Tools:ceph-iscsi-0:3.4-5.el7cp.noarch", "7Server-RHEL-7-RHCEPH-4.3-Tools:ceph-iscsi-0:3.4-5.el7cp.src", "7Server-RHEL-7-RHCEPH-4.3-Tools:libntirpc-0:3.4-1.1.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-Tools:libntirpc-0:3.4-1.1.el7cp.src", "7Server-RHEL-7-RHCEPH-4.3-Tools:libntirpc-0:3.4-1.1.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-Tools:libntirpc-debuginfo-0:3.4-1.1.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-Tools:libntirpc-debuginfo-0:3.4-1.1.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-Tools:libtcmu-0:1.5.2-5.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-Tools:libtcmu-0:1.5.2-5.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-Tools:nfs-ganesha-0:3.5-1.2.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-Tools:nfs-ganesha-0:3.5-1.2.el7cp.src", "7Server-RHEL-7-RHCEPH-4.3-Tools:nfs-ganesha-0:3.5-1.2.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-Tools:nfs-ganesha-ceph-0:3.5-1.2.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-Tools:nfs-ganesha-ceph-0:3.5-1.2.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-Tools:nfs-ganesha-debuginfo-0:3.5-1.2.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-Tools:nfs-ganesha-debuginfo-0:3.5-1.2.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-Tools:nfs-ganesha-proxy-0:3.5-1.2.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-Tools:nfs-ganesha-proxy-0:3.5-1.2.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-Tools:nfs-ganesha-rados-grace-0:3.5-1.2.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-Tools:nfs-ganesha-rados-grace-0:3.5-1.2.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-Tools:nfs-ganesha-rados-urls-0:3.5-1.2.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-Tools:nfs-ganesha-rados-urls-0:3.5-1.2.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-Tools:nfs-ganesha-rgw-0:3.5-1.2.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-Tools:nfs-ganesha-rgw-0:3.5-1.2.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-Tools:nfs-ganesha-selinux-0:3.5-1.2.el7cp.noarch", "7Server-RHEL-7-RHCEPH-4.3-Tools:nfs-ganesha-vfs-0:3.5-1.2.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-Tools:nfs-ganesha-vfs-0:3.5-1.2.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-Tools:tcmu-runner-0:1.5.2-5.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-Tools:tcmu-runner-0:1.5.2-5.el7cp.src", "7Server-RHEL-7-RHCEPH-4.3-Tools:tcmu-runner-0:1.5.2-5.el7cp.x86_64", "8Base-RHCEPH-4.3-MON:python-rsa-0:4.8-1.el8cp.src", "8Base-RHCEPH-4.3-MON:python3-rsa-0:4.8-1.el8cp.noarch", "8Base-RHCEPH-4.3-Tools:ceph-ansible-0:4.0.70.3-1.el8cp.noarch", "8Base-RHCEPH-4.3-Tools:ceph-ansible-0:4.0.70.3-1.el8cp.src", "8Base-RHCEPH-4.3-Tools:ceph-iscsi-0:3.4-5.el8cp.noarch", "8Base-RHCEPH-4.3-Tools:ceph-iscsi-0:3.4-5.el8cp.src", "8Base-RHCEPH-4.3-Tools:libntirpc-0:3.4-1.1.el8cp.ppc64le", "8Base-RHCEPH-4.3-Tools:libntirpc-0:3.4-1.1.el8cp.s390x", "8Base-RHCEPH-4.3-Tools:libntirpc-0:3.4-1.1.el8cp.src", "8Base-RHCEPH-4.3-Tools:libntirpc-0:3.4-1.1.el8cp.x86_64", "8Base-RHCEPH-4.3-Tools:libntirpc-debuginfo-0:3.4-1.1.el8cp.ppc64le", "8Base-RHCEPH-4.3-Tools:libntirpc-debuginfo-0:3.4-1.1.el8cp.s390x", "8Base-RHCEPH-4.3-Tools:libntirpc-debuginfo-0:3.4-1.1.el8cp.x86_64", "8Base-RHCEPH-4.3-Tools:libntirpc-debugsource-0:3.4-1.1.el8cp.ppc64le", "8Base-RHCEPH-4.3-Tools:libntirpc-debugsource-0:3.4-1.1.el8cp.s390x", "8Base-RHCEPH-4.3-Tools:libntirpc-debugsource-0:3.4-1.1.el8cp.x86_64", "8Base-RHCEPH-4.3-Tools:libtcmu-0:1.5.2-5.el8cp.ppc64le", "8Base-RHCEPH-4.3-Tools:libtcmu-0:1.5.2-5.el8cp.s390x", "8Base-RHCEPH-4.3-Tools:libtcmu-0:1.5.2-5.el8cp.x86_64", "8Base-RHCEPH-4.3-Tools:nfs-ganesha-0:3.5-1.2.el8cp.ppc64le", "8Base-RHCEPH-4.3-Tools:nfs-ganesha-0:3.5-1.2.el8cp.s390x", "8Base-RHCEPH-4.3-Tools:nfs-ganesha-0:3.5-1.2.el8cp.src", "8Base-RHCEPH-4.3-Tools:nfs-ganesha-0:3.5-1.2.el8cp.x86_64", "8Base-RHCEPH-4.3-Tools:nfs-ganesha-ceph-0:3.5-1.2.el8cp.ppc64le", "8Base-RHCEPH-4.3-Tools:nfs-ganesha-ceph-0:3.5-1.2.el8cp.s390x", "8Base-RHCEPH-4.3-Tools:nfs-ganesha-ceph-0:3.5-1.2.el8cp.x86_64", "8Base-RHCEPH-4.3-Tools:nfs-ganesha-ceph-debuginfo-0:3.5-1.2.el8cp.ppc64le", "8Base-RHCEPH-4.3-Tools:nfs-ganesha-ceph-debuginfo-0:3.5-1.2.el8cp.s390x", "8Base-RHCEPH-4.3-Tools:nfs-ganesha-ceph-debuginfo-0:3.5-1.2.el8cp.x86_64", "8Base-RHCEPH-4.3-Tools:nfs-ganesha-debuginfo-0:3.5-1.2.el8cp.ppc64le", "8Base-RHCEPH-4.3-Tools:nfs-ganesha-debuginfo-0:3.5-1.2.el8cp.s390x", "8Base-RHCEPH-4.3-Tools:nfs-ganesha-debuginfo-0:3.5-1.2.el8cp.x86_64", "8Base-RHCEPH-4.3-Tools:nfs-ganesha-debugsource-0:3.5-1.2.el8cp.ppc64le", "8Base-RHCEPH-4.3-Tools:nfs-ganesha-debugsource-0:3.5-1.2.el8cp.s390x", "8Base-RHCEPH-4.3-Tools:nfs-ganesha-debugsource-0:3.5-1.2.el8cp.x86_64", "8Base-RHCEPH-4.3-Tools:nfs-ganesha-proxy-0:3.5-1.2.el8cp.ppc64le", "8Base-RHCEPH-4.3-Tools:nfs-ganesha-proxy-0:3.5-1.2.el8cp.s390x", "8Base-RHCEPH-4.3-Tools:nfs-ganesha-proxy-0:3.5-1.2.el8cp.x86_64", "8Base-RHCEPH-4.3-Tools:nfs-ganesha-proxy-debuginfo-0:3.5-1.2.el8cp.ppc64le", "8Base-RHCEPH-4.3-Tools:nfs-ganesha-proxy-debuginfo-0:3.5-1.2.el8cp.s390x", "8Base-RHCEPH-4.3-Tools:nfs-ganesha-proxy-debuginfo-0:3.5-1.2.el8cp.x86_64", "8Base-RHCEPH-4.3-Tools:nfs-ganesha-rados-grace-0:3.5-1.2.el8cp.ppc64le", "8Base-RHCEPH-4.3-Tools:nfs-ganesha-rados-grace-0:3.5-1.2.el8cp.s390x", "8Base-RHCEPH-4.3-Tools:nfs-ganesha-rados-grace-0:3.5-1.2.el8cp.x86_64", "8Base-RHCEPH-4.3-Tools:nfs-ganesha-rados-grace-debuginfo-0:3.5-1.2.el8cp.ppc64le", "8Base-RHCEPH-4.3-Tools:nfs-ganesha-rados-grace-debuginfo-0:3.5-1.2.el8cp.s390x", "8Base-RHCEPH-4.3-Tools:nfs-ganesha-rados-grace-debuginfo-0:3.5-1.2.el8cp.x86_64", "8Base-RHCEPH-4.3-Tools:nfs-ganesha-rados-urls-0:3.5-1.2.el8cp.ppc64le", "8Base-RHCEPH-4.3-Tools:nfs-ganesha-rados-urls-0:3.5-1.2.el8cp.s390x", "8Base-RHCEPH-4.3-Tools:nfs-ganesha-rados-urls-0:3.5-1.2.el8cp.x86_64", "8Base-RHCEPH-4.3-Tools:nfs-ganesha-rados-urls-debuginfo-0:3.5-1.2.el8cp.ppc64le", "8Base-RHCEPH-4.3-Tools:nfs-ganesha-rados-urls-debuginfo-0:3.5-1.2.el8cp.s390x", "8Base-RHCEPH-4.3-Tools:nfs-ganesha-rados-urls-debuginfo-0:3.5-1.2.el8cp.x86_64", "8Base-RHCEPH-4.3-Tools:nfs-ganesha-rgw-0:3.5-1.2.el8cp.ppc64le", "8Base-RHCEPH-4.3-Tools:nfs-ganesha-rgw-0:3.5-1.2.el8cp.s390x", "8Base-RHCEPH-4.3-Tools:nfs-ganesha-rgw-0:3.5-1.2.el8cp.x86_64", "8Base-RHCEPH-4.3-Tools:nfs-ganesha-rgw-debuginfo-0:3.5-1.2.el8cp.ppc64le", "8Base-RHCEPH-4.3-Tools:nfs-ganesha-rgw-debuginfo-0:3.5-1.2.el8cp.s390x", "8Base-RHCEPH-4.3-Tools:nfs-ganesha-rgw-debuginfo-0:3.5-1.2.el8cp.x86_64", "8Base-RHCEPH-4.3-Tools:nfs-ganesha-selinux-0:3.5-1.2.el8cp.noarch", "8Base-RHCEPH-4.3-Tools:nfs-ganesha-vfs-0:3.5-1.2.el8cp.ppc64le", "8Base-RHCEPH-4.3-Tools:nfs-ganesha-vfs-0:3.5-1.2.el8cp.s390x", "8Base-RHCEPH-4.3-Tools:nfs-ganesha-vfs-0:3.5-1.2.el8cp.x86_64", "8Base-RHCEPH-4.3-Tools:nfs-ganesha-vfs-debuginfo-0:3.5-1.2.el8cp.ppc64le", "8Base-RHCEPH-4.3-Tools:nfs-ganesha-vfs-debuginfo-0:3.5-1.2.el8cp.s390x", "8Base-RHCEPH-4.3-Tools:nfs-ganesha-vfs-debuginfo-0:3.5-1.2.el8cp.x86_64", "8Base-RHCEPH-4.3-Tools:tcmu-runner-0:1.5.2-5.el8cp.ppc64le", "8Base-RHCEPH-4.3-Tools:tcmu-runner-0:1.5.2-5.el8cp.s390x", "8Base-RHCEPH-4.3-Tools:tcmu-runner-0:1.5.2-5.el8cp.src", "8Base-RHCEPH-4.3-Tools:tcmu-runner-0:1.5.2-5.el8cp.x86_64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2024788" } ], "notes": [ { "category": "description", "text": "A key length flaw was found in Red Hat Ceph Storage. An attacker can exploit the fact that the key length is incorrectly passed in an encryption algorithm to create a non random key, which is weaker and can be exploited for loss of confidentiality and integrity on encrypted disks.", "title": "Vulnerability description" }, { "category": "summary", "text": "ceph: Ceph volume does not honour osd_dmcrypt_key_size", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat OpenStack Platform deployments use the ceph package directly from the Ceph channel; the RHOSP package will not be updated at this time.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RHEL-7-RHCEPH-4.3-MON:ceph-2:14.2.22-110.el7cp.src", "7Server-RHEL-7-RHCEPH-4.3-MON:ceph-base-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-MON:ceph-base-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-MON:ceph-common-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-MON:ceph-common-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-MON:ceph-debuginfo-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-MON:ceph-debuginfo-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-MON:ceph-fuse-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-MON:ceph-fuse-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-MON:ceph-grafana-dashboards-2:14.2.22-110.el7cp.noarch", "7Server-RHEL-7-RHCEPH-4.3-MON:ceph-mds-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-MON:ceph-mds-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-MON:ceph-mgr-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-MON:ceph-mgr-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-MON:ceph-mgr-dashboard-2:14.2.22-110.el7cp.noarch", "7Server-RHEL-7-RHCEPH-4.3-MON:ceph-mgr-diskprediction-local-2:14.2.22-110.el7cp.noarch", "7Server-RHEL-7-RHCEPH-4.3-MON:ceph-mgr-k8sevents-2:14.2.22-110.el7cp.noarch", "7Server-RHEL-7-RHCEPH-4.3-MON:ceph-mgr-rook-2:14.2.22-110.el7cp.noarch", "7Server-RHEL-7-RHCEPH-4.3-MON:ceph-mon-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-MON:ceph-mon-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-MON:ceph-osd-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-MON:ceph-osd-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-MON:ceph-radosgw-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-MON:ceph-radosgw-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-MON:ceph-selinux-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-MON:ceph-selinux-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-MON:ceph-test-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-MON:ceph-test-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-MON:libcephfs-devel-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-MON:libcephfs-devel-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-MON:libcephfs2-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-MON:libcephfs2-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-MON:librados-devel-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-MON:librados-devel-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-MON:librados2-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-MON:librados2-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-MON:libradospp-devel-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-MON:libradospp-devel-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-MON:libradosstriper1-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-MON:libradosstriper1-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-MON:librbd-devel-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-MON:librbd-devel-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-MON:librbd1-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-MON:librbd1-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-MON:librgw-devel-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-MON:librgw-devel-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-MON:librgw2-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-MON:librgw2-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-MON:python-ceph-argparse-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-MON:python-ceph-argparse-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-MON:python-cephfs-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-MON:python-cephfs-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-MON:python-rados-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-MON:python-rados-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-MON:python-rbd-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-MON:python-rbd-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-MON:python-rgw-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-MON:python-rgw-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-MON:rbd-mirror-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-MON:rbd-mirror-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-MON:rbd-nbd-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-MON:rbd-nbd-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-OSD:ceph-2:14.2.22-110.el7cp.src", "7Server-RHEL-7-RHCEPH-4.3-OSD:ceph-base-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-OSD:ceph-base-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-OSD:ceph-common-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-OSD:ceph-common-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-OSD:ceph-debuginfo-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-OSD:ceph-debuginfo-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-OSD:ceph-fuse-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-OSD:ceph-fuse-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-OSD:ceph-grafana-dashboards-2:14.2.22-110.el7cp.noarch", "7Server-RHEL-7-RHCEPH-4.3-OSD:ceph-mds-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-OSD:ceph-mds-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-OSD:ceph-mgr-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-OSD:ceph-mgr-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-OSD:ceph-mgr-dashboard-2:14.2.22-110.el7cp.noarch", "7Server-RHEL-7-RHCEPH-4.3-OSD:ceph-mgr-diskprediction-local-2:14.2.22-110.el7cp.noarch", "7Server-RHEL-7-RHCEPH-4.3-OSD:ceph-mgr-k8sevents-2:14.2.22-110.el7cp.noarch", "7Server-RHEL-7-RHCEPH-4.3-OSD:ceph-mgr-rook-2:14.2.22-110.el7cp.noarch", "7Server-RHEL-7-RHCEPH-4.3-OSD:ceph-mon-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-OSD:ceph-mon-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-OSD:ceph-osd-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-OSD:ceph-osd-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-OSD:ceph-radosgw-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-OSD:ceph-radosgw-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-OSD:ceph-selinux-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-OSD:ceph-selinux-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-OSD:ceph-test-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-OSD:ceph-test-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-OSD:libcephfs-devel-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-OSD:libcephfs-devel-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-OSD:libcephfs2-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-OSD:libcephfs2-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-OSD:librados-devel-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-OSD:librados-devel-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-OSD:librados2-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-OSD:librados2-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-OSD:libradospp-devel-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-OSD:libradospp-devel-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-OSD:libradosstriper1-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-OSD:libradosstriper1-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-OSD:librbd-devel-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-OSD:librbd-devel-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-OSD:librbd1-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-OSD:librbd1-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-OSD:librgw-devel-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-OSD:librgw-devel-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-OSD:librgw2-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-OSD:librgw2-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-OSD:python-ceph-argparse-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-OSD:python-ceph-argparse-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-OSD:python-cephfs-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-OSD:python-cephfs-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-OSD:python-rados-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-OSD:python-rados-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-OSD:python-rbd-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-OSD:python-rbd-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-OSD:python-rgw-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-OSD:python-rgw-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-OSD:rbd-mirror-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-OSD:rbd-mirror-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-OSD:rbd-nbd-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-OSD:rbd-nbd-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-Tools:ceph-2:14.2.22-110.el7cp.src", "7Server-RHEL-7-RHCEPH-4.3-Tools:ceph-base-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-Tools:ceph-base-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-Tools:ceph-common-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-Tools:ceph-common-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-Tools:ceph-debuginfo-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-Tools:ceph-debuginfo-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-Tools:ceph-fuse-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-Tools:ceph-fuse-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-Tools:ceph-grafana-dashboards-2:14.2.22-110.el7cp.noarch", "7Server-RHEL-7-RHCEPH-4.3-Tools:ceph-mds-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-Tools:ceph-mds-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-Tools:ceph-mgr-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-Tools:ceph-mgr-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-Tools:ceph-mgr-dashboard-2:14.2.22-110.el7cp.noarch", "7Server-RHEL-7-RHCEPH-4.3-Tools:ceph-mgr-diskprediction-local-2:14.2.22-110.el7cp.noarch", "7Server-RHEL-7-RHCEPH-4.3-Tools:ceph-mgr-k8sevents-2:14.2.22-110.el7cp.noarch", "7Server-RHEL-7-RHCEPH-4.3-Tools:ceph-mgr-rook-2:14.2.22-110.el7cp.noarch", "7Server-RHEL-7-RHCEPH-4.3-Tools:ceph-mon-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-Tools:ceph-mon-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-Tools:ceph-osd-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-Tools:ceph-osd-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-Tools:ceph-radosgw-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-Tools:ceph-radosgw-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-Tools:ceph-selinux-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-Tools:ceph-selinux-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-Tools:ceph-test-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-Tools:ceph-test-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-Tools:libcephfs-devel-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-Tools:libcephfs-devel-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-Tools:libcephfs2-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-Tools:libcephfs2-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-Tools:librados-devel-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-Tools:librados-devel-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-Tools:librados2-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-Tools:librados2-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-Tools:libradospp-devel-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-Tools:libradospp-devel-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-Tools:libradosstriper1-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-Tools:libradosstriper1-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-Tools:librbd-devel-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-Tools:librbd-devel-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-Tools:librbd1-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-Tools:librbd1-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-Tools:librgw-devel-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-Tools:librgw-devel-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-Tools:librgw2-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-Tools:librgw2-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-Tools:python-ceph-argparse-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-Tools:python-ceph-argparse-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-Tools:python-cephfs-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-Tools:python-cephfs-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-Tools:python-rados-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-Tools:python-rados-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-Tools:python-rbd-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-Tools:python-rbd-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-Tools:python-rgw-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-Tools:python-rgw-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-Tools:rbd-mirror-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-Tools:rbd-mirror-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-Tools:rbd-nbd-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-Tools:rbd-nbd-2:14.2.22-110.el7cp.x86_64", "8Base-RHCEPH-4.3-MON:ceph-2:14.2.22-110.el8cp.src", "8Base-RHCEPH-4.3-MON:ceph-base-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-MON:ceph-base-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-MON:ceph-base-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-MON:ceph-base-debuginfo-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-MON:ceph-base-debuginfo-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-MON:ceph-base-debuginfo-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-MON:ceph-common-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-MON:ceph-common-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-MON:ceph-common-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-MON:ceph-common-debuginfo-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-MON:ceph-common-debuginfo-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-MON:ceph-common-debuginfo-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-MON:ceph-debugsource-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-MON:ceph-debugsource-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-MON:ceph-debugsource-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-MON:ceph-fuse-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-MON:ceph-fuse-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-MON:ceph-fuse-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-MON:ceph-fuse-debuginfo-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-MON:ceph-fuse-debuginfo-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-MON:ceph-fuse-debuginfo-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-MON:ceph-grafana-dashboards-2:14.2.22-110.el8cp.noarch", "8Base-RHCEPH-4.3-MON:ceph-mds-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-MON:ceph-mds-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-MON:ceph-mds-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-MON:ceph-mds-debuginfo-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-MON:ceph-mds-debuginfo-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-MON:ceph-mds-debuginfo-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-MON:ceph-mgr-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-MON:ceph-mgr-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-MON:ceph-mgr-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-MON:ceph-mgr-dashboard-2:14.2.22-110.el8cp.noarch", "8Base-RHCEPH-4.3-MON:ceph-mgr-debuginfo-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-MON:ceph-mgr-debuginfo-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-MON:ceph-mgr-debuginfo-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-MON:ceph-mgr-diskprediction-local-2:14.2.22-110.el8cp.noarch", "8Base-RHCEPH-4.3-MON:ceph-mgr-k8sevents-2:14.2.22-110.el8cp.noarch", "8Base-RHCEPH-4.3-MON:ceph-mgr-rook-2:14.2.22-110.el8cp.noarch", "8Base-RHCEPH-4.3-MON:ceph-mon-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-MON:ceph-mon-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-MON:ceph-mon-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-MON:ceph-mon-debuginfo-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-MON:ceph-mon-debuginfo-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-MON:ceph-mon-debuginfo-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-MON:ceph-osd-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-MON:ceph-osd-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-MON:ceph-osd-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-MON:ceph-osd-debuginfo-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-MON:ceph-osd-debuginfo-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-MON:ceph-osd-debuginfo-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-MON:ceph-radosgw-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-MON:ceph-radosgw-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-MON:ceph-radosgw-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-MON:ceph-radosgw-debuginfo-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-MON:ceph-radosgw-debuginfo-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-MON:ceph-radosgw-debuginfo-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-MON:ceph-selinux-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-MON:ceph-selinux-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-MON:ceph-selinux-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-MON:ceph-test-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-MON:ceph-test-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-MON:ceph-test-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-MON:ceph-test-debuginfo-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-MON:ceph-test-debuginfo-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-MON:ceph-test-debuginfo-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-MON:libcephfs-devel-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-MON:libcephfs-devel-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-MON:libcephfs-devel-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-MON:libcephfs2-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-MON:libcephfs2-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-MON:libcephfs2-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-MON:libcephfs2-debuginfo-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-MON:libcephfs2-debuginfo-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-MON:libcephfs2-debuginfo-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-MON:librados-devel-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-MON:librados-devel-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-MON:librados-devel-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-MON:librados-devel-debuginfo-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-MON:librados-devel-debuginfo-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-MON:librados-devel-debuginfo-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-MON:librados2-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-MON:librados2-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-MON:librados2-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-MON:librados2-debuginfo-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-MON:librados2-debuginfo-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-MON:librados2-debuginfo-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-MON:libradospp-devel-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-MON:libradospp-devel-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-MON:libradospp-devel-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-MON:libradosstriper1-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-MON:libradosstriper1-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-MON:libradosstriper1-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-MON:libradosstriper1-debuginfo-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-MON:libradosstriper1-debuginfo-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-MON:libradosstriper1-debuginfo-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-MON:librbd-devel-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-MON:librbd-devel-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-MON:librbd-devel-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-MON:librbd1-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-MON:librbd1-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-MON:librbd1-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-MON:librbd1-debuginfo-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-MON:librbd1-debuginfo-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-MON:librbd1-debuginfo-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-MON:librgw-devel-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-MON:librgw-devel-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-MON:librgw-devel-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-MON:librgw2-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-MON:librgw2-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-MON:librgw2-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-MON:librgw2-debuginfo-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-MON:librgw2-debuginfo-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-MON:librgw2-debuginfo-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-MON:python3-ceph-argparse-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-MON:python3-ceph-argparse-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-MON:python3-ceph-argparse-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-MON:python3-cephfs-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-MON:python3-cephfs-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-MON:python3-cephfs-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-MON:python3-cephfs-debuginfo-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-MON:python3-cephfs-debuginfo-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-MON:python3-cephfs-debuginfo-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-MON:python3-rados-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-MON:python3-rados-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-MON:python3-rados-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-MON:python3-rados-debuginfo-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-MON:python3-rados-debuginfo-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-MON:python3-rados-debuginfo-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-MON:python3-rbd-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-MON:python3-rbd-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-MON:python3-rbd-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-MON:python3-rbd-debuginfo-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-MON:python3-rbd-debuginfo-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-MON:python3-rbd-debuginfo-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-MON:python3-rgw-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-MON:python3-rgw-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-MON:python3-rgw-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-MON:python3-rgw-debuginfo-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-MON:python3-rgw-debuginfo-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-MON:python3-rgw-debuginfo-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-MON:rbd-fuse-debuginfo-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-MON:rbd-fuse-debuginfo-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-MON:rbd-fuse-debuginfo-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-MON:rbd-mirror-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-MON:rbd-mirror-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-MON:rbd-mirror-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-MON:rbd-mirror-debuginfo-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-MON:rbd-mirror-debuginfo-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-MON:rbd-mirror-debuginfo-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-MON:rbd-nbd-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-MON:rbd-nbd-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-MON:rbd-nbd-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-MON:rbd-nbd-debuginfo-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-MON:rbd-nbd-debuginfo-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-MON:rbd-nbd-debuginfo-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-OSD:ceph-2:14.2.22-110.el8cp.src", "8Base-RHCEPH-4.3-OSD:ceph-base-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-OSD:ceph-base-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-OSD:ceph-base-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-OSD:ceph-base-debuginfo-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-OSD:ceph-base-debuginfo-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-OSD:ceph-base-debuginfo-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-OSD:ceph-common-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-OSD:ceph-common-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-OSD:ceph-common-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-OSD:ceph-common-debuginfo-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-OSD:ceph-common-debuginfo-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-OSD:ceph-common-debuginfo-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-OSD:ceph-debugsource-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-OSD:ceph-debugsource-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-OSD:ceph-debugsource-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-OSD:ceph-fuse-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-OSD:ceph-fuse-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-OSD:ceph-fuse-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-OSD:ceph-fuse-debuginfo-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-OSD:ceph-fuse-debuginfo-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-OSD:ceph-fuse-debuginfo-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-OSD:ceph-grafana-dashboards-2:14.2.22-110.el8cp.noarch", "8Base-RHCEPH-4.3-OSD:ceph-mds-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-OSD:ceph-mds-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-OSD:ceph-mds-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-OSD:ceph-mds-debuginfo-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-OSD:ceph-mds-debuginfo-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-OSD:ceph-mds-debuginfo-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-OSD:ceph-mgr-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-OSD:ceph-mgr-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-OSD:ceph-mgr-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-OSD:ceph-mgr-dashboard-2:14.2.22-110.el8cp.noarch", "8Base-RHCEPH-4.3-OSD:ceph-mgr-debuginfo-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-OSD:ceph-mgr-debuginfo-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-OSD:ceph-mgr-debuginfo-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-OSD:ceph-mgr-diskprediction-local-2:14.2.22-110.el8cp.noarch", "8Base-RHCEPH-4.3-OSD:ceph-mgr-k8sevents-2:14.2.22-110.el8cp.noarch", "8Base-RHCEPH-4.3-OSD:ceph-mgr-rook-2:14.2.22-110.el8cp.noarch", "8Base-RHCEPH-4.3-OSD:ceph-mon-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-OSD:ceph-mon-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-OSD:ceph-mon-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-OSD:ceph-mon-debuginfo-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-OSD:ceph-mon-debuginfo-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-OSD:ceph-mon-debuginfo-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-OSD:ceph-osd-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-OSD:ceph-osd-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-OSD:ceph-osd-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-OSD:ceph-osd-debuginfo-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-OSD:ceph-osd-debuginfo-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-OSD:ceph-osd-debuginfo-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-OSD:ceph-radosgw-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-OSD:ceph-radosgw-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-OSD:ceph-radosgw-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-OSD:ceph-radosgw-debuginfo-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-OSD:ceph-radosgw-debuginfo-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-OSD:ceph-radosgw-debuginfo-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-OSD:ceph-selinux-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-OSD:ceph-selinux-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-OSD:ceph-selinux-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-OSD:ceph-test-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-OSD:ceph-test-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-OSD:ceph-test-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-OSD:ceph-test-debuginfo-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-OSD:ceph-test-debuginfo-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-OSD:ceph-test-debuginfo-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-OSD:libcephfs-devel-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-OSD:libcephfs-devel-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-OSD:libcephfs-devel-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-OSD:libcephfs2-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-OSD:libcephfs2-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-OSD:libcephfs2-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-OSD:libcephfs2-debuginfo-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-OSD:libcephfs2-debuginfo-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-OSD:libcephfs2-debuginfo-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-OSD:librados-devel-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-OSD:librados-devel-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-OSD:librados-devel-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-OSD:librados-devel-debuginfo-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-OSD:librados-devel-debuginfo-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-OSD:librados-devel-debuginfo-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-OSD:librados2-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-OSD:librados2-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-OSD:librados2-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-OSD:librados2-debuginfo-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-OSD:librados2-debuginfo-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-OSD:librados2-debuginfo-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-OSD:libradospp-devel-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-OSD:libradospp-devel-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-OSD:libradospp-devel-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-OSD:libradosstriper1-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-OSD:libradosstriper1-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-OSD:libradosstriper1-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-OSD:libradosstriper1-debuginfo-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-OSD:libradosstriper1-debuginfo-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-OSD:libradosstriper1-debuginfo-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-OSD:librbd-devel-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-OSD:librbd-devel-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-OSD:librbd-devel-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-OSD:librbd1-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-OSD:librbd1-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-OSD:librbd1-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-OSD:librbd1-debuginfo-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-OSD:librbd1-debuginfo-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-OSD:librbd1-debuginfo-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-OSD:librgw-devel-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-OSD:librgw-devel-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-OSD:librgw-devel-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-OSD:librgw2-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-OSD:librgw2-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-OSD:librgw2-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-OSD:librgw2-debuginfo-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-OSD:librgw2-debuginfo-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-OSD:librgw2-debuginfo-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-OSD:python3-ceph-argparse-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-OSD:python3-ceph-argparse-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-OSD:python3-ceph-argparse-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-OSD:python3-cephfs-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-OSD:python3-cephfs-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-OSD:python3-cephfs-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-OSD:python3-cephfs-debuginfo-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-OSD:python3-cephfs-debuginfo-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-OSD:python3-cephfs-debuginfo-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-OSD:python3-rados-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-OSD:python3-rados-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-OSD:python3-rados-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-OSD:python3-rados-debuginfo-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-OSD:python3-rados-debuginfo-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-OSD:python3-rados-debuginfo-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-OSD:python3-rbd-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-OSD:python3-rbd-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-OSD:python3-rbd-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-OSD:python3-rbd-debuginfo-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-OSD:python3-rbd-debuginfo-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-OSD:python3-rbd-debuginfo-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-OSD:python3-rgw-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-OSD:python3-rgw-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-OSD:python3-rgw-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-OSD:python3-rgw-debuginfo-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-OSD:python3-rgw-debuginfo-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-OSD:python3-rgw-debuginfo-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-OSD:rbd-fuse-debuginfo-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-OSD:rbd-fuse-debuginfo-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-OSD:rbd-fuse-debuginfo-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-OSD:rbd-mirror-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-OSD:rbd-mirror-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-OSD:rbd-mirror-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-OSD:rbd-mirror-debuginfo-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-OSD:rbd-mirror-debuginfo-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-OSD:rbd-mirror-debuginfo-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-OSD:rbd-nbd-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-OSD:rbd-nbd-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-OSD:rbd-nbd-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-OSD:rbd-nbd-debuginfo-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-OSD:rbd-nbd-debuginfo-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-OSD:rbd-nbd-debuginfo-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-Tools:ceph-2:14.2.22-110.el8cp.src", "8Base-RHCEPH-4.3-Tools:ceph-base-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-Tools:ceph-base-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-Tools:ceph-base-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-Tools:ceph-base-debuginfo-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-Tools:ceph-base-debuginfo-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-Tools:ceph-base-debuginfo-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-Tools:ceph-common-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-Tools:ceph-common-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-Tools:ceph-common-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-Tools:ceph-common-debuginfo-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-Tools:ceph-common-debuginfo-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-Tools:ceph-common-debuginfo-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-Tools:ceph-debugsource-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-Tools:ceph-debugsource-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-Tools:ceph-debugsource-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-Tools:ceph-fuse-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-Tools:ceph-fuse-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-Tools:ceph-fuse-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-Tools:ceph-fuse-debuginfo-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-Tools:ceph-fuse-debuginfo-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-Tools:ceph-fuse-debuginfo-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-Tools:ceph-grafana-dashboards-2:14.2.22-110.el8cp.noarch", "8Base-RHCEPH-4.3-Tools:ceph-mds-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-Tools:ceph-mds-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-Tools:ceph-mds-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-Tools:ceph-mds-debuginfo-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-Tools:ceph-mds-debuginfo-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-Tools:ceph-mds-debuginfo-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-Tools:ceph-mgr-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-Tools:ceph-mgr-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-Tools:ceph-mgr-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-Tools:ceph-mgr-dashboard-2:14.2.22-110.el8cp.noarch", "8Base-RHCEPH-4.3-Tools:ceph-mgr-debuginfo-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-Tools:ceph-mgr-debuginfo-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-Tools:ceph-mgr-debuginfo-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-Tools:ceph-mgr-diskprediction-local-2:14.2.22-110.el8cp.noarch", "8Base-RHCEPH-4.3-Tools:ceph-mgr-k8sevents-2:14.2.22-110.el8cp.noarch", "8Base-RHCEPH-4.3-Tools:ceph-mgr-rook-2:14.2.22-110.el8cp.noarch", "8Base-RHCEPH-4.3-Tools:ceph-mon-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-Tools:ceph-mon-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-Tools:ceph-mon-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-Tools:ceph-mon-debuginfo-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-Tools:ceph-mon-debuginfo-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-Tools:ceph-mon-debuginfo-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-Tools:ceph-osd-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-Tools:ceph-osd-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-Tools:ceph-osd-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-Tools:ceph-osd-debuginfo-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-Tools:ceph-osd-debuginfo-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-Tools:ceph-osd-debuginfo-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-Tools:ceph-radosgw-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-Tools:ceph-radosgw-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-Tools:ceph-radosgw-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-Tools:ceph-radosgw-debuginfo-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-Tools:ceph-radosgw-debuginfo-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-Tools:ceph-radosgw-debuginfo-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-Tools:ceph-selinux-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-Tools:ceph-selinux-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-Tools:ceph-selinux-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-Tools:ceph-test-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-Tools:ceph-test-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-Tools:ceph-test-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-Tools:ceph-test-debuginfo-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-Tools:ceph-test-debuginfo-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-Tools:ceph-test-debuginfo-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-Tools:libcephfs-devel-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-Tools:libcephfs-devel-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-Tools:libcephfs-devel-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-Tools:libcephfs2-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-Tools:libcephfs2-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-Tools:libcephfs2-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-Tools:libcephfs2-debuginfo-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-Tools:libcephfs2-debuginfo-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-Tools:libcephfs2-debuginfo-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-Tools:librados-devel-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-Tools:librados-devel-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-Tools:librados-devel-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-Tools:librados-devel-debuginfo-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-Tools:librados-devel-debuginfo-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-Tools:librados-devel-debuginfo-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-Tools:librados2-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-Tools:librados2-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-Tools:librados2-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-Tools:librados2-debuginfo-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-Tools:librados2-debuginfo-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-Tools:librados2-debuginfo-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-Tools:libradospp-devel-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-Tools:libradospp-devel-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-Tools:libradospp-devel-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-Tools:libradosstriper1-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-Tools:libradosstriper1-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-Tools:libradosstriper1-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-Tools:libradosstriper1-debuginfo-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-Tools:libradosstriper1-debuginfo-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-Tools:libradosstriper1-debuginfo-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-Tools:librbd-devel-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-Tools:librbd-devel-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-Tools:librbd-devel-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-Tools:librbd1-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-Tools:librbd1-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-Tools:librbd1-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-Tools:librbd1-debuginfo-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-Tools:librbd1-debuginfo-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-Tools:librbd1-debuginfo-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-Tools:librgw-devel-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-Tools:librgw-devel-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-Tools:librgw-devel-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-Tools:librgw2-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-Tools:librgw2-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-Tools:librgw2-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-Tools:librgw2-debuginfo-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-Tools:librgw2-debuginfo-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-Tools:librgw2-debuginfo-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-Tools:python3-ceph-argparse-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-Tools:python3-ceph-argparse-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-Tools:python3-ceph-argparse-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-Tools:python3-cephfs-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-Tools:python3-cephfs-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-Tools:python3-cephfs-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-Tools:python3-cephfs-debuginfo-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-Tools:python3-cephfs-debuginfo-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-Tools:python3-cephfs-debuginfo-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-Tools:python3-rados-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-Tools:python3-rados-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-Tools:python3-rados-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-Tools:python3-rados-debuginfo-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-Tools:python3-rados-debuginfo-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-Tools:python3-rados-debuginfo-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-Tools:python3-rbd-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-Tools:python3-rbd-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-Tools:python3-rbd-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-Tools:python3-rbd-debuginfo-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-Tools:python3-rbd-debuginfo-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-Tools:python3-rbd-debuginfo-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-Tools:python3-rgw-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-Tools:python3-rgw-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-Tools:python3-rgw-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-Tools:python3-rgw-debuginfo-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-Tools:python3-rgw-debuginfo-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-Tools:python3-rgw-debuginfo-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-Tools:rbd-fuse-debuginfo-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-Tools:rbd-fuse-debuginfo-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-Tools:rbd-fuse-debuginfo-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-Tools:rbd-mirror-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-Tools:rbd-mirror-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-Tools:rbd-mirror-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-Tools:rbd-mirror-debuginfo-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-Tools:rbd-mirror-debuginfo-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-Tools:rbd-mirror-debuginfo-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-Tools:rbd-nbd-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-Tools:rbd-nbd-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-Tools:rbd-nbd-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-Tools:rbd-nbd-debuginfo-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-Tools:rbd-nbd-debuginfo-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-Tools:rbd-nbd-debuginfo-2:14.2.22-110.el8cp.x86_64" ], "known_not_affected": [ "7Server-RHEL-7-RHCEPH-4.3-Tools:ceph-ansible-0:4.0.70.3-1.el7cp.noarch", "7Server-RHEL-7-RHCEPH-4.3-Tools:ceph-ansible-0:4.0.70.3-1.el7cp.src", "7Server-RHEL-7-RHCEPH-4.3-Tools:ceph-iscsi-0:3.4-5.el7cp.noarch", "7Server-RHEL-7-RHCEPH-4.3-Tools:ceph-iscsi-0:3.4-5.el7cp.src", "7Server-RHEL-7-RHCEPH-4.3-Tools:libntirpc-0:3.4-1.1.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-Tools:libntirpc-0:3.4-1.1.el7cp.src", "7Server-RHEL-7-RHCEPH-4.3-Tools:libntirpc-0:3.4-1.1.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-Tools:libntirpc-debuginfo-0:3.4-1.1.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-Tools:libntirpc-debuginfo-0:3.4-1.1.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-Tools:libtcmu-0:1.5.2-5.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-Tools:libtcmu-0:1.5.2-5.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-Tools:nfs-ganesha-0:3.5-1.2.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-Tools:nfs-ganesha-0:3.5-1.2.el7cp.src", "7Server-RHEL-7-RHCEPH-4.3-Tools:nfs-ganesha-0:3.5-1.2.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-Tools:nfs-ganesha-ceph-0:3.5-1.2.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-Tools:nfs-ganesha-ceph-0:3.5-1.2.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-Tools:nfs-ganesha-debuginfo-0:3.5-1.2.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-Tools:nfs-ganesha-debuginfo-0:3.5-1.2.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-Tools:nfs-ganesha-proxy-0:3.5-1.2.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-Tools:nfs-ganesha-proxy-0:3.5-1.2.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-Tools:nfs-ganesha-rados-grace-0:3.5-1.2.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-Tools:nfs-ganesha-rados-grace-0:3.5-1.2.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-Tools:nfs-ganesha-rados-urls-0:3.5-1.2.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-Tools:nfs-ganesha-rados-urls-0:3.5-1.2.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-Tools:nfs-ganesha-rgw-0:3.5-1.2.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-Tools:nfs-ganesha-rgw-0:3.5-1.2.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-Tools:nfs-ganesha-selinux-0:3.5-1.2.el7cp.noarch", "7Server-RHEL-7-RHCEPH-4.3-Tools:nfs-ganesha-vfs-0:3.5-1.2.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-Tools:nfs-ganesha-vfs-0:3.5-1.2.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-Tools:tcmu-runner-0:1.5.2-5.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-Tools:tcmu-runner-0:1.5.2-5.el7cp.src", "7Server-RHEL-7-RHCEPH-4.3-Tools:tcmu-runner-0:1.5.2-5.el7cp.x86_64", "8Base-RHCEPH-4.3-MON:python-rsa-0:4.8-1.el8cp.src", "8Base-RHCEPH-4.3-MON:python3-rsa-0:4.8-1.el8cp.noarch", "8Base-RHCEPH-4.3-Tools:ceph-ansible-0:4.0.70.3-1.el8cp.noarch", "8Base-RHCEPH-4.3-Tools:ceph-ansible-0:4.0.70.3-1.el8cp.src", "8Base-RHCEPH-4.3-Tools:ceph-iscsi-0:3.4-5.el8cp.noarch", "8Base-RHCEPH-4.3-Tools:ceph-iscsi-0:3.4-5.el8cp.src", "8Base-RHCEPH-4.3-Tools:libntirpc-0:3.4-1.1.el8cp.ppc64le", "8Base-RHCEPH-4.3-Tools:libntirpc-0:3.4-1.1.el8cp.s390x", "8Base-RHCEPH-4.3-Tools:libntirpc-0:3.4-1.1.el8cp.src", "8Base-RHCEPH-4.3-Tools:libntirpc-0:3.4-1.1.el8cp.x86_64", "8Base-RHCEPH-4.3-Tools:libntirpc-debuginfo-0:3.4-1.1.el8cp.ppc64le", "8Base-RHCEPH-4.3-Tools:libntirpc-debuginfo-0:3.4-1.1.el8cp.s390x", "8Base-RHCEPH-4.3-Tools:libntirpc-debuginfo-0:3.4-1.1.el8cp.x86_64", "8Base-RHCEPH-4.3-Tools:libntirpc-debugsource-0:3.4-1.1.el8cp.ppc64le", "8Base-RHCEPH-4.3-Tools:libntirpc-debugsource-0:3.4-1.1.el8cp.s390x", "8Base-RHCEPH-4.3-Tools:libntirpc-debugsource-0:3.4-1.1.el8cp.x86_64", "8Base-RHCEPH-4.3-Tools:libtcmu-0:1.5.2-5.el8cp.ppc64le", "8Base-RHCEPH-4.3-Tools:libtcmu-0:1.5.2-5.el8cp.s390x", "8Base-RHCEPH-4.3-Tools:libtcmu-0:1.5.2-5.el8cp.x86_64", "8Base-RHCEPH-4.3-Tools:nfs-ganesha-0:3.5-1.2.el8cp.ppc64le", "8Base-RHCEPH-4.3-Tools:nfs-ganesha-0:3.5-1.2.el8cp.s390x", "8Base-RHCEPH-4.3-Tools:nfs-ganesha-0:3.5-1.2.el8cp.src", "8Base-RHCEPH-4.3-Tools:nfs-ganesha-0:3.5-1.2.el8cp.x86_64", "8Base-RHCEPH-4.3-Tools:nfs-ganesha-ceph-0:3.5-1.2.el8cp.ppc64le", "8Base-RHCEPH-4.3-Tools:nfs-ganesha-ceph-0:3.5-1.2.el8cp.s390x", "8Base-RHCEPH-4.3-Tools:nfs-ganesha-ceph-0:3.5-1.2.el8cp.x86_64", "8Base-RHCEPH-4.3-Tools:nfs-ganesha-ceph-debuginfo-0:3.5-1.2.el8cp.ppc64le", "8Base-RHCEPH-4.3-Tools:nfs-ganesha-ceph-debuginfo-0:3.5-1.2.el8cp.s390x", "8Base-RHCEPH-4.3-Tools:nfs-ganesha-ceph-debuginfo-0:3.5-1.2.el8cp.x86_64", "8Base-RHCEPH-4.3-Tools:nfs-ganesha-debuginfo-0:3.5-1.2.el8cp.ppc64le", "8Base-RHCEPH-4.3-Tools:nfs-ganesha-debuginfo-0:3.5-1.2.el8cp.s390x", "8Base-RHCEPH-4.3-Tools:nfs-ganesha-debuginfo-0:3.5-1.2.el8cp.x86_64", "8Base-RHCEPH-4.3-Tools:nfs-ganesha-debugsource-0:3.5-1.2.el8cp.ppc64le", "8Base-RHCEPH-4.3-Tools:nfs-ganesha-debugsource-0:3.5-1.2.el8cp.s390x", "8Base-RHCEPH-4.3-Tools:nfs-ganesha-debugsource-0:3.5-1.2.el8cp.x86_64", "8Base-RHCEPH-4.3-Tools:nfs-ganesha-proxy-0:3.5-1.2.el8cp.ppc64le", "8Base-RHCEPH-4.3-Tools:nfs-ganesha-proxy-0:3.5-1.2.el8cp.s390x", "8Base-RHCEPH-4.3-Tools:nfs-ganesha-proxy-0:3.5-1.2.el8cp.x86_64", "8Base-RHCEPH-4.3-Tools:nfs-ganesha-proxy-debuginfo-0:3.5-1.2.el8cp.ppc64le", "8Base-RHCEPH-4.3-Tools:nfs-ganesha-proxy-debuginfo-0:3.5-1.2.el8cp.s390x", "8Base-RHCEPH-4.3-Tools:nfs-ganesha-proxy-debuginfo-0:3.5-1.2.el8cp.x86_64", "8Base-RHCEPH-4.3-Tools:nfs-ganesha-rados-grace-0:3.5-1.2.el8cp.ppc64le", "8Base-RHCEPH-4.3-Tools:nfs-ganesha-rados-grace-0:3.5-1.2.el8cp.s390x", "8Base-RHCEPH-4.3-Tools:nfs-ganesha-rados-grace-0:3.5-1.2.el8cp.x86_64", "8Base-RHCEPH-4.3-Tools:nfs-ganesha-rados-grace-debuginfo-0:3.5-1.2.el8cp.ppc64le", "8Base-RHCEPH-4.3-Tools:nfs-ganesha-rados-grace-debuginfo-0:3.5-1.2.el8cp.s390x", "8Base-RHCEPH-4.3-Tools:nfs-ganesha-rados-grace-debuginfo-0:3.5-1.2.el8cp.x86_64", "8Base-RHCEPH-4.3-Tools:nfs-ganesha-rados-urls-0:3.5-1.2.el8cp.ppc64le", "8Base-RHCEPH-4.3-Tools:nfs-ganesha-rados-urls-0:3.5-1.2.el8cp.s390x", "8Base-RHCEPH-4.3-Tools:nfs-ganesha-rados-urls-0:3.5-1.2.el8cp.x86_64", "8Base-RHCEPH-4.3-Tools:nfs-ganesha-rados-urls-debuginfo-0:3.5-1.2.el8cp.ppc64le", "8Base-RHCEPH-4.3-Tools:nfs-ganesha-rados-urls-debuginfo-0:3.5-1.2.el8cp.s390x", "8Base-RHCEPH-4.3-Tools:nfs-ganesha-rados-urls-debuginfo-0:3.5-1.2.el8cp.x86_64", "8Base-RHCEPH-4.3-Tools:nfs-ganesha-rgw-0:3.5-1.2.el8cp.ppc64le", "8Base-RHCEPH-4.3-Tools:nfs-ganesha-rgw-0:3.5-1.2.el8cp.s390x", "8Base-RHCEPH-4.3-Tools:nfs-ganesha-rgw-0:3.5-1.2.el8cp.x86_64", "8Base-RHCEPH-4.3-Tools:nfs-ganesha-rgw-debuginfo-0:3.5-1.2.el8cp.ppc64le", "8Base-RHCEPH-4.3-Tools:nfs-ganesha-rgw-debuginfo-0:3.5-1.2.el8cp.s390x", "8Base-RHCEPH-4.3-Tools:nfs-ganesha-rgw-debuginfo-0:3.5-1.2.el8cp.x86_64", "8Base-RHCEPH-4.3-Tools:nfs-ganesha-selinux-0:3.5-1.2.el8cp.noarch", "8Base-RHCEPH-4.3-Tools:nfs-ganesha-vfs-0:3.5-1.2.el8cp.ppc64le", "8Base-RHCEPH-4.3-Tools:nfs-ganesha-vfs-0:3.5-1.2.el8cp.s390x", "8Base-RHCEPH-4.3-Tools:nfs-ganesha-vfs-0:3.5-1.2.el8cp.x86_64", "8Base-RHCEPH-4.3-Tools:nfs-ganesha-vfs-debuginfo-0:3.5-1.2.el8cp.ppc64le", "8Base-RHCEPH-4.3-Tools:nfs-ganesha-vfs-debuginfo-0:3.5-1.2.el8cp.s390x", "8Base-RHCEPH-4.3-Tools:nfs-ganesha-vfs-debuginfo-0:3.5-1.2.el8cp.x86_64", "8Base-RHCEPH-4.3-Tools:tcmu-runner-0:1.5.2-5.el8cp.ppc64le", "8Base-RHCEPH-4.3-Tools:tcmu-runner-0:1.5.2-5.el8cp.s390x", "8Base-RHCEPH-4.3-Tools:tcmu-runner-0:1.5.2-5.el8cp.src", "8Base-RHCEPH-4.3-Tools:tcmu-runner-0:1.5.2-5.el8cp.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-3979" }, { "category": "external", "summary": "RHBZ#2024788", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2024788" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-3979", "url": "https://www.cve.org/CVERecord?id=CVE-2021-3979" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3979", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3979" } ], "release_date": "2022-01-11T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-05-05T07:56:42+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nFor supported configurations, refer to:\n\nhttps://access.redhat.com/articles/1548993", "product_ids": [ "7Server-RHEL-7-RHCEPH-4.3-MON:ceph-2:14.2.22-110.el7cp.src", "7Server-RHEL-7-RHCEPH-4.3-MON:ceph-base-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-MON:ceph-base-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-MON:ceph-common-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-MON:ceph-common-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-MON:ceph-debuginfo-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-MON:ceph-debuginfo-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-MON:ceph-fuse-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-MON:ceph-fuse-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-MON:ceph-grafana-dashboards-2:14.2.22-110.el7cp.noarch", "7Server-RHEL-7-RHCEPH-4.3-MON:ceph-mds-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-MON:ceph-mds-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-MON:ceph-mgr-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-MON:ceph-mgr-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-MON:ceph-mgr-dashboard-2:14.2.22-110.el7cp.noarch", "7Server-RHEL-7-RHCEPH-4.3-MON:ceph-mgr-diskprediction-local-2:14.2.22-110.el7cp.noarch", "7Server-RHEL-7-RHCEPH-4.3-MON:ceph-mgr-k8sevents-2:14.2.22-110.el7cp.noarch", "7Server-RHEL-7-RHCEPH-4.3-MON:ceph-mgr-rook-2:14.2.22-110.el7cp.noarch", "7Server-RHEL-7-RHCEPH-4.3-MON:ceph-mon-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-MON:ceph-mon-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-MON:ceph-osd-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-MON:ceph-osd-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-MON:ceph-radosgw-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-MON:ceph-radosgw-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-MON:ceph-selinux-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-MON:ceph-selinux-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-MON:ceph-test-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-MON:ceph-test-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-MON:libcephfs-devel-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-MON:libcephfs-devel-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-MON:libcephfs2-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-MON:libcephfs2-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-MON:librados-devel-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-MON:librados-devel-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-MON:librados2-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-MON:librados2-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-MON:libradospp-devel-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-MON:libradospp-devel-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-MON:libradosstriper1-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-MON:libradosstriper1-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-MON:librbd-devel-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-MON:librbd-devel-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-MON:librbd1-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-MON:librbd1-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-MON:librgw-devel-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-MON:librgw-devel-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-MON:librgw2-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-MON:librgw2-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-MON:python-ceph-argparse-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-MON:python-ceph-argparse-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-MON:python-cephfs-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-MON:python-cephfs-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-MON:python-rados-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-MON:python-rados-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-MON:python-rbd-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-MON:python-rbd-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-MON:python-rgw-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-MON:python-rgw-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-MON:rbd-mirror-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-MON:rbd-mirror-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-MON:rbd-nbd-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-MON:rbd-nbd-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-OSD:ceph-2:14.2.22-110.el7cp.src", "7Server-RHEL-7-RHCEPH-4.3-OSD:ceph-base-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-OSD:ceph-base-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-OSD:ceph-common-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-OSD:ceph-common-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-OSD:ceph-debuginfo-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-OSD:ceph-debuginfo-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-OSD:ceph-fuse-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-OSD:ceph-fuse-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-OSD:ceph-grafana-dashboards-2:14.2.22-110.el7cp.noarch", "7Server-RHEL-7-RHCEPH-4.3-OSD:ceph-mds-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-OSD:ceph-mds-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-OSD:ceph-mgr-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-OSD:ceph-mgr-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-OSD:ceph-mgr-dashboard-2:14.2.22-110.el7cp.noarch", "7Server-RHEL-7-RHCEPH-4.3-OSD:ceph-mgr-diskprediction-local-2:14.2.22-110.el7cp.noarch", "7Server-RHEL-7-RHCEPH-4.3-OSD:ceph-mgr-k8sevents-2:14.2.22-110.el7cp.noarch", "7Server-RHEL-7-RHCEPH-4.3-OSD:ceph-mgr-rook-2:14.2.22-110.el7cp.noarch", "7Server-RHEL-7-RHCEPH-4.3-OSD:ceph-mon-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-OSD:ceph-mon-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-OSD:ceph-osd-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-OSD:ceph-osd-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-OSD:ceph-radosgw-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-OSD:ceph-radosgw-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-OSD:ceph-selinux-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-OSD:ceph-selinux-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-OSD:ceph-test-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-OSD:ceph-test-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-OSD:libcephfs-devel-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-OSD:libcephfs-devel-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-OSD:libcephfs2-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-OSD:libcephfs2-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-OSD:librados-devel-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-OSD:librados-devel-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-OSD:librados2-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-OSD:librados2-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-OSD:libradospp-devel-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-OSD:libradospp-devel-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-OSD:libradosstriper1-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-OSD:libradosstriper1-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-OSD:librbd-devel-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-OSD:librbd-devel-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-OSD:librbd1-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-OSD:librbd1-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-OSD:librgw-devel-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-OSD:librgw-devel-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-OSD:librgw2-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-OSD:librgw2-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-OSD:python-ceph-argparse-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-OSD:python-ceph-argparse-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-OSD:python-cephfs-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-OSD:python-cephfs-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-OSD:python-rados-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-OSD:python-rados-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-OSD:python-rbd-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-OSD:python-rbd-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-OSD:python-rgw-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-OSD:python-rgw-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-OSD:rbd-mirror-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-OSD:rbd-mirror-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-OSD:rbd-nbd-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-OSD:rbd-nbd-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-Tools:ceph-2:14.2.22-110.el7cp.src", "7Server-RHEL-7-RHCEPH-4.3-Tools:ceph-base-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-Tools:ceph-base-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-Tools:ceph-common-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-Tools:ceph-common-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-Tools:ceph-debuginfo-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-Tools:ceph-debuginfo-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-Tools:ceph-fuse-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-Tools:ceph-fuse-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-Tools:ceph-grafana-dashboards-2:14.2.22-110.el7cp.noarch", "7Server-RHEL-7-RHCEPH-4.3-Tools:ceph-mds-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-Tools:ceph-mds-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-Tools:ceph-mgr-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-Tools:ceph-mgr-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-Tools:ceph-mgr-dashboard-2:14.2.22-110.el7cp.noarch", "7Server-RHEL-7-RHCEPH-4.3-Tools:ceph-mgr-diskprediction-local-2:14.2.22-110.el7cp.noarch", "7Server-RHEL-7-RHCEPH-4.3-Tools:ceph-mgr-k8sevents-2:14.2.22-110.el7cp.noarch", "7Server-RHEL-7-RHCEPH-4.3-Tools:ceph-mgr-rook-2:14.2.22-110.el7cp.noarch", "7Server-RHEL-7-RHCEPH-4.3-Tools:ceph-mon-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-Tools:ceph-mon-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-Tools:ceph-osd-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-Tools:ceph-osd-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-Tools:ceph-radosgw-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-Tools:ceph-radosgw-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-Tools:ceph-selinux-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-Tools:ceph-selinux-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-Tools:ceph-test-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-Tools:ceph-test-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-Tools:libcephfs-devel-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-Tools:libcephfs-devel-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-Tools:libcephfs2-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-Tools:libcephfs2-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-Tools:librados-devel-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-Tools:librados-devel-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-Tools:librados2-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-Tools:librados2-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-Tools:libradospp-devel-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-Tools:libradospp-devel-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-Tools:libradosstriper1-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-Tools:libradosstriper1-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-Tools:librbd-devel-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-Tools:librbd-devel-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-Tools:librbd1-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-Tools:librbd1-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-Tools:librgw-devel-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-Tools:librgw-devel-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-Tools:librgw2-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-Tools:librgw2-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-Tools:python-ceph-argparse-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-Tools:python-ceph-argparse-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-Tools:python-cephfs-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-Tools:python-cephfs-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-Tools:python-rados-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-Tools:python-rados-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-Tools:python-rbd-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-Tools:python-rbd-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-Tools:python-rgw-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-Tools:python-rgw-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-Tools:rbd-mirror-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-Tools:rbd-mirror-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-Tools:rbd-nbd-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-Tools:rbd-nbd-2:14.2.22-110.el7cp.x86_64", "8Base-RHCEPH-4.3-MON:ceph-2:14.2.22-110.el8cp.src", "8Base-RHCEPH-4.3-MON:ceph-base-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-MON:ceph-base-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-MON:ceph-base-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-MON:ceph-base-debuginfo-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-MON:ceph-base-debuginfo-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-MON:ceph-base-debuginfo-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-MON:ceph-common-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-MON:ceph-common-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-MON:ceph-common-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-MON:ceph-common-debuginfo-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-MON:ceph-common-debuginfo-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-MON:ceph-common-debuginfo-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-MON:ceph-debugsource-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-MON:ceph-debugsource-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-MON:ceph-debugsource-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-MON:ceph-fuse-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-MON:ceph-fuse-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-MON:ceph-fuse-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-MON:ceph-fuse-debuginfo-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-MON:ceph-fuse-debuginfo-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-MON:ceph-fuse-debuginfo-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-MON:ceph-grafana-dashboards-2:14.2.22-110.el8cp.noarch", "8Base-RHCEPH-4.3-MON:ceph-mds-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-MON:ceph-mds-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-MON:ceph-mds-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-MON:ceph-mds-debuginfo-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-MON:ceph-mds-debuginfo-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-MON:ceph-mds-debuginfo-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-MON:ceph-mgr-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-MON:ceph-mgr-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-MON:ceph-mgr-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-MON:ceph-mgr-dashboard-2:14.2.22-110.el8cp.noarch", "8Base-RHCEPH-4.3-MON:ceph-mgr-debuginfo-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-MON:ceph-mgr-debuginfo-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-MON:ceph-mgr-debuginfo-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-MON:ceph-mgr-diskprediction-local-2:14.2.22-110.el8cp.noarch", "8Base-RHCEPH-4.3-MON:ceph-mgr-k8sevents-2:14.2.22-110.el8cp.noarch", "8Base-RHCEPH-4.3-MON:ceph-mgr-rook-2:14.2.22-110.el8cp.noarch", "8Base-RHCEPH-4.3-MON:ceph-mon-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-MON:ceph-mon-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-MON:ceph-mon-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-MON:ceph-mon-debuginfo-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-MON:ceph-mon-debuginfo-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-MON:ceph-mon-debuginfo-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-MON:ceph-osd-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-MON:ceph-osd-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-MON:ceph-osd-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-MON:ceph-osd-debuginfo-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-MON:ceph-osd-debuginfo-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-MON:ceph-osd-debuginfo-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-MON:ceph-radosgw-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-MON:ceph-radosgw-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-MON:ceph-radosgw-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-MON:ceph-radosgw-debuginfo-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-MON:ceph-radosgw-debuginfo-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-MON:ceph-radosgw-debuginfo-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-MON:ceph-selinux-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-MON:ceph-selinux-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-MON:ceph-selinux-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-MON:ceph-test-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-MON:ceph-test-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-MON:ceph-test-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-MON:ceph-test-debuginfo-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-MON:ceph-test-debuginfo-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-MON:ceph-test-debuginfo-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-MON:libcephfs-devel-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-MON:libcephfs-devel-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-MON:libcephfs-devel-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-MON:libcephfs2-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-MON:libcephfs2-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-MON:libcephfs2-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-MON:libcephfs2-debuginfo-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-MON:libcephfs2-debuginfo-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-MON:libcephfs2-debuginfo-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-MON:librados-devel-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-MON:librados-devel-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-MON:librados-devel-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-MON:librados-devel-debuginfo-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-MON:librados-devel-debuginfo-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-MON:librados-devel-debuginfo-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-MON:librados2-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-MON:librados2-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-MON:librados2-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-MON:librados2-debuginfo-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-MON:librados2-debuginfo-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-MON:librados2-debuginfo-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-MON:libradospp-devel-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-MON:libradospp-devel-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-MON:libradospp-devel-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-MON:libradosstriper1-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-MON:libradosstriper1-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-MON:libradosstriper1-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-MON:libradosstriper1-debuginfo-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-MON:libradosstriper1-debuginfo-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-MON:libradosstriper1-debuginfo-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-MON:librbd-devel-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-MON:librbd-devel-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-MON:librbd-devel-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-MON:librbd1-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-MON:librbd1-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-MON:librbd1-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-MON:librbd1-debuginfo-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-MON:librbd1-debuginfo-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-MON:librbd1-debuginfo-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-MON:librgw-devel-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-MON:librgw-devel-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-MON:librgw-devel-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-MON:librgw2-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-MON:librgw2-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-MON:librgw2-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-MON:librgw2-debuginfo-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-MON:librgw2-debuginfo-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-MON:librgw2-debuginfo-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-MON:python3-ceph-argparse-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-MON:python3-ceph-argparse-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-MON:python3-ceph-argparse-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-MON:python3-cephfs-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-MON:python3-cephfs-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-MON:python3-cephfs-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-MON:python3-cephfs-debuginfo-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-MON:python3-cephfs-debuginfo-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-MON:python3-cephfs-debuginfo-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-MON:python3-rados-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-MON:python3-rados-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-MON:python3-rados-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-MON:python3-rados-debuginfo-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-MON:python3-rados-debuginfo-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-MON:python3-rados-debuginfo-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-MON:python3-rbd-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-MON:python3-rbd-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-MON:python3-rbd-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-MON:python3-rbd-debuginfo-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-MON:python3-rbd-debuginfo-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-MON:python3-rbd-debuginfo-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-MON:python3-rgw-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-MON:python3-rgw-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-MON:python3-rgw-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-MON:python3-rgw-debuginfo-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-MON:python3-rgw-debuginfo-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-MON:python3-rgw-debuginfo-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-MON:rbd-fuse-debuginfo-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-MON:rbd-fuse-debuginfo-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-MON:rbd-fuse-debuginfo-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-MON:rbd-mirror-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-MON:rbd-mirror-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-MON:rbd-mirror-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-MON:rbd-mirror-debuginfo-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-MON:rbd-mirror-debuginfo-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-MON:rbd-mirror-debuginfo-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-MON:rbd-nbd-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-MON:rbd-nbd-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-MON:rbd-nbd-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-MON:rbd-nbd-debuginfo-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-MON:rbd-nbd-debuginfo-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-MON:rbd-nbd-debuginfo-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-OSD:ceph-2:14.2.22-110.el8cp.src", "8Base-RHCEPH-4.3-OSD:ceph-base-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-OSD:ceph-base-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-OSD:ceph-base-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-OSD:ceph-base-debuginfo-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-OSD:ceph-base-debuginfo-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-OSD:ceph-base-debuginfo-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-OSD:ceph-common-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-OSD:ceph-common-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-OSD:ceph-common-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-OSD:ceph-common-debuginfo-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-OSD:ceph-common-debuginfo-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-OSD:ceph-common-debuginfo-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-OSD:ceph-debugsource-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-OSD:ceph-debugsource-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-OSD:ceph-debugsource-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-OSD:ceph-fuse-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-OSD:ceph-fuse-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-OSD:ceph-fuse-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-OSD:ceph-fuse-debuginfo-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-OSD:ceph-fuse-debuginfo-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-OSD:ceph-fuse-debuginfo-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-OSD:ceph-grafana-dashboards-2:14.2.22-110.el8cp.noarch", "8Base-RHCEPH-4.3-OSD:ceph-mds-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-OSD:ceph-mds-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-OSD:ceph-mds-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-OSD:ceph-mds-debuginfo-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-OSD:ceph-mds-debuginfo-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-OSD:ceph-mds-debuginfo-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-OSD:ceph-mgr-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-OSD:ceph-mgr-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-OSD:ceph-mgr-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-OSD:ceph-mgr-dashboard-2:14.2.22-110.el8cp.noarch", "8Base-RHCEPH-4.3-OSD:ceph-mgr-debuginfo-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-OSD:ceph-mgr-debuginfo-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-OSD:ceph-mgr-debuginfo-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-OSD:ceph-mgr-diskprediction-local-2:14.2.22-110.el8cp.noarch", "8Base-RHCEPH-4.3-OSD:ceph-mgr-k8sevents-2:14.2.22-110.el8cp.noarch", "8Base-RHCEPH-4.3-OSD:ceph-mgr-rook-2:14.2.22-110.el8cp.noarch", "8Base-RHCEPH-4.3-OSD:ceph-mon-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-OSD:ceph-mon-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-OSD:ceph-mon-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-OSD:ceph-mon-debuginfo-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-OSD:ceph-mon-debuginfo-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-OSD:ceph-mon-debuginfo-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-OSD:ceph-osd-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-OSD:ceph-osd-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-OSD:ceph-osd-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-OSD:ceph-osd-debuginfo-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-OSD:ceph-osd-debuginfo-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-OSD:ceph-osd-debuginfo-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-OSD:ceph-radosgw-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-OSD:ceph-radosgw-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-OSD:ceph-radosgw-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-OSD:ceph-radosgw-debuginfo-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-OSD:ceph-radosgw-debuginfo-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-OSD:ceph-radosgw-debuginfo-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-OSD:ceph-selinux-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-OSD:ceph-selinux-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-OSD:ceph-selinux-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-OSD:ceph-test-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-OSD:ceph-test-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-OSD:ceph-test-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-OSD:ceph-test-debuginfo-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-OSD:ceph-test-debuginfo-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-OSD:ceph-test-debuginfo-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-OSD:libcephfs-devel-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-OSD:libcephfs-devel-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-OSD:libcephfs-devel-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-OSD:libcephfs2-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-OSD:libcephfs2-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-OSD:libcephfs2-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-OSD:libcephfs2-debuginfo-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-OSD:libcephfs2-debuginfo-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-OSD:libcephfs2-debuginfo-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-OSD:librados-devel-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-OSD:librados-devel-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-OSD:librados-devel-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-OSD:librados-devel-debuginfo-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-OSD:librados-devel-debuginfo-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-OSD:librados-devel-debuginfo-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-OSD:librados2-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-OSD:librados2-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-OSD:librados2-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-OSD:librados2-debuginfo-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-OSD:librados2-debuginfo-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-OSD:librados2-debuginfo-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-OSD:libradospp-devel-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-OSD:libradospp-devel-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-OSD:libradospp-devel-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-OSD:libradosstriper1-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-OSD:libradosstriper1-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-OSD:libradosstriper1-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-OSD:libradosstriper1-debuginfo-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-OSD:libradosstriper1-debuginfo-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-OSD:libradosstriper1-debuginfo-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-OSD:librbd-devel-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-OSD:librbd-devel-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-OSD:librbd-devel-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-OSD:librbd1-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-OSD:librbd1-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-OSD:librbd1-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-OSD:librbd1-debuginfo-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-OSD:librbd1-debuginfo-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-OSD:librbd1-debuginfo-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-OSD:librgw-devel-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-OSD:librgw-devel-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-OSD:librgw-devel-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-OSD:librgw2-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-OSD:librgw2-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-OSD:librgw2-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-OSD:librgw2-debuginfo-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-OSD:librgw2-debuginfo-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-OSD:librgw2-debuginfo-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-OSD:python3-ceph-argparse-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-OSD:python3-ceph-argparse-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-OSD:python3-ceph-argparse-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-OSD:python3-cephfs-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-OSD:python3-cephfs-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-OSD:python3-cephfs-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-OSD:python3-cephfs-debuginfo-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-OSD:python3-cephfs-debuginfo-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-OSD:python3-cephfs-debuginfo-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-OSD:python3-rados-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-OSD:python3-rados-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-OSD:python3-rados-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-OSD:python3-rados-debuginfo-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-OSD:python3-rados-debuginfo-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-OSD:python3-rados-debuginfo-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-OSD:python3-rbd-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-OSD:python3-rbd-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-OSD:python3-rbd-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-OSD:python3-rbd-debuginfo-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-OSD:python3-rbd-debuginfo-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-OSD:python3-rbd-debuginfo-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-OSD:python3-rgw-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-OSD:python3-rgw-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-OSD:python3-rgw-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-OSD:python3-rgw-debuginfo-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-OSD:python3-rgw-debuginfo-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-OSD:python3-rgw-debuginfo-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-OSD:rbd-fuse-debuginfo-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-OSD:rbd-fuse-debuginfo-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-OSD:rbd-fuse-debuginfo-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-OSD:rbd-mirror-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-OSD:rbd-mirror-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-OSD:rbd-mirror-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-OSD:rbd-mirror-debuginfo-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-OSD:rbd-mirror-debuginfo-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-OSD:rbd-mirror-debuginfo-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-OSD:rbd-nbd-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-OSD:rbd-nbd-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-OSD:rbd-nbd-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-OSD:rbd-nbd-debuginfo-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-OSD:rbd-nbd-debuginfo-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-OSD:rbd-nbd-debuginfo-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-Tools:ceph-2:14.2.22-110.el8cp.src", "8Base-RHCEPH-4.3-Tools:ceph-base-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-Tools:ceph-base-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-Tools:ceph-base-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-Tools:ceph-base-debuginfo-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-Tools:ceph-base-debuginfo-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-Tools:ceph-base-debuginfo-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-Tools:ceph-common-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-Tools:ceph-common-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-Tools:ceph-common-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-Tools:ceph-common-debuginfo-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-Tools:ceph-common-debuginfo-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-Tools:ceph-common-debuginfo-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-Tools:ceph-debugsource-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-Tools:ceph-debugsource-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-Tools:ceph-debugsource-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-Tools:ceph-fuse-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-Tools:ceph-fuse-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-Tools:ceph-fuse-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-Tools:ceph-fuse-debuginfo-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-Tools:ceph-fuse-debuginfo-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-Tools:ceph-fuse-debuginfo-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-Tools:ceph-grafana-dashboards-2:14.2.22-110.el8cp.noarch", "8Base-RHCEPH-4.3-Tools:ceph-mds-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-Tools:ceph-mds-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-Tools:ceph-mds-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-Tools:ceph-mds-debuginfo-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-Tools:ceph-mds-debuginfo-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-Tools:ceph-mds-debuginfo-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-Tools:ceph-mgr-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-Tools:ceph-mgr-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-Tools:ceph-mgr-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-Tools:ceph-mgr-dashboard-2:14.2.22-110.el8cp.noarch", "8Base-RHCEPH-4.3-Tools:ceph-mgr-debuginfo-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-Tools:ceph-mgr-debuginfo-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-Tools:ceph-mgr-debuginfo-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-Tools:ceph-mgr-diskprediction-local-2:14.2.22-110.el8cp.noarch", "8Base-RHCEPH-4.3-Tools:ceph-mgr-k8sevents-2:14.2.22-110.el8cp.noarch", "8Base-RHCEPH-4.3-Tools:ceph-mgr-rook-2:14.2.22-110.el8cp.noarch", "8Base-RHCEPH-4.3-Tools:ceph-mon-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-Tools:ceph-mon-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-Tools:ceph-mon-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-Tools:ceph-mon-debuginfo-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-Tools:ceph-mon-debuginfo-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-Tools:ceph-mon-debuginfo-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-Tools:ceph-osd-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-Tools:ceph-osd-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-Tools:ceph-osd-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-Tools:ceph-osd-debuginfo-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-Tools:ceph-osd-debuginfo-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-Tools:ceph-osd-debuginfo-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-Tools:ceph-radosgw-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-Tools:ceph-radosgw-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-Tools:ceph-radosgw-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-Tools:ceph-radosgw-debuginfo-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-Tools:ceph-radosgw-debuginfo-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-Tools:ceph-radosgw-debuginfo-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-Tools:ceph-selinux-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-Tools:ceph-selinux-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-Tools:ceph-selinux-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-Tools:ceph-test-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-Tools:ceph-test-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-Tools:ceph-test-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-Tools:ceph-test-debuginfo-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-Tools:ceph-test-debuginfo-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-Tools:ceph-test-debuginfo-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-Tools:libcephfs-devel-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-Tools:libcephfs-devel-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-Tools:libcephfs-devel-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-Tools:libcephfs2-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-Tools:libcephfs2-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-Tools:libcephfs2-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-Tools:libcephfs2-debuginfo-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-Tools:libcephfs2-debuginfo-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-Tools:libcephfs2-debuginfo-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-Tools:librados-devel-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-Tools:librados-devel-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-Tools:librados-devel-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-Tools:librados-devel-debuginfo-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-Tools:librados-devel-debuginfo-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-Tools:librados-devel-debuginfo-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-Tools:librados2-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-Tools:librados2-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-Tools:librados2-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-Tools:librados2-debuginfo-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-Tools:librados2-debuginfo-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-Tools:librados2-debuginfo-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-Tools:libradospp-devel-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-Tools:libradospp-devel-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-Tools:libradospp-devel-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-Tools:libradosstriper1-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-Tools:libradosstriper1-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-Tools:libradosstriper1-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-Tools:libradosstriper1-debuginfo-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-Tools:libradosstriper1-debuginfo-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-Tools:libradosstriper1-debuginfo-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-Tools:librbd-devel-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-Tools:librbd-devel-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-Tools:librbd-devel-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-Tools:librbd1-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-Tools:librbd1-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-Tools:librbd1-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-Tools:librbd1-debuginfo-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-Tools:librbd1-debuginfo-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-Tools:librbd1-debuginfo-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-Tools:librgw-devel-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-Tools:librgw-devel-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-Tools:librgw-devel-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-Tools:librgw2-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-Tools:librgw2-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-Tools:librgw2-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-Tools:librgw2-debuginfo-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-Tools:librgw2-debuginfo-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-Tools:librgw2-debuginfo-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-Tools:python3-ceph-argparse-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-Tools:python3-ceph-argparse-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-Tools:python3-ceph-argparse-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-Tools:python3-cephfs-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-Tools:python3-cephfs-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-Tools:python3-cephfs-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-Tools:python3-cephfs-debuginfo-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-Tools:python3-cephfs-debuginfo-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-Tools:python3-cephfs-debuginfo-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-Tools:python3-rados-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-Tools:python3-rados-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-Tools:python3-rados-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-Tools:python3-rados-debuginfo-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-Tools:python3-rados-debuginfo-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-Tools:python3-rados-debuginfo-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-Tools:python3-rbd-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-Tools:python3-rbd-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-Tools:python3-rbd-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-Tools:python3-rbd-debuginfo-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-Tools:python3-rbd-debuginfo-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-Tools:python3-rbd-debuginfo-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-Tools:python3-rgw-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-Tools:python3-rgw-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-Tools:python3-rgw-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-Tools:python3-rgw-debuginfo-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-Tools:python3-rgw-debuginfo-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-Tools:python3-rgw-debuginfo-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-Tools:rbd-fuse-debuginfo-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-Tools:rbd-fuse-debuginfo-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-Tools:rbd-fuse-debuginfo-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-Tools:rbd-mirror-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-Tools:rbd-mirror-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-Tools:rbd-mirror-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-Tools:rbd-mirror-debuginfo-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-Tools:rbd-mirror-debuginfo-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-Tools:rbd-mirror-debuginfo-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-Tools:rbd-nbd-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-Tools:rbd-nbd-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-Tools:rbd-nbd-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-Tools:rbd-nbd-debuginfo-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-Tools:rbd-nbd-debuginfo-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-Tools:rbd-nbd-debuginfo-2:14.2.22-110.el8cp.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:1716" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N", "version": "3.1" }, "products": [ "7Server-RHEL-7-RHCEPH-4.3-MON:ceph-2:14.2.22-110.el7cp.src", "7Server-RHEL-7-RHCEPH-4.3-MON:ceph-base-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-MON:ceph-base-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-MON:ceph-common-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-MON:ceph-common-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-MON:ceph-debuginfo-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-MON:ceph-debuginfo-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-MON:ceph-fuse-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-MON:ceph-fuse-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-MON:ceph-grafana-dashboards-2:14.2.22-110.el7cp.noarch", "7Server-RHEL-7-RHCEPH-4.3-MON:ceph-mds-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-MON:ceph-mds-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-MON:ceph-mgr-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-MON:ceph-mgr-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-MON:ceph-mgr-dashboard-2:14.2.22-110.el7cp.noarch", "7Server-RHEL-7-RHCEPH-4.3-MON:ceph-mgr-diskprediction-local-2:14.2.22-110.el7cp.noarch", "7Server-RHEL-7-RHCEPH-4.3-MON:ceph-mgr-k8sevents-2:14.2.22-110.el7cp.noarch", "7Server-RHEL-7-RHCEPH-4.3-MON:ceph-mgr-rook-2:14.2.22-110.el7cp.noarch", "7Server-RHEL-7-RHCEPH-4.3-MON:ceph-mon-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-MON:ceph-mon-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-MON:ceph-osd-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-MON:ceph-osd-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-MON:ceph-radosgw-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-MON:ceph-radosgw-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-MON:ceph-selinux-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-MON:ceph-selinux-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-MON:ceph-test-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-MON:ceph-test-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-MON:libcephfs-devel-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-MON:libcephfs-devel-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-MON:libcephfs2-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-MON:libcephfs2-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-MON:librados-devel-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-MON:librados-devel-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-MON:librados2-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-MON:librados2-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-MON:libradospp-devel-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-MON:libradospp-devel-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-MON:libradosstriper1-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-MON:libradosstriper1-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-MON:librbd-devel-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-MON:librbd-devel-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-MON:librbd1-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-MON:librbd1-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-MON:librgw-devel-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-MON:librgw-devel-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-MON:librgw2-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-MON:librgw2-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-MON:python-ceph-argparse-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-MON:python-ceph-argparse-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-MON:python-cephfs-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-MON:python-cephfs-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-MON:python-rados-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-MON:python-rados-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-MON:python-rbd-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-MON:python-rbd-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-MON:python-rgw-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-MON:python-rgw-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-MON:rbd-mirror-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-MON:rbd-mirror-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-MON:rbd-nbd-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-MON:rbd-nbd-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-OSD:ceph-2:14.2.22-110.el7cp.src", "7Server-RHEL-7-RHCEPH-4.3-OSD:ceph-base-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-OSD:ceph-base-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-OSD:ceph-common-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-OSD:ceph-common-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-OSD:ceph-debuginfo-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-OSD:ceph-debuginfo-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-OSD:ceph-fuse-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-OSD:ceph-fuse-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-OSD:ceph-grafana-dashboards-2:14.2.22-110.el7cp.noarch", "7Server-RHEL-7-RHCEPH-4.3-OSD:ceph-mds-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-OSD:ceph-mds-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-OSD:ceph-mgr-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-OSD:ceph-mgr-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-OSD:ceph-mgr-dashboard-2:14.2.22-110.el7cp.noarch", "7Server-RHEL-7-RHCEPH-4.3-OSD:ceph-mgr-diskprediction-local-2:14.2.22-110.el7cp.noarch", "7Server-RHEL-7-RHCEPH-4.3-OSD:ceph-mgr-k8sevents-2:14.2.22-110.el7cp.noarch", "7Server-RHEL-7-RHCEPH-4.3-OSD:ceph-mgr-rook-2:14.2.22-110.el7cp.noarch", "7Server-RHEL-7-RHCEPH-4.3-OSD:ceph-mon-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-OSD:ceph-mon-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-OSD:ceph-osd-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-OSD:ceph-osd-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-OSD:ceph-radosgw-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-OSD:ceph-radosgw-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-OSD:ceph-selinux-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-OSD:ceph-selinux-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-OSD:ceph-test-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-OSD:ceph-test-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-OSD:libcephfs-devel-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-OSD:libcephfs-devel-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-OSD:libcephfs2-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-OSD:libcephfs2-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-OSD:librados-devel-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-OSD:librados-devel-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-OSD:librados2-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-OSD:librados2-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-OSD:libradospp-devel-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-OSD:libradospp-devel-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-OSD:libradosstriper1-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-OSD:libradosstriper1-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-OSD:librbd-devel-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-OSD:librbd-devel-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-OSD:librbd1-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-OSD:librbd1-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-OSD:librgw-devel-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-OSD:librgw-devel-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-OSD:librgw2-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-OSD:librgw2-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-OSD:python-ceph-argparse-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-OSD:python-ceph-argparse-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-OSD:python-cephfs-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-OSD:python-cephfs-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-OSD:python-rados-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-OSD:python-rados-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-OSD:python-rbd-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-OSD:python-rbd-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-OSD:python-rgw-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-OSD:python-rgw-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-OSD:rbd-mirror-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-OSD:rbd-mirror-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-OSD:rbd-nbd-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-OSD:rbd-nbd-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-Tools:ceph-2:14.2.22-110.el7cp.src", "7Server-RHEL-7-RHCEPH-4.3-Tools:ceph-base-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-Tools:ceph-base-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-Tools:ceph-common-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-Tools:ceph-common-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-Tools:ceph-debuginfo-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-Tools:ceph-debuginfo-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-Tools:ceph-fuse-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-Tools:ceph-fuse-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-Tools:ceph-grafana-dashboards-2:14.2.22-110.el7cp.noarch", "7Server-RHEL-7-RHCEPH-4.3-Tools:ceph-mds-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-Tools:ceph-mds-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-Tools:ceph-mgr-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-Tools:ceph-mgr-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-Tools:ceph-mgr-dashboard-2:14.2.22-110.el7cp.noarch", "7Server-RHEL-7-RHCEPH-4.3-Tools:ceph-mgr-diskprediction-local-2:14.2.22-110.el7cp.noarch", "7Server-RHEL-7-RHCEPH-4.3-Tools:ceph-mgr-k8sevents-2:14.2.22-110.el7cp.noarch", "7Server-RHEL-7-RHCEPH-4.3-Tools:ceph-mgr-rook-2:14.2.22-110.el7cp.noarch", "7Server-RHEL-7-RHCEPH-4.3-Tools:ceph-mon-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-Tools:ceph-mon-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-Tools:ceph-osd-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-Tools:ceph-osd-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-Tools:ceph-radosgw-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-Tools:ceph-radosgw-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-Tools:ceph-selinux-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-Tools:ceph-selinux-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-Tools:ceph-test-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-Tools:ceph-test-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-Tools:libcephfs-devel-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-Tools:libcephfs-devel-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-Tools:libcephfs2-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-Tools:libcephfs2-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-Tools:librados-devel-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-Tools:librados-devel-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-Tools:librados2-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-Tools:librados2-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-Tools:libradospp-devel-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-Tools:libradospp-devel-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-Tools:libradosstriper1-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-Tools:libradosstriper1-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-Tools:librbd-devel-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-Tools:librbd-devel-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-Tools:librbd1-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-Tools:librbd1-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-Tools:librgw-devel-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-Tools:librgw-devel-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-Tools:librgw2-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-Tools:librgw2-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-Tools:python-ceph-argparse-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-Tools:python-ceph-argparse-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-Tools:python-cephfs-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-Tools:python-cephfs-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-Tools:python-rados-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-Tools:python-rados-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-Tools:python-rbd-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-Tools:python-rbd-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-Tools:python-rgw-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-Tools:python-rgw-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-Tools:rbd-mirror-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-Tools:rbd-mirror-2:14.2.22-110.el7cp.x86_64", "7Server-RHEL-7-RHCEPH-4.3-Tools:rbd-nbd-2:14.2.22-110.el7cp.ppc64le", "7Server-RHEL-7-RHCEPH-4.3-Tools:rbd-nbd-2:14.2.22-110.el7cp.x86_64", "8Base-RHCEPH-4.3-MON:ceph-2:14.2.22-110.el8cp.src", "8Base-RHCEPH-4.3-MON:ceph-base-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-MON:ceph-base-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-MON:ceph-base-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-MON:ceph-base-debuginfo-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-MON:ceph-base-debuginfo-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-MON:ceph-base-debuginfo-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-MON:ceph-common-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-MON:ceph-common-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-MON:ceph-common-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-MON:ceph-common-debuginfo-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-MON:ceph-common-debuginfo-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-MON:ceph-common-debuginfo-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-MON:ceph-debugsource-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-MON:ceph-debugsource-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-MON:ceph-debugsource-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-MON:ceph-fuse-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-MON:ceph-fuse-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-MON:ceph-fuse-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-MON:ceph-fuse-debuginfo-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-MON:ceph-fuse-debuginfo-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-MON:ceph-fuse-debuginfo-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-MON:ceph-grafana-dashboards-2:14.2.22-110.el8cp.noarch", "8Base-RHCEPH-4.3-MON:ceph-mds-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-MON:ceph-mds-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-MON:ceph-mds-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-MON:ceph-mds-debuginfo-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-MON:ceph-mds-debuginfo-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-MON:ceph-mds-debuginfo-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-MON:ceph-mgr-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-MON:ceph-mgr-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-MON:ceph-mgr-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-MON:ceph-mgr-dashboard-2:14.2.22-110.el8cp.noarch", "8Base-RHCEPH-4.3-MON:ceph-mgr-debuginfo-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-MON:ceph-mgr-debuginfo-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-MON:ceph-mgr-debuginfo-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-MON:ceph-mgr-diskprediction-local-2:14.2.22-110.el8cp.noarch", "8Base-RHCEPH-4.3-MON:ceph-mgr-k8sevents-2:14.2.22-110.el8cp.noarch", "8Base-RHCEPH-4.3-MON:ceph-mgr-rook-2:14.2.22-110.el8cp.noarch", "8Base-RHCEPH-4.3-MON:ceph-mon-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-MON:ceph-mon-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-MON:ceph-mon-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-MON:ceph-mon-debuginfo-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-MON:ceph-mon-debuginfo-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-MON:ceph-mon-debuginfo-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-MON:ceph-osd-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-MON:ceph-osd-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-MON:ceph-osd-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-MON:ceph-osd-debuginfo-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-MON:ceph-osd-debuginfo-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-MON:ceph-osd-debuginfo-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-MON:ceph-radosgw-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-MON:ceph-radosgw-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-MON:ceph-radosgw-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-MON:ceph-radosgw-debuginfo-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-MON:ceph-radosgw-debuginfo-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-MON:ceph-radosgw-debuginfo-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-MON:ceph-selinux-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-MON:ceph-selinux-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-MON:ceph-selinux-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-MON:ceph-test-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-MON:ceph-test-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-MON:ceph-test-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-MON:ceph-test-debuginfo-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-MON:ceph-test-debuginfo-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-MON:ceph-test-debuginfo-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-MON:libcephfs-devel-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-MON:libcephfs-devel-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-MON:libcephfs-devel-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-MON:libcephfs2-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-MON:libcephfs2-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-MON:libcephfs2-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-MON:libcephfs2-debuginfo-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-MON:libcephfs2-debuginfo-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-MON:libcephfs2-debuginfo-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-MON:librados-devel-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-MON:librados-devel-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-MON:librados-devel-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-MON:librados-devel-debuginfo-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-MON:librados-devel-debuginfo-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-MON:librados-devel-debuginfo-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-MON:librados2-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-MON:librados2-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-MON:librados2-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-MON:librados2-debuginfo-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-MON:librados2-debuginfo-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-MON:librados2-debuginfo-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-MON:libradospp-devel-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-MON:libradospp-devel-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-MON:libradospp-devel-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-MON:libradosstriper1-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-MON:libradosstriper1-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-MON:libradosstriper1-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-MON:libradosstriper1-debuginfo-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-MON:libradosstriper1-debuginfo-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-MON:libradosstriper1-debuginfo-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-MON:librbd-devel-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-MON:librbd-devel-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-MON:librbd-devel-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-MON:librbd1-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-MON:librbd1-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-MON:librbd1-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-MON:librbd1-debuginfo-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-MON:librbd1-debuginfo-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-MON:librbd1-debuginfo-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-MON:librgw-devel-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-MON:librgw-devel-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-MON:librgw-devel-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-MON:librgw2-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-MON:librgw2-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-MON:librgw2-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-MON:librgw2-debuginfo-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-MON:librgw2-debuginfo-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-MON:librgw2-debuginfo-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-MON:python3-ceph-argparse-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-MON:python3-ceph-argparse-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-MON:python3-ceph-argparse-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-MON:python3-cephfs-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-MON:python3-cephfs-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-MON:python3-cephfs-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-MON:python3-cephfs-debuginfo-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-MON:python3-cephfs-debuginfo-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-MON:python3-cephfs-debuginfo-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-MON:python3-rados-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-MON:python3-rados-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-MON:python3-rados-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-MON:python3-rados-debuginfo-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-MON:python3-rados-debuginfo-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-MON:python3-rados-debuginfo-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-MON:python3-rbd-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-MON:python3-rbd-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-MON:python3-rbd-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-MON:python3-rbd-debuginfo-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-MON:python3-rbd-debuginfo-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-MON:python3-rbd-debuginfo-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-MON:python3-rgw-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-MON:python3-rgw-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-MON:python3-rgw-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-MON:python3-rgw-debuginfo-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-MON:python3-rgw-debuginfo-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-MON:python3-rgw-debuginfo-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-MON:rbd-fuse-debuginfo-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-MON:rbd-fuse-debuginfo-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-MON:rbd-fuse-debuginfo-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-MON:rbd-mirror-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-MON:rbd-mirror-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-MON:rbd-mirror-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-MON:rbd-mirror-debuginfo-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-MON:rbd-mirror-debuginfo-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-MON:rbd-mirror-debuginfo-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-MON:rbd-nbd-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-MON:rbd-nbd-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-MON:rbd-nbd-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-MON:rbd-nbd-debuginfo-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-MON:rbd-nbd-debuginfo-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-MON:rbd-nbd-debuginfo-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-OSD:ceph-2:14.2.22-110.el8cp.src", "8Base-RHCEPH-4.3-OSD:ceph-base-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-OSD:ceph-base-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-OSD:ceph-base-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-OSD:ceph-base-debuginfo-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-OSD:ceph-base-debuginfo-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-OSD:ceph-base-debuginfo-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-OSD:ceph-common-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-OSD:ceph-common-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-OSD:ceph-common-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-OSD:ceph-common-debuginfo-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-OSD:ceph-common-debuginfo-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-OSD:ceph-common-debuginfo-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-OSD:ceph-debugsource-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-OSD:ceph-debugsource-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-OSD:ceph-debugsource-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-OSD:ceph-fuse-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-OSD:ceph-fuse-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-OSD:ceph-fuse-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-OSD:ceph-fuse-debuginfo-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-OSD:ceph-fuse-debuginfo-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-OSD:ceph-fuse-debuginfo-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-OSD:ceph-grafana-dashboards-2:14.2.22-110.el8cp.noarch", "8Base-RHCEPH-4.3-OSD:ceph-mds-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-OSD:ceph-mds-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-OSD:ceph-mds-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-OSD:ceph-mds-debuginfo-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-OSD:ceph-mds-debuginfo-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-OSD:ceph-mds-debuginfo-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-OSD:ceph-mgr-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-OSD:ceph-mgr-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-OSD:ceph-mgr-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-OSD:ceph-mgr-dashboard-2:14.2.22-110.el8cp.noarch", "8Base-RHCEPH-4.3-OSD:ceph-mgr-debuginfo-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-OSD:ceph-mgr-debuginfo-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-OSD:ceph-mgr-debuginfo-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-OSD:ceph-mgr-diskprediction-local-2:14.2.22-110.el8cp.noarch", "8Base-RHCEPH-4.3-OSD:ceph-mgr-k8sevents-2:14.2.22-110.el8cp.noarch", "8Base-RHCEPH-4.3-OSD:ceph-mgr-rook-2:14.2.22-110.el8cp.noarch", "8Base-RHCEPH-4.3-OSD:ceph-mon-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-OSD:ceph-mon-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-OSD:ceph-mon-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-OSD:ceph-mon-debuginfo-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-OSD:ceph-mon-debuginfo-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-OSD:ceph-mon-debuginfo-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-OSD:ceph-osd-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-OSD:ceph-osd-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-OSD:ceph-osd-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-OSD:ceph-osd-debuginfo-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-OSD:ceph-osd-debuginfo-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-OSD:ceph-osd-debuginfo-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-OSD:ceph-radosgw-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-OSD:ceph-radosgw-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-OSD:ceph-radosgw-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-OSD:ceph-radosgw-debuginfo-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-OSD:ceph-radosgw-debuginfo-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-OSD:ceph-radosgw-debuginfo-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-OSD:ceph-selinux-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-OSD:ceph-selinux-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-OSD:ceph-selinux-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-OSD:ceph-test-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-OSD:ceph-test-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-OSD:ceph-test-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-OSD:ceph-test-debuginfo-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-OSD:ceph-test-debuginfo-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-OSD:ceph-test-debuginfo-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-OSD:libcephfs-devel-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-OSD:libcephfs-devel-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-OSD:libcephfs-devel-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-OSD:libcephfs2-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-OSD:libcephfs2-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-OSD:libcephfs2-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-OSD:libcephfs2-debuginfo-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-OSD:libcephfs2-debuginfo-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-OSD:libcephfs2-debuginfo-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-OSD:librados-devel-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-OSD:librados-devel-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-OSD:librados-devel-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-OSD:librados-devel-debuginfo-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-OSD:librados-devel-debuginfo-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-OSD:librados-devel-debuginfo-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-OSD:librados2-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-OSD:librados2-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-OSD:librados2-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-OSD:librados2-debuginfo-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-OSD:librados2-debuginfo-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-OSD:librados2-debuginfo-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-OSD:libradospp-devel-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-OSD:libradospp-devel-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-OSD:libradospp-devel-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-OSD:libradosstriper1-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-OSD:libradosstriper1-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-OSD:libradosstriper1-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-OSD:libradosstriper1-debuginfo-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-OSD:libradosstriper1-debuginfo-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-OSD:libradosstriper1-debuginfo-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-OSD:librbd-devel-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-OSD:librbd-devel-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-OSD:librbd-devel-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-OSD:librbd1-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-OSD:librbd1-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-OSD:librbd1-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-OSD:librbd1-debuginfo-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-OSD:librbd1-debuginfo-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-OSD:librbd1-debuginfo-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-OSD:librgw-devel-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-OSD:librgw-devel-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-OSD:librgw-devel-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-OSD:librgw2-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-OSD:librgw2-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-OSD:librgw2-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-OSD:librgw2-debuginfo-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-OSD:librgw2-debuginfo-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-OSD:librgw2-debuginfo-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-OSD:python3-ceph-argparse-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-OSD:python3-ceph-argparse-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-OSD:python3-ceph-argparse-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-OSD:python3-cephfs-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-OSD:python3-cephfs-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-OSD:python3-cephfs-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-OSD:python3-cephfs-debuginfo-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-OSD:python3-cephfs-debuginfo-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-OSD:python3-cephfs-debuginfo-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-OSD:python3-rados-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-OSD:python3-rados-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-OSD:python3-rados-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-OSD:python3-rados-debuginfo-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-OSD:python3-rados-debuginfo-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-OSD:python3-rados-debuginfo-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-OSD:python3-rbd-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-OSD:python3-rbd-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-OSD:python3-rbd-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-OSD:python3-rbd-debuginfo-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-OSD:python3-rbd-debuginfo-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-OSD:python3-rbd-debuginfo-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-OSD:python3-rgw-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-OSD:python3-rgw-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-OSD:python3-rgw-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-OSD:python3-rgw-debuginfo-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-OSD:python3-rgw-debuginfo-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-OSD:python3-rgw-debuginfo-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-OSD:rbd-fuse-debuginfo-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-OSD:rbd-fuse-debuginfo-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-OSD:rbd-fuse-debuginfo-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-OSD:rbd-mirror-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-OSD:rbd-mirror-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-OSD:rbd-mirror-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-OSD:rbd-mirror-debuginfo-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-OSD:rbd-mirror-debuginfo-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-OSD:rbd-mirror-debuginfo-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-OSD:rbd-nbd-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-OSD:rbd-nbd-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-OSD:rbd-nbd-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-OSD:rbd-nbd-debuginfo-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-OSD:rbd-nbd-debuginfo-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-OSD:rbd-nbd-debuginfo-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-Tools:ceph-2:14.2.22-110.el8cp.src", "8Base-RHCEPH-4.3-Tools:ceph-base-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-Tools:ceph-base-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-Tools:ceph-base-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-Tools:ceph-base-debuginfo-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-Tools:ceph-base-debuginfo-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-Tools:ceph-base-debuginfo-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-Tools:ceph-common-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-Tools:ceph-common-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-Tools:ceph-common-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-Tools:ceph-common-debuginfo-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-Tools:ceph-common-debuginfo-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-Tools:ceph-common-debuginfo-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-Tools:ceph-debugsource-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-Tools:ceph-debugsource-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-Tools:ceph-debugsource-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-Tools:ceph-fuse-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-Tools:ceph-fuse-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-Tools:ceph-fuse-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-Tools:ceph-fuse-debuginfo-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-Tools:ceph-fuse-debuginfo-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-Tools:ceph-fuse-debuginfo-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-Tools:ceph-grafana-dashboards-2:14.2.22-110.el8cp.noarch", "8Base-RHCEPH-4.3-Tools:ceph-mds-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-Tools:ceph-mds-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-Tools:ceph-mds-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-Tools:ceph-mds-debuginfo-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-Tools:ceph-mds-debuginfo-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-Tools:ceph-mds-debuginfo-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-Tools:ceph-mgr-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-Tools:ceph-mgr-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-Tools:ceph-mgr-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-Tools:ceph-mgr-dashboard-2:14.2.22-110.el8cp.noarch", "8Base-RHCEPH-4.3-Tools:ceph-mgr-debuginfo-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-Tools:ceph-mgr-debuginfo-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-Tools:ceph-mgr-debuginfo-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-Tools:ceph-mgr-diskprediction-local-2:14.2.22-110.el8cp.noarch", "8Base-RHCEPH-4.3-Tools:ceph-mgr-k8sevents-2:14.2.22-110.el8cp.noarch", "8Base-RHCEPH-4.3-Tools:ceph-mgr-rook-2:14.2.22-110.el8cp.noarch", "8Base-RHCEPH-4.3-Tools:ceph-mon-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-Tools:ceph-mon-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-Tools:ceph-mon-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-Tools:ceph-mon-debuginfo-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-Tools:ceph-mon-debuginfo-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-Tools:ceph-mon-debuginfo-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-Tools:ceph-osd-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-Tools:ceph-osd-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-Tools:ceph-osd-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-Tools:ceph-osd-debuginfo-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-Tools:ceph-osd-debuginfo-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-Tools:ceph-osd-debuginfo-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-Tools:ceph-radosgw-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-Tools:ceph-radosgw-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-Tools:ceph-radosgw-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-Tools:ceph-radosgw-debuginfo-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-Tools:ceph-radosgw-debuginfo-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-Tools:ceph-radosgw-debuginfo-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-Tools:ceph-selinux-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-Tools:ceph-selinux-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-Tools:ceph-selinux-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-Tools:ceph-test-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-Tools:ceph-test-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-Tools:ceph-test-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-Tools:ceph-test-debuginfo-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-Tools:ceph-test-debuginfo-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-Tools:ceph-test-debuginfo-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-Tools:libcephfs-devel-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-Tools:libcephfs-devel-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-Tools:libcephfs-devel-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-Tools:libcephfs2-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-Tools:libcephfs2-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-Tools:libcephfs2-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-Tools:libcephfs2-debuginfo-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-Tools:libcephfs2-debuginfo-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-Tools:libcephfs2-debuginfo-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-Tools:librados-devel-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-Tools:librados-devel-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-Tools:librados-devel-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-Tools:librados-devel-debuginfo-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-Tools:librados-devel-debuginfo-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-Tools:librados-devel-debuginfo-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-Tools:librados2-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-Tools:librados2-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-Tools:librados2-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-Tools:librados2-debuginfo-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-Tools:librados2-debuginfo-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-Tools:librados2-debuginfo-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-Tools:libradospp-devel-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-Tools:libradospp-devel-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-Tools:libradospp-devel-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-Tools:libradosstriper1-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-Tools:libradosstriper1-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-Tools:libradosstriper1-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-Tools:libradosstriper1-debuginfo-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-Tools:libradosstriper1-debuginfo-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-Tools:libradosstriper1-debuginfo-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-Tools:librbd-devel-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-Tools:librbd-devel-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-Tools:librbd-devel-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-Tools:librbd1-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-Tools:librbd1-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-Tools:librbd1-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-Tools:librbd1-debuginfo-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-Tools:librbd1-debuginfo-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-Tools:librbd1-debuginfo-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-Tools:librgw-devel-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-Tools:librgw-devel-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-Tools:librgw-devel-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-Tools:librgw2-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-Tools:librgw2-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-Tools:librgw2-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-Tools:librgw2-debuginfo-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-Tools:librgw2-debuginfo-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-Tools:librgw2-debuginfo-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-Tools:python3-ceph-argparse-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-Tools:python3-ceph-argparse-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-Tools:python3-ceph-argparse-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-Tools:python3-cephfs-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-Tools:python3-cephfs-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-Tools:python3-cephfs-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-Tools:python3-cephfs-debuginfo-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-Tools:python3-cephfs-debuginfo-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-Tools:python3-cephfs-debuginfo-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-Tools:python3-rados-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-Tools:python3-rados-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-Tools:python3-rados-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-Tools:python3-rados-debuginfo-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-Tools:python3-rados-debuginfo-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-Tools:python3-rados-debuginfo-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-Tools:python3-rbd-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-Tools:python3-rbd-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-Tools:python3-rbd-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-Tools:python3-rbd-debuginfo-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-Tools:python3-rbd-debuginfo-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-Tools:python3-rbd-debuginfo-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-Tools:python3-rgw-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-Tools:python3-rgw-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-Tools:python3-rgw-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-Tools:python3-rgw-debuginfo-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-Tools:python3-rgw-debuginfo-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-Tools:python3-rgw-debuginfo-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-Tools:rbd-fuse-debuginfo-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-Tools:rbd-fuse-debuginfo-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-Tools:rbd-fuse-debuginfo-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-Tools:rbd-mirror-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-Tools:rbd-mirror-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-Tools:rbd-mirror-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-Tools:rbd-mirror-debuginfo-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-Tools:rbd-mirror-debuginfo-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-Tools:rbd-mirror-debuginfo-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-Tools:rbd-nbd-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-Tools:rbd-nbd-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-Tools:rbd-nbd-2:14.2.22-110.el8cp.x86_64", "8Base-RHCEPH-4.3-Tools:rbd-nbd-debuginfo-2:14.2.22-110.el8cp.ppc64le", "8Base-RHCEPH-4.3-Tools:rbd-nbd-debuginfo-2:14.2.22-110.el8cp.s390x", "8Base-RHCEPH-4.3-Tools:rbd-nbd-debuginfo-2:14.2.22-110.el8cp.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "ceph: Ceph volume does not honour osd_dmcrypt_key_size" } ] }
rhsa-2020_5634
Vulnerability from csaf_redhat
Published
2021-02-24 14:45
Modified
2024-11-22 16:16
Summary
Red Hat Security Advisory: OpenShift Container Platform 4.7.0 packages security update
Notes
Topic
Red Hat OpenShift Container Platform release 4.7.0 is now available.
Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
Red Hat OpenShift Container Platform is Red Hat's cloud computing
Kubernetes application platform solution designed for on-premise or private
cloud deployments.
This advisory contains the RPM packages for Red Hat OpenShift Container
Platform 4.7.0. See the following advisory for the container images for
this release:
https://access.redhat.com/errata/RHSA-2020:5633
All OpenShift Container Platform 4.7 users are advised to upgrade to these
updated packages and images when they are available in the appropriate
release channel. To check for available updates, use the OpenShift Console
or the CLI oc command. Instructions for upgrading a cluster are available
at
https://docs.openshift.com/container-platform/4.7/updating/updating-cluster-between-minor.html#understanding-upgrade-channels_updating-cluster-between-minor.
Security Fix(es):
* gogo/protobuf: plugin/unmarshal/unmarshal.go lacks certain index validation (CVE-2021-3121)
* kubernetes: Ceph RBD adminSecrets exposed in logs when loglevel >= 4 (CVE-2020-8566)
* containerd: credentials leak during image pull (CVE-2020-15157)
* python-rsa: bleichenbacher timing oracle attack against RSA decryption (CVE-2020-25658)
* atomic-openshift: cross-namespace owner references can trigger deletions of valid children (CVE-2019-3884)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Red Hat OpenShift Container Platform release 4.7.0 is now available.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "Red Hat OpenShift Container Platform is Red Hat\u0027s cloud computing\nKubernetes application platform solution designed for on-premise or private\ncloud deployments.\n\nThis advisory contains the RPM packages for Red Hat OpenShift Container\nPlatform 4.7.0. See the following advisory for the container images for\nthis release:\n\nhttps://access.redhat.com/errata/RHSA-2020:5633\n\nAll OpenShift Container Platform 4.7 users are advised to upgrade to these\nupdated packages and images when they are available in the appropriate\nrelease channel. To check for available updates, use the OpenShift Console\nor the CLI oc command. Instructions for upgrading a cluster are available\nat\nhttps://docs.openshift.com/container-platform/4.7/updating/updating-cluster-between-minor.html#understanding-upgrade-channels_updating-cluster-between-minor.\n\nSecurity Fix(es):\n\n* gogo/protobuf: plugin/unmarshal/unmarshal.go lacks certain index validation (CVE-2021-3121)\n\n* kubernetes: Ceph RBD adminSecrets exposed in logs when loglevel \u003e= 4 (CVE-2020-8566)\n\n* containerd: credentials leak during image pull (CVE-2020-15157)\n\n* python-rsa: bleichenbacher timing oracle attack against RSA decryption (CVE-2020-25658)\n\n* atomic-openshift: cross-namespace owner references can trigger deletions of valid children (CVE-2019-3884)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2020:5634", "url": "https://access.redhat.com/errata/RHSA-2020:5634" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#moderate", "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "category": "external", "summary": "1693905", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1693905" }, { "category": "external", "summary": "1886640", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1886640" }, { "category": "external", "summary": "1888248", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1888248" }, { "category": "external", "summary": "1889972", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1889972" }, { "category": "external", "summary": "1910081", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1910081" }, { "category": "external", "summary": "1921650", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1921650" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2021/rhsa-2020_5634.json" } ], "title": "Red Hat Security Advisory: OpenShift Container Platform 4.7.0 packages security update", "tracking": { "current_release_date": "2024-11-22T16:16:13+00:00", "generator": { "date": "2024-11-22T16:16:13+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2020:5634", "initial_release_date": "2021-02-24T14:45:13+00:00", "revision_history": [ { "date": "2021-02-24T14:45:13+00:00", "number": "1", "summary": "Initial version" }, { "date": "2021-02-24T14:45:13+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-22T16:16:13+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat OpenShift Container Platform 4.7", "product": { "name": "Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7", "product_identification_helper": { "cpe": "cpe:/a:redhat:openshift:4.7::el8" } } }, { "category": "product_name", "name": "Red Hat OpenShift Container Platform 4.7", "product": { "name": "Red Hat OpenShift Container Platform 4.7", "product_id": "7Server-RH7-RHOSE-4.7", "product_identification_helper": { "cpe": "cpe:/a:redhat:openshift:4.7::el7" } } } ], "category": "product_family", "name": "Red Hat OpenShift Enterprise" }, { "branches": [ { "category": "product_version", "name": "ansible-runner-0:1.4.6-2.el8ar.src", "product": { "name": "ansible-runner-0:1.4.6-2.el8ar.src", "product_id": "ansible-runner-0:1.4.6-2.el8ar.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/ansible-runner@1.4.6-2.el8ar?arch=src" } } }, { "category": "product_version", "name": "ansible-runner-http-0:1.0.0-2.el8ar.src", "product": { "name": "ansible-runner-http-0:1.0.0-2.el8ar.src", "product_id": "ansible-runner-http-0:1.0.0-2.el8ar.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/ansible-runner-http@1.0.0-2.el8ar?arch=src" } } }, { "category": "product_version", "name": "atomic-openshift-service-idler-0:4.7.0-202011171454.p0.git.15.675c1c8.el8.src", "product": { "name": "atomic-openshift-service-idler-0:4.7.0-202011171454.p0.git.15.675c1c8.el8.src", "product_id": "atomic-openshift-service-idler-0:4.7.0-202011171454.p0.git.15.675c1c8.el8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/atomic-openshift-service-idler@4.7.0-202011171454.p0.git.15.675c1c8.el8?arch=src" } } }, { "category": "product_version", "name": "container-selinux-2:2.151.0-1.rhaos4.7.el8.src", "product": { "name": "container-selinux-2:2.151.0-1.rhaos4.7.el8.src", "product_id": "container-selinux-2:2.151.0-1.rhaos4.7.el8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/container-selinux@2.151.0-1.rhaos4.7.el8?arch=src\u0026epoch=2" } } }, { "category": "product_version", "name": "containernetworking-plugins-0:0.8.6-1.rhaos4.5.el8.src", "product": { "name": "containernetworking-plugins-0:0.8.6-1.rhaos4.5.el8.src", "product_id": "containernetworking-plugins-0:0.8.6-1.rhaos4.5.el8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/containernetworking-plugins@0.8.6-1.rhaos4.5.el8?arch=src" } } }, { "category": "product_version", "name": "cri-tools-0:1.20.0-1.el8.src", "product": { "name": "cri-tools-0:1.20.0-1.el8.src", "product_id": "cri-tools-0:1.20.0-1.el8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/cri-tools@1.20.0-1.el8?arch=src" } } }, { "category": "product_version", "name": "dracut-0:049-95.git20200804.el8_3.4.src", "product": { "name": "dracut-0:049-95.git20200804.el8_3.4.src", "product_id": "dracut-0:049-95.git20200804.el8_3.4.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/dracut@049-95.git20200804.el8_3.4?arch=src" } } }, { "category": "product_version", "name": "faq-0:0.0.6-5.el8.src", "product": { "name": "faq-0:0.0.6-5.el8.src", "product_id": "faq-0:0.0.6-5.el8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/faq@0.0.6-5.el8?arch=src" } } }, { "category": "product_version", "name": "golang-github-prometheus-promu-0:0.5.0-2.git642a960.el8.src", "product": { "name": "golang-github-prometheus-promu-0:0.5.0-2.git642a960.el8.src", "product_id": "golang-github-prometheus-promu-0:0.5.0-2.git642a960.el8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/golang-github-prometheus-promu@0.5.0-2.git642a960.el8?arch=src" } } }, { "category": "product_version", "name": "grpc-0:1.18.0-4.el8ost.src", "product": { "name": "grpc-0:1.18.0-4.el8ost.src", "product_id": "grpc-0:1.18.0-4.el8ost.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/grpc@1.18.0-4.el8ost?arch=src" } } }, { "category": "product_version", "name": "haproxy-0:2.0.19-1.el8.src", "product": { "name": "haproxy-0:2.0.19-1.el8.src", "product_id": "haproxy-0:2.0.19-1.el8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/haproxy@2.0.19-1.el8?arch=src" } } }, { "category": "product_version", "name": "ironic-images-0:15.1-20210114.1.el8.src", "product": { "name": "ironic-images-0:15.1-20210114.1.el8.src", "product_id": "ironic-images-0:15.1-20210114.1.el8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/ironic-images@15.1-20210114.1.el8?arch=src" } } }, { "category": "product_version", "name": "jq-0:1.6-2.el8.src", "product": { "name": "jq-0:1.6-2.el8.src", "product_id": "jq-0:1.6-2.el8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jq@1.6-2.el8?arch=src" } } }, { "category": "product_version", "name": "libnftnl-0:1.1.5-4.el8.src", "product": { "name": "libnftnl-0:1.1.5-4.el8.src", "product_id": "libnftnl-0:1.1.5-4.el8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/libnftnl@1.1.5-4.el8?arch=src" } } }, { "category": "product_version", "name": "libsodium-0:1.0.16-4.5.el8ost.src", "product": { "name": "libsodium-0:1.0.16-4.5.el8ost.src", "product_id": "libsodium-0:1.0.16-4.5.el8ost.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/libsodium@1.0.16-4.5.el8ost?arch=src" } } }, { "category": "product_version", "name": "libunwind-0:1.2.1-5.el8.src", "product": { "name": "libunwind-0:1.2.1-5.el8.src", "product_id": "libunwind-0:1.2.1-5.el8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/libunwind@1.2.1-5.el8?arch=src" } } }, { "category": "product_version", "name": "openshift-eventrouter-0:0.2-4.git7c289cc.el8.src", "product": { "name": "openshift-eventrouter-0:0.2-4.git7c289cc.el8.src", "product_id": "openshift-eventrouter-0:0.2-4.git7c289cc.el8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-eventrouter@0.2-4.git7c289cc.el8?arch=src" } } }, { "category": "product_version", "name": "openstack-ironic-python-agent-0:6.4.3-0.20201217171210.bd45db1.el8.src", "product": { "name": "openstack-ironic-python-agent-0:6.4.3-0.20201217171210.bd45db1.el8.src", "product_id": "openstack-ironic-python-agent-0:6.4.3-0.20201217171210.bd45db1.el8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/openstack-ironic-python-agent@6.4.3-0.20201217171210.bd45db1.el8?arch=src" } } }, { "category": "product_version", "name": "openvswitch2.13-0:2.13.0-79.el8fdp.src", "product": { "name": "openvswitch2.13-0:2.13.0-79.el8fdp.src", "product_id": "openvswitch2.13-0:2.13.0-79.el8fdp.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/openvswitch2.13@2.13.0-79.el8fdp?arch=src" } } }, { "category": "product_version", "name": "ovn2.13-0:20.09.0-21.el8fdn.src", "product": { "name": "ovn2.13-0:20.09.0-21.el8fdn.src", "product_id": "ovn2.13-0:20.09.0-21.el8fdn.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn2.13@20.09.0-21.el8fdn?arch=src" } } }, { "category": "product_version", "name": "powerpc-utils-0:1.3.6-12.el8_3.src", "product": { "name": "powerpc-utils-0:1.3.6-12.el8_3.src", "product_id": "powerpc-utils-0:1.3.6-12.el8_3.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/powerpc-utils@1.3.6-12.el8_3?arch=src" } } }, { "category": "product_version", "name": "protobuf-0:3.6.1-4.el8ost.src", "product": { "name": "protobuf-0:3.6.1-4.el8ost.src", "product_id": "protobuf-0:3.6.1-4.el8ost.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/protobuf@3.6.1-4.el8ost?arch=src" } } }, { "category": "product_version", "name": "python-alembic-0:1.4.2-5.el8ost.src", "product": { "name": "python-alembic-0:1.4.2-5.el8ost.src", "product_id": "python-alembic-0:1.4.2-5.el8ost.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-alembic@1.4.2-5.el8ost?arch=src" } } }, { "category": "product_version", "name": "python-boto3-0:1.9.101-1.el8ost.src", "product": { "name": "python-boto3-0:1.9.101-1.el8ost.src", "product_id": "python-boto3-0:1.9.101-1.el8ost.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-boto3@1.9.101-1.el8ost?arch=src" } } }, { "category": "product_version", "name": "python-botocore-0:1.12.119-1.el8ost.src", "product": { "name": "python-botocore-0:1.12.119-1.el8ost.src", "product_id": "python-botocore-0:1.12.119-1.el8ost.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-botocore@1.12.119-1.el8ost?arch=src" } } }, { "category": "product_version", "name": "python-cachetools-0:3.1.0-1.el8ost.src", "product": { "name": "python-cachetools-0:3.1.0-1.el8ost.src", "product_id": "python-cachetools-0:3.1.0-1.el8ost.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-cachetools@3.1.0-1.el8ost?arch=src" } } }, { "category": "product_version", "name": "python-certifi-0:2018.10.15-4.el8ost.src", "product": { "name": "python-certifi-0:2018.10.15-4.el8ost.src", "product_id": "python-certifi-0:2018.10.15-4.el8ost.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-certifi@2018.10.15-4.el8ost?arch=src" } } }, { "category": "product_version", "name": "python-construct-0:2.10.56-1.el8ost.src", "product": { "name": "python-construct-0:2.10.56-1.el8ost.src", "product_id": "python-construct-0:2.10.56-1.el8ost.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-construct@2.10.56-1.el8ost?arch=src" } } }, { "category": "product_version", "name": "python-daemon-0:2.1.2-9.el8ar.src", "product": { "name": "python-daemon-0:2.1.2-9.el8ar.src", "product_id": "python-daemon-0:2.1.2-9.el8ar.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-daemon@2.1.2-9.el8ar?arch=src" } } }, { "category": "product_version", "name": "python-debtcollector-0:2.2.0-0.20201008171245.649189d.el8.src", "product": { "name": "python-debtcollector-0:2.2.0-0.20201008171245.649189d.el8.src", "product_id": "python-debtcollector-0:2.2.0-0.20201008171245.649189d.el8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-debtcollector@2.2.0-0.20201008171245.649189d.el8?arch=src" } } }, { "category": "product_version", "name": "python-dictdiffer-0:0.7.1-2.el8ost.src", "product": { "name": "python-dictdiffer-0:0.7.1-2.el8ost.src", "product_id": "python-dictdiffer-0:0.7.1-2.el8ost.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-dictdiffer@0.7.1-2.el8ost?arch=src" } } }, { "category": "product_version", "name": "python-eventlet-0:0.25.2-3.el8ost.src", "product": { "name": "python-eventlet-0:0.25.2-3.el8ost.src", "product_id": "python-eventlet-0:0.25.2-3.el8ost.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-eventlet@0.25.2-3.el8ost?arch=src" } } }, { "category": "product_version", "name": "python-flask-1:1.1.1-1.el8ost.src", "product": { "name": "python-flask-1:1.1.1-1.el8ost.src", "product_id": "python-flask-1:1.1.1-1.el8ost.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-flask@1.1.1-1.el8ost?arch=src\u0026epoch=1" } } }, { "category": "product_version", "name": "python-google-auth-0:1.3.0-1.el8ost.src", "product": { "name": "python-google-auth-0:1.3.0-1.el8ost.src", "product_id": "python-google-auth-0:1.3.0-1.el8ost.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-google-auth@1.3.0-1.el8ost?arch=src" } } }, { "category": "product_version", "name": "python-hardware-0:0.23.0-0.20201031022149.59211cc.el8.src", "product": { "name": "python-hardware-0:0.23.0-0.20201031022149.59211cc.el8.src", "product_id": "python-hardware-0:0.23.0-0.20201031022149.59211cc.el8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-hardware@0.23.0-0.20201031022149.59211cc.el8?arch=src" } } }, { "category": "product_version", "name": "python-ifaddr-0:0.1.6-5.el8ost.src", "product": { "name": "python-ifaddr-0:0.1.6-5.el8ost.src", "product_id": "python-ifaddr-0:0.1.6-5.el8ost.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-ifaddr@0.1.6-5.el8ost?arch=src" } } }, { "category": "product_version", "name": "python-importlib-metadata-0:1.7.0-1.el8ost.src", "product": { "name": "python-importlib-metadata-0:1.7.0-1.el8ost.src", "product_id": "python-importlib-metadata-0:1.7.0-1.el8ost.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-importlib-metadata@1.7.0-1.el8ost?arch=src" } } }, { "category": "product_version", "name": "python-ironic-lib-0:4.4.1-0.20201218041209.aa7cfec.el8.src", "product": { "name": "python-ironic-lib-0:4.4.1-0.20201218041209.aa7cfec.el8.src", "product_id": "python-ironic-lib-0:4.4.1-0.20201218041209.aa7cfec.el8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-ironic-lib@4.4.1-0.20201218041209.aa7cfec.el8?arch=src" } } }, { "category": "product_version", "name": "python-keystoneauth1-0:4.2.0-0.20200630234358.dab8e10.el8ost.src", "product": { "name": "python-keystoneauth1-0:4.2.0-0.20200630234358.dab8e10.el8ost.src", "product_id": "python-keystoneauth1-0:4.2.0-0.20200630234358.dab8e10.el8ost.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-keystoneauth1@4.2.0-0.20200630234358.dab8e10.el8ost?arch=src" } } }, { "category": "product_version", "name": "python-kubernetes-0:11.0.0-1.el8.src", "product": { "name": "python-kubernetes-0:11.0.0-1.el8.src", "product_id": "python-kubernetes-0:11.0.0-1.el8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-kubernetes@11.0.0-1.el8?arch=src" } } }, { "category": "product_version", "name": "python-kuryr-lib-0:1.1.1-0.20190923160834.41e6964.el8ost.src", "product": { "name": "python-kuryr-lib-0:1.1.1-0.20190923160834.41e6964.el8ost.src", "product_id": "python-kuryr-lib-0:1.1.1-0.20190923160834.41e6964.el8ost.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-kuryr-lib@1.1.1-0.20190923160834.41e6964.el8ost?arch=src" } } }, { "category": "product_version", "name": "python-lockfile-1:0.11.0-8.el8ar.src", "product": { "name": "python-lockfile-1:0.11.0-8.el8ar.src", "product_id": "python-lockfile-1:0.11.0-8.el8ar.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-lockfile@0.11.0-8.el8ar?arch=src\u0026epoch=1" } } }, { "category": "product_version", "name": "python-msgpack-0:0.6.2-1.el8ost.src", "product": { "name": "python-msgpack-0:0.6.2-1.el8ost.src", "product_id": "python-msgpack-0:0.6.2-1.el8ost.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-msgpack@0.6.2-1.el8ost?arch=src" } } }, { "category": "product_version", "name": "python-openshift-1:0.11.2-1.el8.src", "product": { "name": "python-openshift-1:0.11.2-1.el8.src", "product_id": "python-openshift-1:0.11.2-1.el8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-openshift@0.11.2-1.el8?arch=src\u0026epoch=1" } } }, { "category": "product_version", "name": "python-openstacksdk-0:0.48.0-0.20200708092906.3b693c2.el8ost.src", "product": { "name": "python-openstacksdk-0:0.48.0-0.20200708092906.3b693c2.el8ost.src", "product_id": "python-openstacksdk-0:0.48.0-0.20200708092906.3b693c2.el8ost.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-openstacksdk@0.48.0-0.20200708092906.3b693c2.el8ost?arch=src" } } }, { "category": "product_version", "name": "python-oslo-concurrency-0:4.3.0-0.20201008180343.2f78803.el8.src", "product": { "name": "python-oslo-concurrency-0:4.3.0-0.20201008180343.2f78803.el8.src", "product_id": "python-oslo-concurrency-0:4.3.0-0.20201008180343.2f78803.el8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-oslo-concurrency@4.3.0-0.20201008180343.2f78803.el8?arch=src" } } }, { "category": "product_version", "name": "python-oslo-config-2:8.3.2-0.20201008180634.fcb8894.el8.src", "product": { "name": "python-oslo-config-2:8.3.2-0.20201008180634.fcb8894.el8.src", "product_id": "python-oslo-config-2:8.3.2-0.20201008180634.fcb8894.el8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-oslo-config@8.3.2-0.20201008180634.fcb8894.el8?arch=src\u0026epoch=2" } } }, { "category": "product_version", "name": "python-oslo-context-0:3.1.1-0.20201008190523.57dbded.el8.src", "product": { "name": "python-oslo-context-0:3.1.1-0.20201008190523.57dbded.el8.src", "product_id": "python-oslo-context-0:3.1.1-0.20201008190523.57dbded.el8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-oslo-context@3.1.1-0.20201008190523.57dbded.el8?arch=src" } } }, { "category": "product_version", "name": "python-oslo-db-0:8.4.0-0.20200918104110.e42c733.el8ost.src", "product": { "name": "python-oslo-db-0:8.4.0-0.20200918104110.e42c733.el8ost.src", "product_id": "python-oslo-db-0:8.4.0-0.20200918104110.e42c733.el8ost.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-oslo-db@8.4.0-0.20200918104110.e42c733.el8ost?arch=src" } } }, { "category": "product_version", "name": "python-oslo-i18n-0:5.0.1-0.20201009131251.73187bd.el8.src", "product": { "name": "python-oslo-i18n-0:5.0.1-0.20201009131251.73187bd.el8.src", "product_id": "python-oslo-i18n-0:5.0.1-0.20201009131251.73187bd.el8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-oslo-i18n@5.0.1-0.20201009131251.73187bd.el8?arch=src" } } }, { "category": "product_version", "name": "python-oslo-log-0:4.3.1-0.20201207021200.1597f24.el8.src", "product": { "name": "python-oslo-log-0:4.3.1-0.20201207021200.1597f24.el8.src", "product_id": "python-oslo-log-0:4.3.1-0.20201207021200.1597f24.el8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-oslo-log@4.3.1-0.20201207021200.1597f24.el8?arch=src" } } }, { "category": "product_version", "name": "python-oslo-serialization-0:4.0.1-0.20201008182423.c7884b2.el8.src", "product": { "name": "python-oslo-serialization-0:4.0.1-0.20201008182423.c7884b2.el8.src", "product_id": "python-oslo-serialization-0:4.0.1-0.20201008182423.c7884b2.el8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-oslo-serialization@4.0.1-0.20201008182423.c7884b2.el8?arch=src" } } }, { "category": "product_version", "name": "python-oslo-service-0:2.4.0-0.20201008184547.58466a6.el8.src", "product": { "name": "python-oslo-service-0:2.4.0-0.20201008184547.58466a6.el8.src", "product_id": "python-oslo-service-0:2.4.0-0.20201008184547.58466a6.el8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-oslo-service@2.4.0-0.20201008184547.58466a6.el8?arch=src" } } }, { "category": "product_version", "name": "python-oslo-utils-0:4.6.0-0.20201009175936.91497da.el8.src", "product": { "name": "python-oslo-utils-0:4.6.0-0.20201009175936.91497da.el8.src", "product_id": "python-oslo-utils-0:4.6.0-0.20201009175936.91497da.el8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-oslo-utils@4.6.0-0.20201009175936.91497da.el8?arch=src" } } }, { "category": "product_version", "name": "python-packaging-0:20.4-1.el8ost.src", "product": { "name": "python-packaging-0:20.4-1.el8ost.src", "product_id": "python-packaging-0:20.4-1.el8ost.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-packaging@20.4-1.el8ost?arch=src" } } }, { "category": "product_version", "name": "python-paste-0:3.2.4-1.el8ost.src", "product": { "name": "python-paste-0:3.2.4-1.el8ost.src", "product_id": "python-paste-0:3.2.4-1.el8ost.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-paste@3.2.4-1.el8ost?arch=src" } } }, { "category": "product_version", "name": "python-paste-deploy-0:2.0.1-4.el8ost.src", "product": { "name": "python-paste-deploy-0:2.0.1-4.el8ost.src", "product_id": "python-paste-deploy-0:2.0.1-4.el8ost.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-paste-deploy@2.0.1-4.el8ost?arch=src" } } }, { "category": "product_version", "name": "python-pbr-0:5.4.3-2.el8ost.src", "product": { "name": "python-pbr-0:5.4.3-2.el8ost.src", "product_id": "python-pbr-0:5.4.3-2.el8ost.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-pbr@5.4.3-2.el8ost?arch=src" } } }, { "category": "product_version", "name": "python-pexpect-0:4.6-2.el8ar.src", "product": { "name": "python-pexpect-0:4.6-2.el8ar.src", "product_id": "python-pexpect-0:4.6-2.el8ar.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-pexpect@4.6-2.el8ar?arch=src" } } }, { "category": "product_version", "name": "python-pint-0:0.10.1-1.el8ost.src", "product": { "name": "python-pint-0:0.10.1-1.el8ost.src", "product_id": "python-pint-0:0.10.1-1.el8ost.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-pint@0.10.1-1.el8ost?arch=src" } } }, { "category": "product_version", "name": "python-psutil-0:5.6.6-1.el8ar.src", "product": { "name": "python-psutil-0:5.6.6-1.el8ar.src", "product_id": "python-psutil-0:5.6.6-1.el8ar.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-psutil@5.6.6-1.el8ar?arch=src" } } }, { "category": "product_version", "name": "python-pyroute2-0:0.5.13-1.el8ost.src", "product": { "name": "python-pyroute2-0:0.5.13-1.el8ost.src", "product_id": "python-pyroute2-0:0.5.13-1.el8ost.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-pyroute2@0.5.13-1.el8ost?arch=src" } } }, { "category": "product_version", "name": "python-requests-unixsocket-0:0.1.5-5.el8ar.src", "product": { "name": "python-requests-unixsocket-0:0.1.5-5.el8ar.src", "product_id": "python-requests-unixsocket-0:0.1.5-5.el8ar.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-requests-unixsocket@0.1.5-5.el8ar?arch=src" } } }, { "category": "product_version", "name": "python-ruamel-yaml-0:0.15.41-4.el8ost.src", "product": { "name": "python-ruamel-yaml-0:0.15.41-4.el8ost.src", "product_id": "python-ruamel-yaml-0:0.15.41-4.el8ost.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-ruamel-yaml@0.15.41-4.el8ost?arch=src" } } }, { "category": "product_version", "name": "python-s3transfer-0:0.2.0-1.el8ost.src", "product": { "name": "python-s3transfer-0:0.2.0-1.el8ost.src", "product_id": "python-s3transfer-0:0.2.0-1.el8ost.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-s3transfer@0.2.0-1.el8ost?arch=src" } } }, { "category": "product_version", "name": "python-stevedore-0:3.2.2-0.20201009151242.274eaa6.el8.src", "product": { "name": "python-stevedore-0:3.2.2-0.20201009151242.274eaa6.el8.src", "product_id": "python-stevedore-0:3.2.2-0.20201009151242.274eaa6.el8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-stevedore@3.2.2-0.20201009151242.274eaa6.el8?arch=src" } } }, { "category": "product_version", "name": "python-string_utils-0:0.6.0-4.el8ost.src", "product": { "name": "python-string_utils-0:0.6.0-4.el8ost.src", "product_id": "python-string_utils-0:0.6.0-4.el8ost.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-string_utils@0.6.0-4.el8ost?arch=src" } } }, { "category": "product_version", "name": "python-sushy-oem-idrac-0:0.0.3-0.20200922221223.1202372.el8ost.src", "product": { "name": "python-sushy-oem-idrac-0:0.0.3-0.20200922221223.1202372.el8ost.src", "product_id": "python-sushy-oem-idrac-0:0.0.3-0.20200922221223.1202372.el8ost.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-sushy-oem-idrac@0.0.3-0.20200922221223.1202372.el8ost?arch=src" } } }, { "category": "product_version", "name": "python-tenacity-0:6.2.0-1.el8ost.src", "product": { "name": "python-tenacity-0:6.2.0-1.el8ost.src", "product_id": "python-tenacity-0:6.2.0-1.el8ost.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-tenacity@6.2.0-1.el8ost?arch=src" } } }, { "category": "product_version", "name": "python-tooz-0:2.7.0-0.20200723133754.fca43df.el8ost.src", "product": { "name": "python-tooz-0:2.7.0-0.20200723133754.fca43df.el8ost.src", "product_id": "python-tooz-0:2.7.0-0.20200723133754.fca43df.el8ost.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-tooz@2.7.0-0.20200723133754.fca43df.el8ost?arch=src" } } }, { "category": "product_version", "name": "python-websocket-client-0:0.54.0-1.el8ost.src", "product": { "name": "python-websocket-client-0:0.54.0-1.el8ost.src", "product_id": "python-websocket-client-0:0.54.0-1.el8ost.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-websocket-client@0.54.0-1.el8ost?arch=src" } } }, { "category": "product_version", "name": "python-werkzeug-0:1.0.1-3.el8ost.src", "product": { "name": "python-werkzeug-0:1.0.1-3.el8ost.src", "product_id": "python-werkzeug-0:1.0.1-3.el8ost.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-werkzeug@1.0.1-3.el8ost?arch=src" } } }, { "category": "product_version", "name": "python-zeroconf-0:0.24.4-1.el8ost.src", "product": { "name": "python-zeroconf-0:0.24.4-1.el8ost.src", "product_id": "python-zeroconf-0:0.24.4-1.el8ost.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-zeroconf@0.24.4-1.el8ost?arch=src" } } }, { "category": "product_version", "name": "python-zipp-0:0.5.1-2.el8ost.src", "product": { "name": "python-zipp-0:0.5.1-2.el8ost.src", "product_id": "python-zipp-0:0.5.1-2.el8ost.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-zipp@0.5.1-2.el8ost?arch=src" } } }, { "category": "product_version", "name": "tini-0:0.16.1-1.el8ar.src", "product": { "name": "tini-0:0.16.1-1.el8ar.src", "product_id": "tini-0:0.16.1-1.el8ar.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/tini@0.16.1-1.el8ar?arch=src" } } }, { "category": "product_version", "name": "NetworkManager-1:1.26.0-12.1.rhaos4.7.el8.src", "product": { "name": "NetworkManager-1:1.26.0-12.1.rhaos4.7.el8.src", "product_id": "NetworkManager-1:1.26.0-12.1.rhaos4.7.el8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/NetworkManager@1.26.0-12.1.rhaos4.7.el8?arch=src\u0026epoch=1" } } }, { "category": "product_version", "name": "openshift-clients-0:4.7.0-202102032256.p0.git.3951.0e656ef.el8.src", "product": { "name": "openshift-clients-0:4.7.0-202102032256.p0.git.3951.0e656ef.el8.src", "product_id": "openshift-clients-0:4.7.0-202102032256.p0.git.3951.0e656ef.el8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-clients@4.7.0-202102032256.p0.git.3951.0e656ef.el8?arch=src" } } }, { "category": "product_version", "name": "openstack-ironic-1:16.0.4-0.20210203051223.7d74ea0.el8.src", "product": { "name": "openstack-ironic-1:16.0.4-0.20210203051223.7d74ea0.el8.src", "product_id": "openstack-ironic-1:16.0.4-0.20210203051223.7d74ea0.el8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/openstack-ironic@16.0.4-0.20210203051223.7d74ea0.el8?arch=src\u0026epoch=1" } } }, { "category": "product_version", "name": "python-rsa-0:4.7-1.el8.src", "product": { "name": "python-rsa-0:4.7-1.el8.src", "product_id": "python-rsa-0:4.7-1.el8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-rsa@4.7-1.el8?arch=src" } } }, { "category": "product_version", "name": "openshift-kuryr-0:4.7.0-202101262230.p0.git.2494.cd95ce5.el8.src", "product": { "name": "openshift-kuryr-0:4.7.0-202101262230.p0.git.2494.cd95ce5.el8.src", "product_id": "openshift-kuryr-0:4.7.0-202101262230.p0.git.2494.cd95ce5.el8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-kuryr@4.7.0-202101262230.p0.git.2494.cd95ce5.el8?arch=src" } } }, { "category": "product_version", "name": "python-sushy-0:3.6.1-0.20210122201213.7ec0422.el8.src", "product": { "name": "python-sushy-0:3.6.1-0.20210122201213.7ec0422.el8.src", "product_id": "python-sushy-0:3.6.1-0.20210122201213.7ec0422.el8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-sushy@3.6.1-0.20210122201213.7ec0422.el8?arch=src" } } }, { "category": "product_version", "name": "gperftools-0:2.6.3-2.el8ost.src", "product": { "name": "gperftools-0:2.6.3-2.el8ost.src", "product_id": "gperftools-0:2.6.3-2.el8ost.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/gperftools@2.6.3-2.el8ost?arch=src" } } }, { "category": "product_version", "name": "python-pyghmi-0:1.5.14-2.1.el8ost.src", "product": { "name": "python-pyghmi-0:1.5.14-2.1.el8ost.src", "product_id": "python-pyghmi-0:1.5.14-2.1.el8ost.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-pyghmi@1.5.14-2.1.el8ost?arch=src" } } }, { "category": "product_version", "name": "jenkins-2-plugins-0:4.7.1611636915-1.el8.src", "product": { "name": "jenkins-2-plugins-0:4.7.1611636915-1.el8.src", "product_id": "jenkins-2-plugins-0:4.7.1611636915-1.el8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jenkins-2-plugins@4.7.1611636915-1.el8?arch=src" } } }, { "category": "product_version", "name": "openstack-ironic-inspector-0:10.4.1-0.20201123161216.70fccec.el8.src", "product": { "name": "openstack-ironic-inspector-0:10.4.1-0.20201123161216.70fccec.el8.src", "product_id": "openstack-ironic-inspector-0:10.4.1-0.20201123161216.70fccec.el8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/openstack-ironic-inspector@10.4.1-0.20201123161216.70fccec.el8?arch=src" } } }, { "category": "product_version", "name": "clevis-0:15-1.el8.src", "product": { "name": "clevis-0:15-1.el8.src", "product_id": "clevis-0:15-1.el8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/clevis@15-1.el8?arch=src" } } }, { "category": "product_version", "name": "rust-bootupd-0:0.2.5-2.el8.src", "product": { "name": "rust-bootupd-0:0.2.5-2.el8.src", "product_id": "rust-bootupd-0:0.2.5-2.el8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/rust-bootupd@0.2.5-2.el8?arch=src" } } }, { "category": "product_version", "name": "rust-afterburn-0:4.6.0-1.rhaos4.7.el8.src", "product": { "name": "rust-afterburn-0:4.6.0-1.rhaos4.7.el8.src", "product_id": "rust-afterburn-0:4.6.0-1.rhaos4.7.el8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/rust-afterburn@4.6.0-1.rhaos4.7.el8?arch=src" } } }, { "category": "product_version", "name": "rpm-ostree-0:2020.7-1.el8_3.src", "product": { "name": "rpm-ostree-0:2020.7-1.el8_3.src", "product_id": "rpm-ostree-0:2020.7-1.el8_3.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/rpm-ostree@2020.7-1.el8_3?arch=src" } } }, { "category": "product_version", "name": "rhosp-director-images-0:17.0-20200606.1.el8ost.src", "product": { "name": "rhosp-director-images-0:17.0-20200606.1.el8ost.src", "product_id": "rhosp-director-images-0:17.0-20200606.1.el8ost.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/rhosp-director-images@17.0-20200606.1.el8ost?arch=src" } } }, { "category": "product_version", "name": "rhcos-tools-0:0.0.0-1.rhaos4.2.el8.src", "product": { "name": "rhcos-tools-0:0.0.0-1.rhaos4.2.el8.src", "product_id": "rhcos-tools-0:0.0.0-1.rhaos4.2.el8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/rhcos-tools@0.0.0-1.rhaos4.2.el8?arch=src" } } }, { "category": "product_version", "name": "redhat-release-coreos-0:47.83-1.el8.src", "product": { "name": "redhat-release-coreos-0:47.83-1.el8.src", "product_id": "redhat-release-coreos-0:47.83-1.el8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/redhat-release-coreos@47.83-1.el8?arch=src" } } }, { "category": "product_version", "name": "ostree-0:2020.7-1.el8.src", "product": { "name": "ostree-0:2020.7-1.el8.src", "product_id": "ostree-0:2020.7-1.el8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/ostree@2020.7-1.el8?arch=src" } } }, { "category": "product_version", "name": "inotify-tools-0:3.20.1-2.el8.src", "product": { "name": "inotify-tools-0:3.20.1-2.el8.src", "product_id": "inotify-tools-0:3.20.1-2.el8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/inotify-tools@3.20.1-2.el8?arch=src" } } }, { "category": "product_version", "name": "ignition-0:2.9.0-2.rhaos4.7.git1d56dc8.el8.src", "product": { "name": "ignition-0:2.9.0-2.rhaos4.7.git1d56dc8.el8.src", "product_id": "ignition-0:2.9.0-2.rhaos4.7.git1d56dc8.el8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/ignition@2.9.0-2.rhaos4.7.git1d56dc8.el8?arch=src" } } }, { "category": "product_version", "name": "coreos-installer-0:0.8.0-3.rhaos4.7.el8.src", "product": { "name": "coreos-installer-0:0.8.0-3.rhaos4.7.el8.src", "product_id": "coreos-installer-0:0.8.0-3.rhaos4.7.el8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/coreos-installer@0.8.0-3.rhaos4.7.el8?arch=src" } } }, { "category": "product_version", "name": "console-login-helper-messages-0:0.20.3-1.rhaos4.7.el8.src", "product": { "name": "console-login-helper-messages-0:0.20.3-1.rhaos4.7.el8.src", "product_id": "console-login-helper-messages-0:0.20.3-1.rhaos4.7.el8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/console-login-helper-messages@0.20.3-1.rhaos4.7.el8?arch=src" } } }, { "category": "product_version", "name": "conmon-2:2.0.21-2.rhaos4.6.el8.src", "product": { "name": "conmon-2:2.0.21-2.rhaos4.6.el8.src", "product_id": "conmon-2:2.0.21-2.rhaos4.6.el8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/conmon@2.0.21-2.rhaos4.6.el8?arch=src\u0026epoch=2" } } }, { "category": "product_version", "name": "openshift-0:4.7.0-202102060108.p0.git.97095.7271b90.el8.src", "product": { "name": "openshift-0:4.7.0-202102060108.p0.git.97095.7271b90.el8.src", "product_id": "openshift-0:4.7.0-202102060108.p0.git.97095.7271b90.el8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift@4.7.0-202102060108.p0.git.97095.7271b90.el8?arch=src" } } }, { "category": "product_version", "name": "runc-0:1.0.0-82.rhaos4.6.git086e841.el8.src", "product": { "name": "runc-0:1.0.0-82.rhaos4.6.git086e841.el8.src", "product_id": "runc-0:1.0.0-82.rhaos4.6.git086e841.el8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/runc@1.0.0-82.rhaos4.6.git086e841.el8?arch=src" } } }, { "category": "product_version", "name": "jenkins-0:2.263.3.1612449007-1.el8.src", "product": { "name": "jenkins-0:2.263.3.1612449007-1.el8.src", "product_id": "jenkins-0:2.263.3.1612449007-1.el8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jenkins@2.263.3.1612449007-1.el8?arch=src" } } }, { "category": "product_version", "name": "toolbox-0:0.0.8-3.rhaos4.7.el8.src", "product": { "name": "toolbox-0:0.0.8-3.rhaos4.7.el8.src", "product_id": "toolbox-0:0.0.8-3.rhaos4.7.el8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/toolbox@0.0.8-3.rhaos4.7.el8?arch=src" } } }, { "category": "product_version", "name": "cri-o-0:1.20.0-0.rhaos4.7.git8921e00.el8.51.src", "product": { "name": "cri-o-0:1.20.0-0.rhaos4.7.git8921e00.el8.51.src", "product_id": "cri-o-0:1.20.0-0.rhaos4.7.git8921e00.el8.51.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/cri-o@1.20.0-0.rhaos4.7.git8921e00.el8.51?arch=src" } } }, { "category": "product_version", "name": "conmon-2:2.0.21-2.rhaos4.6.el7.src", "product": { "name": "conmon-2:2.0.21-2.rhaos4.6.el7.src", "product_id": "conmon-2:2.0.21-2.rhaos4.6.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/conmon@2.0.21-2.rhaos4.6.el7?arch=src\u0026epoch=2" } } }, { "category": "product_version", "name": "containernetworking-plugins-0:0.8.6-1.rhaos4.5.el7.src", "product": { "name": "containernetworking-plugins-0:0.8.6-1.rhaos4.5.el7.src", "product_id": "containernetworking-plugins-0:0.8.6-1.rhaos4.5.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/containernetworking-plugins@0.8.6-1.rhaos4.5.el7?arch=src" } } }, { "category": "product_version", "name": "cri-tools-0:1.18.0-3.el7.src", "product": { "name": "cri-tools-0:1.18.0-3.el7.src", "product_id": "cri-tools-0:1.18.0-3.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/cri-tools@1.18.0-3.el7?arch=src" } } }, { "category": "product_version", "name": "haproxy-0:2.0.19-1.el7.src", "product": { "name": "haproxy-0:2.0.19-1.el7.src", "product_id": "haproxy-0:2.0.19-1.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/haproxy@2.0.19-1.el7?arch=src" } } }, { "category": "product_version", "name": "jq-0:1.6-2.el7.src", "product": { "name": "jq-0:1.6-2.el7.src", "product_id": "jq-0:1.6-2.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jq@1.6-2.el7?arch=src" } } }, { "category": "product_version", "name": "oniguruma-0:5.9.2-5.el7.src", "product": { "name": "oniguruma-0:5.9.2-5.el7.src", "product_id": "oniguruma-0:5.9.2-5.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/oniguruma@5.9.2-5.el7?arch=src" } } }, { "category": "product_version", "name": "python-botocore-0:1.4.57-5.el7.src", "product": { "name": "python-botocore-0:1.4.57-5.el7.src", "product_id": "python-botocore-0:1.4.57-5.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-botocore@1.4.57-5.el7?arch=src" } } }, { "category": "product_version", "name": "openshift-clients-0:4.7.0-202102032256.p0.git.3951.0e656ef.el7.src", "product": { "name": "openshift-clients-0:4.7.0-202102032256.p0.git.3951.0e656ef.el7.src", "product_id": "openshift-clients-0:4.7.0-202102032256.p0.git.3951.0e656ef.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-clients@4.7.0-202102032256.p0.git.3951.0e656ef.el7?arch=src" } } }, { "category": "product_version", "name": "openshift-ansible-0:4.7.0-202102032256.p0.git.0.bf7d9a7.el7.src", "product": { "name": "openshift-ansible-0:4.7.0-202102032256.p0.git.0.bf7d9a7.el7.src", "product_id": "openshift-ansible-0:4.7.0-202102032256.p0.git.0.bf7d9a7.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-ansible@4.7.0-202102032256.p0.git.0.bf7d9a7.el7?arch=src" } } }, { "category": "product_version", "name": "openshift-0:4.7.0-202102060108.p0.git.97095.7271b90.el7.src", "product": { "name": "openshift-0:4.7.0-202102060108.p0.git.97095.7271b90.el7.src", "product_id": "openshift-0:4.7.0-202102060108.p0.git.97095.7271b90.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift@4.7.0-202102060108.p0.git.97095.7271b90.el7?arch=src" } } }, { "category": "product_version", "name": "runc-0:1.0.0-82.rhaos4.6.git086e841.el7.src", "product": { "name": "runc-0:1.0.0-82.rhaos4.6.git086e841.el7.src", "product_id": "runc-0:1.0.0-82.rhaos4.6.git086e841.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/runc@1.0.0-82.rhaos4.6.git086e841.el7?arch=src" } } }, { "category": "product_version", "name": "cri-o-0:1.20.0-0.rhaos4.7.git8921e00.el7.51.src", "product": { "name": "cri-o-0:1.20.0-0.rhaos4.7.git8921e00.el7.51.src", "product_id": "cri-o-0:1.20.0-0.rhaos4.7.git8921e00.el7.51.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/cri-o@1.20.0-0.rhaos4.7.git8921e00.el7.51?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "ansible-runner-0:1.4.6-2.el8ar.noarch", "product": { "name": "ansible-runner-0:1.4.6-2.el8ar.noarch", "product_id": "ansible-runner-0:1.4.6-2.el8ar.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/ansible-runner@1.4.6-2.el8ar?arch=noarch" } } }, { "category": "product_version", "name": "python3-ansible-runner-0:1.4.6-2.el8ar.noarch", "product": { "name": "python3-ansible-runner-0:1.4.6-2.el8ar.noarch", "product_id": "python3-ansible-runner-0:1.4.6-2.el8ar.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-ansible-runner@1.4.6-2.el8ar?arch=noarch" } } }, { "category": "product_version", "name": "ansible-runner-http-0:1.0.0-2.el8ar.noarch", "product": { "name": "ansible-runner-http-0:1.0.0-2.el8ar.noarch", "product_id": "ansible-runner-http-0:1.0.0-2.el8ar.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/ansible-runner-http@1.0.0-2.el8ar?arch=noarch" } } }, { "category": "product_version", "name": "container-selinux-2:2.151.0-1.rhaos4.7.el8.noarch", "product": { "name": "container-selinux-2:2.151.0-1.rhaos4.7.el8.noarch", "product_id": "container-selinux-2:2.151.0-1.rhaos4.7.el8.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/container-selinux@2.151.0-1.rhaos4.7.el8?arch=noarch\u0026epoch=2" } } }, { "category": "product_version", "name": "ironic-images-0:15.1-20210114.1.el8.noarch", "product": { "name": "ironic-images-0:15.1-20210114.1.el8.noarch", "product_id": "ironic-images-0:15.1-20210114.1.el8.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/ironic-images@15.1-20210114.1.el8?arch=noarch" } } }, { "category": "product_version", "name": "ironic-images-all-0:15.1-20210114.1.el8.noarch", "product": { "name": "ironic-images-all-0:15.1-20210114.1.el8.noarch", "product_id": "ironic-images-all-0:15.1-20210114.1.el8.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/ironic-images-all@15.1-20210114.1.el8?arch=noarch" } } }, { "category": "product_version", "name": "ironic-images-ipa-ppc64le-0:15.1-20210114.1.el8.noarch", "product": { "name": "ironic-images-ipa-ppc64le-0:15.1-20210114.1.el8.noarch", "product_id": "ironic-images-ipa-ppc64le-0:15.1-20210114.1.el8.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/ironic-images-ipa-ppc64le@15.1-20210114.1.el8?arch=noarch" } } }, { "category": "product_version", "name": "ironic-images-ipa-x86_64-0:15.1-20210114.1.el8.noarch", "product": { "name": "ironic-images-ipa-x86_64-0:15.1-20210114.1.el8.noarch", "product_id": "ironic-images-ipa-x86_64-0:15.1-20210114.1.el8.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/ironic-images-ipa-x86_64@15.1-20210114.1.el8?arch=noarch" } } }, { "category": "product_version", "name": "openstack-ironic-python-agent-0:6.4.3-0.20201217171210.bd45db1.el8.noarch", "product": { "name": "openstack-ironic-python-agent-0:6.4.3-0.20201217171210.bd45db1.el8.noarch", "product_id": "openstack-ironic-python-agent-0:6.4.3-0.20201217171210.bd45db1.el8.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/openstack-ironic-python-agent@6.4.3-0.20201217171210.bd45db1.el8?arch=noarch" } } }, { "category": "product_version", "name": "python3-ironic-python-agent-0:6.4.3-0.20201217171210.bd45db1.el8.noarch", "product": { "name": "python3-ironic-python-agent-0:6.4.3-0.20201217171210.bd45db1.el8.noarch", "product_id": "python3-ironic-python-agent-0:6.4.3-0.20201217171210.bd45db1.el8.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-ironic-python-agent@6.4.3-0.20201217171210.bd45db1.el8?arch=noarch" } } }, { "category": "product_version", "name": "openvswitch2.13-test-0:2.13.0-79.el8fdp.noarch", "product": { "name": "openvswitch2.13-test-0:2.13.0-79.el8fdp.noarch", "product_id": "openvswitch2.13-test-0:2.13.0-79.el8fdp.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/openvswitch2.13-test@2.13.0-79.el8fdp?arch=noarch" } } }, { "category": "product_version", "name": "protobuf-vim-0:3.6.1-4.el8ost.noarch", "product": { "name": "protobuf-vim-0:3.6.1-4.el8ost.noarch", "product_id": "protobuf-vim-0:3.6.1-4.el8ost.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/protobuf-vim@3.6.1-4.el8ost?arch=noarch" } } }, { "category": "product_version", "name": "python3-protobuf-0:3.6.1-4.el8ost.noarch", "product": { "name": "python3-protobuf-0:3.6.1-4.el8ost.noarch", "product_id": "python3-protobuf-0:3.6.1-4.el8ost.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-protobuf@3.6.1-4.el8ost?arch=noarch" } } }, { "category": "product_version", "name": "python3-alembic-0:1.4.2-5.el8ost.noarch", "product": { "name": "python3-alembic-0:1.4.2-5.el8ost.noarch", "product_id": "python3-alembic-0:1.4.2-5.el8ost.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-alembic@1.4.2-5.el8ost?arch=noarch" } } }, { "category": "product_version", "name": "python3-boto3-0:1.9.101-1.el8ost.noarch", "product": { "name": "python3-boto3-0:1.9.101-1.el8ost.noarch", "product_id": "python3-boto3-0:1.9.101-1.el8ost.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-boto3@1.9.101-1.el8ost?arch=noarch" } } }, { "category": "product_version", "name": "python2-botocore-0:1.12.119-1.el8ost.noarch", "product": { "name": "python2-botocore-0:1.12.119-1.el8ost.noarch", "product_id": "python2-botocore-0:1.12.119-1.el8ost.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/python2-botocore@1.12.119-1.el8ost?arch=noarch" } } }, { "category": "product_version", "name": "python3-botocore-0:1.12.119-1.el8ost.noarch", "product": { "name": "python3-botocore-0:1.12.119-1.el8ost.noarch", "product_id": "python3-botocore-0:1.12.119-1.el8ost.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-botocore@1.12.119-1.el8ost?arch=noarch" } } }, { "category": "product_version", "name": "python2-cachetools-0:3.1.0-1.el8ost.noarch", "product": { "name": "python2-cachetools-0:3.1.0-1.el8ost.noarch", "product_id": "python2-cachetools-0:3.1.0-1.el8ost.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/python2-cachetools@3.1.0-1.el8ost?arch=noarch" } } }, { "category": "product_version", "name": "python3-cachetools-0:3.1.0-1.el8ost.noarch", "product": { "name": "python3-cachetools-0:3.1.0-1.el8ost.noarch", "product_id": "python3-cachetools-0:3.1.0-1.el8ost.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-cachetools@3.1.0-1.el8ost?arch=noarch" } } }, { "category": "product_version", "name": "python3-certifi-0:2018.10.15-4.el8ost.noarch", "product": { "name": "python3-certifi-0:2018.10.15-4.el8ost.noarch", "product_id": "python3-certifi-0:2018.10.15-4.el8ost.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-certifi@2018.10.15-4.el8ost?arch=noarch" } } }, { "category": "product_version", "name": "python3-construct-0:2.10.56-1.el8ost.noarch", "product": { "name": "python3-construct-0:2.10.56-1.el8ost.noarch", "product_id": "python3-construct-0:2.10.56-1.el8ost.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-construct@2.10.56-1.el8ost?arch=noarch" } } }, { "category": "product_version", "name": "python3-daemon-0:2.1.2-9.el8ar.noarch", "product": { "name": "python3-daemon-0:2.1.2-9.el8ar.noarch", "product_id": "python3-daemon-0:2.1.2-9.el8ar.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-daemon@2.1.2-9.el8ar?arch=noarch" } } }, { "category": "product_version", "name": "python3-debtcollector-0:2.2.0-0.20201008171245.649189d.el8.noarch", "product": { "name": "python3-debtcollector-0:2.2.0-0.20201008171245.649189d.el8.noarch", "product_id": "python3-debtcollector-0:2.2.0-0.20201008171245.649189d.el8.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-debtcollector@2.2.0-0.20201008171245.649189d.el8?arch=noarch" } } }, { "category": "product_version", "name": "python3-dictdiffer-0:0.7.1-2.el8ost.noarch", "product": { "name": "python3-dictdiffer-0:0.7.1-2.el8ost.noarch", "product_id": "python3-dictdiffer-0:0.7.1-2.el8ost.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-dictdiffer@0.7.1-2.el8ost?arch=noarch" } } }, { "category": "product_version", "name": "python3-eventlet-0:0.25.2-3.el8ost.noarch", "product": { "name": "python3-eventlet-0:0.25.2-3.el8ost.noarch", "product_id": "python3-eventlet-0:0.25.2-3.el8ost.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-eventlet@0.25.2-3.el8ost?arch=noarch" } } }, { "category": "product_version", "name": "python-flask-doc-1:1.1.1-1.el8ost.noarch", "product": { "name": "python-flask-doc-1:1.1.1-1.el8ost.noarch", "product_id": "python-flask-doc-1:1.1.1-1.el8ost.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-flask-doc@1.1.1-1.el8ost?arch=noarch\u0026epoch=1" } } }, { "category": "product_version", "name": "python3-flask-1:1.1.1-1.el8ost.noarch", "product": { "name": "python3-flask-1:1.1.1-1.el8ost.noarch", "product_id": "python3-flask-1:1.1.1-1.el8ost.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-flask@1.1.1-1.el8ost?arch=noarch\u0026epoch=1" } } }, { "category": "product_version", "name": "python3-google-auth-0:1.3.0-1.el8ost.noarch", "product": { "name": "python3-google-auth-0:1.3.0-1.el8ost.noarch", "product_id": "python3-google-auth-0:1.3.0-1.el8ost.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-google-auth@1.3.0-1.el8ost?arch=noarch" } } }, { "category": "product_version", "name": "python3-hardware-0:0.23.0-0.20201031022149.59211cc.el8.noarch", "product": { "name": "python3-hardware-0:0.23.0-0.20201031022149.59211cc.el8.noarch", "product_id": "python3-hardware-0:0.23.0-0.20201031022149.59211cc.el8.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-hardware@0.23.0-0.20201031022149.59211cc.el8?arch=noarch" } } }, { "category": "product_version", "name": "python3-hardware-detect-0:0.23.0-0.20201031022149.59211cc.el8.noarch", "product": { "name": "python3-hardware-detect-0:0.23.0-0.20201031022149.59211cc.el8.noarch", "product_id": "python3-hardware-detect-0:0.23.0-0.20201031022149.59211cc.el8.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-hardware-detect@0.23.0-0.20201031022149.59211cc.el8?arch=noarch" } } }, { "category": "product_version", "name": "python3-ifaddr-0:0.1.6-5.el8ost.noarch", "product": { "name": "python3-ifaddr-0:0.1.6-5.el8ost.noarch", "product_id": "python3-ifaddr-0:0.1.6-5.el8ost.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-ifaddr@0.1.6-5.el8ost?arch=noarch" } } }, { "category": "product_version", "name": "python3-importlib-metadata-0:1.7.0-1.el8ost.noarch", "product": { "name": "python3-importlib-metadata-0:1.7.0-1.el8ost.noarch", "product_id": "python3-importlib-metadata-0:1.7.0-1.el8ost.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-importlib-metadata@1.7.0-1.el8ost?arch=noarch" } } }, { "category": "product_version", "name": "python3-ironic-lib-0:4.4.1-0.20201218041209.aa7cfec.el8.noarch", "product": { "name": "python3-ironic-lib-0:4.4.1-0.20201218041209.aa7cfec.el8.noarch", "product_id": "python3-ironic-lib-0:4.4.1-0.20201218041209.aa7cfec.el8.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-ironic-lib@4.4.1-0.20201218041209.aa7cfec.el8?arch=noarch" } } }, { "category": "product_version", "name": "python3-keystoneauth1-0:4.2.0-0.20200630234358.dab8e10.el8ost.noarch", "product": { "name": "python3-keystoneauth1-0:4.2.0-0.20200630234358.dab8e10.el8ost.noarch", "product_id": "python3-keystoneauth1-0:4.2.0-0.20200630234358.dab8e10.el8ost.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-keystoneauth1@4.2.0-0.20200630234358.dab8e10.el8ost?arch=noarch" } } }, { "category": "product_version", "name": "python3-kubernetes-0:11.0.0-1.el8.noarch", "product": { "name": "python3-kubernetes-0:11.0.0-1.el8.noarch", "product_id": "python3-kubernetes-0:11.0.0-1.el8.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-kubernetes@11.0.0-1.el8?arch=noarch" } } }, { "category": "product_version", "name": "python3-kubernetes-tests-0:11.0.0-1.el8.noarch", "product": { "name": "python3-kubernetes-tests-0:11.0.0-1.el8.noarch", "product_id": "python3-kubernetes-tests-0:11.0.0-1.el8.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-kubernetes-tests@11.0.0-1.el8?arch=noarch" } } }, { "category": "product_version", "name": "kuryr-binding-scripts-0:1.1.1-0.20190923160834.41e6964.el8ost.noarch", "product": { "name": "kuryr-binding-scripts-0:1.1.1-0.20190923160834.41e6964.el8ost.noarch", "product_id": "kuryr-binding-scripts-0:1.1.1-0.20190923160834.41e6964.el8ost.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/kuryr-binding-scripts@1.1.1-0.20190923160834.41e6964.el8ost?arch=noarch" } } }, { "category": "product_version", "name": "python3-kuryr-lib-0:1.1.1-0.20190923160834.41e6964.el8ost.noarch", "product": { "name": "python3-kuryr-lib-0:1.1.1-0.20190923160834.41e6964.el8ost.noarch", "product_id": "python3-kuryr-lib-0:1.1.1-0.20190923160834.41e6964.el8ost.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-kuryr-lib@1.1.1-0.20190923160834.41e6964.el8ost?arch=noarch" } } }, { "category": "product_version", "name": "python3-kuryr-lib-tests-0:1.1.1-0.20190923160834.41e6964.el8ost.noarch", "product": { "name": "python3-kuryr-lib-tests-0:1.1.1-0.20190923160834.41e6964.el8ost.noarch", "product_id": "python3-kuryr-lib-tests-0:1.1.1-0.20190923160834.41e6964.el8ost.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-kuryr-lib-tests@1.1.1-0.20190923160834.41e6964.el8ost?arch=noarch" } } }, { "category": "product_version", "name": "python3-lockfile-1:0.11.0-8.el8ar.noarch", "product": { "name": "python3-lockfile-1:0.11.0-8.el8ar.noarch", "product_id": "python3-lockfile-1:0.11.0-8.el8ar.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-lockfile@0.11.0-8.el8ar?arch=noarch\u0026epoch=1" } } }, { "category": "product_version", "name": "python3-openshift-1:0.11.2-1.el8.noarch", "product": { "name": "python3-openshift-1:0.11.2-1.el8.noarch", "product_id": "python3-openshift-1:0.11.2-1.el8.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-openshift@0.11.2-1.el8?arch=noarch\u0026epoch=1" } } }, { "category": "product_version", "name": "python3-openstacksdk-0:0.48.0-0.20200708092906.3b693c2.el8ost.noarch", "product": { "name": "python3-openstacksdk-0:0.48.0-0.20200708092906.3b693c2.el8ost.noarch", "product_id": "python3-openstacksdk-0:0.48.0-0.20200708092906.3b693c2.el8ost.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-openstacksdk@0.48.0-0.20200708092906.3b693c2.el8ost?arch=noarch" } } }, { "category": "product_version", "name": "python3-openstacksdk-tests-0:0.48.0-0.20200708092906.3b693c2.el8ost.noarch", "product": { "name": "python3-openstacksdk-tests-0:0.48.0-0.20200708092906.3b693c2.el8ost.noarch", "product_id": "python3-openstacksdk-tests-0:0.48.0-0.20200708092906.3b693c2.el8ost.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-openstacksdk-tests@0.48.0-0.20200708092906.3b693c2.el8ost?arch=noarch" } } }, { "category": "product_version", "name": "python-oslo-concurrency-lang-0:4.3.0-0.20201008180343.2f78803.el8.noarch", "product": { "name": "python-oslo-concurrency-lang-0:4.3.0-0.20201008180343.2f78803.el8.noarch", "product_id": "python-oslo-concurrency-lang-0:4.3.0-0.20201008180343.2f78803.el8.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-oslo-concurrency-lang@4.3.0-0.20201008180343.2f78803.el8?arch=noarch" } } }, { "category": "product_version", "name": "python3-oslo-concurrency-0:4.3.0-0.20201008180343.2f78803.el8.noarch", "product": { "name": "python3-oslo-concurrency-0:4.3.0-0.20201008180343.2f78803.el8.noarch", "product_id": "python3-oslo-concurrency-0:4.3.0-0.20201008180343.2f78803.el8.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-oslo-concurrency@4.3.0-0.20201008180343.2f78803.el8?arch=noarch" } } }, { "category": "product_version", "name": "python3-oslo-concurrency-tests-0:4.3.0-0.20201008180343.2f78803.el8.noarch", "product": { "name": "python3-oslo-concurrency-tests-0:4.3.0-0.20201008180343.2f78803.el8.noarch", "product_id": "python3-oslo-concurrency-tests-0:4.3.0-0.20201008180343.2f78803.el8.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-oslo-concurrency-tests@4.3.0-0.20201008180343.2f78803.el8?arch=noarch" } } }, { "category": "product_version", "name": "python3-oslo-config-2:8.3.2-0.20201008180634.fcb8894.el8.noarch", "product": { "name": "python3-oslo-config-2:8.3.2-0.20201008180634.fcb8894.el8.noarch", "product_id": "python3-oslo-config-2:8.3.2-0.20201008180634.fcb8894.el8.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-oslo-config@8.3.2-0.20201008180634.fcb8894.el8?arch=noarch\u0026epoch=2" } } }, { "category": "product_version", "name": "python3-oslo-context-0:3.1.1-0.20201008190523.57dbded.el8.noarch", "product": { "name": "python3-oslo-context-0:3.1.1-0.20201008190523.57dbded.el8.noarch", "product_id": "python3-oslo-context-0:3.1.1-0.20201008190523.57dbded.el8.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-oslo-context@3.1.1-0.20201008190523.57dbded.el8?arch=noarch" } } }, { "category": "product_version", "name": "python3-oslo-context-tests-0:3.1.1-0.20201008190523.57dbded.el8.noarch", "product": { "name": "python3-oslo-context-tests-0:3.1.1-0.20201008190523.57dbded.el8.noarch", "product_id": "python3-oslo-context-tests-0:3.1.1-0.20201008190523.57dbded.el8.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-oslo-context-tests@3.1.1-0.20201008190523.57dbded.el8?arch=noarch" } } }, { "category": "product_version", "name": "python-oslo-db-lang-0:8.4.0-0.20200918104110.e42c733.el8ost.noarch", "product": { "name": "python-oslo-db-lang-0:8.4.0-0.20200918104110.e42c733.el8ost.noarch", "product_id": "python-oslo-db-lang-0:8.4.0-0.20200918104110.e42c733.el8ost.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-oslo-db-lang@8.4.0-0.20200918104110.e42c733.el8ost?arch=noarch" } } }, { "category": "product_version", "name": "python3-oslo-db-0:8.4.0-0.20200918104110.e42c733.el8ost.noarch", "product": { "name": "python3-oslo-db-0:8.4.0-0.20200918104110.e42c733.el8ost.noarch", "product_id": "python3-oslo-db-0:8.4.0-0.20200918104110.e42c733.el8ost.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-oslo-db@8.4.0-0.20200918104110.e42c733.el8ost?arch=noarch" } } }, { "category": "product_version", "name": "python3-oslo-db-tests-0:8.4.0-0.20200918104110.e42c733.el8ost.noarch", "product": { "name": "python3-oslo-db-tests-0:8.4.0-0.20200918104110.e42c733.el8ost.noarch", "product_id": "python3-oslo-db-tests-0:8.4.0-0.20200918104110.e42c733.el8ost.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-oslo-db-tests@8.4.0-0.20200918104110.e42c733.el8ost?arch=noarch" } } }, { "category": "product_version", "name": "python-oslo-i18n-lang-0:5.0.1-0.20201009131251.73187bd.el8.noarch", "product": { "name": "python-oslo-i18n-lang-0:5.0.1-0.20201009131251.73187bd.el8.noarch", "product_id": "python-oslo-i18n-lang-0:5.0.1-0.20201009131251.73187bd.el8.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-oslo-i18n-lang@5.0.1-0.20201009131251.73187bd.el8?arch=noarch" } } }, { "category": "product_version", "name": "python3-oslo-i18n-0:5.0.1-0.20201009131251.73187bd.el8.noarch", "product": { "name": "python3-oslo-i18n-0:5.0.1-0.20201009131251.73187bd.el8.noarch", "product_id": "python3-oslo-i18n-0:5.0.1-0.20201009131251.73187bd.el8.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-oslo-i18n@5.0.1-0.20201009131251.73187bd.el8?arch=noarch" } } }, { "category": "product_version", "name": "python-oslo-log-lang-0:4.3.1-0.20201207021200.1597f24.el8.noarch", "product": { "name": "python-oslo-log-lang-0:4.3.1-0.20201207021200.1597f24.el8.noarch", "product_id": "python-oslo-log-lang-0:4.3.1-0.20201207021200.1597f24.el8.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-oslo-log-lang@4.3.1-0.20201207021200.1597f24.el8?arch=noarch" } } }, { "category": "product_version", "name": "python3-oslo-log-0:4.3.1-0.20201207021200.1597f24.el8.noarch", "product": { "name": "python3-oslo-log-0:4.3.1-0.20201207021200.1597f24.el8.noarch", "product_id": "python3-oslo-log-0:4.3.1-0.20201207021200.1597f24.el8.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-oslo-log@4.3.1-0.20201207021200.1597f24.el8?arch=noarch" } } }, { "category": "product_version", "name": "python3-oslo-log-tests-0:4.3.1-0.20201207021200.1597f24.el8.noarch", "product": { "name": "python3-oslo-log-tests-0:4.3.1-0.20201207021200.1597f24.el8.noarch", "product_id": "python3-oslo-log-tests-0:4.3.1-0.20201207021200.1597f24.el8.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-oslo-log-tests@4.3.1-0.20201207021200.1597f24.el8?arch=noarch" } } }, { "category": "product_version", "name": "python3-oslo-serialization-0:4.0.1-0.20201008182423.c7884b2.el8.noarch", "product": { "name": "python3-oslo-serialization-0:4.0.1-0.20201008182423.c7884b2.el8.noarch", "product_id": "python3-oslo-serialization-0:4.0.1-0.20201008182423.c7884b2.el8.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-oslo-serialization@4.0.1-0.20201008182423.c7884b2.el8?arch=noarch" } } }, { "category": "product_version", "name": "python3-oslo-serialization-tests-0:4.0.1-0.20201008182423.c7884b2.el8.noarch", "product": { "name": "python3-oslo-serialization-tests-0:4.0.1-0.20201008182423.c7884b2.el8.noarch", "product_id": "python3-oslo-serialization-tests-0:4.0.1-0.20201008182423.c7884b2.el8.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-oslo-serialization-tests@4.0.1-0.20201008182423.c7884b2.el8?arch=noarch" } } }, { "category": "product_version", "name": "python3-oslo-service-0:2.4.0-0.20201008184547.58466a6.el8.noarch", "product": { "name": "python3-oslo-service-0:2.4.0-0.20201008184547.58466a6.el8.noarch", "product_id": "python3-oslo-service-0:2.4.0-0.20201008184547.58466a6.el8.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-oslo-service@2.4.0-0.20201008184547.58466a6.el8?arch=noarch" } } }, { "category": "product_version", "name": "python3-oslo-service-tests-0:2.4.0-0.20201008184547.58466a6.el8.noarch", "product": { "name": "python3-oslo-service-tests-0:2.4.0-0.20201008184547.58466a6.el8.noarch", "product_id": "python3-oslo-service-tests-0:2.4.0-0.20201008184547.58466a6.el8.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-oslo-service-tests@2.4.0-0.20201008184547.58466a6.el8?arch=noarch" } } }, { "category": "product_version", "name": "python-oslo-utils-lang-0:4.6.0-0.20201009175936.91497da.el8.noarch", "product": { "name": "python-oslo-utils-lang-0:4.6.0-0.20201009175936.91497da.el8.noarch", "product_id": "python-oslo-utils-lang-0:4.6.0-0.20201009175936.91497da.el8.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-oslo-utils-lang@4.6.0-0.20201009175936.91497da.el8?arch=noarch" } } }, { "category": "product_version", "name": "python3-oslo-utils-0:4.6.0-0.20201009175936.91497da.el8.noarch", "product": { "name": "python3-oslo-utils-0:4.6.0-0.20201009175936.91497da.el8.noarch", "product_id": "python3-oslo-utils-0:4.6.0-0.20201009175936.91497da.el8.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-oslo-utils@4.6.0-0.20201009175936.91497da.el8?arch=noarch" } } }, { "category": "product_version", "name": "python3-oslo-utils-tests-0:4.6.0-0.20201009175936.91497da.el8.noarch", "product": { "name": "python3-oslo-utils-tests-0:4.6.0-0.20201009175936.91497da.el8.noarch", "product_id": "python3-oslo-utils-tests-0:4.6.0-0.20201009175936.91497da.el8.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-oslo-utils-tests@4.6.0-0.20201009175936.91497da.el8?arch=noarch" } } }, { "category": "product_version", "name": "python-packaging-doc-0:20.4-1.el8ost.noarch", "product": { "name": "python-packaging-doc-0:20.4-1.el8ost.noarch", "product_id": "python-packaging-doc-0:20.4-1.el8ost.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-packaging-doc@20.4-1.el8ost?arch=noarch" } } }, { "category": "product_version", "name": "python3-packaging-0:20.4-1.el8ost.noarch", "product": { "name": "python3-packaging-0:20.4-1.el8ost.noarch", "product_id": "python3-packaging-0:20.4-1.el8ost.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-packaging@20.4-1.el8ost?arch=noarch" } } }, { "category": "product_version", "name": "python3-paste-0:3.2.4-1.el8ost.noarch", "product": { "name": "python3-paste-0:3.2.4-1.el8ost.noarch", "product_id": "python3-paste-0:3.2.4-1.el8ost.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-paste@3.2.4-1.el8ost?arch=noarch" } } }, { "category": "product_version", "name": "python3-paste-deploy-0:2.0.1-4.el8ost.noarch", "product": { "name": "python3-paste-deploy-0:2.0.1-4.el8ost.noarch", "product_id": "python3-paste-deploy-0:2.0.1-4.el8ost.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-paste-deploy@2.0.1-4.el8ost?arch=noarch" } } }, { "category": "product_version", "name": "python3-pbr-0:5.4.3-2.el8ost.noarch", "product": { "name": "python3-pbr-0:5.4.3-2.el8ost.noarch", "product_id": "python3-pbr-0:5.4.3-2.el8ost.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-pbr@5.4.3-2.el8ost?arch=noarch" } } }, { "category": "product_version", "name": "python3-pexpect-0:4.6-2.el8ar.noarch", "product": { "name": "python3-pexpect-0:4.6-2.el8ar.noarch", "product_id": "python3-pexpect-0:4.6-2.el8ar.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-pexpect@4.6-2.el8ar?arch=noarch" } } }, { "category": "product_version", "name": "python3-pint-0:0.10.1-1.el8ost.noarch", "product": { "name": "python3-pint-0:0.10.1-1.el8ost.noarch", "product_id": "python3-pint-0:0.10.1-1.el8ost.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-pint@0.10.1-1.el8ost?arch=noarch" } } }, { "category": "product_version", "name": "python3-pyroute2-0:0.5.13-1.el8ost.noarch", "product": { "name": "python3-pyroute2-0:0.5.13-1.el8ost.noarch", "product_id": "python3-pyroute2-0:0.5.13-1.el8ost.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-pyroute2@0.5.13-1.el8ost?arch=noarch" } } }, { "category": "product_version", "name": "python3-requests-unixsocket-0:0.1.5-5.el8ar.noarch", "product": { "name": "python3-requests-unixsocket-0:0.1.5-5.el8ar.noarch", "product_id": "python3-requests-unixsocket-0:0.1.5-5.el8ar.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-requests-unixsocket@0.1.5-5.el8ar?arch=noarch" } } }, { "category": "product_version", "name": "python3-s3transfer-0:0.2.0-1.el8ost.noarch", "product": { "name": "python3-s3transfer-0:0.2.0-1.el8ost.noarch", "product_id": "python3-s3transfer-0:0.2.0-1.el8ost.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-s3transfer@0.2.0-1.el8ost?arch=noarch" } } }, { "category": "product_version", "name": "python3-stevedore-0:3.2.2-0.20201009151242.274eaa6.el8.noarch", "product": { "name": "python3-stevedore-0:3.2.2-0.20201009151242.274eaa6.el8.noarch", "product_id": "python3-stevedore-0:3.2.2-0.20201009151242.274eaa6.el8.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-stevedore@3.2.2-0.20201009151242.274eaa6.el8?arch=noarch" } } }, { "category": "product_version", "name": "python3-string_utils-0:0.6.0-4.el8ost.noarch", "product": { "name": "python3-string_utils-0:0.6.0-4.el8ost.noarch", "product_id": "python3-string_utils-0:0.6.0-4.el8ost.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-string_utils@0.6.0-4.el8ost?arch=noarch" } } }, { "category": "product_version", "name": "python3-sushy-oem-idrac-0:0.0.3-0.20200922221223.1202372.el8ost.noarch", "product": { "name": "python3-sushy-oem-idrac-0:0.0.3-0.20200922221223.1202372.el8ost.noarch", "product_id": "python3-sushy-oem-idrac-0:0.0.3-0.20200922221223.1202372.el8ost.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-sushy-oem-idrac@0.0.3-0.20200922221223.1202372.el8ost?arch=noarch" } } }, { "category": "product_version", "name": "python3-sushy-oem-idrac-tests-0:0.0.3-0.20200922221223.1202372.el8ost.noarch", "product": { "name": "python3-sushy-oem-idrac-tests-0:0.0.3-0.20200922221223.1202372.el8ost.noarch", "product_id": "python3-sushy-oem-idrac-tests-0:0.0.3-0.20200922221223.1202372.el8ost.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-sushy-oem-idrac-tests@0.0.3-0.20200922221223.1202372.el8ost?arch=noarch" } } }, { "category": "product_version", "name": "python3-tenacity-0:6.2.0-1.el8ost.noarch", "product": { "name": "python3-tenacity-0:6.2.0-1.el8ost.noarch", "product_id": "python3-tenacity-0:6.2.0-1.el8ost.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-tenacity@6.2.0-1.el8ost?arch=noarch" } } }, { "category": "product_version", "name": "python3-tooz-0:2.7.0-0.20200723133754.fca43df.el8ost.noarch", "product": { "name": "python3-tooz-0:2.7.0-0.20200723133754.fca43df.el8ost.noarch", "product_id": "python3-tooz-0:2.7.0-0.20200723133754.fca43df.el8ost.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-tooz@2.7.0-0.20200723133754.fca43df.el8ost?arch=noarch" } } }, { "category": "product_version", "name": "python3-websocket-client-0:0.54.0-1.el8ost.noarch", "product": { "name": "python3-websocket-client-0:0.54.0-1.el8ost.noarch", "product_id": "python3-websocket-client-0:0.54.0-1.el8ost.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-websocket-client@0.54.0-1.el8ost?arch=noarch" } } }, { "category": "product_version", "name": "python3-werkzeug-0:1.0.1-3.el8ost.noarch", "product": { "name": "python3-werkzeug-0:1.0.1-3.el8ost.noarch", "product_id": "python3-werkzeug-0:1.0.1-3.el8ost.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-werkzeug@1.0.1-3.el8ost?arch=noarch" } } }, { "category": "product_version", "name": "python3-zeroconf-0:0.24.4-1.el8ost.noarch", "product": { "name": "python3-zeroconf-0:0.24.4-1.el8ost.noarch", "product_id": "python3-zeroconf-0:0.24.4-1.el8ost.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-zeroconf@0.24.4-1.el8ost?arch=noarch" } } }, { "category": "product_version", "name": "python3-zipp-0:0.5.1-2.el8ost.noarch", "product": { "name": "python3-zipp-0:0.5.1-2.el8ost.noarch", "product_id": "python3-zipp-0:0.5.1-2.el8ost.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-zipp@0.5.1-2.el8ost?arch=noarch" } } }, { "category": "product_version", "name": "NetworkManager-config-connectivity-redhat-1:1.26.0-12.1.rhaos4.7.el8.noarch", "product": { "name": "NetworkManager-config-connectivity-redhat-1:1.26.0-12.1.rhaos4.7.el8.noarch", "product_id": "NetworkManager-config-connectivity-redhat-1:1.26.0-12.1.rhaos4.7.el8.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/NetworkManager-config-connectivity-redhat@1.26.0-12.1.rhaos4.7.el8?arch=noarch\u0026epoch=1" } } }, { "category": "product_version", "name": "NetworkManager-config-server-1:1.26.0-12.1.rhaos4.7.el8.noarch", "product": { "name": "NetworkManager-config-server-1:1.26.0-12.1.rhaos4.7.el8.noarch", "product_id": "NetworkManager-config-server-1:1.26.0-12.1.rhaos4.7.el8.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/NetworkManager-config-server@1.26.0-12.1.rhaos4.7.el8?arch=noarch\u0026epoch=1" } } }, { "category": "product_version", "name": "NetworkManager-dispatcher-routing-rules-1:1.26.0-12.1.rhaos4.7.el8.noarch", "product": { "name": "NetworkManager-dispatcher-routing-rules-1:1.26.0-12.1.rhaos4.7.el8.noarch", "product_id": "NetworkManager-dispatcher-routing-rules-1:1.26.0-12.1.rhaos4.7.el8.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/NetworkManager-dispatcher-routing-rules@1.26.0-12.1.rhaos4.7.el8?arch=noarch\u0026epoch=1" } } }, { "category": "product_version", "name": "openstack-ironic-api-1:16.0.4-0.20210203051223.7d74ea0.el8.noarch", "product": { "name": "openstack-ironic-api-1:16.0.4-0.20210203051223.7d74ea0.el8.noarch", "product_id": "openstack-ironic-api-1:16.0.4-0.20210203051223.7d74ea0.el8.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/openstack-ironic-api@16.0.4-0.20210203051223.7d74ea0.el8?arch=noarch\u0026epoch=1" } } }, { "category": "product_version", "name": "openstack-ironic-common-1:16.0.4-0.20210203051223.7d74ea0.el8.noarch", "product": { "name": "openstack-ironic-common-1:16.0.4-0.20210203051223.7d74ea0.el8.noarch", "product_id": "openstack-ironic-common-1:16.0.4-0.20210203051223.7d74ea0.el8.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/openstack-ironic-common@16.0.4-0.20210203051223.7d74ea0.el8?arch=noarch\u0026epoch=1" } } }, { "category": "product_version", "name": "openstack-ironic-conductor-1:16.0.4-0.20210203051223.7d74ea0.el8.noarch", "product": { "name": "openstack-ironic-conductor-1:16.0.4-0.20210203051223.7d74ea0.el8.noarch", "product_id": "openstack-ironic-conductor-1:16.0.4-0.20210203051223.7d74ea0.el8.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/openstack-ironic-conductor@16.0.4-0.20210203051223.7d74ea0.el8?arch=noarch\u0026epoch=1" } } }, { "category": "product_version", "name": "python3-ironic-tests-1:16.0.4-0.20210203051223.7d74ea0.el8.noarch", "product": { "name": "python3-ironic-tests-1:16.0.4-0.20210203051223.7d74ea0.el8.noarch", "product_id": "python3-ironic-tests-1:16.0.4-0.20210203051223.7d74ea0.el8.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-ironic-tests@16.0.4-0.20210203051223.7d74ea0.el8?arch=noarch\u0026epoch=1" } } }, { "category": "product_version", "name": "python3-rsa-0:4.7-1.el8.noarch", "product": { "name": "python3-rsa-0:4.7-1.el8.noarch", "product_id": "python3-rsa-0:4.7-1.el8.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-rsa@4.7-1.el8?arch=noarch" } } }, { "category": "product_version", "name": "openshift-kuryr-cni-0:4.7.0-202101262230.p0.git.2494.cd95ce5.el8.noarch", "product": { "name": "openshift-kuryr-cni-0:4.7.0-202101262230.p0.git.2494.cd95ce5.el8.noarch", "product_id": "openshift-kuryr-cni-0:4.7.0-202101262230.p0.git.2494.cd95ce5.el8.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-kuryr-cni@4.7.0-202101262230.p0.git.2494.cd95ce5.el8?arch=noarch" } } }, { "category": "product_version", "name": "openshift-kuryr-common-0:4.7.0-202101262230.p0.git.2494.cd95ce5.el8.noarch", "product": { "name": "openshift-kuryr-common-0:4.7.0-202101262230.p0.git.2494.cd95ce5.el8.noarch", "product_id": "openshift-kuryr-common-0:4.7.0-202101262230.p0.git.2494.cd95ce5.el8.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-kuryr-common@4.7.0-202101262230.p0.git.2494.cd95ce5.el8?arch=noarch" } } }, { "category": "product_version", "name": "openshift-kuryr-controller-0:4.7.0-202101262230.p0.git.2494.cd95ce5.el8.noarch", "product": { "name": "openshift-kuryr-controller-0:4.7.0-202101262230.p0.git.2494.cd95ce5.el8.noarch", "product_id": "openshift-kuryr-controller-0:4.7.0-202101262230.p0.git.2494.cd95ce5.el8.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-kuryr-controller@4.7.0-202101262230.p0.git.2494.cd95ce5.el8?arch=noarch" } } }, { "category": "product_version", "name": "python3-kuryr-kubernetes-0:4.7.0-202101262230.p0.git.2494.cd95ce5.el8.noarch", "product": { "name": "python3-kuryr-kubernetes-0:4.7.0-202101262230.p0.git.2494.cd95ce5.el8.noarch", "product_id": "python3-kuryr-kubernetes-0:4.7.0-202101262230.p0.git.2494.cd95ce5.el8.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-kuryr-kubernetes@4.7.0-202101262230.p0.git.2494.cd95ce5.el8?arch=noarch" } } }, { "category": "product_version", "name": "python3-sushy-0:3.6.1-0.20210122201213.7ec0422.el8.noarch", "product": { "name": "python3-sushy-0:3.6.1-0.20210122201213.7ec0422.el8.noarch", "product_id": "python3-sushy-0:3.6.1-0.20210122201213.7ec0422.el8.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-sushy@3.6.1-0.20210122201213.7ec0422.el8?arch=noarch" } } }, { "category": "product_version", "name": "python3-sushy-tests-0:3.6.1-0.20210122201213.7ec0422.el8.noarch", "product": { "name": "python3-sushy-tests-0:3.6.1-0.20210122201213.7ec0422.el8.noarch", "product_id": "python3-sushy-tests-0:3.6.1-0.20210122201213.7ec0422.el8.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-sushy-tests@3.6.1-0.20210122201213.7ec0422.el8?arch=noarch" } } }, { "category": "product_version", "name": "pprof-0:2.6.3-2.el8ost.noarch", "product": { "name": "pprof-0:2.6.3-2.el8ost.noarch", "product_id": "pprof-0:2.6.3-2.el8ost.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/pprof@2.6.3-2.el8ost?arch=noarch" } } }, { "category": "product_version", "name": "python3-pyghmi-0:1.5.14-2.1.el8ost.noarch", "product": { "name": "python3-pyghmi-0:1.5.14-2.1.el8ost.noarch", "product_id": "python3-pyghmi-0:1.5.14-2.1.el8ost.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-pyghmi@1.5.14-2.1.el8ost?arch=noarch" } } }, { "category": "product_version", "name": "jenkins-2-plugins-0:4.7.1611636915-1.el8.noarch", "product": { "name": "jenkins-2-plugins-0:4.7.1611636915-1.el8.noarch", "product_id": "jenkins-2-plugins-0:4.7.1611636915-1.el8.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jenkins-2-plugins@4.7.1611636915-1.el8?arch=noarch" } } }, { "category": "product_version", "name": "openstack-ironic-inspector-0:10.4.1-0.20201123161216.70fccec.el8.noarch", "product": { "name": "openstack-ironic-inspector-0:10.4.1-0.20201123161216.70fccec.el8.noarch", "product_id": "openstack-ironic-inspector-0:10.4.1-0.20201123161216.70fccec.el8.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/openstack-ironic-inspector@10.4.1-0.20201123161216.70fccec.el8?arch=noarch" } } }, { "category": "product_version", "name": "openstack-ironic-inspector-api-0:10.4.1-0.20201123161216.70fccec.el8.noarch", "product": { "name": "openstack-ironic-inspector-api-0:10.4.1-0.20201123161216.70fccec.el8.noarch", "product_id": "openstack-ironic-inspector-api-0:10.4.1-0.20201123161216.70fccec.el8.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/openstack-ironic-inspector-api@10.4.1-0.20201123161216.70fccec.el8?arch=noarch" } } }, { "category": "product_version", "name": "openstack-ironic-inspector-conductor-0:10.4.1-0.20201123161216.70fccec.el8.noarch", "product": { "name": "openstack-ironic-inspector-conductor-0:10.4.1-0.20201123161216.70fccec.el8.noarch", "product_id": "openstack-ironic-inspector-conductor-0:10.4.1-0.20201123161216.70fccec.el8.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/openstack-ironic-inspector-conductor@10.4.1-0.20201123161216.70fccec.el8?arch=noarch" } } }, { "category": "product_version", "name": "openstack-ironic-inspector-dnsmasq-0:10.4.1-0.20201123161216.70fccec.el8.noarch", "product": { "name": "openstack-ironic-inspector-dnsmasq-0:10.4.1-0.20201123161216.70fccec.el8.noarch", "product_id": "openstack-ironic-inspector-dnsmasq-0:10.4.1-0.20201123161216.70fccec.el8.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/openstack-ironic-inspector-dnsmasq@10.4.1-0.20201123161216.70fccec.el8?arch=noarch" } } }, { "category": "product_version", "name": "python3-ironic-inspector-tests-0:10.4.1-0.20201123161216.70fccec.el8.noarch", "product": { "name": "python3-ironic-inspector-tests-0:10.4.1-0.20201123161216.70fccec.el8.noarch", "product_id": "python3-ironic-inspector-tests-0:10.4.1-0.20201123161216.70fccec.el8.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-ironic-inspector-tests@10.4.1-0.20201123161216.70fccec.el8?arch=noarch" } } }, { "category": "product_version", "name": "octavia-amphora-image-x86_64-0:17.0-20200606.1.el8ost.noarch", "product": { "name": "octavia-amphora-image-x86_64-0:17.0-20200606.1.el8ost.noarch", "product_id": "octavia-amphora-image-x86_64-0:17.0-20200606.1.el8ost.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/octavia-amphora-image-x86_64@17.0-20200606.1.el8ost?arch=noarch" } } }, { "category": "product_version", "name": "rhosp-director-images-0:17.0-20200606.1.el8ost.noarch", "product": { "name": "rhosp-director-images-0:17.0-20200606.1.el8ost.noarch", "product_id": "rhosp-director-images-0:17.0-20200606.1.el8ost.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/rhosp-director-images@17.0-20200606.1.el8ost?arch=noarch" } } }, { "category": "product_version", "name": "rhosp-director-images-all-0:17.0-20200606.1.el8ost.noarch", "product": { "name": "rhosp-director-images-all-0:17.0-20200606.1.el8ost.noarch", "product_id": "rhosp-director-images-all-0:17.0-20200606.1.el8ost.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/rhosp-director-images-all@17.0-20200606.1.el8ost?arch=noarch" } } }, { "category": "product_version", "name": "rhosp-director-images-ipa-0:17.0-20200606.1.el8ost.noarch", "product": { "name": "rhosp-director-images-ipa-0:17.0-20200606.1.el8ost.noarch", "product_id": "rhosp-director-images-ipa-0:17.0-20200606.1.el8ost.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/rhosp-director-images-ipa@17.0-20200606.1.el8ost?arch=noarch" } } }, { "category": "product_version", "name": "rhosp-director-images-ipa-ppc64le-0:17.0-20200606.1.el8ost.noarch", "product": { "name": "rhosp-director-images-ipa-ppc64le-0:17.0-20200606.1.el8ost.noarch", "product_id": "rhosp-director-images-ipa-ppc64le-0:17.0-20200606.1.el8ost.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/rhosp-director-images-ipa-ppc64le@17.0-20200606.1.el8ost?arch=noarch" } } }, { "category": "product_version", "name": "rhosp-director-images-ipa-x86_64-0:17.0-20200606.1.el8ost.noarch", "product": { "name": "rhosp-director-images-ipa-x86_64-0:17.0-20200606.1.el8ost.noarch", "product_id": "rhosp-director-images-ipa-x86_64-0:17.0-20200606.1.el8ost.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/rhosp-director-images-ipa-x86_64@17.0-20200606.1.el8ost?arch=noarch" } } }, { "category": "product_version", "name": "rhosp-director-images-minimal-0:17.0-20200606.1.el8ost.noarch", "product": { "name": "rhosp-director-images-minimal-0:17.0-20200606.1.el8ost.noarch", "product_id": "rhosp-director-images-minimal-0:17.0-20200606.1.el8ost.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/rhosp-director-images-minimal@17.0-20200606.1.el8ost?arch=noarch" } } }, { "category": "product_version", "name": "rhosp-director-images-ppc64le-0:17.0-20200606.1.el8ost.noarch", "product": { "name": "rhosp-director-images-ppc64le-0:17.0-20200606.1.el8ost.noarch", "product_id": "rhosp-director-images-ppc64le-0:17.0-20200606.1.el8ost.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/rhosp-director-images-ppc64le@17.0-20200606.1.el8ost?arch=noarch" } } }, { "category": "product_version", "name": "rhosp-director-images-x86_64-0:17.0-20200606.1.el8ost.noarch", "product": { "name": "rhosp-director-images-x86_64-0:17.0-20200606.1.el8ost.noarch", "product_id": "rhosp-director-images-x86_64-0:17.0-20200606.1.el8ost.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/rhosp-director-images-x86_64@17.0-20200606.1.el8ost?arch=noarch" } } }, { "category": "product_version", "name": "rhcos-tools-0:0.0.0-1.rhaos4.2.el8.noarch", "product": { "name": "rhcos-tools-0:0.0.0-1.rhaos4.2.el8.noarch", "product_id": "rhcos-tools-0:0.0.0-1.rhaos4.2.el8.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/rhcos-tools@0.0.0-1.rhaos4.2.el8?arch=noarch" } } }, { "category": "product_version", "name": "console-login-helper-messages-0:0.20.3-1.rhaos4.7.el8.noarch", "product": { "name": "console-login-helper-messages-0:0.20.3-1.rhaos4.7.el8.noarch", "product_id": "console-login-helper-messages-0:0.20.3-1.rhaos4.7.el8.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/console-login-helper-messages@0.20.3-1.rhaos4.7.el8?arch=noarch" } } }, { "category": "product_version", "name": "console-login-helper-messages-issuegen-0:0.20.3-1.rhaos4.7.el8.noarch", "product": { "name": "console-login-helper-messages-issuegen-0:0.20.3-1.rhaos4.7.el8.noarch", "product_id": "console-login-helper-messages-issuegen-0:0.20.3-1.rhaos4.7.el8.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/console-login-helper-messages-issuegen@0.20.3-1.rhaos4.7.el8?arch=noarch" } } }, { "category": "product_version", "name": "console-login-helper-messages-profile-0:0.20.3-1.rhaos4.7.el8.noarch", "product": { "name": "console-login-helper-messages-profile-0:0.20.3-1.rhaos4.7.el8.noarch", "product_id": "console-login-helper-messages-profile-0:0.20.3-1.rhaos4.7.el8.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/console-login-helper-messages-profile@0.20.3-1.rhaos4.7.el8?arch=noarch" } } }, { "category": "product_version", "name": "jenkins-0:2.263.3.1612449007-1.el8.noarch", "product": { "name": "jenkins-0:2.263.3.1612449007-1.el8.noarch", "product_id": "jenkins-0:2.263.3.1612449007-1.el8.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jenkins@2.263.3.1612449007-1.el8?arch=noarch" } } }, { "category": "product_version", "name": "toolbox-0:0.0.8-3.rhaos4.7.el8.noarch", "product": { "name": "toolbox-0:0.0.8-3.rhaos4.7.el8.noarch", "product_id": "toolbox-0:0.0.8-3.rhaos4.7.el8.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/toolbox@0.0.8-3.rhaos4.7.el8?arch=noarch" } } }, { "category": "product_version", "name": "python2-botocore-0:1.4.57-5.el7.noarch", "product": { "name": "python2-botocore-0:1.4.57-5.el7.noarch", "product_id": "python2-botocore-0:1.4.57-5.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/python2-botocore@1.4.57-5.el7?arch=noarch" } } }, { "category": "product_version", "name": "openshift-ansible-0:4.7.0-202102032256.p0.git.0.bf7d9a7.el7.noarch", "product": { "name": "openshift-ansible-0:4.7.0-202102032256.p0.git.0.bf7d9a7.el7.noarch", "product_id": "openshift-ansible-0:4.7.0-202102032256.p0.git.0.bf7d9a7.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-ansible@4.7.0-202102032256.p0.git.0.bf7d9a7.el7?arch=noarch" } } }, { "category": "product_version", "name": "openshift-ansible-test-0:4.7.0-202102032256.p0.git.0.bf7d9a7.el7.noarch", "product": { "name": "openshift-ansible-test-0:4.7.0-202102032256.p0.git.0.bf7d9a7.el7.noarch", "product_id": "openshift-ansible-test-0:4.7.0-202102032256.p0.git.0.bf7d9a7.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-ansible-test@4.7.0-202102032256.p0.git.0.bf7d9a7.el7?arch=noarch" } } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "atomic-openshift-service-idler-0:4.7.0-202011171454.p0.git.15.675c1c8.el8.x86_64", "product": { "name": "atomic-openshift-service-idler-0:4.7.0-202011171454.p0.git.15.675c1c8.el8.x86_64", "product_id": "atomic-openshift-service-idler-0:4.7.0-202011171454.p0.git.15.675c1c8.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/atomic-openshift-service-idler@4.7.0-202011171454.p0.git.15.675c1c8.el8?arch=x86_64" } } }, { "category": "product_version", "name": "containernetworking-plugins-0:0.8.6-1.rhaos4.5.el8.x86_64", "product": { "name": "containernetworking-plugins-0:0.8.6-1.rhaos4.5.el8.x86_64", "product_id": "containernetworking-plugins-0:0.8.6-1.rhaos4.5.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/containernetworking-plugins@0.8.6-1.rhaos4.5.el8?arch=x86_64" } } }, { "category": "product_version", "name": "containernetworking-plugins-debugsource-0:0.8.6-1.rhaos4.5.el8.x86_64", "product": { "name": "containernetworking-plugins-debugsource-0:0.8.6-1.rhaos4.5.el8.x86_64", "product_id": "containernetworking-plugins-debugsource-0:0.8.6-1.rhaos4.5.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/containernetworking-plugins-debugsource@0.8.6-1.rhaos4.5.el8?arch=x86_64" } } }, { "category": "product_version", "name": "containernetworking-plugins-debuginfo-0:0.8.6-1.rhaos4.5.el8.x86_64", "product": { "name": "containernetworking-plugins-debuginfo-0:0.8.6-1.rhaos4.5.el8.x86_64", "product_id": "containernetworking-plugins-debuginfo-0:0.8.6-1.rhaos4.5.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/containernetworking-plugins-debuginfo@0.8.6-1.rhaos4.5.el8?arch=x86_64" } } }, { "category": "product_version", "name": "cri-tools-0:1.20.0-1.el8.x86_64", "product": { "name": "cri-tools-0:1.20.0-1.el8.x86_64", "product_id": "cri-tools-0:1.20.0-1.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/cri-tools@1.20.0-1.el8?arch=x86_64" } } }, { "category": "product_version", "name": "cri-tools-debugsource-0:1.20.0-1.el8.x86_64", "product": { "name": "cri-tools-debugsource-0:1.20.0-1.el8.x86_64", "product_id": "cri-tools-debugsource-0:1.20.0-1.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/cri-tools-debugsource@1.20.0-1.el8?arch=x86_64" } } }, { "category": "product_version", "name": "cri-tools-debuginfo-0:1.20.0-1.el8.x86_64", "product": { "name": "cri-tools-debuginfo-0:1.20.0-1.el8.x86_64", "product_id": "cri-tools-debuginfo-0:1.20.0-1.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/cri-tools-debuginfo@1.20.0-1.el8?arch=x86_64" } } }, { "category": "product_version", "name": "dracut-0:049-95.git20200804.el8_3.4.x86_64", "product": { "name": "dracut-0:049-95.git20200804.el8_3.4.x86_64", "product_id": "dracut-0:049-95.git20200804.el8_3.4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/dracut@049-95.git20200804.el8_3.4?arch=x86_64" } } }, { "category": "product_version", "name": "dracut-caps-0:049-95.git20200804.el8_3.4.x86_64", "product": { "name": "dracut-caps-0:049-95.git20200804.el8_3.4.x86_64", "product_id": "dracut-caps-0:049-95.git20200804.el8_3.4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/dracut-caps@049-95.git20200804.el8_3.4?arch=x86_64" } } }, { "category": "product_version", "name": "dracut-config-generic-0:049-95.git20200804.el8_3.4.x86_64", "product": { "name": "dracut-config-generic-0:049-95.git20200804.el8_3.4.x86_64", "product_id": "dracut-config-generic-0:049-95.git20200804.el8_3.4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/dracut-config-generic@049-95.git20200804.el8_3.4?arch=x86_64" } } }, { "category": "product_version", "name": "dracut-config-rescue-0:049-95.git20200804.el8_3.4.x86_64", "product": { "name": "dracut-config-rescue-0:049-95.git20200804.el8_3.4.x86_64", "product_id": "dracut-config-rescue-0:049-95.git20200804.el8_3.4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/dracut-config-rescue@049-95.git20200804.el8_3.4?arch=x86_64" } } }, { "category": "product_version", "name": "dracut-live-0:049-95.git20200804.el8_3.4.x86_64", "product": { "name": "dracut-live-0:049-95.git20200804.el8_3.4.x86_64", "product_id": "dracut-live-0:049-95.git20200804.el8_3.4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/dracut-live@049-95.git20200804.el8_3.4?arch=x86_64" } } }, { "category": "product_version", "name": "dracut-network-0:049-95.git20200804.el8_3.4.x86_64", "product": { "name": "dracut-network-0:049-95.git20200804.el8_3.4.x86_64", "product_id": "dracut-network-0:049-95.git20200804.el8_3.4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/dracut-network@049-95.git20200804.el8_3.4?arch=x86_64" } } }, { "category": "product_version", "name": "dracut-squash-0:049-95.git20200804.el8_3.4.x86_64", "product": { "name": "dracut-squash-0:049-95.git20200804.el8_3.4.x86_64", "product_id": "dracut-squash-0:049-95.git20200804.el8_3.4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/dracut-squash@049-95.git20200804.el8_3.4?arch=x86_64" } } }, { "category": "product_version", "name": "dracut-tools-0:049-95.git20200804.el8_3.4.x86_64", "product": { "name": "dracut-tools-0:049-95.git20200804.el8_3.4.x86_64", "product_id": "dracut-tools-0:049-95.git20200804.el8_3.4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/dracut-tools@049-95.git20200804.el8_3.4?arch=x86_64" } } }, { "category": "product_version", "name": "dracut-debugsource-0:049-95.git20200804.el8_3.4.x86_64", "product": { "name": "dracut-debugsource-0:049-95.git20200804.el8_3.4.x86_64", "product_id": "dracut-debugsource-0:049-95.git20200804.el8_3.4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/dracut-debugsource@049-95.git20200804.el8_3.4?arch=x86_64" } } }, { "category": "product_version", "name": "dracut-debuginfo-0:049-95.git20200804.el8_3.4.x86_64", "product": { "name": "dracut-debuginfo-0:049-95.git20200804.el8_3.4.x86_64", "product_id": "dracut-debuginfo-0:049-95.git20200804.el8_3.4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/dracut-debuginfo@049-95.git20200804.el8_3.4?arch=x86_64" } } }, { "category": "product_version", "name": "faq-0:0.0.6-5.el8.x86_64", "product": { "name": "faq-0:0.0.6-5.el8.x86_64", "product_id": "faq-0:0.0.6-5.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/faq@0.0.6-5.el8?arch=x86_64" } } }, { "category": "product_version", "name": "golang-github-prometheus-promu-0:0.5.0-2.git642a960.el8.x86_64", "product": { "name": "golang-github-prometheus-promu-0:0.5.0-2.git642a960.el8.x86_64", "product_id": "golang-github-prometheus-promu-0:0.5.0-2.git642a960.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/golang-github-prometheus-promu@0.5.0-2.git642a960.el8?arch=x86_64" } } }, { "category": "product_version", "name": "prometheus-promu-0:0.5.0-2.git642a960.el8.x86_64", "product": { "name": "prometheus-promu-0:0.5.0-2.git642a960.el8.x86_64", "product_id": "prometheus-promu-0:0.5.0-2.git642a960.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/prometheus-promu@0.5.0-2.git642a960.el8?arch=x86_64" } } }, { "category": "product_version", "name": "grpc-0:1.18.0-4.el8ost.x86_64", "product": { "name": "grpc-0:1.18.0-4.el8ost.x86_64", "product_id": "grpc-0:1.18.0-4.el8ost.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/grpc@1.18.0-4.el8ost?arch=x86_64" } } }, { "category": "product_version", "name": "grpc-cli-0:1.18.0-4.el8ost.x86_64", "product": { "name": "grpc-cli-0:1.18.0-4.el8ost.x86_64", "product_id": "grpc-cli-0:1.18.0-4.el8ost.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/grpc-cli@1.18.0-4.el8ost?arch=x86_64" } } }, { "category": "product_version", "name": "grpc-devel-0:1.18.0-4.el8ost.x86_64", "product": { "name": "grpc-devel-0:1.18.0-4.el8ost.x86_64", "product_id": "grpc-devel-0:1.18.0-4.el8ost.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/grpc-devel@1.18.0-4.el8ost?arch=x86_64" } } }, { "category": "product_version", "name": "grpc-plugins-0:1.18.0-4.el8ost.x86_64", "product": { "name": "grpc-plugins-0:1.18.0-4.el8ost.x86_64", "product_id": "grpc-plugins-0:1.18.0-4.el8ost.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/grpc-plugins@1.18.0-4.el8ost?arch=x86_64" } } }, { "category": "product_version", "name": "python3-grpcio-0:1.18.0-4.el8ost.x86_64", "product": { "name": "python3-grpcio-0:1.18.0-4.el8ost.x86_64", "product_id": "python3-grpcio-0:1.18.0-4.el8ost.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-grpcio@1.18.0-4.el8ost?arch=x86_64" } } }, { "category": "product_version", "name": "grpc-debugsource-0:1.18.0-4.el8ost.x86_64", "product": { "name": "grpc-debugsource-0:1.18.0-4.el8ost.x86_64", "product_id": "grpc-debugsource-0:1.18.0-4.el8ost.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/grpc-debugsource@1.18.0-4.el8ost?arch=x86_64" } } }, { "category": "product_version", "name": "grpc-cli-debuginfo-0:1.18.0-4.el8ost.x86_64", "product": { "name": "grpc-cli-debuginfo-0:1.18.0-4.el8ost.x86_64", "product_id": "grpc-cli-debuginfo-0:1.18.0-4.el8ost.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/grpc-cli-debuginfo@1.18.0-4.el8ost?arch=x86_64" } } }, { "category": "product_version", "name": "grpc-debuginfo-0:1.18.0-4.el8ost.x86_64", "product": { "name": "grpc-debuginfo-0:1.18.0-4.el8ost.x86_64", "product_id": "grpc-debuginfo-0:1.18.0-4.el8ost.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/grpc-debuginfo@1.18.0-4.el8ost?arch=x86_64" } } }, { "category": "product_version", "name": "grpc-plugins-debuginfo-0:1.18.0-4.el8ost.x86_64", "product": { "name": "grpc-plugins-debuginfo-0:1.18.0-4.el8ost.x86_64", "product_id": "grpc-plugins-debuginfo-0:1.18.0-4.el8ost.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/grpc-plugins-debuginfo@1.18.0-4.el8ost?arch=x86_64" } } }, { "category": "product_version", "name": "python3-grpcio-debuginfo-0:1.18.0-4.el8ost.x86_64", "product": { "name": "python3-grpcio-debuginfo-0:1.18.0-4.el8ost.x86_64", "product_id": "python3-grpcio-debuginfo-0:1.18.0-4.el8ost.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-grpcio-debuginfo@1.18.0-4.el8ost?arch=x86_64" } } }, { "category": "product_version", "name": "haproxy20-0:2.0.19-1.el8.x86_64", "product": { "name": "haproxy20-0:2.0.19-1.el8.x86_64", "product_id": "haproxy20-0:2.0.19-1.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/haproxy20@2.0.19-1.el8?arch=x86_64" } } }, { "category": "product_version", "name": "haproxy-debugsource-0:2.0.19-1.el8.x86_64", "product": { "name": "haproxy-debugsource-0:2.0.19-1.el8.x86_64", "product_id": "haproxy-debugsource-0:2.0.19-1.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/haproxy-debugsource@2.0.19-1.el8?arch=x86_64" } } }, { "category": "product_version", "name": "haproxy20-debuginfo-0:2.0.19-1.el8.x86_64", "product": { "name": "haproxy20-debuginfo-0:2.0.19-1.el8.x86_64", "product_id": "haproxy20-debuginfo-0:2.0.19-1.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/haproxy20-debuginfo@2.0.19-1.el8?arch=x86_64" } } }, { "category": "product_version", "name": "jq-0:1.6-2.el8.x86_64", "product": { "name": "jq-0:1.6-2.el8.x86_64", "product_id": "jq-0:1.6-2.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jq@1.6-2.el8?arch=x86_64" } } }, { "category": "product_version", "name": "jq-devel-0:1.6-2.el8.x86_64", "product": { "name": "jq-devel-0:1.6-2.el8.x86_64", "product_id": "jq-devel-0:1.6-2.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jq-devel@1.6-2.el8?arch=x86_64" } } }, { "category": "product_version", "name": "jq-debugsource-0:1.6-2.el8.x86_64", "product": { "name": "jq-debugsource-0:1.6-2.el8.x86_64", "product_id": "jq-debugsource-0:1.6-2.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jq-debugsource@1.6-2.el8?arch=x86_64" } } }, { "category": "product_version", "name": "jq-debuginfo-0:1.6-2.el8.x86_64", "product": { "name": "jq-debuginfo-0:1.6-2.el8.x86_64", "product_id": "jq-debuginfo-0:1.6-2.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jq-debuginfo@1.6-2.el8?arch=x86_64" } } }, { "category": "product_version", "name": "libnftnl-0:1.1.5-4.el8.x86_64", "product": { "name": "libnftnl-0:1.1.5-4.el8.x86_64", "product_id": "libnftnl-0:1.1.5-4.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/libnftnl@1.1.5-4.el8?arch=x86_64" } } }, { "category": "product_version", "name": "libnftnl-devel-0:1.1.5-4.el8.x86_64", "product": { "name": "libnftnl-devel-0:1.1.5-4.el8.x86_64", "product_id": "libnftnl-devel-0:1.1.5-4.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/libnftnl-devel@1.1.5-4.el8?arch=x86_64" } } }, { "category": "product_version", "name": "libnftnl-debugsource-0:1.1.5-4.el8.x86_64", "product": { "name": "libnftnl-debugsource-0:1.1.5-4.el8.x86_64", "product_id": "libnftnl-debugsource-0:1.1.5-4.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/libnftnl-debugsource@1.1.5-4.el8?arch=x86_64" } } }, { "category": "product_version", "name": "libnftnl-debuginfo-0:1.1.5-4.el8.x86_64", "product": { "name": "libnftnl-debuginfo-0:1.1.5-4.el8.x86_64", "product_id": "libnftnl-debuginfo-0:1.1.5-4.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/libnftnl-debuginfo@1.1.5-4.el8?arch=x86_64" } } }, { "category": "product_version", "name": "libsodium-0:1.0.16-4.5.el8ost.x86_64", "product": { "name": "libsodium-0:1.0.16-4.5.el8ost.x86_64", "product_id": "libsodium-0:1.0.16-4.5.el8ost.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/libsodium@1.0.16-4.5.el8ost?arch=x86_64" } } }, { "category": "product_version", "name": "libsodium-devel-0:1.0.16-4.5.el8ost.x86_64", "product": { "name": "libsodium-devel-0:1.0.16-4.5.el8ost.x86_64", "product_id": "libsodium-devel-0:1.0.16-4.5.el8ost.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/libsodium-devel@1.0.16-4.5.el8ost?arch=x86_64" } } }, { "category": "product_version", "name": "libsodium-static-0:1.0.16-4.5.el8ost.x86_64", "product": { "name": "libsodium-static-0:1.0.16-4.5.el8ost.x86_64", "product_id": "libsodium-static-0:1.0.16-4.5.el8ost.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/libsodium-static@1.0.16-4.5.el8ost?arch=x86_64" } } }, { "category": "product_version", "name": "libsodium-debugsource-0:1.0.16-4.5.el8ost.x86_64", "product": { "name": "libsodium-debugsource-0:1.0.16-4.5.el8ost.x86_64", "product_id": "libsodium-debugsource-0:1.0.16-4.5.el8ost.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/libsodium-debugsource@1.0.16-4.5.el8ost?arch=x86_64" } } }, { "category": "product_version", "name": "libsodium-debuginfo-0:1.0.16-4.5.el8ost.x86_64", "product": { "name": "libsodium-debuginfo-0:1.0.16-4.5.el8ost.x86_64", "product_id": "libsodium-debuginfo-0:1.0.16-4.5.el8ost.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/libsodium-debuginfo@1.0.16-4.5.el8ost?arch=x86_64" } } }, { "category": "product_version", "name": "libunwind-0:1.2.1-5.el8.x86_64", "product": { "name": "libunwind-0:1.2.1-5.el8.x86_64", "product_id": "libunwind-0:1.2.1-5.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/libunwind@1.2.1-5.el8?arch=x86_64" } } }, { "category": "product_version", "name": "libunwind-devel-0:1.2.1-5.el8.x86_64", "product": { "name": "libunwind-devel-0:1.2.1-5.el8.x86_64", "product_id": "libunwind-devel-0:1.2.1-5.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/libunwind-devel@1.2.1-5.el8?arch=x86_64" } } }, { "category": "product_version", "name": "libunwind-debugsource-0:1.2.1-5.el8.x86_64", "product": { "name": "libunwind-debugsource-0:1.2.1-5.el8.x86_64", "product_id": "libunwind-debugsource-0:1.2.1-5.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/libunwind-debugsource@1.2.1-5.el8?arch=x86_64" } } }, { "category": "product_version", "name": "libunwind-debuginfo-0:1.2.1-5.el8.x86_64", "product": { "name": "libunwind-debuginfo-0:1.2.1-5.el8.x86_64", "product_id": "libunwind-debuginfo-0:1.2.1-5.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/libunwind-debuginfo@1.2.1-5.el8?arch=x86_64" } } }, { "category": "product_version", "name": "openshift-eventrouter-0:0.2-4.git7c289cc.el8.x86_64", "product": { "name": "openshift-eventrouter-0:0.2-4.git7c289cc.el8.x86_64", "product_id": "openshift-eventrouter-0:0.2-4.git7c289cc.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-eventrouter@0.2-4.git7c289cc.el8?arch=x86_64" } } }, { "category": "product_version", "name": "openshift-eventrouter-debugsource-0:0.2-4.git7c289cc.el8.x86_64", "product": { "name": "openshift-eventrouter-debugsource-0:0.2-4.git7c289cc.el8.x86_64", "product_id": "openshift-eventrouter-debugsource-0:0.2-4.git7c289cc.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-eventrouter-debugsource@0.2-4.git7c289cc.el8?arch=x86_64" } } }, { "category": "product_version", "name": "openshift-eventrouter-debuginfo-0:0.2-4.git7c289cc.el8.x86_64", "product": { "name": "openshift-eventrouter-debuginfo-0:0.2-4.git7c289cc.el8.x86_64", "product_id": "openshift-eventrouter-debuginfo-0:0.2-4.git7c289cc.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-eventrouter-debuginfo@0.2-4.git7c289cc.el8?arch=x86_64" } } }, { "category": "product_version", "name": "network-scripts-openvswitch2.13-0:2.13.0-79.el8fdp.x86_64", "product": { "name": "network-scripts-openvswitch2.13-0:2.13.0-79.el8fdp.x86_64", "product_id": "network-scripts-openvswitch2.13-0:2.13.0-79.el8fdp.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/network-scripts-openvswitch2.13@2.13.0-79.el8fdp?arch=x86_64" } } }, { "category": "product_version", "name": "openvswitch2.13-0:2.13.0-79.el8fdp.x86_64", "product": { "name": "openvswitch2.13-0:2.13.0-79.el8fdp.x86_64", "product_id": "openvswitch2.13-0:2.13.0-79.el8fdp.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openvswitch2.13@2.13.0-79.el8fdp?arch=x86_64" } } }, { "category": "product_version", "name": "openvswitch2.13-devel-0:2.13.0-79.el8fdp.x86_64", "product": { "name": "openvswitch2.13-devel-0:2.13.0-79.el8fdp.x86_64", "product_id": "openvswitch2.13-devel-0:2.13.0-79.el8fdp.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openvswitch2.13-devel@2.13.0-79.el8fdp?arch=x86_64" } } }, { "category": "product_version", "name": "python3-openvswitch2.13-0:2.13.0-79.el8fdp.x86_64", "product": { "name": "python3-openvswitch2.13-0:2.13.0-79.el8fdp.x86_64", "product_id": "python3-openvswitch2.13-0:2.13.0-79.el8fdp.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-openvswitch2.13@2.13.0-79.el8fdp?arch=x86_64" } } }, { "category": "product_version", "name": "openvswitch2.13-debugsource-0:2.13.0-79.el8fdp.x86_64", "product": { "name": "openvswitch2.13-debugsource-0:2.13.0-79.el8fdp.x86_64", "product_id": "openvswitch2.13-debugsource-0:2.13.0-79.el8fdp.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openvswitch2.13-debugsource@2.13.0-79.el8fdp?arch=x86_64" } } }, { "category": "product_version", "name": "openvswitch2.13-debuginfo-0:2.13.0-79.el8fdp.x86_64", "product": { "name": "openvswitch2.13-debuginfo-0:2.13.0-79.el8fdp.x86_64", "product_id": "openvswitch2.13-debuginfo-0:2.13.0-79.el8fdp.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openvswitch2.13-debuginfo@2.13.0-79.el8fdp?arch=x86_64" } } }, { "category": "product_version", "name": "python3-openvswitch2.13-debuginfo-0:2.13.0-79.el8fdp.x86_64", "product": { "name": "python3-openvswitch2.13-debuginfo-0:2.13.0-79.el8fdp.x86_64", "product_id": "python3-openvswitch2.13-debuginfo-0:2.13.0-79.el8fdp.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-openvswitch2.13-debuginfo@2.13.0-79.el8fdp?arch=x86_64" } } }, { "category": "product_version", "name": "ovn2.13-0:20.09.0-21.el8fdn.x86_64", "product": { "name": "ovn2.13-0:20.09.0-21.el8fdn.x86_64", "product_id": "ovn2.13-0:20.09.0-21.el8fdn.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn2.13@20.09.0-21.el8fdn?arch=x86_64" } } }, { "category": "product_version", "name": "ovn2.13-central-0:20.09.0-21.el8fdn.x86_64", "product": { "name": "ovn2.13-central-0:20.09.0-21.el8fdn.x86_64", "product_id": "ovn2.13-central-0:20.09.0-21.el8fdn.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn2.13-central@20.09.0-21.el8fdn?arch=x86_64" } } }, { "category": "product_version", "name": "ovn2.13-host-0:20.09.0-21.el8fdn.x86_64", "product": { "name": "ovn2.13-host-0:20.09.0-21.el8fdn.x86_64", "product_id": "ovn2.13-host-0:20.09.0-21.el8fdn.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn2.13-host@20.09.0-21.el8fdn?arch=x86_64" } } }, { "category": "product_version", "name": "ovn2.13-vtep-0:20.09.0-21.el8fdn.x86_64", "product": { "name": "ovn2.13-vtep-0:20.09.0-21.el8fdn.x86_64", "product_id": "ovn2.13-vtep-0:20.09.0-21.el8fdn.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn2.13-vtep@20.09.0-21.el8fdn?arch=x86_64" } } }, { "category": "product_version", "name": "ovn2.13-debugsource-0:20.09.0-21.el8fdn.x86_64", "product": { "name": "ovn2.13-debugsource-0:20.09.0-21.el8fdn.x86_64", "product_id": "ovn2.13-debugsource-0:20.09.0-21.el8fdn.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn2.13-debugsource@20.09.0-21.el8fdn?arch=x86_64" } } }, { "category": "product_version", "name": "ovn2.13-central-debuginfo-0:20.09.0-21.el8fdn.x86_64", "product": { "name": "ovn2.13-central-debuginfo-0:20.09.0-21.el8fdn.x86_64", "product_id": "ovn2.13-central-debuginfo-0:20.09.0-21.el8fdn.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn2.13-central-debuginfo@20.09.0-21.el8fdn?arch=x86_64" } } }, { "category": "product_version", "name": "ovn2.13-debuginfo-0:20.09.0-21.el8fdn.x86_64", "product": { "name": "ovn2.13-debuginfo-0:20.09.0-21.el8fdn.x86_64", "product_id": "ovn2.13-debuginfo-0:20.09.0-21.el8fdn.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn2.13-debuginfo@20.09.0-21.el8fdn?arch=x86_64" } } }, { "category": "product_version", "name": "ovn2.13-host-debuginfo-0:20.09.0-21.el8fdn.x86_64", "product": { "name": "ovn2.13-host-debuginfo-0:20.09.0-21.el8fdn.x86_64", "product_id": "ovn2.13-host-debuginfo-0:20.09.0-21.el8fdn.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn2.13-host-debuginfo@20.09.0-21.el8fdn?arch=x86_64" } } }, { "category": "product_version", "name": "ovn2.13-vtep-debuginfo-0:20.09.0-21.el8fdn.x86_64", "product": { "name": "ovn2.13-vtep-debuginfo-0:20.09.0-21.el8fdn.x86_64", "product_id": "ovn2.13-vtep-debuginfo-0:20.09.0-21.el8fdn.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn2.13-vtep-debuginfo@20.09.0-21.el8fdn?arch=x86_64" } } }, { "category": "product_version", "name": "protobuf-0:3.6.1-4.el8ost.x86_64", "product": { "name": "protobuf-0:3.6.1-4.el8ost.x86_64", "product_id": "protobuf-0:3.6.1-4.el8ost.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/protobuf@3.6.1-4.el8ost?arch=x86_64" } } }, { "category": "product_version", "name": "protobuf-compiler-0:3.6.1-4.el8ost.x86_64", "product": { "name": "protobuf-compiler-0:3.6.1-4.el8ost.x86_64", "product_id": "protobuf-compiler-0:3.6.1-4.el8ost.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/protobuf-compiler@3.6.1-4.el8ost?arch=x86_64" } } }, { "category": "product_version", "name": "protobuf-devel-0:3.6.1-4.el8ost.x86_64", "product": { "name": "protobuf-devel-0:3.6.1-4.el8ost.x86_64", "product_id": "protobuf-devel-0:3.6.1-4.el8ost.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/protobuf-devel@3.6.1-4.el8ost?arch=x86_64" } } }, { "category": "product_version", "name": "protobuf-lite-0:3.6.1-4.el8ost.x86_64", "product": { "name": "protobuf-lite-0:3.6.1-4.el8ost.x86_64", "product_id": "protobuf-lite-0:3.6.1-4.el8ost.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/protobuf-lite@3.6.1-4.el8ost?arch=x86_64" } } }, { "category": "product_version", "name": "protobuf-lite-devel-0:3.6.1-4.el8ost.x86_64", "product": { "name": "protobuf-lite-devel-0:3.6.1-4.el8ost.x86_64", "product_id": "protobuf-lite-devel-0:3.6.1-4.el8ost.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/protobuf-lite-devel@3.6.1-4.el8ost?arch=x86_64" } } }, { "category": "product_version", "name": "protobuf-lite-static-0:3.6.1-4.el8ost.x86_64", "product": { "name": "protobuf-lite-static-0:3.6.1-4.el8ost.x86_64", "product_id": "protobuf-lite-static-0:3.6.1-4.el8ost.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/protobuf-lite-static@3.6.1-4.el8ost?arch=x86_64" } } }, { "category": "product_version", "name": "protobuf-static-0:3.6.1-4.el8ost.x86_64", "product": { "name": "protobuf-static-0:3.6.1-4.el8ost.x86_64", "product_id": "protobuf-static-0:3.6.1-4.el8ost.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/protobuf-static@3.6.1-4.el8ost?arch=x86_64" } } }, { "category": "product_version", "name": "protobuf-debugsource-0:3.6.1-4.el8ost.x86_64", "product": { "name": "protobuf-debugsource-0:3.6.1-4.el8ost.x86_64", "product_id": "protobuf-debugsource-0:3.6.1-4.el8ost.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/protobuf-debugsource@3.6.1-4.el8ost?arch=x86_64" } } }, { "category": "product_version", "name": "protobuf-compiler-debuginfo-0:3.6.1-4.el8ost.x86_64", "product": { "name": "protobuf-compiler-debuginfo-0:3.6.1-4.el8ost.x86_64", "product_id": "protobuf-compiler-debuginfo-0:3.6.1-4.el8ost.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/protobuf-compiler-debuginfo@3.6.1-4.el8ost?arch=x86_64" } } }, { "category": "product_version", "name": "protobuf-debuginfo-0:3.6.1-4.el8ost.x86_64", "product": { "name": "protobuf-debuginfo-0:3.6.1-4.el8ost.x86_64", "product_id": "protobuf-debuginfo-0:3.6.1-4.el8ost.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/protobuf-debuginfo@3.6.1-4.el8ost?arch=x86_64" } } }, { "category": "product_version", "name": "protobuf-lite-debuginfo-0:3.6.1-4.el8ost.x86_64", "product": { "name": "protobuf-lite-debuginfo-0:3.6.1-4.el8ost.x86_64", "product_id": "protobuf-lite-debuginfo-0:3.6.1-4.el8ost.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/protobuf-lite-debuginfo@3.6.1-4.el8ost?arch=x86_64" } } }, { "category": "product_version", "name": "python3-msgpack-0:0.6.2-1.el8ost.x86_64", "product": { "name": "python3-msgpack-0:0.6.2-1.el8ost.x86_64", "product_id": "python3-msgpack-0:0.6.2-1.el8ost.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-msgpack@0.6.2-1.el8ost?arch=x86_64" } } }, { "category": "product_version", "name": "python-msgpack-debugsource-0:0.6.2-1.el8ost.x86_64", "product": { "name": "python-msgpack-debugsource-0:0.6.2-1.el8ost.x86_64", "product_id": "python-msgpack-debugsource-0:0.6.2-1.el8ost.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-msgpack-debugsource@0.6.2-1.el8ost?arch=x86_64" } } }, { "category": "product_version", "name": "python3-msgpack-debuginfo-0:0.6.2-1.el8ost.x86_64", "product": { "name": "python3-msgpack-debuginfo-0:0.6.2-1.el8ost.x86_64", "product_id": "python3-msgpack-debuginfo-0:0.6.2-1.el8ost.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-msgpack-debuginfo@0.6.2-1.el8ost?arch=x86_64" } } }, { "category": "product_version", "name": "python3-psutil-0:5.6.6-1.el8ar.x86_64", "product": { "name": "python3-psutil-0:5.6.6-1.el8ar.x86_64", "product_id": "python3-psutil-0:5.6.6-1.el8ar.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-psutil@5.6.6-1.el8ar?arch=x86_64" } } }, { "category": "product_version", "name": "python-psutil-debugsource-0:5.6.6-1.el8ar.x86_64", "product": { "name": "python-psutil-debugsource-0:5.6.6-1.el8ar.x86_64", "product_id": "python-psutil-debugsource-0:5.6.6-1.el8ar.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-psutil-debugsource@5.6.6-1.el8ar?arch=x86_64" } } }, { "category": "product_version", "name": "python3-psutil-debuginfo-0:5.6.6-1.el8ar.x86_64", "product": { "name": "python3-psutil-debuginfo-0:5.6.6-1.el8ar.x86_64", "product_id": "python3-psutil-debuginfo-0:5.6.6-1.el8ar.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-psutil-debuginfo@5.6.6-1.el8ar?arch=x86_64" } } }, { "category": "product_version", "name": "python3-ruamel-yaml-0:0.15.41-4.el8ost.x86_64", "product": { "name": "python3-ruamel-yaml-0:0.15.41-4.el8ost.x86_64", "product_id": "python3-ruamel-yaml-0:0.15.41-4.el8ost.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-ruamel-yaml@0.15.41-4.el8ost?arch=x86_64" } } }, { "category": "product_version", "name": "python-ruamel-yaml-debugsource-0:0.15.41-4.el8ost.x86_64", "product": { "name": "python-ruamel-yaml-debugsource-0:0.15.41-4.el8ost.x86_64", "product_id": "python-ruamel-yaml-debugsource-0:0.15.41-4.el8ost.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-ruamel-yaml-debugsource@0.15.41-4.el8ost?arch=x86_64" } } }, { "category": "product_version", "name": "python3-ruamel-yaml-debuginfo-0:0.15.41-4.el8ost.x86_64", "product": { "name": "python3-ruamel-yaml-debuginfo-0:0.15.41-4.el8ost.x86_64", "product_id": "python3-ruamel-yaml-debuginfo-0:0.15.41-4.el8ost.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-ruamel-yaml-debuginfo@0.15.41-4.el8ost?arch=x86_64" } } }, { "category": "product_version", "name": "tini-0:0.16.1-1.el8ar.x86_64", "product": { "name": "tini-0:0.16.1-1.el8ar.x86_64", "product_id": "tini-0:0.16.1-1.el8ar.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/tini@0.16.1-1.el8ar?arch=x86_64" } } }, { "category": "product_version", "name": "NetworkManager-1:1.26.0-12.1.rhaos4.7.el8.x86_64", "product": { "name": "NetworkManager-1:1.26.0-12.1.rhaos4.7.el8.x86_64", "product_id": "NetworkManager-1:1.26.0-12.1.rhaos4.7.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/NetworkManager@1.26.0-12.1.rhaos4.7.el8?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "NetworkManager-adsl-1:1.26.0-12.1.rhaos4.7.el8.x86_64", "product": { "name": "NetworkManager-adsl-1:1.26.0-12.1.rhaos4.7.el8.x86_64", "product_id": "NetworkManager-adsl-1:1.26.0-12.1.rhaos4.7.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/NetworkManager-adsl@1.26.0-12.1.rhaos4.7.el8?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "NetworkManager-bluetooth-1:1.26.0-12.1.rhaos4.7.el8.x86_64", "product": { "name": "NetworkManager-bluetooth-1:1.26.0-12.1.rhaos4.7.el8.x86_64", "product_id": "NetworkManager-bluetooth-1:1.26.0-12.1.rhaos4.7.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/NetworkManager-bluetooth@1.26.0-12.1.rhaos4.7.el8?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "NetworkManager-cloud-setup-1:1.26.0-12.1.rhaos4.7.el8.x86_64", "product": { "name": "NetworkManager-cloud-setup-1:1.26.0-12.1.rhaos4.7.el8.x86_64", "product_id": "NetworkManager-cloud-setup-1:1.26.0-12.1.rhaos4.7.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/NetworkManager-cloud-setup@1.26.0-12.1.rhaos4.7.el8?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "NetworkManager-libnm-1:1.26.0-12.1.rhaos4.7.el8.x86_64", "product": { "name": "NetworkManager-libnm-1:1.26.0-12.1.rhaos4.7.el8.x86_64", "product_id": "NetworkManager-libnm-1:1.26.0-12.1.rhaos4.7.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/NetworkManager-libnm@1.26.0-12.1.rhaos4.7.el8?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "NetworkManager-libnm-devel-1:1.26.0-12.1.rhaos4.7.el8.x86_64", "product": { "name": "NetworkManager-libnm-devel-1:1.26.0-12.1.rhaos4.7.el8.x86_64", "product_id": "NetworkManager-libnm-devel-1:1.26.0-12.1.rhaos4.7.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/NetworkManager-libnm-devel@1.26.0-12.1.rhaos4.7.el8?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "NetworkManager-ovs-1:1.26.0-12.1.rhaos4.7.el8.x86_64", "product": { "name": "NetworkManager-ovs-1:1.26.0-12.1.rhaos4.7.el8.x86_64", "product_id": "NetworkManager-ovs-1:1.26.0-12.1.rhaos4.7.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/NetworkManager-ovs@1.26.0-12.1.rhaos4.7.el8?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "NetworkManager-ppp-1:1.26.0-12.1.rhaos4.7.el8.x86_64", "product": { "name": "NetworkManager-ppp-1:1.26.0-12.1.rhaos4.7.el8.x86_64", "product_id": "NetworkManager-ppp-1:1.26.0-12.1.rhaos4.7.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/NetworkManager-ppp@1.26.0-12.1.rhaos4.7.el8?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "NetworkManager-team-1:1.26.0-12.1.rhaos4.7.el8.x86_64", "product": { "name": "NetworkManager-team-1:1.26.0-12.1.rhaos4.7.el8.x86_64", "product_id": "NetworkManager-team-1:1.26.0-12.1.rhaos4.7.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/NetworkManager-team@1.26.0-12.1.rhaos4.7.el8?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "NetworkManager-tui-1:1.26.0-12.1.rhaos4.7.el8.x86_64", "product": { "name": "NetworkManager-tui-1:1.26.0-12.1.rhaos4.7.el8.x86_64", "product_id": "NetworkManager-tui-1:1.26.0-12.1.rhaos4.7.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/NetworkManager-tui@1.26.0-12.1.rhaos4.7.el8?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "NetworkManager-wifi-1:1.26.0-12.1.rhaos4.7.el8.x86_64", "product": { "name": "NetworkManager-wifi-1:1.26.0-12.1.rhaos4.7.el8.x86_64", "product_id": "NetworkManager-wifi-1:1.26.0-12.1.rhaos4.7.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/NetworkManager-wifi@1.26.0-12.1.rhaos4.7.el8?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "NetworkManager-wwan-1:1.26.0-12.1.rhaos4.7.el8.x86_64", "product": { "name": "NetworkManager-wwan-1:1.26.0-12.1.rhaos4.7.el8.x86_64", "product_id": "NetworkManager-wwan-1:1.26.0-12.1.rhaos4.7.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/NetworkManager-wwan@1.26.0-12.1.rhaos4.7.el8?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "NetworkManager-debugsource-1:1.26.0-12.1.rhaos4.7.el8.x86_64", "product": { "name": "NetworkManager-debugsource-1:1.26.0-12.1.rhaos4.7.el8.x86_64", "product_id": "NetworkManager-debugsource-1:1.26.0-12.1.rhaos4.7.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/NetworkManager-debugsource@1.26.0-12.1.rhaos4.7.el8?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "NetworkManager-adsl-debuginfo-1:1.26.0-12.1.rhaos4.7.el8.x86_64", "product": { "name": "NetworkManager-adsl-debuginfo-1:1.26.0-12.1.rhaos4.7.el8.x86_64", "product_id": "NetworkManager-adsl-debuginfo-1:1.26.0-12.1.rhaos4.7.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/NetworkManager-adsl-debuginfo@1.26.0-12.1.rhaos4.7.el8?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "NetworkManager-bluetooth-debuginfo-1:1.26.0-12.1.rhaos4.7.el8.x86_64", "product": { "name": "NetworkManager-bluetooth-debuginfo-1:1.26.0-12.1.rhaos4.7.el8.x86_64", "product_id": "NetworkManager-bluetooth-debuginfo-1:1.26.0-12.1.rhaos4.7.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/NetworkManager-bluetooth-debuginfo@1.26.0-12.1.rhaos4.7.el8?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "NetworkManager-cloud-setup-debuginfo-1:1.26.0-12.1.rhaos4.7.el8.x86_64", "product": { "name": "NetworkManager-cloud-setup-debuginfo-1:1.26.0-12.1.rhaos4.7.el8.x86_64", "product_id": "NetworkManager-cloud-setup-debuginfo-1:1.26.0-12.1.rhaos4.7.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/NetworkManager-cloud-setup-debuginfo@1.26.0-12.1.rhaos4.7.el8?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "NetworkManager-debuginfo-1:1.26.0-12.1.rhaos4.7.el8.x86_64", "product": { "name": "NetworkManager-debuginfo-1:1.26.0-12.1.rhaos4.7.el8.x86_64", "product_id": "NetworkManager-debuginfo-1:1.26.0-12.1.rhaos4.7.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/NetworkManager-debuginfo@1.26.0-12.1.rhaos4.7.el8?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "NetworkManager-libnm-debuginfo-1:1.26.0-12.1.rhaos4.7.el8.x86_64", "product": { "name": "NetworkManager-libnm-debuginfo-1:1.26.0-12.1.rhaos4.7.el8.x86_64", "product_id": "NetworkManager-libnm-debuginfo-1:1.26.0-12.1.rhaos4.7.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/NetworkManager-libnm-debuginfo@1.26.0-12.1.rhaos4.7.el8?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "NetworkManager-ovs-debuginfo-1:1.26.0-12.1.rhaos4.7.el8.x86_64", "product": { "name": "NetworkManager-ovs-debuginfo-1:1.26.0-12.1.rhaos4.7.el8.x86_64", "product_id": "NetworkManager-ovs-debuginfo-1:1.26.0-12.1.rhaos4.7.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/NetworkManager-ovs-debuginfo@1.26.0-12.1.rhaos4.7.el8?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "NetworkManager-ppp-debuginfo-1:1.26.0-12.1.rhaos4.7.el8.x86_64", "product": { "name": "NetworkManager-ppp-debuginfo-1:1.26.0-12.1.rhaos4.7.el8.x86_64", "product_id": "NetworkManager-ppp-debuginfo-1:1.26.0-12.1.rhaos4.7.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/NetworkManager-ppp-debuginfo@1.26.0-12.1.rhaos4.7.el8?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "NetworkManager-team-debuginfo-1:1.26.0-12.1.rhaos4.7.el8.x86_64", "product": { "name": "NetworkManager-team-debuginfo-1:1.26.0-12.1.rhaos4.7.el8.x86_64", "product_id": "NetworkManager-team-debuginfo-1:1.26.0-12.1.rhaos4.7.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/NetworkManager-team-debuginfo@1.26.0-12.1.rhaos4.7.el8?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "NetworkManager-tui-debuginfo-1:1.26.0-12.1.rhaos4.7.el8.x86_64", "product": { "name": "NetworkManager-tui-debuginfo-1:1.26.0-12.1.rhaos4.7.el8.x86_64", "product_id": "NetworkManager-tui-debuginfo-1:1.26.0-12.1.rhaos4.7.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/NetworkManager-tui-debuginfo@1.26.0-12.1.rhaos4.7.el8?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "NetworkManager-wifi-debuginfo-1:1.26.0-12.1.rhaos4.7.el8.x86_64", "product": { "name": "NetworkManager-wifi-debuginfo-1:1.26.0-12.1.rhaos4.7.el8.x86_64", "product_id": "NetworkManager-wifi-debuginfo-1:1.26.0-12.1.rhaos4.7.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/NetworkManager-wifi-debuginfo@1.26.0-12.1.rhaos4.7.el8?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "NetworkManager-wwan-debuginfo-1:1.26.0-12.1.rhaos4.7.el8.x86_64", "product": { "name": "NetworkManager-wwan-debuginfo-1:1.26.0-12.1.rhaos4.7.el8.x86_64", "product_id": "NetworkManager-wwan-debuginfo-1:1.26.0-12.1.rhaos4.7.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/NetworkManager-wwan-debuginfo@1.26.0-12.1.rhaos4.7.el8?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "openshift-clients-0:4.7.0-202102032256.p0.git.3951.0e656ef.el8.x86_64", "product": { "name": "openshift-clients-0:4.7.0-202102032256.p0.git.3951.0e656ef.el8.x86_64", "product_id": "openshift-clients-0:4.7.0-202102032256.p0.git.3951.0e656ef.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-clients@4.7.0-202102032256.p0.git.3951.0e656ef.el8?arch=x86_64" } } }, { "category": "product_version", "name": "openshift-clients-redistributable-0:4.7.0-202102032256.p0.git.3951.0e656ef.el8.x86_64", "product": { "name": "openshift-clients-redistributable-0:4.7.0-202102032256.p0.git.3951.0e656ef.el8.x86_64", "product_id": "openshift-clients-redistributable-0:4.7.0-202102032256.p0.git.3951.0e656ef.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-clients-redistributable@4.7.0-202102032256.p0.git.3951.0e656ef.el8?arch=x86_64" } } }, { "category": "product_version", "name": "gperftools-0:2.6.3-2.el8ost.x86_64", "product": { "name": "gperftools-0:2.6.3-2.el8ost.x86_64", "product_id": "gperftools-0:2.6.3-2.el8ost.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/gperftools@2.6.3-2.el8ost?arch=x86_64" } } }, { "category": "product_version", "name": "gperftools-devel-0:2.6.3-2.el8ost.x86_64", "product": { "name": "gperftools-devel-0:2.6.3-2.el8ost.x86_64", "product_id": "gperftools-devel-0:2.6.3-2.el8ost.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/gperftools-devel@2.6.3-2.el8ost?arch=x86_64" } } }, { "category": "product_version", "name": "gperftools-libs-0:2.6.3-2.el8ost.x86_64", "product": { "name": "gperftools-libs-0:2.6.3-2.el8ost.x86_64", "product_id": "gperftools-libs-0:2.6.3-2.el8ost.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/gperftools-libs@2.6.3-2.el8ost?arch=x86_64" } } }, { "category": "product_version", "name": "gperftools-debugsource-0:2.6.3-2.el8ost.x86_64", "product": { "name": "gperftools-debugsource-0:2.6.3-2.el8ost.x86_64", "product_id": "gperftools-debugsource-0:2.6.3-2.el8ost.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/gperftools-debugsource@2.6.3-2.el8ost?arch=x86_64" } } }, { "category": "product_version", "name": "gperftools-libs-debuginfo-0:2.6.3-2.el8ost.x86_64", "product": { "name": "gperftools-libs-debuginfo-0:2.6.3-2.el8ost.x86_64", "product_id": "gperftools-libs-debuginfo-0:2.6.3-2.el8ost.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/gperftools-libs-debuginfo@2.6.3-2.el8ost?arch=x86_64" } } }, { "category": "product_version", "name": "clevis-0:15-1.el8.x86_64", "product": { "name": "clevis-0:15-1.el8.x86_64", "product_id": "clevis-0:15-1.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/clevis@15-1.el8?arch=x86_64" } } }, { "category": "product_version", "name": "clevis-dracut-0:15-1.el8.x86_64", "product": { "name": "clevis-dracut-0:15-1.el8.x86_64", "product_id": "clevis-dracut-0:15-1.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/clevis-dracut@15-1.el8?arch=x86_64" } } }, { "category": "product_version", "name": "clevis-luks-0:15-1.el8.x86_64", "product": { "name": "clevis-luks-0:15-1.el8.x86_64", "product_id": "clevis-luks-0:15-1.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/clevis-luks@15-1.el8?arch=x86_64" } } }, { "category": "product_version", "name": "clevis-systemd-0:15-1.el8.x86_64", "product": { "name": "clevis-systemd-0:15-1.el8.x86_64", "product_id": "clevis-systemd-0:15-1.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/clevis-systemd@15-1.el8?arch=x86_64" } } }, { "category": "product_version", "name": "clevis-udisks2-0:15-1.el8.x86_64", "product": { "name": "clevis-udisks2-0:15-1.el8.x86_64", "product_id": "clevis-udisks2-0:15-1.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/clevis-udisks2@15-1.el8?arch=x86_64" } } }, { "category": "product_version", "name": "clevis-debugsource-0:15-1.el8.x86_64", "product": { "name": "clevis-debugsource-0:15-1.el8.x86_64", "product_id": "clevis-debugsource-0:15-1.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/clevis-debugsource@15-1.el8?arch=x86_64" } } }, { "category": "product_version", "name": "clevis-debuginfo-0:15-1.el8.x86_64", "product": { "name": "clevis-debuginfo-0:15-1.el8.x86_64", "product_id": "clevis-debuginfo-0:15-1.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/clevis-debuginfo@15-1.el8?arch=x86_64" } } }, { "category": "product_version", "name": "clevis-udisks2-debuginfo-0:15-1.el8.x86_64", "product": { "name": "clevis-udisks2-debuginfo-0:15-1.el8.x86_64", "product_id": "clevis-udisks2-debuginfo-0:15-1.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/clevis-udisks2-debuginfo@15-1.el8?arch=x86_64" } } }, { "category": "product_version", "name": "bootupd-0:0.2.5-2.el8.x86_64", "product": { "name": "bootupd-0:0.2.5-2.el8.x86_64", "product_id": "bootupd-0:0.2.5-2.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/bootupd@0.2.5-2.el8?arch=x86_64" } } }, { "category": "product_version", "name": "rust-bootupd-debugsource-0:0.2.5-2.el8.x86_64", "product": { "name": "rust-bootupd-debugsource-0:0.2.5-2.el8.x86_64", "product_id": "rust-bootupd-debugsource-0:0.2.5-2.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/rust-bootupd-debugsource@0.2.5-2.el8?arch=x86_64" } } }, { "category": "product_version", "name": "bootupd-debuginfo-0:0.2.5-2.el8.x86_64", "product": { "name": "bootupd-debuginfo-0:0.2.5-2.el8.x86_64", "product_id": "bootupd-debuginfo-0:0.2.5-2.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/bootupd-debuginfo@0.2.5-2.el8?arch=x86_64" } } }, { "category": "product_version", "name": "afterburn-0:4.6.0-1.rhaos4.7.el8.x86_64", "product": { "name": "afterburn-0:4.6.0-1.rhaos4.7.el8.x86_64", "product_id": "afterburn-0:4.6.0-1.rhaos4.7.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/afterburn@4.6.0-1.rhaos4.7.el8?arch=x86_64" } } }, { "category": "product_version", "name": "rust-afterburn-debugsource-0:4.6.0-1.rhaos4.7.el8.x86_64", "product": { "name": "rust-afterburn-debugsource-0:4.6.0-1.rhaos4.7.el8.x86_64", "product_id": "rust-afterburn-debugsource-0:4.6.0-1.rhaos4.7.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/rust-afterburn-debugsource@4.6.0-1.rhaos4.7.el8?arch=x86_64" } } }, { "category": "product_version", "name": "afterburn-debuginfo-0:4.6.0-1.rhaos4.7.el8.x86_64", "product": { "name": "afterburn-debuginfo-0:4.6.0-1.rhaos4.7.el8.x86_64", "product_id": "afterburn-debuginfo-0:4.6.0-1.rhaos4.7.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/afterburn-debuginfo@4.6.0-1.rhaos4.7.el8?arch=x86_64" } } }, { "category": "product_version", "name": "rpm-ostree-0:2020.7-1.el8_3.x86_64", "product": { "name": "rpm-ostree-0:2020.7-1.el8_3.x86_64", "product_id": "rpm-ostree-0:2020.7-1.el8_3.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/rpm-ostree@2020.7-1.el8_3?arch=x86_64" } } }, { "category": "product_version", "name": "rpm-ostree-devel-0:2020.7-1.el8_3.x86_64", "product": { "name": "rpm-ostree-devel-0:2020.7-1.el8_3.x86_64", "product_id": "rpm-ostree-devel-0:2020.7-1.el8_3.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/rpm-ostree-devel@2020.7-1.el8_3?arch=x86_64" } } }, { "category": "product_version", "name": "rpm-ostree-libs-0:2020.7-1.el8_3.x86_64", "product": { "name": "rpm-ostree-libs-0:2020.7-1.el8_3.x86_64", "product_id": "rpm-ostree-libs-0:2020.7-1.el8_3.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/rpm-ostree-libs@2020.7-1.el8_3?arch=x86_64" } } }, { "category": "product_version", "name": "rpm-ostree-debugsource-0:2020.7-1.el8_3.x86_64", "product": { "name": "rpm-ostree-debugsource-0:2020.7-1.el8_3.x86_64", "product_id": "rpm-ostree-debugsource-0:2020.7-1.el8_3.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/rpm-ostree-debugsource@2020.7-1.el8_3?arch=x86_64" } } }, { "category": "product_version", "name": "rpm-ostree-debuginfo-0:2020.7-1.el8_3.x86_64", "product": { "name": "rpm-ostree-debuginfo-0:2020.7-1.el8_3.x86_64", "product_id": "rpm-ostree-debuginfo-0:2020.7-1.el8_3.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/rpm-ostree-debuginfo@2020.7-1.el8_3?arch=x86_64" } } }, { "category": "product_version", "name": "rpm-ostree-libs-debuginfo-0:2020.7-1.el8_3.x86_64", "product": { "name": "rpm-ostree-libs-debuginfo-0:2020.7-1.el8_3.x86_64", "product_id": "rpm-ostree-libs-debuginfo-0:2020.7-1.el8_3.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/rpm-ostree-libs-debuginfo@2020.7-1.el8_3?arch=x86_64" } } }, { "category": "product_version", "name": "redhat-release-coreos-0:47.83-1.el8.x86_64", "product": { "name": "redhat-release-coreos-0:47.83-1.el8.x86_64", "product_id": "redhat-release-coreos-0:47.83-1.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/redhat-release-coreos@47.83-1.el8?arch=x86_64" } } }, { "category": "product_version", "name": "ostree-0:2020.7-1.el8.x86_64", "product": { "name": "ostree-0:2020.7-1.el8.x86_64", "product_id": "ostree-0:2020.7-1.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ostree@2020.7-1.el8?arch=x86_64" } } }, { "category": "product_version", "name": "ostree-devel-0:2020.7-1.el8.x86_64", "product": { "name": "ostree-devel-0:2020.7-1.el8.x86_64", "product_id": "ostree-devel-0:2020.7-1.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ostree-devel@2020.7-1.el8?arch=x86_64" } } }, { "category": "product_version", "name": "ostree-grub2-0:2020.7-1.el8.x86_64", "product": { "name": "ostree-grub2-0:2020.7-1.el8.x86_64", "product_id": "ostree-grub2-0:2020.7-1.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ostree-grub2@2020.7-1.el8?arch=x86_64" } } }, { "category": "product_version", "name": "ostree-libs-0:2020.7-1.el8.x86_64", "product": { "name": "ostree-libs-0:2020.7-1.el8.x86_64", "product_id": "ostree-libs-0:2020.7-1.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ostree-libs@2020.7-1.el8?arch=x86_64" } } }, { "category": "product_version", "name": "ostree-debugsource-0:2020.7-1.el8.x86_64", "product": { "name": "ostree-debugsource-0:2020.7-1.el8.x86_64", "product_id": "ostree-debugsource-0:2020.7-1.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ostree-debugsource@2020.7-1.el8?arch=x86_64" } } }, { "category": "product_version", "name": "ostree-debuginfo-0:2020.7-1.el8.x86_64", "product": { "name": "ostree-debuginfo-0:2020.7-1.el8.x86_64", "product_id": "ostree-debuginfo-0:2020.7-1.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ostree-debuginfo@2020.7-1.el8?arch=x86_64" } } }, { "category": "product_version", "name": "ostree-libs-debuginfo-0:2020.7-1.el8.x86_64", "product": { "name": "ostree-libs-debuginfo-0:2020.7-1.el8.x86_64", "product_id": "ostree-libs-debuginfo-0:2020.7-1.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ostree-libs-debuginfo@2020.7-1.el8?arch=x86_64" } } }, { "category": "product_version", "name": "inotify-tools-0:3.20.1-2.el8.x86_64", "product": { "name": "inotify-tools-0:3.20.1-2.el8.x86_64", "product_id": "inotify-tools-0:3.20.1-2.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/inotify-tools@3.20.1-2.el8?arch=x86_64" } } }, { "category": "product_version", "name": "inotify-tools-devel-0:3.20.1-2.el8.x86_64", "product": { "name": "inotify-tools-devel-0:3.20.1-2.el8.x86_64", "product_id": "inotify-tools-devel-0:3.20.1-2.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/inotify-tools-devel@3.20.1-2.el8?arch=x86_64" } } }, { "category": "product_version", "name": "inotify-tools-debugsource-0:3.20.1-2.el8.x86_64", "product": { "name": "inotify-tools-debugsource-0:3.20.1-2.el8.x86_64", "product_id": "inotify-tools-debugsource-0:3.20.1-2.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/inotify-tools-debugsource@3.20.1-2.el8?arch=x86_64" } } }, { "category": "product_version", "name": "inotify-tools-debuginfo-0:3.20.1-2.el8.x86_64", "product": { "name": "inotify-tools-debuginfo-0:3.20.1-2.el8.x86_64", "product_id": "inotify-tools-debuginfo-0:3.20.1-2.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/inotify-tools-debuginfo@3.20.1-2.el8?arch=x86_64" } } }, { "category": "product_version", "name": "ignition-0:2.9.0-2.rhaos4.7.git1d56dc8.el8.x86_64", "product": { "name": "ignition-0:2.9.0-2.rhaos4.7.git1d56dc8.el8.x86_64", "product_id": "ignition-0:2.9.0-2.rhaos4.7.git1d56dc8.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ignition@2.9.0-2.rhaos4.7.git1d56dc8.el8?arch=x86_64" } } }, { "category": "product_version", "name": "ignition-validate-0:2.9.0-2.rhaos4.7.git1d56dc8.el8.x86_64", "product": { "name": "ignition-validate-0:2.9.0-2.rhaos4.7.git1d56dc8.el8.x86_64", "product_id": "ignition-validate-0:2.9.0-2.rhaos4.7.git1d56dc8.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ignition-validate@2.9.0-2.rhaos4.7.git1d56dc8.el8?arch=x86_64" } } }, { "category": "product_version", "name": "ignition-debugsource-0:2.9.0-2.rhaos4.7.git1d56dc8.el8.x86_64", "product": { "name": "ignition-debugsource-0:2.9.0-2.rhaos4.7.git1d56dc8.el8.x86_64", "product_id": "ignition-debugsource-0:2.9.0-2.rhaos4.7.git1d56dc8.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ignition-debugsource@2.9.0-2.rhaos4.7.git1d56dc8.el8?arch=x86_64" } } }, { "category": "product_version", "name": "ignition-debuginfo-0:2.9.0-2.rhaos4.7.git1d56dc8.el8.x86_64", "product": { "name": "ignition-debuginfo-0:2.9.0-2.rhaos4.7.git1d56dc8.el8.x86_64", "product_id": "ignition-debuginfo-0:2.9.0-2.rhaos4.7.git1d56dc8.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ignition-debuginfo@2.9.0-2.rhaos4.7.git1d56dc8.el8?arch=x86_64" } } }, { "category": "product_version", "name": "ignition-validate-debuginfo-0:2.9.0-2.rhaos4.7.git1d56dc8.el8.x86_64", "product": { "name": "ignition-validate-debuginfo-0:2.9.0-2.rhaos4.7.git1d56dc8.el8.x86_64", "product_id": "ignition-validate-debuginfo-0:2.9.0-2.rhaos4.7.git1d56dc8.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ignition-validate-debuginfo@2.9.0-2.rhaos4.7.git1d56dc8.el8?arch=x86_64" } } }, { "category": "product_version", "name": "coreos-installer-0:0.8.0-3.rhaos4.7.el8.x86_64", "product": { "name": "coreos-installer-0:0.8.0-3.rhaos4.7.el8.x86_64", "product_id": "coreos-installer-0:0.8.0-3.rhaos4.7.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/coreos-installer@0.8.0-3.rhaos4.7.el8?arch=x86_64" } } }, { "category": "product_version", "name": "coreos-installer-debugsource-0:0.8.0-3.rhaos4.7.el8.x86_64", "product": { "name": "coreos-installer-debugsource-0:0.8.0-3.rhaos4.7.el8.x86_64", "product_id": "coreos-installer-debugsource-0:0.8.0-3.rhaos4.7.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/coreos-installer-debugsource@0.8.0-3.rhaos4.7.el8?arch=x86_64" } } }, { "category": "product_version", "name": "coreos-installer-bootinfra-debuginfo-0:0.8.0-3.rhaos4.7.el8.x86_64", "product": { "name": "coreos-installer-bootinfra-debuginfo-0:0.8.0-3.rhaos4.7.el8.x86_64", "product_id": "coreos-installer-bootinfra-debuginfo-0:0.8.0-3.rhaos4.7.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/coreos-installer-bootinfra-debuginfo@0.8.0-3.rhaos4.7.el8?arch=x86_64" } } }, { "category": "product_version", "name": "coreos-installer-debuginfo-0:0.8.0-3.rhaos4.7.el8.x86_64", "product": { "name": "coreos-installer-debuginfo-0:0.8.0-3.rhaos4.7.el8.x86_64", "product_id": "coreos-installer-debuginfo-0:0.8.0-3.rhaos4.7.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/coreos-installer-debuginfo@0.8.0-3.rhaos4.7.el8?arch=x86_64" } } }, { "category": "product_version", "name": "conmon-2:2.0.21-2.rhaos4.6.el8.x86_64", "product": { "name": "conmon-2:2.0.21-2.rhaos4.6.el8.x86_64", "product_id": "conmon-2:2.0.21-2.rhaos4.6.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/conmon@2.0.21-2.rhaos4.6.el8?arch=x86_64\u0026epoch=2" } } }, { "category": "product_version", "name": "openshift-hyperkube-0:4.7.0-202102060108.p0.git.97095.7271b90.el8.x86_64", "product": { "name": "openshift-hyperkube-0:4.7.0-202102060108.p0.git.97095.7271b90.el8.x86_64", "product_id": "openshift-hyperkube-0:4.7.0-202102060108.p0.git.97095.7271b90.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-hyperkube@4.7.0-202102060108.p0.git.97095.7271b90.el8?arch=x86_64" } } }, { "category": "product_version", "name": "runc-0:1.0.0-82.rhaos4.6.git086e841.el8.x86_64", "product": { "name": "runc-0:1.0.0-82.rhaos4.6.git086e841.el8.x86_64", "product_id": "runc-0:1.0.0-82.rhaos4.6.git086e841.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/runc@1.0.0-82.rhaos4.6.git086e841.el8?arch=x86_64" } } }, { "category": "product_version", "name": "runc-debugsource-0:1.0.0-82.rhaos4.6.git086e841.el8.x86_64", "product": { "name": "runc-debugsource-0:1.0.0-82.rhaos4.6.git086e841.el8.x86_64", "product_id": "runc-debugsource-0:1.0.0-82.rhaos4.6.git086e841.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/runc-debugsource@1.0.0-82.rhaos4.6.git086e841.el8?arch=x86_64" } } }, { "category": "product_version", "name": "runc-debuginfo-0:1.0.0-82.rhaos4.6.git086e841.el8.x86_64", "product": { "name": "runc-debuginfo-0:1.0.0-82.rhaos4.6.git086e841.el8.x86_64", "product_id": "runc-debuginfo-0:1.0.0-82.rhaos4.6.git086e841.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/runc-debuginfo@1.0.0-82.rhaos4.6.git086e841.el8?arch=x86_64" } } }, { "category": "product_version", "name": "cri-o-0:1.20.0-0.rhaos4.7.git8921e00.el8.51.x86_64", "product": { "name": "cri-o-0:1.20.0-0.rhaos4.7.git8921e00.el8.51.x86_64", "product_id": "cri-o-0:1.20.0-0.rhaos4.7.git8921e00.el8.51.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/cri-o@1.20.0-0.rhaos4.7.git8921e00.el8.51?arch=x86_64" } } }, { "category": "product_version", "name": "cri-o-debugsource-0:1.20.0-0.rhaos4.7.git8921e00.el8.51.x86_64", "product": { "name": "cri-o-debugsource-0:1.20.0-0.rhaos4.7.git8921e00.el8.51.x86_64", "product_id": "cri-o-debugsource-0:1.20.0-0.rhaos4.7.git8921e00.el8.51.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/cri-o-debugsource@1.20.0-0.rhaos4.7.git8921e00.el8.51?arch=x86_64" } } }, { "category": "product_version", "name": "cri-o-debuginfo-0:1.20.0-0.rhaos4.7.git8921e00.el8.51.x86_64", "product": { "name": "cri-o-debuginfo-0:1.20.0-0.rhaos4.7.git8921e00.el8.51.x86_64", "product_id": "cri-o-debuginfo-0:1.20.0-0.rhaos4.7.git8921e00.el8.51.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/cri-o-debuginfo@1.20.0-0.rhaos4.7.git8921e00.el8.51?arch=x86_64" } } }, { "category": "product_version", "name": "conmon-2:2.0.21-2.rhaos4.6.el7.x86_64", "product": { "name": "conmon-2:2.0.21-2.rhaos4.6.el7.x86_64", "product_id": "conmon-2:2.0.21-2.rhaos4.6.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/conmon@2.0.21-2.rhaos4.6.el7?arch=x86_64\u0026epoch=2" } } }, { "category": "product_version", "name": "containernetworking-plugins-0:0.8.6-1.rhaos4.5.el7.x86_64", "product": { "name": "containernetworking-plugins-0:0.8.6-1.rhaos4.5.el7.x86_64", "product_id": "containernetworking-plugins-0:0.8.6-1.rhaos4.5.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/containernetworking-plugins@0.8.6-1.rhaos4.5.el7?arch=x86_64" } } }, { "category": "product_version", "name": "containernetworking-plugins-debuginfo-0:0.8.6-1.rhaos4.5.el7.x86_64", "product": { "name": "containernetworking-plugins-debuginfo-0:0.8.6-1.rhaos4.5.el7.x86_64", "product_id": "containernetworking-plugins-debuginfo-0:0.8.6-1.rhaos4.5.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/containernetworking-plugins-debuginfo@0.8.6-1.rhaos4.5.el7?arch=x86_64" } } }, { "category": "product_version", "name": "cri-tools-0:1.18.0-3.el7.x86_64", "product": { "name": "cri-tools-0:1.18.0-3.el7.x86_64", "product_id": "cri-tools-0:1.18.0-3.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/cri-tools@1.18.0-3.el7?arch=x86_64" } } }, { "category": "product_version", "name": "cri-tools-debuginfo-0:1.18.0-3.el7.x86_64", "product": { "name": "cri-tools-debuginfo-0:1.18.0-3.el7.x86_64", "product_id": "cri-tools-debuginfo-0:1.18.0-3.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/cri-tools-debuginfo@1.18.0-3.el7?arch=x86_64" } } }, { "category": "product_version", "name": "haproxy20-0:2.0.19-1.el7.x86_64", "product": { "name": "haproxy20-0:2.0.19-1.el7.x86_64", "product_id": "haproxy20-0:2.0.19-1.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/haproxy20@2.0.19-1.el7?arch=x86_64" } } }, { "category": "product_version", "name": "haproxy-debuginfo-0:2.0.19-1.el7.x86_64", "product": { "name": "haproxy-debuginfo-0:2.0.19-1.el7.x86_64", "product_id": "haproxy-debuginfo-0:2.0.19-1.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/haproxy-debuginfo@2.0.19-1.el7?arch=x86_64" } } }, { "category": "product_version", "name": "jq-0:1.6-2.el7.x86_64", "product": { "name": "jq-0:1.6-2.el7.x86_64", "product_id": "jq-0:1.6-2.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jq@1.6-2.el7?arch=x86_64" } } }, { "category": "product_version", "name": "jq-devel-0:1.6-2.el7.x86_64", "product": { "name": "jq-devel-0:1.6-2.el7.x86_64", "product_id": "jq-devel-0:1.6-2.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jq-devel@1.6-2.el7?arch=x86_64" } } }, { "category": "product_version", "name": "jq-debuginfo-0:1.6-2.el7.x86_64", "product": { "name": "jq-debuginfo-0:1.6-2.el7.x86_64", "product_id": "jq-debuginfo-0:1.6-2.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jq-debuginfo@1.6-2.el7?arch=x86_64" } } }, { "category": "product_version", "name": "oniguruma-0:5.9.2-5.el7.x86_64", "product": { "name": "oniguruma-0:5.9.2-5.el7.x86_64", "product_id": "oniguruma-0:5.9.2-5.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/oniguruma@5.9.2-5.el7?arch=x86_64" } } }, { "category": "product_version", "name": "oniguruma-devel-0:5.9.2-5.el7.x86_64", "product": { "name": "oniguruma-devel-0:5.9.2-5.el7.x86_64", "product_id": "oniguruma-devel-0:5.9.2-5.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/oniguruma-devel@5.9.2-5.el7?arch=x86_64" } } }, { "category": "product_version", "name": "oniguruma-debuginfo-0:5.9.2-5.el7.x86_64", "product": { "name": "oniguruma-debuginfo-0:5.9.2-5.el7.x86_64", "product_id": "oniguruma-debuginfo-0:5.9.2-5.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/oniguruma-debuginfo@5.9.2-5.el7?arch=x86_64" } } }, { "category": "product_version", "name": "openshift-clients-0:4.7.0-202102032256.p0.git.3951.0e656ef.el7.x86_64", "product": { "name": "openshift-clients-0:4.7.0-202102032256.p0.git.3951.0e656ef.el7.x86_64", "product_id": "openshift-clients-0:4.7.0-202102032256.p0.git.3951.0e656ef.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-clients@4.7.0-202102032256.p0.git.3951.0e656ef.el7?arch=x86_64" } } }, { "category": "product_version", "name": "openshift-clients-redistributable-0:4.7.0-202102032256.p0.git.3951.0e656ef.el7.x86_64", "product": { "name": "openshift-clients-redistributable-0:4.7.0-202102032256.p0.git.3951.0e656ef.el7.x86_64", "product_id": "openshift-clients-redistributable-0:4.7.0-202102032256.p0.git.3951.0e656ef.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-clients-redistributable@4.7.0-202102032256.p0.git.3951.0e656ef.el7?arch=x86_64" } } }, { "category": "product_version", "name": "openshift-hyperkube-0:4.7.0-202102060108.p0.git.97095.7271b90.el7.x86_64", "product": { "name": "openshift-hyperkube-0:4.7.0-202102060108.p0.git.97095.7271b90.el7.x86_64", "product_id": "openshift-hyperkube-0:4.7.0-202102060108.p0.git.97095.7271b90.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-hyperkube@4.7.0-202102060108.p0.git.97095.7271b90.el7?arch=x86_64" } } }, { "category": "product_version", "name": "runc-0:1.0.0-82.rhaos4.6.git086e841.el7.x86_64", "product": { "name": "runc-0:1.0.0-82.rhaos4.6.git086e841.el7.x86_64", "product_id": "runc-0:1.0.0-82.rhaos4.6.git086e841.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/runc@1.0.0-82.rhaos4.6.git086e841.el7?arch=x86_64" } } }, { "category": "product_version", "name": "runc-debuginfo-0:1.0.0-82.rhaos4.6.git086e841.el7.x86_64", "product": { "name": "runc-debuginfo-0:1.0.0-82.rhaos4.6.git086e841.el7.x86_64", "product_id": "runc-debuginfo-0:1.0.0-82.rhaos4.6.git086e841.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/runc-debuginfo@1.0.0-82.rhaos4.6.git086e841.el7?arch=x86_64" } } }, { "category": "product_version", "name": "cri-o-0:1.20.0-0.rhaos4.7.git8921e00.el7.51.x86_64", "product": { "name": "cri-o-0:1.20.0-0.rhaos4.7.git8921e00.el7.51.x86_64", "product_id": "cri-o-0:1.20.0-0.rhaos4.7.git8921e00.el7.51.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/cri-o@1.20.0-0.rhaos4.7.git8921e00.el7.51?arch=x86_64" } } }, { "category": "product_version", "name": "cri-o-debuginfo-0:1.20.0-0.rhaos4.7.git8921e00.el7.51.x86_64", "product": { "name": "cri-o-debuginfo-0:1.20.0-0.rhaos4.7.git8921e00.el7.51.x86_64", "product_id": "cri-o-debuginfo-0:1.20.0-0.rhaos4.7.git8921e00.el7.51.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/cri-o-debuginfo@1.20.0-0.rhaos4.7.git8921e00.el7.51?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "atomic-openshift-service-idler-0:4.7.0-202011171454.p0.git.15.675c1c8.el8.ppc64le", "product": { "name": "atomic-openshift-service-idler-0:4.7.0-202011171454.p0.git.15.675c1c8.el8.ppc64le", "product_id": "atomic-openshift-service-idler-0:4.7.0-202011171454.p0.git.15.675c1c8.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/atomic-openshift-service-idler@4.7.0-202011171454.p0.git.15.675c1c8.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "containernetworking-plugins-0:0.8.6-1.rhaos4.5.el8.ppc64le", "product": { "name": "containernetworking-plugins-0:0.8.6-1.rhaos4.5.el8.ppc64le", "product_id": "containernetworking-plugins-0:0.8.6-1.rhaos4.5.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/containernetworking-plugins@0.8.6-1.rhaos4.5.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "containernetworking-plugins-debugsource-0:0.8.6-1.rhaos4.5.el8.ppc64le", "product": { "name": "containernetworking-plugins-debugsource-0:0.8.6-1.rhaos4.5.el8.ppc64le", "product_id": "containernetworking-plugins-debugsource-0:0.8.6-1.rhaos4.5.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/containernetworking-plugins-debugsource@0.8.6-1.rhaos4.5.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "containernetworking-plugins-debuginfo-0:0.8.6-1.rhaos4.5.el8.ppc64le", "product": { "name": "containernetworking-plugins-debuginfo-0:0.8.6-1.rhaos4.5.el8.ppc64le", "product_id": "containernetworking-plugins-debuginfo-0:0.8.6-1.rhaos4.5.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/containernetworking-plugins-debuginfo@0.8.6-1.rhaos4.5.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "cri-tools-0:1.20.0-1.el8.ppc64le", "product": { "name": "cri-tools-0:1.20.0-1.el8.ppc64le", "product_id": "cri-tools-0:1.20.0-1.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/cri-tools@1.20.0-1.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "cri-tools-debugsource-0:1.20.0-1.el8.ppc64le", "product": { "name": "cri-tools-debugsource-0:1.20.0-1.el8.ppc64le", "product_id": "cri-tools-debugsource-0:1.20.0-1.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/cri-tools-debugsource@1.20.0-1.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "cri-tools-debuginfo-0:1.20.0-1.el8.ppc64le", "product": { "name": "cri-tools-debuginfo-0:1.20.0-1.el8.ppc64le", "product_id": "cri-tools-debuginfo-0:1.20.0-1.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/cri-tools-debuginfo@1.20.0-1.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "dracut-0:049-95.git20200804.el8_3.4.ppc64le", "product": { "name": "dracut-0:049-95.git20200804.el8_3.4.ppc64le", "product_id": "dracut-0:049-95.git20200804.el8_3.4.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/dracut@049-95.git20200804.el8_3.4?arch=ppc64le" } } }, { "category": "product_version", "name": "dracut-caps-0:049-95.git20200804.el8_3.4.ppc64le", "product": { "name": "dracut-caps-0:049-95.git20200804.el8_3.4.ppc64le", "product_id": "dracut-caps-0:049-95.git20200804.el8_3.4.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/dracut-caps@049-95.git20200804.el8_3.4?arch=ppc64le" } } }, { "category": "product_version", "name": "dracut-config-generic-0:049-95.git20200804.el8_3.4.ppc64le", "product": { "name": "dracut-config-generic-0:049-95.git20200804.el8_3.4.ppc64le", "product_id": "dracut-config-generic-0:049-95.git20200804.el8_3.4.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/dracut-config-generic@049-95.git20200804.el8_3.4?arch=ppc64le" } } }, { "category": "product_version", "name": "dracut-config-rescue-0:049-95.git20200804.el8_3.4.ppc64le", "product": { "name": "dracut-config-rescue-0:049-95.git20200804.el8_3.4.ppc64le", "product_id": "dracut-config-rescue-0:049-95.git20200804.el8_3.4.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/dracut-config-rescue@049-95.git20200804.el8_3.4?arch=ppc64le" } } }, { "category": "product_version", "name": "dracut-live-0:049-95.git20200804.el8_3.4.ppc64le", "product": { "name": "dracut-live-0:049-95.git20200804.el8_3.4.ppc64le", "product_id": "dracut-live-0:049-95.git20200804.el8_3.4.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/dracut-live@049-95.git20200804.el8_3.4?arch=ppc64le" } } }, { "category": "product_version", "name": "dracut-network-0:049-95.git20200804.el8_3.4.ppc64le", "product": { "name": "dracut-network-0:049-95.git20200804.el8_3.4.ppc64le", "product_id": "dracut-network-0:049-95.git20200804.el8_3.4.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/dracut-network@049-95.git20200804.el8_3.4?arch=ppc64le" } } }, { "category": "product_version", "name": "dracut-squash-0:049-95.git20200804.el8_3.4.ppc64le", "product": { "name": "dracut-squash-0:049-95.git20200804.el8_3.4.ppc64le", "product_id": "dracut-squash-0:049-95.git20200804.el8_3.4.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/dracut-squash@049-95.git20200804.el8_3.4?arch=ppc64le" } } }, { "category": "product_version", "name": "dracut-tools-0:049-95.git20200804.el8_3.4.ppc64le", "product": { "name": "dracut-tools-0:049-95.git20200804.el8_3.4.ppc64le", "product_id": "dracut-tools-0:049-95.git20200804.el8_3.4.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/dracut-tools@049-95.git20200804.el8_3.4?arch=ppc64le" } } }, { "category": "product_version", "name": "dracut-debugsource-0:049-95.git20200804.el8_3.4.ppc64le", "product": { "name": "dracut-debugsource-0:049-95.git20200804.el8_3.4.ppc64le", "product_id": "dracut-debugsource-0:049-95.git20200804.el8_3.4.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/dracut-debugsource@049-95.git20200804.el8_3.4?arch=ppc64le" } } }, { "category": "product_version", "name": "dracut-debuginfo-0:049-95.git20200804.el8_3.4.ppc64le", "product": { "name": "dracut-debuginfo-0:049-95.git20200804.el8_3.4.ppc64le", "product_id": "dracut-debuginfo-0:049-95.git20200804.el8_3.4.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/dracut-debuginfo@049-95.git20200804.el8_3.4?arch=ppc64le" } } }, { "category": "product_version", "name": "faq-0:0.0.6-5.el8.ppc64le", "product": { "name": "faq-0:0.0.6-5.el8.ppc64le", "product_id": "faq-0:0.0.6-5.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/faq@0.0.6-5.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "golang-github-prometheus-promu-0:0.5.0-2.git642a960.el8.ppc64le", "product": { "name": "golang-github-prometheus-promu-0:0.5.0-2.git642a960.el8.ppc64le", "product_id": "golang-github-prometheus-promu-0:0.5.0-2.git642a960.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/golang-github-prometheus-promu@0.5.0-2.git642a960.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "prometheus-promu-0:0.5.0-2.git642a960.el8.ppc64le", "product": { "name": "prometheus-promu-0:0.5.0-2.git642a960.el8.ppc64le", "product_id": "prometheus-promu-0:0.5.0-2.git642a960.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/prometheus-promu@0.5.0-2.git642a960.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "grpc-0:1.18.0-4.el8ost.ppc64le", "product": { "name": "grpc-0:1.18.0-4.el8ost.ppc64le", "product_id": "grpc-0:1.18.0-4.el8ost.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/grpc@1.18.0-4.el8ost?arch=ppc64le" } } }, { "category": "product_version", "name": "grpc-cli-0:1.18.0-4.el8ost.ppc64le", "product": { "name": "grpc-cli-0:1.18.0-4.el8ost.ppc64le", "product_id": "grpc-cli-0:1.18.0-4.el8ost.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/grpc-cli@1.18.0-4.el8ost?arch=ppc64le" } } }, { "category": "product_version", "name": "grpc-devel-0:1.18.0-4.el8ost.ppc64le", "product": { "name": "grpc-devel-0:1.18.0-4.el8ost.ppc64le", "product_id": "grpc-devel-0:1.18.0-4.el8ost.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/grpc-devel@1.18.0-4.el8ost?arch=ppc64le" } } }, { "category": "product_version", "name": "grpc-plugins-0:1.18.0-4.el8ost.ppc64le", "product": { "name": "grpc-plugins-0:1.18.0-4.el8ost.ppc64le", "product_id": "grpc-plugins-0:1.18.0-4.el8ost.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/grpc-plugins@1.18.0-4.el8ost?arch=ppc64le" } } }, { "category": "product_version", "name": "python3-grpcio-0:1.18.0-4.el8ost.ppc64le", "product": { "name": "python3-grpcio-0:1.18.0-4.el8ost.ppc64le", "product_id": "python3-grpcio-0:1.18.0-4.el8ost.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-grpcio@1.18.0-4.el8ost?arch=ppc64le" } } }, { "category": "product_version", "name": "grpc-debugsource-0:1.18.0-4.el8ost.ppc64le", "product": { "name": "grpc-debugsource-0:1.18.0-4.el8ost.ppc64le", "product_id": "grpc-debugsource-0:1.18.0-4.el8ost.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/grpc-debugsource@1.18.0-4.el8ost?arch=ppc64le" } } }, { "category": "product_version", "name": "grpc-cli-debuginfo-0:1.18.0-4.el8ost.ppc64le", "product": { "name": "grpc-cli-debuginfo-0:1.18.0-4.el8ost.ppc64le", "product_id": "grpc-cli-debuginfo-0:1.18.0-4.el8ost.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/grpc-cli-debuginfo@1.18.0-4.el8ost?arch=ppc64le" } } }, { "category": "product_version", "name": "grpc-debuginfo-0:1.18.0-4.el8ost.ppc64le", "product": { "name": "grpc-debuginfo-0:1.18.0-4.el8ost.ppc64le", "product_id": "grpc-debuginfo-0:1.18.0-4.el8ost.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/grpc-debuginfo@1.18.0-4.el8ost?arch=ppc64le" } } }, { "category": "product_version", "name": "grpc-plugins-debuginfo-0:1.18.0-4.el8ost.ppc64le", "product": { "name": "grpc-plugins-debuginfo-0:1.18.0-4.el8ost.ppc64le", "product_id": "grpc-plugins-debuginfo-0:1.18.0-4.el8ost.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/grpc-plugins-debuginfo@1.18.0-4.el8ost?arch=ppc64le" } } }, { "category": "product_version", "name": "python3-grpcio-debuginfo-0:1.18.0-4.el8ost.ppc64le", "product": { "name": "python3-grpcio-debuginfo-0:1.18.0-4.el8ost.ppc64le", "product_id": "python3-grpcio-debuginfo-0:1.18.0-4.el8ost.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-grpcio-debuginfo@1.18.0-4.el8ost?arch=ppc64le" } } }, { "category": "product_version", "name": "haproxy20-0:2.0.19-1.el8.ppc64le", "product": { "name": "haproxy20-0:2.0.19-1.el8.ppc64le", "product_id": "haproxy20-0:2.0.19-1.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/haproxy20@2.0.19-1.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "haproxy-debugsource-0:2.0.19-1.el8.ppc64le", "product": { "name": "haproxy-debugsource-0:2.0.19-1.el8.ppc64le", "product_id": "haproxy-debugsource-0:2.0.19-1.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/haproxy-debugsource@2.0.19-1.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "haproxy20-debuginfo-0:2.0.19-1.el8.ppc64le", "product": { "name": "haproxy20-debuginfo-0:2.0.19-1.el8.ppc64le", "product_id": "haproxy20-debuginfo-0:2.0.19-1.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/haproxy20-debuginfo@2.0.19-1.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "jq-0:1.6-2.el8.ppc64le", "product": { "name": "jq-0:1.6-2.el8.ppc64le", "product_id": "jq-0:1.6-2.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/jq@1.6-2.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "jq-devel-0:1.6-2.el8.ppc64le", "product": { "name": "jq-devel-0:1.6-2.el8.ppc64le", "product_id": "jq-devel-0:1.6-2.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/jq-devel@1.6-2.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "jq-debugsource-0:1.6-2.el8.ppc64le", "product": { "name": "jq-debugsource-0:1.6-2.el8.ppc64le", "product_id": "jq-debugsource-0:1.6-2.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/jq-debugsource@1.6-2.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "jq-debuginfo-0:1.6-2.el8.ppc64le", "product": { "name": "jq-debuginfo-0:1.6-2.el8.ppc64le", "product_id": "jq-debuginfo-0:1.6-2.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/jq-debuginfo@1.6-2.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "libnftnl-0:1.1.5-4.el8.ppc64le", "product": { "name": "libnftnl-0:1.1.5-4.el8.ppc64le", "product_id": "libnftnl-0:1.1.5-4.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/libnftnl@1.1.5-4.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "libnftnl-devel-0:1.1.5-4.el8.ppc64le", "product": { "name": "libnftnl-devel-0:1.1.5-4.el8.ppc64le", "product_id": "libnftnl-devel-0:1.1.5-4.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/libnftnl-devel@1.1.5-4.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "libnftnl-debugsource-0:1.1.5-4.el8.ppc64le", "product": { "name": "libnftnl-debugsource-0:1.1.5-4.el8.ppc64le", "product_id": "libnftnl-debugsource-0:1.1.5-4.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/libnftnl-debugsource@1.1.5-4.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "libnftnl-debuginfo-0:1.1.5-4.el8.ppc64le", "product": { "name": "libnftnl-debuginfo-0:1.1.5-4.el8.ppc64le", "product_id": "libnftnl-debuginfo-0:1.1.5-4.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/libnftnl-debuginfo@1.1.5-4.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "libsodium-0:1.0.16-4.5.el8ost.ppc64le", "product": { "name": "libsodium-0:1.0.16-4.5.el8ost.ppc64le", "product_id": "libsodium-0:1.0.16-4.5.el8ost.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/libsodium@1.0.16-4.5.el8ost?arch=ppc64le" } } }, { "category": "product_version", "name": "libsodium-devel-0:1.0.16-4.5.el8ost.ppc64le", "product": { "name": "libsodium-devel-0:1.0.16-4.5.el8ost.ppc64le", "product_id": "libsodium-devel-0:1.0.16-4.5.el8ost.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/libsodium-devel@1.0.16-4.5.el8ost?arch=ppc64le" } } }, { "category": "product_version", "name": "libsodium-static-0:1.0.16-4.5.el8ost.ppc64le", "product": { "name": "libsodium-static-0:1.0.16-4.5.el8ost.ppc64le", "product_id": "libsodium-static-0:1.0.16-4.5.el8ost.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/libsodium-static@1.0.16-4.5.el8ost?arch=ppc64le" } } }, { "category": "product_version", "name": "libsodium-debugsource-0:1.0.16-4.5.el8ost.ppc64le", "product": { "name": "libsodium-debugsource-0:1.0.16-4.5.el8ost.ppc64le", "product_id": "libsodium-debugsource-0:1.0.16-4.5.el8ost.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/libsodium-debugsource@1.0.16-4.5.el8ost?arch=ppc64le" } } }, { "category": "product_version", "name": "libsodium-debuginfo-0:1.0.16-4.5.el8ost.ppc64le", "product": { "name": "libsodium-debuginfo-0:1.0.16-4.5.el8ost.ppc64le", "product_id": "libsodium-debuginfo-0:1.0.16-4.5.el8ost.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/libsodium-debuginfo@1.0.16-4.5.el8ost?arch=ppc64le" } } }, { "category": "product_version", "name": "libunwind-0:1.2.1-5.el8.ppc64le", "product": { "name": "libunwind-0:1.2.1-5.el8.ppc64le", "product_id": "libunwind-0:1.2.1-5.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/libunwind@1.2.1-5.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "libunwind-devel-0:1.2.1-5.el8.ppc64le", "product": { "name": "libunwind-devel-0:1.2.1-5.el8.ppc64le", "product_id": "libunwind-devel-0:1.2.1-5.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/libunwind-devel@1.2.1-5.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "libunwind-debugsource-0:1.2.1-5.el8.ppc64le", "product": { "name": "libunwind-debugsource-0:1.2.1-5.el8.ppc64le", "product_id": "libunwind-debugsource-0:1.2.1-5.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/libunwind-debugsource@1.2.1-5.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "libunwind-debuginfo-0:1.2.1-5.el8.ppc64le", "product": { "name": "libunwind-debuginfo-0:1.2.1-5.el8.ppc64le", "product_id": "libunwind-debuginfo-0:1.2.1-5.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/libunwind-debuginfo@1.2.1-5.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "openshift-eventrouter-0:0.2-4.git7c289cc.el8.ppc64le", "product": { "name": "openshift-eventrouter-0:0.2-4.git7c289cc.el8.ppc64le", "product_id": "openshift-eventrouter-0:0.2-4.git7c289cc.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-eventrouter@0.2-4.git7c289cc.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "openshift-eventrouter-debugsource-0:0.2-4.git7c289cc.el8.ppc64le", "product": { "name": "openshift-eventrouter-debugsource-0:0.2-4.git7c289cc.el8.ppc64le", "product_id": "openshift-eventrouter-debugsource-0:0.2-4.git7c289cc.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-eventrouter-debugsource@0.2-4.git7c289cc.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "openshift-eventrouter-debuginfo-0:0.2-4.git7c289cc.el8.ppc64le", "product": { "name": "openshift-eventrouter-debuginfo-0:0.2-4.git7c289cc.el8.ppc64le", "product_id": "openshift-eventrouter-debuginfo-0:0.2-4.git7c289cc.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-eventrouter-debuginfo@0.2-4.git7c289cc.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "network-scripts-openvswitch2.13-0:2.13.0-79.el8fdp.ppc64le", "product": { "name": "network-scripts-openvswitch2.13-0:2.13.0-79.el8fdp.ppc64le", "product_id": "network-scripts-openvswitch2.13-0:2.13.0-79.el8fdp.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/network-scripts-openvswitch2.13@2.13.0-79.el8fdp?arch=ppc64le" } } }, { "category": "product_version", "name": "openvswitch2.13-0:2.13.0-79.el8fdp.ppc64le", "product": { "name": "openvswitch2.13-0:2.13.0-79.el8fdp.ppc64le", "product_id": "openvswitch2.13-0:2.13.0-79.el8fdp.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/openvswitch2.13@2.13.0-79.el8fdp?arch=ppc64le" } } }, { "category": "product_version", "name": "openvswitch2.13-devel-0:2.13.0-79.el8fdp.ppc64le", "product": { "name": "openvswitch2.13-devel-0:2.13.0-79.el8fdp.ppc64le", "product_id": "openvswitch2.13-devel-0:2.13.0-79.el8fdp.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/openvswitch2.13-devel@2.13.0-79.el8fdp?arch=ppc64le" } } }, { "category": "product_version", "name": "python3-openvswitch2.13-0:2.13.0-79.el8fdp.ppc64le", "product": { "name": "python3-openvswitch2.13-0:2.13.0-79.el8fdp.ppc64le", "product_id": "python3-openvswitch2.13-0:2.13.0-79.el8fdp.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-openvswitch2.13@2.13.0-79.el8fdp?arch=ppc64le" } } }, { "category": "product_version", "name": "openvswitch2.13-debugsource-0:2.13.0-79.el8fdp.ppc64le", "product": { "name": "openvswitch2.13-debugsource-0:2.13.0-79.el8fdp.ppc64le", "product_id": "openvswitch2.13-debugsource-0:2.13.0-79.el8fdp.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/openvswitch2.13-debugsource@2.13.0-79.el8fdp?arch=ppc64le" } } }, { "category": "product_version", "name": "openvswitch2.13-debuginfo-0:2.13.0-79.el8fdp.ppc64le", "product": { "name": "openvswitch2.13-debuginfo-0:2.13.0-79.el8fdp.ppc64le", "product_id": "openvswitch2.13-debuginfo-0:2.13.0-79.el8fdp.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/openvswitch2.13-debuginfo@2.13.0-79.el8fdp?arch=ppc64le" } } }, { "category": "product_version", "name": "python3-openvswitch2.13-debuginfo-0:2.13.0-79.el8fdp.ppc64le", "product": { "name": "python3-openvswitch2.13-debuginfo-0:2.13.0-79.el8fdp.ppc64le", "product_id": "python3-openvswitch2.13-debuginfo-0:2.13.0-79.el8fdp.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-openvswitch2.13-debuginfo@2.13.0-79.el8fdp?arch=ppc64le" } } }, { "category": "product_version", "name": "ovn2.13-0:20.09.0-21.el8fdn.ppc64le", "product": { "name": "ovn2.13-0:20.09.0-21.el8fdn.ppc64le", "product_id": "ovn2.13-0:20.09.0-21.el8fdn.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn2.13@20.09.0-21.el8fdn?arch=ppc64le" } } }, { "category": "product_version", "name": "ovn2.13-central-0:20.09.0-21.el8fdn.ppc64le", "product": { "name": "ovn2.13-central-0:20.09.0-21.el8fdn.ppc64le", "product_id": "ovn2.13-central-0:20.09.0-21.el8fdn.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn2.13-central@20.09.0-21.el8fdn?arch=ppc64le" } } }, { "category": "product_version", "name": "ovn2.13-host-0:20.09.0-21.el8fdn.ppc64le", "product": { "name": "ovn2.13-host-0:20.09.0-21.el8fdn.ppc64le", "product_id": "ovn2.13-host-0:20.09.0-21.el8fdn.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn2.13-host@20.09.0-21.el8fdn?arch=ppc64le" } } }, { "category": "product_version", "name": "ovn2.13-vtep-0:20.09.0-21.el8fdn.ppc64le", "product": { "name": "ovn2.13-vtep-0:20.09.0-21.el8fdn.ppc64le", "product_id": "ovn2.13-vtep-0:20.09.0-21.el8fdn.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn2.13-vtep@20.09.0-21.el8fdn?arch=ppc64le" } } }, { "category": "product_version", "name": "ovn2.13-debugsource-0:20.09.0-21.el8fdn.ppc64le", "product": { "name": "ovn2.13-debugsource-0:20.09.0-21.el8fdn.ppc64le", "product_id": "ovn2.13-debugsource-0:20.09.0-21.el8fdn.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn2.13-debugsource@20.09.0-21.el8fdn?arch=ppc64le" } } }, { "category": "product_version", "name": "ovn2.13-central-debuginfo-0:20.09.0-21.el8fdn.ppc64le", "product": { "name": "ovn2.13-central-debuginfo-0:20.09.0-21.el8fdn.ppc64le", "product_id": "ovn2.13-central-debuginfo-0:20.09.0-21.el8fdn.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn2.13-central-debuginfo@20.09.0-21.el8fdn?arch=ppc64le" } } }, { "category": "product_version", "name": "ovn2.13-debuginfo-0:20.09.0-21.el8fdn.ppc64le", "product": { "name": "ovn2.13-debuginfo-0:20.09.0-21.el8fdn.ppc64le", "product_id": "ovn2.13-debuginfo-0:20.09.0-21.el8fdn.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn2.13-debuginfo@20.09.0-21.el8fdn?arch=ppc64le" } } }, { "category": "product_version", "name": "ovn2.13-host-debuginfo-0:20.09.0-21.el8fdn.ppc64le", "product": { "name": "ovn2.13-host-debuginfo-0:20.09.0-21.el8fdn.ppc64le", "product_id": "ovn2.13-host-debuginfo-0:20.09.0-21.el8fdn.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn2.13-host-debuginfo@20.09.0-21.el8fdn?arch=ppc64le" } } }, { "category": "product_version", "name": "ovn2.13-vtep-debuginfo-0:20.09.0-21.el8fdn.ppc64le", "product": { "name": "ovn2.13-vtep-debuginfo-0:20.09.0-21.el8fdn.ppc64le", "product_id": "ovn2.13-vtep-debuginfo-0:20.09.0-21.el8fdn.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn2.13-vtep-debuginfo@20.09.0-21.el8fdn?arch=ppc64le" } } }, { "category": "product_version", "name": "powerpc-utils-0:1.3.6-12.el8_3.ppc64le", "product": { "name": "powerpc-utils-0:1.3.6-12.el8_3.ppc64le", "product_id": "powerpc-utils-0:1.3.6-12.el8_3.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/powerpc-utils@1.3.6-12.el8_3?arch=ppc64le" } } }, { "category": "product_version", "name": "powerpc-utils-core-0:1.3.6-12.el8_3.ppc64le", "product": { "name": "powerpc-utils-core-0:1.3.6-12.el8_3.ppc64le", "product_id": "powerpc-utils-core-0:1.3.6-12.el8_3.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/powerpc-utils-core@1.3.6-12.el8_3?arch=ppc64le" } } }, { "category": "product_version", "name": "powerpc-utils-debugsource-0:1.3.6-12.el8_3.ppc64le", "product": { "name": "powerpc-utils-debugsource-0:1.3.6-12.el8_3.ppc64le", "product_id": "powerpc-utils-debugsource-0:1.3.6-12.el8_3.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/powerpc-utils-debugsource@1.3.6-12.el8_3?arch=ppc64le" } } }, { "category": "product_version", "name": "powerpc-utils-core-debuginfo-0:1.3.6-12.el8_3.ppc64le", "product": { "name": "powerpc-utils-core-debuginfo-0:1.3.6-12.el8_3.ppc64le", "product_id": "powerpc-utils-core-debuginfo-0:1.3.6-12.el8_3.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/powerpc-utils-core-debuginfo@1.3.6-12.el8_3?arch=ppc64le" } } }, { "category": "product_version", "name": "protobuf-0:3.6.1-4.el8ost.ppc64le", "product": { "name": "protobuf-0:3.6.1-4.el8ost.ppc64le", "product_id": "protobuf-0:3.6.1-4.el8ost.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/protobuf@3.6.1-4.el8ost?arch=ppc64le" } } }, { "category": "product_version", "name": "protobuf-compiler-0:3.6.1-4.el8ost.ppc64le", "product": { "name": "protobuf-compiler-0:3.6.1-4.el8ost.ppc64le", "product_id": "protobuf-compiler-0:3.6.1-4.el8ost.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/protobuf-compiler@3.6.1-4.el8ost?arch=ppc64le" } } }, { "category": "product_version", "name": "protobuf-devel-0:3.6.1-4.el8ost.ppc64le", "product": { "name": "protobuf-devel-0:3.6.1-4.el8ost.ppc64le", "product_id": "protobuf-devel-0:3.6.1-4.el8ost.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/protobuf-devel@3.6.1-4.el8ost?arch=ppc64le" } } }, { "category": "product_version", "name": "protobuf-lite-0:3.6.1-4.el8ost.ppc64le", "product": { "name": "protobuf-lite-0:3.6.1-4.el8ost.ppc64le", "product_id": "protobuf-lite-0:3.6.1-4.el8ost.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/protobuf-lite@3.6.1-4.el8ost?arch=ppc64le" } } }, { "category": "product_version", "name": "protobuf-lite-devel-0:3.6.1-4.el8ost.ppc64le", "product": { "name": "protobuf-lite-devel-0:3.6.1-4.el8ost.ppc64le", "product_id": "protobuf-lite-devel-0:3.6.1-4.el8ost.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/protobuf-lite-devel@3.6.1-4.el8ost?arch=ppc64le" } } }, { "category": "product_version", "name": "protobuf-lite-static-0:3.6.1-4.el8ost.ppc64le", "product": { "name": "protobuf-lite-static-0:3.6.1-4.el8ost.ppc64le", "product_id": "protobuf-lite-static-0:3.6.1-4.el8ost.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/protobuf-lite-static@3.6.1-4.el8ost?arch=ppc64le" } } }, { "category": "product_version", "name": "protobuf-static-0:3.6.1-4.el8ost.ppc64le", "product": { "name": "protobuf-static-0:3.6.1-4.el8ost.ppc64le", "product_id": "protobuf-static-0:3.6.1-4.el8ost.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/protobuf-static@3.6.1-4.el8ost?arch=ppc64le" } } }, { "category": "product_version", "name": "protobuf-debugsource-0:3.6.1-4.el8ost.ppc64le", "product": { "name": "protobuf-debugsource-0:3.6.1-4.el8ost.ppc64le", "product_id": "protobuf-debugsource-0:3.6.1-4.el8ost.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/protobuf-debugsource@3.6.1-4.el8ost?arch=ppc64le" } } }, { "category": "product_version", "name": "protobuf-compiler-debuginfo-0:3.6.1-4.el8ost.ppc64le", "product": { "name": "protobuf-compiler-debuginfo-0:3.6.1-4.el8ost.ppc64le", "product_id": "protobuf-compiler-debuginfo-0:3.6.1-4.el8ost.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/protobuf-compiler-debuginfo@3.6.1-4.el8ost?arch=ppc64le" } } }, { "category": "product_version", "name": "protobuf-debuginfo-0:3.6.1-4.el8ost.ppc64le", "product": { "name": "protobuf-debuginfo-0:3.6.1-4.el8ost.ppc64le", "product_id": "protobuf-debuginfo-0:3.6.1-4.el8ost.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/protobuf-debuginfo@3.6.1-4.el8ost?arch=ppc64le" } } }, { "category": "product_version", "name": "protobuf-lite-debuginfo-0:3.6.1-4.el8ost.ppc64le", "product": { "name": "protobuf-lite-debuginfo-0:3.6.1-4.el8ost.ppc64le", "product_id": "protobuf-lite-debuginfo-0:3.6.1-4.el8ost.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/protobuf-lite-debuginfo@3.6.1-4.el8ost?arch=ppc64le" } } }, { "category": "product_version", "name": "python3-psutil-0:5.6.6-1.el8ar.ppc64le", "product": { "name": "python3-psutil-0:5.6.6-1.el8ar.ppc64le", "product_id": "python3-psutil-0:5.6.6-1.el8ar.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-psutil@5.6.6-1.el8ar?arch=ppc64le" } } }, { "category": "product_version", "name": "python-psutil-debugsource-0:5.6.6-1.el8ar.ppc64le", "product": { "name": "python-psutil-debugsource-0:5.6.6-1.el8ar.ppc64le", "product_id": "python-psutil-debugsource-0:5.6.6-1.el8ar.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-psutil-debugsource@5.6.6-1.el8ar?arch=ppc64le" } } }, { "category": "product_version", "name": "python3-psutil-debuginfo-0:5.6.6-1.el8ar.ppc64le", "product": { "name": "python3-psutil-debuginfo-0:5.6.6-1.el8ar.ppc64le", "product_id": "python3-psutil-debuginfo-0:5.6.6-1.el8ar.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-psutil-debuginfo@5.6.6-1.el8ar?arch=ppc64le" } } }, { "category": "product_version", "name": "python3-ruamel-yaml-0:0.15.41-4.el8ost.ppc64le", "product": { "name": "python3-ruamel-yaml-0:0.15.41-4.el8ost.ppc64le", "product_id": "python3-ruamel-yaml-0:0.15.41-4.el8ost.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-ruamel-yaml@0.15.41-4.el8ost?arch=ppc64le" } } }, { "category": "product_version", "name": "python-ruamel-yaml-debugsource-0:0.15.41-4.el8ost.ppc64le", "product": { "name": "python-ruamel-yaml-debugsource-0:0.15.41-4.el8ost.ppc64le", "product_id": "python-ruamel-yaml-debugsource-0:0.15.41-4.el8ost.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-ruamel-yaml-debugsource@0.15.41-4.el8ost?arch=ppc64le" } } }, { "category": "product_version", "name": "python3-ruamel-yaml-debuginfo-0:0.15.41-4.el8ost.ppc64le", "product": { "name": "python3-ruamel-yaml-debuginfo-0:0.15.41-4.el8ost.ppc64le", "product_id": "python3-ruamel-yaml-debuginfo-0:0.15.41-4.el8ost.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-ruamel-yaml-debuginfo@0.15.41-4.el8ost?arch=ppc64le" } } }, { "category": "product_version", "name": "tini-0:0.16.1-1.el8ar.ppc64le", "product": { "name": "tini-0:0.16.1-1.el8ar.ppc64le", "product_id": "tini-0:0.16.1-1.el8ar.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/tini@0.16.1-1.el8ar?arch=ppc64le" } } }, { "category": "product_version", "name": "NetworkManager-1:1.26.0-12.1.rhaos4.7.el8.ppc64le", "product": { "name": "NetworkManager-1:1.26.0-12.1.rhaos4.7.el8.ppc64le", "product_id": "NetworkManager-1:1.26.0-12.1.rhaos4.7.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/NetworkManager@1.26.0-12.1.rhaos4.7.el8?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "NetworkManager-adsl-1:1.26.0-12.1.rhaos4.7.el8.ppc64le", "product": { "name": "NetworkManager-adsl-1:1.26.0-12.1.rhaos4.7.el8.ppc64le", "product_id": "NetworkManager-adsl-1:1.26.0-12.1.rhaos4.7.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/NetworkManager-adsl@1.26.0-12.1.rhaos4.7.el8?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "NetworkManager-bluetooth-1:1.26.0-12.1.rhaos4.7.el8.ppc64le", "product": { "name": "NetworkManager-bluetooth-1:1.26.0-12.1.rhaos4.7.el8.ppc64le", "product_id": "NetworkManager-bluetooth-1:1.26.0-12.1.rhaos4.7.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/NetworkManager-bluetooth@1.26.0-12.1.rhaos4.7.el8?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "NetworkManager-cloud-setup-1:1.26.0-12.1.rhaos4.7.el8.ppc64le", "product": { "name": "NetworkManager-cloud-setup-1:1.26.0-12.1.rhaos4.7.el8.ppc64le", "product_id": "NetworkManager-cloud-setup-1:1.26.0-12.1.rhaos4.7.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/NetworkManager-cloud-setup@1.26.0-12.1.rhaos4.7.el8?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "NetworkManager-libnm-1:1.26.0-12.1.rhaos4.7.el8.ppc64le", "product": { "name": "NetworkManager-libnm-1:1.26.0-12.1.rhaos4.7.el8.ppc64le", "product_id": "NetworkManager-libnm-1:1.26.0-12.1.rhaos4.7.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/NetworkManager-libnm@1.26.0-12.1.rhaos4.7.el8?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "NetworkManager-libnm-devel-1:1.26.0-12.1.rhaos4.7.el8.ppc64le", "product": { "name": "NetworkManager-libnm-devel-1:1.26.0-12.1.rhaos4.7.el8.ppc64le", "product_id": "NetworkManager-libnm-devel-1:1.26.0-12.1.rhaos4.7.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/NetworkManager-libnm-devel@1.26.0-12.1.rhaos4.7.el8?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "NetworkManager-ovs-1:1.26.0-12.1.rhaos4.7.el8.ppc64le", "product": { "name": "NetworkManager-ovs-1:1.26.0-12.1.rhaos4.7.el8.ppc64le", "product_id": "NetworkManager-ovs-1:1.26.0-12.1.rhaos4.7.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/NetworkManager-ovs@1.26.0-12.1.rhaos4.7.el8?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "NetworkManager-ppp-1:1.26.0-12.1.rhaos4.7.el8.ppc64le", "product": { "name": "NetworkManager-ppp-1:1.26.0-12.1.rhaos4.7.el8.ppc64le", "product_id": "NetworkManager-ppp-1:1.26.0-12.1.rhaos4.7.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/NetworkManager-ppp@1.26.0-12.1.rhaos4.7.el8?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "NetworkManager-team-1:1.26.0-12.1.rhaos4.7.el8.ppc64le", "product": { "name": "NetworkManager-team-1:1.26.0-12.1.rhaos4.7.el8.ppc64le", "product_id": "NetworkManager-team-1:1.26.0-12.1.rhaos4.7.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/NetworkManager-team@1.26.0-12.1.rhaos4.7.el8?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "NetworkManager-tui-1:1.26.0-12.1.rhaos4.7.el8.ppc64le", "product": { "name": "NetworkManager-tui-1:1.26.0-12.1.rhaos4.7.el8.ppc64le", "product_id": "NetworkManager-tui-1:1.26.0-12.1.rhaos4.7.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/NetworkManager-tui@1.26.0-12.1.rhaos4.7.el8?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "NetworkManager-wifi-1:1.26.0-12.1.rhaos4.7.el8.ppc64le", "product": { "name": "NetworkManager-wifi-1:1.26.0-12.1.rhaos4.7.el8.ppc64le", "product_id": "NetworkManager-wifi-1:1.26.0-12.1.rhaos4.7.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/NetworkManager-wifi@1.26.0-12.1.rhaos4.7.el8?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "NetworkManager-wwan-1:1.26.0-12.1.rhaos4.7.el8.ppc64le", "product": { "name": "NetworkManager-wwan-1:1.26.0-12.1.rhaos4.7.el8.ppc64le", "product_id": "NetworkManager-wwan-1:1.26.0-12.1.rhaos4.7.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/NetworkManager-wwan@1.26.0-12.1.rhaos4.7.el8?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "NetworkManager-debugsource-1:1.26.0-12.1.rhaos4.7.el8.ppc64le", "product": { "name": "NetworkManager-debugsource-1:1.26.0-12.1.rhaos4.7.el8.ppc64le", "product_id": "NetworkManager-debugsource-1:1.26.0-12.1.rhaos4.7.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/NetworkManager-debugsource@1.26.0-12.1.rhaos4.7.el8?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "NetworkManager-adsl-debuginfo-1:1.26.0-12.1.rhaos4.7.el8.ppc64le", "product": { "name": "NetworkManager-adsl-debuginfo-1:1.26.0-12.1.rhaos4.7.el8.ppc64le", "product_id": "NetworkManager-adsl-debuginfo-1:1.26.0-12.1.rhaos4.7.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/NetworkManager-adsl-debuginfo@1.26.0-12.1.rhaos4.7.el8?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "NetworkManager-bluetooth-debuginfo-1:1.26.0-12.1.rhaos4.7.el8.ppc64le", "product": { "name": "NetworkManager-bluetooth-debuginfo-1:1.26.0-12.1.rhaos4.7.el8.ppc64le", "product_id": "NetworkManager-bluetooth-debuginfo-1:1.26.0-12.1.rhaos4.7.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/NetworkManager-bluetooth-debuginfo@1.26.0-12.1.rhaos4.7.el8?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "NetworkManager-cloud-setup-debuginfo-1:1.26.0-12.1.rhaos4.7.el8.ppc64le", "product": { "name": "NetworkManager-cloud-setup-debuginfo-1:1.26.0-12.1.rhaos4.7.el8.ppc64le", "product_id": "NetworkManager-cloud-setup-debuginfo-1:1.26.0-12.1.rhaos4.7.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/NetworkManager-cloud-setup-debuginfo@1.26.0-12.1.rhaos4.7.el8?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "NetworkManager-debuginfo-1:1.26.0-12.1.rhaos4.7.el8.ppc64le", "product": { "name": "NetworkManager-debuginfo-1:1.26.0-12.1.rhaos4.7.el8.ppc64le", "product_id": "NetworkManager-debuginfo-1:1.26.0-12.1.rhaos4.7.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/NetworkManager-debuginfo@1.26.0-12.1.rhaos4.7.el8?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "NetworkManager-libnm-debuginfo-1:1.26.0-12.1.rhaos4.7.el8.ppc64le", "product": { "name": "NetworkManager-libnm-debuginfo-1:1.26.0-12.1.rhaos4.7.el8.ppc64le", "product_id": "NetworkManager-libnm-debuginfo-1:1.26.0-12.1.rhaos4.7.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/NetworkManager-libnm-debuginfo@1.26.0-12.1.rhaos4.7.el8?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "NetworkManager-ovs-debuginfo-1:1.26.0-12.1.rhaos4.7.el8.ppc64le", "product": { "name": "NetworkManager-ovs-debuginfo-1:1.26.0-12.1.rhaos4.7.el8.ppc64le", "product_id": "NetworkManager-ovs-debuginfo-1:1.26.0-12.1.rhaos4.7.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/NetworkManager-ovs-debuginfo@1.26.0-12.1.rhaos4.7.el8?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "NetworkManager-ppp-debuginfo-1:1.26.0-12.1.rhaos4.7.el8.ppc64le", "product": { "name": "NetworkManager-ppp-debuginfo-1:1.26.0-12.1.rhaos4.7.el8.ppc64le", "product_id": "NetworkManager-ppp-debuginfo-1:1.26.0-12.1.rhaos4.7.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/NetworkManager-ppp-debuginfo@1.26.0-12.1.rhaos4.7.el8?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "NetworkManager-team-debuginfo-1:1.26.0-12.1.rhaos4.7.el8.ppc64le", "product": { "name": "NetworkManager-team-debuginfo-1:1.26.0-12.1.rhaos4.7.el8.ppc64le", "product_id": "NetworkManager-team-debuginfo-1:1.26.0-12.1.rhaos4.7.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/NetworkManager-team-debuginfo@1.26.0-12.1.rhaos4.7.el8?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "NetworkManager-tui-debuginfo-1:1.26.0-12.1.rhaos4.7.el8.ppc64le", "product": { "name": "NetworkManager-tui-debuginfo-1:1.26.0-12.1.rhaos4.7.el8.ppc64le", "product_id": "NetworkManager-tui-debuginfo-1:1.26.0-12.1.rhaos4.7.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/NetworkManager-tui-debuginfo@1.26.0-12.1.rhaos4.7.el8?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "NetworkManager-wifi-debuginfo-1:1.26.0-12.1.rhaos4.7.el8.ppc64le", "product": { "name": "NetworkManager-wifi-debuginfo-1:1.26.0-12.1.rhaos4.7.el8.ppc64le", "product_id": "NetworkManager-wifi-debuginfo-1:1.26.0-12.1.rhaos4.7.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/NetworkManager-wifi-debuginfo@1.26.0-12.1.rhaos4.7.el8?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "NetworkManager-wwan-debuginfo-1:1.26.0-12.1.rhaos4.7.el8.ppc64le", "product": { "name": "NetworkManager-wwan-debuginfo-1:1.26.0-12.1.rhaos4.7.el8.ppc64le", "product_id": "NetworkManager-wwan-debuginfo-1:1.26.0-12.1.rhaos4.7.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/NetworkManager-wwan-debuginfo@1.26.0-12.1.rhaos4.7.el8?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "openshift-clients-0:4.7.0-202102032256.p0.git.3951.0e656ef.el8.ppc64le", "product": { "name": "openshift-clients-0:4.7.0-202102032256.p0.git.3951.0e656ef.el8.ppc64le", "product_id": "openshift-clients-0:4.7.0-202102032256.p0.git.3951.0e656ef.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-clients@4.7.0-202102032256.p0.git.3951.0e656ef.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "gperftools-0:2.6.3-2.el8ost.ppc64le", "product": { "name": "gperftools-0:2.6.3-2.el8ost.ppc64le", "product_id": "gperftools-0:2.6.3-2.el8ost.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/gperftools@2.6.3-2.el8ost?arch=ppc64le" } } }, { "category": "product_version", "name": "gperftools-devel-0:2.6.3-2.el8ost.ppc64le", "product": { "name": "gperftools-devel-0:2.6.3-2.el8ost.ppc64le", "product_id": "gperftools-devel-0:2.6.3-2.el8ost.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/gperftools-devel@2.6.3-2.el8ost?arch=ppc64le" } } }, { "category": "product_version", "name": "gperftools-libs-0:2.6.3-2.el8ost.ppc64le", "product": { "name": "gperftools-libs-0:2.6.3-2.el8ost.ppc64le", "product_id": "gperftools-libs-0:2.6.3-2.el8ost.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/gperftools-libs@2.6.3-2.el8ost?arch=ppc64le" } } }, { "category": "product_version", "name": "gperftools-debugsource-0:2.6.3-2.el8ost.ppc64le", "product": { "name": "gperftools-debugsource-0:2.6.3-2.el8ost.ppc64le", "product_id": "gperftools-debugsource-0:2.6.3-2.el8ost.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/gperftools-debugsource@2.6.3-2.el8ost?arch=ppc64le" } } }, { "category": "product_version", "name": "gperftools-libs-debuginfo-0:2.6.3-2.el8ost.ppc64le", "product": { "name": "gperftools-libs-debuginfo-0:2.6.3-2.el8ost.ppc64le", "product_id": "gperftools-libs-debuginfo-0:2.6.3-2.el8ost.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/gperftools-libs-debuginfo@2.6.3-2.el8ost?arch=ppc64le" } } }, { "category": "product_version", "name": "clevis-0:15-1.el8.ppc64le", "product": { "name": "clevis-0:15-1.el8.ppc64le", "product_id": "clevis-0:15-1.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/clevis@15-1.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "clevis-dracut-0:15-1.el8.ppc64le", "product": { "name": "clevis-dracut-0:15-1.el8.ppc64le", "product_id": "clevis-dracut-0:15-1.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/clevis-dracut@15-1.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "clevis-luks-0:15-1.el8.ppc64le", "product": { "name": "clevis-luks-0:15-1.el8.ppc64le", "product_id": "clevis-luks-0:15-1.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/clevis-luks@15-1.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "clevis-systemd-0:15-1.el8.ppc64le", "product": { "name": "clevis-systemd-0:15-1.el8.ppc64le", "product_id": "clevis-systemd-0:15-1.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/clevis-systemd@15-1.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "clevis-udisks2-0:15-1.el8.ppc64le", "product": { "name": "clevis-udisks2-0:15-1.el8.ppc64le", "product_id": "clevis-udisks2-0:15-1.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/clevis-udisks2@15-1.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "clevis-debugsource-0:15-1.el8.ppc64le", "product": { "name": "clevis-debugsource-0:15-1.el8.ppc64le", "product_id": "clevis-debugsource-0:15-1.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/clevis-debugsource@15-1.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "clevis-debuginfo-0:15-1.el8.ppc64le", "product": { "name": "clevis-debuginfo-0:15-1.el8.ppc64le", "product_id": "clevis-debuginfo-0:15-1.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/clevis-debuginfo@15-1.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "clevis-udisks2-debuginfo-0:15-1.el8.ppc64le", "product": { "name": "clevis-udisks2-debuginfo-0:15-1.el8.ppc64le", "product_id": "clevis-udisks2-debuginfo-0:15-1.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/clevis-udisks2-debuginfo@15-1.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "afterburn-0:4.6.0-1.rhaos4.7.el8.ppc64le", "product": { "name": "afterburn-0:4.6.0-1.rhaos4.7.el8.ppc64le", "product_id": "afterburn-0:4.6.0-1.rhaos4.7.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/afterburn@4.6.0-1.rhaos4.7.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "rust-afterburn-debugsource-0:4.6.0-1.rhaos4.7.el8.ppc64le", "product": { "name": "rust-afterburn-debugsource-0:4.6.0-1.rhaos4.7.el8.ppc64le", "product_id": "rust-afterburn-debugsource-0:4.6.0-1.rhaos4.7.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/rust-afterburn-debugsource@4.6.0-1.rhaos4.7.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "afterburn-debuginfo-0:4.6.0-1.rhaos4.7.el8.ppc64le", "product": { "name": "afterburn-debuginfo-0:4.6.0-1.rhaos4.7.el8.ppc64le", "product_id": "afterburn-debuginfo-0:4.6.0-1.rhaos4.7.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/afterburn-debuginfo@4.6.0-1.rhaos4.7.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "rpm-ostree-0:2020.7-1.el8_3.ppc64le", "product": { "name": "rpm-ostree-0:2020.7-1.el8_3.ppc64le", "product_id": "rpm-ostree-0:2020.7-1.el8_3.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/rpm-ostree@2020.7-1.el8_3?arch=ppc64le" } } }, { "category": "product_version", "name": "rpm-ostree-devel-0:2020.7-1.el8_3.ppc64le", "product": { "name": "rpm-ostree-devel-0:2020.7-1.el8_3.ppc64le", "product_id": "rpm-ostree-devel-0:2020.7-1.el8_3.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/rpm-ostree-devel@2020.7-1.el8_3?arch=ppc64le" } } }, { "category": "product_version", "name": "rpm-ostree-libs-0:2020.7-1.el8_3.ppc64le", "product": { "name": "rpm-ostree-libs-0:2020.7-1.el8_3.ppc64le", "product_id": "rpm-ostree-libs-0:2020.7-1.el8_3.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/rpm-ostree-libs@2020.7-1.el8_3?arch=ppc64le" } } }, { "category": "product_version", "name": "rpm-ostree-debugsource-0:2020.7-1.el8_3.ppc64le", "product": { "name": "rpm-ostree-debugsource-0:2020.7-1.el8_3.ppc64le", "product_id": "rpm-ostree-debugsource-0:2020.7-1.el8_3.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/rpm-ostree-debugsource@2020.7-1.el8_3?arch=ppc64le" } } }, { "category": "product_version", "name": "rpm-ostree-debuginfo-0:2020.7-1.el8_3.ppc64le", "product": { "name": "rpm-ostree-debuginfo-0:2020.7-1.el8_3.ppc64le", "product_id": "rpm-ostree-debuginfo-0:2020.7-1.el8_3.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/rpm-ostree-debuginfo@2020.7-1.el8_3?arch=ppc64le" } } }, { "category": "product_version", "name": "rpm-ostree-libs-debuginfo-0:2020.7-1.el8_3.ppc64le", "product": { "name": "rpm-ostree-libs-debuginfo-0:2020.7-1.el8_3.ppc64le", "product_id": "rpm-ostree-libs-debuginfo-0:2020.7-1.el8_3.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/rpm-ostree-libs-debuginfo@2020.7-1.el8_3?arch=ppc64le" } } }, { "category": "product_version", "name": "redhat-release-coreos-0:47.83-1.el8.ppc64le", "product": { "name": "redhat-release-coreos-0:47.83-1.el8.ppc64le", "product_id": "redhat-release-coreos-0:47.83-1.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/redhat-release-coreos@47.83-1.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "ostree-0:2020.7-1.el8.ppc64le", "product": { "name": "ostree-0:2020.7-1.el8.ppc64le", "product_id": "ostree-0:2020.7-1.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/ostree@2020.7-1.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "ostree-devel-0:2020.7-1.el8.ppc64le", "product": { "name": "ostree-devel-0:2020.7-1.el8.ppc64le", "product_id": "ostree-devel-0:2020.7-1.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/ostree-devel@2020.7-1.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "ostree-grub2-0:2020.7-1.el8.ppc64le", "product": { "name": "ostree-grub2-0:2020.7-1.el8.ppc64le", "product_id": "ostree-grub2-0:2020.7-1.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/ostree-grub2@2020.7-1.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "ostree-libs-0:2020.7-1.el8.ppc64le", "product": { "name": "ostree-libs-0:2020.7-1.el8.ppc64le", "product_id": "ostree-libs-0:2020.7-1.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/ostree-libs@2020.7-1.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "ostree-debugsource-0:2020.7-1.el8.ppc64le", "product": { "name": "ostree-debugsource-0:2020.7-1.el8.ppc64le", "product_id": "ostree-debugsource-0:2020.7-1.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/ostree-debugsource@2020.7-1.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "ostree-debuginfo-0:2020.7-1.el8.ppc64le", "product": { "name": "ostree-debuginfo-0:2020.7-1.el8.ppc64le", "product_id": "ostree-debuginfo-0:2020.7-1.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/ostree-debuginfo@2020.7-1.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "ostree-libs-debuginfo-0:2020.7-1.el8.ppc64le", "product": { "name": "ostree-libs-debuginfo-0:2020.7-1.el8.ppc64le", "product_id": "ostree-libs-debuginfo-0:2020.7-1.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/ostree-libs-debuginfo@2020.7-1.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "inotify-tools-0:3.20.1-2.el8.ppc64le", "product": { "name": "inotify-tools-0:3.20.1-2.el8.ppc64le", "product_id": "inotify-tools-0:3.20.1-2.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/inotify-tools@3.20.1-2.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "inotify-tools-devel-0:3.20.1-2.el8.ppc64le", "product": { "name": "inotify-tools-devel-0:3.20.1-2.el8.ppc64le", "product_id": "inotify-tools-devel-0:3.20.1-2.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/inotify-tools-devel@3.20.1-2.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "inotify-tools-debugsource-0:3.20.1-2.el8.ppc64le", "product": { "name": "inotify-tools-debugsource-0:3.20.1-2.el8.ppc64le", "product_id": "inotify-tools-debugsource-0:3.20.1-2.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/inotify-tools-debugsource@3.20.1-2.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "inotify-tools-debuginfo-0:3.20.1-2.el8.ppc64le", "product": { "name": "inotify-tools-debuginfo-0:3.20.1-2.el8.ppc64le", "product_id": "inotify-tools-debuginfo-0:3.20.1-2.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/inotify-tools-debuginfo@3.20.1-2.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "ignition-0:2.9.0-2.rhaos4.7.git1d56dc8.el8.ppc64le", "product": { "name": "ignition-0:2.9.0-2.rhaos4.7.git1d56dc8.el8.ppc64le", "product_id": "ignition-0:2.9.0-2.rhaos4.7.git1d56dc8.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/ignition@2.9.0-2.rhaos4.7.git1d56dc8.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "ignition-validate-0:2.9.0-2.rhaos4.7.git1d56dc8.el8.ppc64le", "product": { "name": "ignition-validate-0:2.9.0-2.rhaos4.7.git1d56dc8.el8.ppc64le", "product_id": "ignition-validate-0:2.9.0-2.rhaos4.7.git1d56dc8.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/ignition-validate@2.9.0-2.rhaos4.7.git1d56dc8.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "ignition-debugsource-0:2.9.0-2.rhaos4.7.git1d56dc8.el8.ppc64le", "product": { "name": "ignition-debugsource-0:2.9.0-2.rhaos4.7.git1d56dc8.el8.ppc64le", "product_id": "ignition-debugsource-0:2.9.0-2.rhaos4.7.git1d56dc8.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/ignition-debugsource@2.9.0-2.rhaos4.7.git1d56dc8.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "ignition-debuginfo-0:2.9.0-2.rhaos4.7.git1d56dc8.el8.ppc64le", "product": { "name": "ignition-debuginfo-0:2.9.0-2.rhaos4.7.git1d56dc8.el8.ppc64le", "product_id": "ignition-debuginfo-0:2.9.0-2.rhaos4.7.git1d56dc8.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/ignition-debuginfo@2.9.0-2.rhaos4.7.git1d56dc8.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "ignition-validate-debuginfo-0:2.9.0-2.rhaos4.7.git1d56dc8.el8.ppc64le", "product": { "name": "ignition-validate-debuginfo-0:2.9.0-2.rhaos4.7.git1d56dc8.el8.ppc64le", "product_id": "ignition-validate-debuginfo-0:2.9.0-2.rhaos4.7.git1d56dc8.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/ignition-validate-debuginfo@2.9.0-2.rhaos4.7.git1d56dc8.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "coreos-installer-0:0.8.0-3.rhaos4.7.el8.ppc64le", "product": { "name": "coreos-installer-0:0.8.0-3.rhaos4.7.el8.ppc64le", "product_id": "coreos-installer-0:0.8.0-3.rhaos4.7.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/coreos-installer@0.8.0-3.rhaos4.7.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "coreos-installer-bootinfra-0:0.8.0-3.rhaos4.7.el8.ppc64le", "product": { "name": "coreos-installer-bootinfra-0:0.8.0-3.rhaos4.7.el8.ppc64le", "product_id": "coreos-installer-bootinfra-0:0.8.0-3.rhaos4.7.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/coreos-installer-bootinfra@0.8.0-3.rhaos4.7.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "coreos-installer-debugsource-0:0.8.0-3.rhaos4.7.el8.ppc64le", "product": { "name": "coreos-installer-debugsource-0:0.8.0-3.rhaos4.7.el8.ppc64le", "product_id": "coreos-installer-debugsource-0:0.8.0-3.rhaos4.7.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/coreos-installer-debugsource@0.8.0-3.rhaos4.7.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "coreos-installer-bootinfra-debuginfo-0:0.8.0-3.rhaos4.7.el8.ppc64le", "product": { "name": "coreos-installer-bootinfra-debuginfo-0:0.8.0-3.rhaos4.7.el8.ppc64le", "product_id": "coreos-installer-bootinfra-debuginfo-0:0.8.0-3.rhaos4.7.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/coreos-installer-bootinfra-debuginfo@0.8.0-3.rhaos4.7.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "coreos-installer-debuginfo-0:0.8.0-3.rhaos4.7.el8.ppc64le", "product": { "name": "coreos-installer-debuginfo-0:0.8.0-3.rhaos4.7.el8.ppc64le", "product_id": "coreos-installer-debuginfo-0:0.8.0-3.rhaos4.7.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/coreos-installer-debuginfo@0.8.0-3.rhaos4.7.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "conmon-2:2.0.21-2.rhaos4.6.el8.ppc64le", "product": { "name": "conmon-2:2.0.21-2.rhaos4.6.el8.ppc64le", "product_id": "conmon-2:2.0.21-2.rhaos4.6.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/conmon@2.0.21-2.rhaos4.6.el8?arch=ppc64le\u0026epoch=2" } } }, { "category": "product_version", "name": "openshift-hyperkube-0:4.7.0-202102060108.p0.git.97095.7271b90.el8.ppc64le", "product": { "name": "openshift-hyperkube-0:4.7.0-202102060108.p0.git.97095.7271b90.el8.ppc64le", "product_id": "openshift-hyperkube-0:4.7.0-202102060108.p0.git.97095.7271b90.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-hyperkube@4.7.0-202102060108.p0.git.97095.7271b90.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "runc-0:1.0.0-82.rhaos4.6.git086e841.el8.ppc64le", "product": { "name": "runc-0:1.0.0-82.rhaos4.6.git086e841.el8.ppc64le", "product_id": "runc-0:1.0.0-82.rhaos4.6.git086e841.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/runc@1.0.0-82.rhaos4.6.git086e841.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "runc-debugsource-0:1.0.0-82.rhaos4.6.git086e841.el8.ppc64le", "product": { "name": "runc-debugsource-0:1.0.0-82.rhaos4.6.git086e841.el8.ppc64le", "product_id": "runc-debugsource-0:1.0.0-82.rhaos4.6.git086e841.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/runc-debugsource@1.0.0-82.rhaos4.6.git086e841.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "runc-debuginfo-0:1.0.0-82.rhaos4.6.git086e841.el8.ppc64le", "product": { "name": "runc-debuginfo-0:1.0.0-82.rhaos4.6.git086e841.el8.ppc64le", "product_id": "runc-debuginfo-0:1.0.0-82.rhaos4.6.git086e841.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/runc-debuginfo@1.0.0-82.rhaos4.6.git086e841.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "cri-o-0:1.20.0-0.rhaos4.7.git8921e00.el8.51.ppc64le", "product": { "name": "cri-o-0:1.20.0-0.rhaos4.7.git8921e00.el8.51.ppc64le", "product_id": "cri-o-0:1.20.0-0.rhaos4.7.git8921e00.el8.51.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/cri-o@1.20.0-0.rhaos4.7.git8921e00.el8.51?arch=ppc64le" } } }, { "category": "product_version", "name": "cri-o-debugsource-0:1.20.0-0.rhaos4.7.git8921e00.el8.51.ppc64le", "product": { "name": "cri-o-debugsource-0:1.20.0-0.rhaos4.7.git8921e00.el8.51.ppc64le", "product_id": "cri-o-debugsource-0:1.20.0-0.rhaos4.7.git8921e00.el8.51.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/cri-o-debugsource@1.20.0-0.rhaos4.7.git8921e00.el8.51?arch=ppc64le" } } }, { "category": "product_version", "name": "cri-o-debuginfo-0:1.20.0-0.rhaos4.7.git8921e00.el8.51.ppc64le", "product": { "name": "cri-o-debuginfo-0:1.20.0-0.rhaos4.7.git8921e00.el8.51.ppc64le", "product_id": "cri-o-debuginfo-0:1.20.0-0.rhaos4.7.git8921e00.el8.51.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/cri-o-debuginfo@1.20.0-0.rhaos4.7.git8921e00.el8.51?arch=ppc64le" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "atomic-openshift-service-idler-0:4.7.0-202011171454.p0.git.15.675c1c8.el8.s390x", "product": { "name": "atomic-openshift-service-idler-0:4.7.0-202011171454.p0.git.15.675c1c8.el8.s390x", "product_id": "atomic-openshift-service-idler-0:4.7.0-202011171454.p0.git.15.675c1c8.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/atomic-openshift-service-idler@4.7.0-202011171454.p0.git.15.675c1c8.el8?arch=s390x" } } }, { "category": "product_version", "name": "containernetworking-plugins-0:0.8.6-1.rhaos4.5.el8.s390x", "product": { "name": "containernetworking-plugins-0:0.8.6-1.rhaos4.5.el8.s390x", "product_id": "containernetworking-plugins-0:0.8.6-1.rhaos4.5.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/containernetworking-plugins@0.8.6-1.rhaos4.5.el8?arch=s390x" } } }, { "category": "product_version", "name": "containernetworking-plugins-debugsource-0:0.8.6-1.rhaos4.5.el8.s390x", "product": { "name": "containernetworking-plugins-debugsource-0:0.8.6-1.rhaos4.5.el8.s390x", "product_id": "containernetworking-plugins-debugsource-0:0.8.6-1.rhaos4.5.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/containernetworking-plugins-debugsource@0.8.6-1.rhaos4.5.el8?arch=s390x" } } }, { "category": "product_version", "name": "containernetworking-plugins-debuginfo-0:0.8.6-1.rhaos4.5.el8.s390x", "product": { "name": "containernetworking-plugins-debuginfo-0:0.8.6-1.rhaos4.5.el8.s390x", "product_id": "containernetworking-plugins-debuginfo-0:0.8.6-1.rhaos4.5.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/containernetworking-plugins-debuginfo@0.8.6-1.rhaos4.5.el8?arch=s390x" } } }, { "category": "product_version", "name": "cri-tools-0:1.20.0-1.el8.s390x", "product": { "name": "cri-tools-0:1.20.0-1.el8.s390x", "product_id": "cri-tools-0:1.20.0-1.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/cri-tools@1.20.0-1.el8?arch=s390x" } } }, { "category": "product_version", "name": "cri-tools-debugsource-0:1.20.0-1.el8.s390x", "product": { "name": "cri-tools-debugsource-0:1.20.0-1.el8.s390x", "product_id": "cri-tools-debugsource-0:1.20.0-1.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/cri-tools-debugsource@1.20.0-1.el8?arch=s390x" } } }, { "category": "product_version", "name": "cri-tools-debuginfo-0:1.20.0-1.el8.s390x", "product": { "name": "cri-tools-debuginfo-0:1.20.0-1.el8.s390x", "product_id": "cri-tools-debuginfo-0:1.20.0-1.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/cri-tools-debuginfo@1.20.0-1.el8?arch=s390x" } } }, { "category": "product_version", "name": "dracut-0:049-95.git20200804.el8_3.4.s390x", "product": { "name": "dracut-0:049-95.git20200804.el8_3.4.s390x", "product_id": "dracut-0:049-95.git20200804.el8_3.4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/dracut@049-95.git20200804.el8_3.4?arch=s390x" } } }, { "category": "product_version", "name": "dracut-caps-0:049-95.git20200804.el8_3.4.s390x", "product": { "name": "dracut-caps-0:049-95.git20200804.el8_3.4.s390x", "product_id": "dracut-caps-0:049-95.git20200804.el8_3.4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/dracut-caps@049-95.git20200804.el8_3.4?arch=s390x" } } }, { "category": "product_version", "name": "dracut-config-generic-0:049-95.git20200804.el8_3.4.s390x", "product": { "name": "dracut-config-generic-0:049-95.git20200804.el8_3.4.s390x", "product_id": "dracut-config-generic-0:049-95.git20200804.el8_3.4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/dracut-config-generic@049-95.git20200804.el8_3.4?arch=s390x" } } }, { "category": "product_version", "name": "dracut-config-rescue-0:049-95.git20200804.el8_3.4.s390x", "product": { "name": "dracut-config-rescue-0:049-95.git20200804.el8_3.4.s390x", "product_id": "dracut-config-rescue-0:049-95.git20200804.el8_3.4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/dracut-config-rescue@049-95.git20200804.el8_3.4?arch=s390x" } } }, { "category": "product_version", "name": "dracut-live-0:049-95.git20200804.el8_3.4.s390x", "product": { "name": "dracut-live-0:049-95.git20200804.el8_3.4.s390x", "product_id": "dracut-live-0:049-95.git20200804.el8_3.4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/dracut-live@049-95.git20200804.el8_3.4?arch=s390x" } } }, { "category": "product_version", "name": "dracut-network-0:049-95.git20200804.el8_3.4.s390x", "product": { "name": "dracut-network-0:049-95.git20200804.el8_3.4.s390x", "product_id": "dracut-network-0:049-95.git20200804.el8_3.4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/dracut-network@049-95.git20200804.el8_3.4?arch=s390x" } } }, { "category": "product_version", "name": "dracut-squash-0:049-95.git20200804.el8_3.4.s390x", "product": { "name": "dracut-squash-0:049-95.git20200804.el8_3.4.s390x", "product_id": "dracut-squash-0:049-95.git20200804.el8_3.4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/dracut-squash@049-95.git20200804.el8_3.4?arch=s390x" } } }, { "category": "product_version", "name": "dracut-tools-0:049-95.git20200804.el8_3.4.s390x", "product": { "name": "dracut-tools-0:049-95.git20200804.el8_3.4.s390x", "product_id": "dracut-tools-0:049-95.git20200804.el8_3.4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/dracut-tools@049-95.git20200804.el8_3.4?arch=s390x" } } }, { "category": "product_version", "name": "dracut-debugsource-0:049-95.git20200804.el8_3.4.s390x", "product": { "name": "dracut-debugsource-0:049-95.git20200804.el8_3.4.s390x", "product_id": "dracut-debugsource-0:049-95.git20200804.el8_3.4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/dracut-debugsource@049-95.git20200804.el8_3.4?arch=s390x" } } }, { "category": "product_version", "name": "dracut-debuginfo-0:049-95.git20200804.el8_3.4.s390x", "product": { "name": "dracut-debuginfo-0:049-95.git20200804.el8_3.4.s390x", "product_id": "dracut-debuginfo-0:049-95.git20200804.el8_3.4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/dracut-debuginfo@049-95.git20200804.el8_3.4?arch=s390x" } } }, { "category": "product_version", "name": "faq-0:0.0.6-5.el8.s390x", "product": { "name": "faq-0:0.0.6-5.el8.s390x", "product_id": "faq-0:0.0.6-5.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/faq@0.0.6-5.el8?arch=s390x" } } }, { "category": "product_version", "name": "golang-github-prometheus-promu-0:0.5.0-2.git642a960.el8.s390x", "product": { "name": "golang-github-prometheus-promu-0:0.5.0-2.git642a960.el8.s390x", "product_id": "golang-github-prometheus-promu-0:0.5.0-2.git642a960.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/golang-github-prometheus-promu@0.5.0-2.git642a960.el8?arch=s390x" } } }, { "category": "product_version", "name": "prometheus-promu-0:0.5.0-2.git642a960.el8.s390x", "product": { "name": "prometheus-promu-0:0.5.0-2.git642a960.el8.s390x", "product_id": "prometheus-promu-0:0.5.0-2.git642a960.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/prometheus-promu@0.5.0-2.git642a960.el8?arch=s390x" } } }, { "category": "product_version", "name": "grpc-0:1.18.0-4.el8ost.s390x", "product": { "name": "grpc-0:1.18.0-4.el8ost.s390x", "product_id": "grpc-0:1.18.0-4.el8ost.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/grpc@1.18.0-4.el8ost?arch=s390x" } } }, { "category": "product_version", "name": "grpc-cli-0:1.18.0-4.el8ost.s390x", "product": { "name": "grpc-cli-0:1.18.0-4.el8ost.s390x", "product_id": "grpc-cli-0:1.18.0-4.el8ost.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/grpc-cli@1.18.0-4.el8ost?arch=s390x" } } }, { "category": "product_version", "name": "grpc-devel-0:1.18.0-4.el8ost.s390x", "product": { "name": "grpc-devel-0:1.18.0-4.el8ost.s390x", "product_id": "grpc-devel-0:1.18.0-4.el8ost.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/grpc-devel@1.18.0-4.el8ost?arch=s390x" } } }, { "category": "product_version", "name": "grpc-plugins-0:1.18.0-4.el8ost.s390x", "product": { "name": "grpc-plugins-0:1.18.0-4.el8ost.s390x", "product_id": "grpc-plugins-0:1.18.0-4.el8ost.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/grpc-plugins@1.18.0-4.el8ost?arch=s390x" } } }, { "category": "product_version", "name": "python3-grpcio-0:1.18.0-4.el8ost.s390x", "product": { "name": "python3-grpcio-0:1.18.0-4.el8ost.s390x", "product_id": "python3-grpcio-0:1.18.0-4.el8ost.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-grpcio@1.18.0-4.el8ost?arch=s390x" } } }, { "category": "product_version", "name": "grpc-debugsource-0:1.18.0-4.el8ost.s390x", "product": { "name": "grpc-debugsource-0:1.18.0-4.el8ost.s390x", "product_id": "grpc-debugsource-0:1.18.0-4.el8ost.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/grpc-debugsource@1.18.0-4.el8ost?arch=s390x" } } }, { "category": "product_version", "name": "grpc-cli-debuginfo-0:1.18.0-4.el8ost.s390x", "product": { "name": "grpc-cli-debuginfo-0:1.18.0-4.el8ost.s390x", "product_id": "grpc-cli-debuginfo-0:1.18.0-4.el8ost.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/grpc-cli-debuginfo@1.18.0-4.el8ost?arch=s390x" } } }, { "category": "product_version", "name": "grpc-debuginfo-0:1.18.0-4.el8ost.s390x", "product": { "name": "grpc-debuginfo-0:1.18.0-4.el8ost.s390x", "product_id": "grpc-debuginfo-0:1.18.0-4.el8ost.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/grpc-debuginfo@1.18.0-4.el8ost?arch=s390x" } } }, { "category": "product_version", "name": "grpc-plugins-debuginfo-0:1.18.0-4.el8ost.s390x", "product": { "name": "grpc-plugins-debuginfo-0:1.18.0-4.el8ost.s390x", "product_id": "grpc-plugins-debuginfo-0:1.18.0-4.el8ost.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/grpc-plugins-debuginfo@1.18.0-4.el8ost?arch=s390x" } } }, { "category": "product_version", "name": "python3-grpcio-debuginfo-0:1.18.0-4.el8ost.s390x", "product": { "name": "python3-grpcio-debuginfo-0:1.18.0-4.el8ost.s390x", "product_id": "python3-grpcio-debuginfo-0:1.18.0-4.el8ost.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-grpcio-debuginfo@1.18.0-4.el8ost?arch=s390x" } } }, { "category": "product_version", "name": "haproxy20-0:2.0.19-1.el8.s390x", "product": { "name": "haproxy20-0:2.0.19-1.el8.s390x", "product_id": "haproxy20-0:2.0.19-1.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/haproxy20@2.0.19-1.el8?arch=s390x" } } }, { "category": "product_version", "name": "haproxy-debugsource-0:2.0.19-1.el8.s390x", "product": { "name": "haproxy-debugsource-0:2.0.19-1.el8.s390x", "product_id": "haproxy-debugsource-0:2.0.19-1.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/haproxy-debugsource@2.0.19-1.el8?arch=s390x" } } }, { "category": "product_version", "name": "haproxy20-debuginfo-0:2.0.19-1.el8.s390x", "product": { "name": "haproxy20-debuginfo-0:2.0.19-1.el8.s390x", "product_id": "haproxy20-debuginfo-0:2.0.19-1.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/haproxy20-debuginfo@2.0.19-1.el8?arch=s390x" } } }, { "category": "product_version", "name": "jq-0:1.6-2.el8.s390x", "product": { "name": "jq-0:1.6-2.el8.s390x", "product_id": "jq-0:1.6-2.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/jq@1.6-2.el8?arch=s390x" } } }, { "category": "product_version", "name": "jq-devel-0:1.6-2.el8.s390x", "product": { "name": "jq-devel-0:1.6-2.el8.s390x", "product_id": "jq-devel-0:1.6-2.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/jq-devel@1.6-2.el8?arch=s390x" } } }, { "category": "product_version", "name": "jq-debugsource-0:1.6-2.el8.s390x", "product": { "name": "jq-debugsource-0:1.6-2.el8.s390x", "product_id": "jq-debugsource-0:1.6-2.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/jq-debugsource@1.6-2.el8?arch=s390x" } } }, { "category": "product_version", "name": "jq-debuginfo-0:1.6-2.el8.s390x", "product": { "name": "jq-debuginfo-0:1.6-2.el8.s390x", "product_id": "jq-debuginfo-0:1.6-2.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/jq-debuginfo@1.6-2.el8?arch=s390x" } } }, { "category": "product_version", "name": "libnftnl-0:1.1.5-4.el8.s390x", "product": { "name": "libnftnl-0:1.1.5-4.el8.s390x", "product_id": "libnftnl-0:1.1.5-4.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/libnftnl@1.1.5-4.el8?arch=s390x" } } }, { "category": "product_version", "name": "libnftnl-devel-0:1.1.5-4.el8.s390x", "product": { "name": "libnftnl-devel-0:1.1.5-4.el8.s390x", "product_id": "libnftnl-devel-0:1.1.5-4.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/libnftnl-devel@1.1.5-4.el8?arch=s390x" } } }, { "category": "product_version", "name": "libnftnl-debugsource-0:1.1.5-4.el8.s390x", "product": { "name": "libnftnl-debugsource-0:1.1.5-4.el8.s390x", "product_id": "libnftnl-debugsource-0:1.1.5-4.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/libnftnl-debugsource@1.1.5-4.el8?arch=s390x" } } }, { "category": "product_version", "name": "libnftnl-debuginfo-0:1.1.5-4.el8.s390x", "product": { "name": "libnftnl-debuginfo-0:1.1.5-4.el8.s390x", "product_id": "libnftnl-debuginfo-0:1.1.5-4.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/libnftnl-debuginfo@1.1.5-4.el8?arch=s390x" } } }, { "category": "product_version", "name": "libsodium-0:1.0.16-4.5.el8ost.s390x", "product": { "name": "libsodium-0:1.0.16-4.5.el8ost.s390x", "product_id": "libsodium-0:1.0.16-4.5.el8ost.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/libsodium@1.0.16-4.5.el8ost?arch=s390x" } } }, { "category": "product_version", "name": "libsodium-devel-0:1.0.16-4.5.el8ost.s390x", "product": { "name": "libsodium-devel-0:1.0.16-4.5.el8ost.s390x", "product_id": "libsodium-devel-0:1.0.16-4.5.el8ost.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/libsodium-devel@1.0.16-4.5.el8ost?arch=s390x" } } }, { "category": "product_version", "name": "libsodium-static-0:1.0.16-4.5.el8ost.s390x", "product": { "name": "libsodium-static-0:1.0.16-4.5.el8ost.s390x", "product_id": "libsodium-static-0:1.0.16-4.5.el8ost.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/libsodium-static@1.0.16-4.5.el8ost?arch=s390x" } } }, { "category": "product_version", "name": "libsodium-debugsource-0:1.0.16-4.5.el8ost.s390x", "product": { "name": "libsodium-debugsource-0:1.0.16-4.5.el8ost.s390x", "product_id": "libsodium-debugsource-0:1.0.16-4.5.el8ost.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/libsodium-debugsource@1.0.16-4.5.el8ost?arch=s390x" } } }, { "category": "product_version", "name": "libsodium-debuginfo-0:1.0.16-4.5.el8ost.s390x", "product": { "name": "libsodium-debuginfo-0:1.0.16-4.5.el8ost.s390x", "product_id": "libsodium-debuginfo-0:1.0.16-4.5.el8ost.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/libsodium-debuginfo@1.0.16-4.5.el8ost?arch=s390x" } } }, { "category": "product_version", "name": "openshift-eventrouter-0:0.2-4.git7c289cc.el8.s390x", "product": { "name": "openshift-eventrouter-0:0.2-4.git7c289cc.el8.s390x", "product_id": "openshift-eventrouter-0:0.2-4.git7c289cc.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-eventrouter@0.2-4.git7c289cc.el8?arch=s390x" } } }, { "category": "product_version", "name": "openshift-eventrouter-debugsource-0:0.2-4.git7c289cc.el8.s390x", "product": { "name": "openshift-eventrouter-debugsource-0:0.2-4.git7c289cc.el8.s390x", "product_id": "openshift-eventrouter-debugsource-0:0.2-4.git7c289cc.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-eventrouter-debugsource@0.2-4.git7c289cc.el8?arch=s390x" } } }, { "category": "product_version", "name": "openshift-eventrouter-debuginfo-0:0.2-4.git7c289cc.el8.s390x", "product": { "name": "openshift-eventrouter-debuginfo-0:0.2-4.git7c289cc.el8.s390x", "product_id": "openshift-eventrouter-debuginfo-0:0.2-4.git7c289cc.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-eventrouter-debuginfo@0.2-4.git7c289cc.el8?arch=s390x" } } }, { "category": "product_version", "name": "network-scripts-openvswitch2.13-0:2.13.0-79.el8fdp.s390x", "product": { "name": "network-scripts-openvswitch2.13-0:2.13.0-79.el8fdp.s390x", "product_id": "network-scripts-openvswitch2.13-0:2.13.0-79.el8fdp.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/network-scripts-openvswitch2.13@2.13.0-79.el8fdp?arch=s390x" } } }, { "category": "product_version", "name": "openvswitch2.13-0:2.13.0-79.el8fdp.s390x", "product": { "name": "openvswitch2.13-0:2.13.0-79.el8fdp.s390x", "product_id": "openvswitch2.13-0:2.13.0-79.el8fdp.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/openvswitch2.13@2.13.0-79.el8fdp?arch=s390x" } } }, { "category": "product_version", "name": "openvswitch2.13-devel-0:2.13.0-79.el8fdp.s390x", "product": { "name": "openvswitch2.13-devel-0:2.13.0-79.el8fdp.s390x", "product_id": "openvswitch2.13-devel-0:2.13.0-79.el8fdp.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/openvswitch2.13-devel@2.13.0-79.el8fdp?arch=s390x" } } }, { "category": "product_version", "name": "python3-openvswitch2.13-0:2.13.0-79.el8fdp.s390x", "product": { "name": "python3-openvswitch2.13-0:2.13.0-79.el8fdp.s390x", "product_id": "python3-openvswitch2.13-0:2.13.0-79.el8fdp.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-openvswitch2.13@2.13.0-79.el8fdp?arch=s390x" } } }, { "category": "product_version", "name": "openvswitch2.13-debugsource-0:2.13.0-79.el8fdp.s390x", "product": { "name": "openvswitch2.13-debugsource-0:2.13.0-79.el8fdp.s390x", "product_id": "openvswitch2.13-debugsource-0:2.13.0-79.el8fdp.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/openvswitch2.13-debugsource@2.13.0-79.el8fdp?arch=s390x" } } }, { "category": "product_version", "name": "openvswitch2.13-debuginfo-0:2.13.0-79.el8fdp.s390x", "product": { "name": "openvswitch2.13-debuginfo-0:2.13.0-79.el8fdp.s390x", "product_id": "openvswitch2.13-debuginfo-0:2.13.0-79.el8fdp.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/openvswitch2.13-debuginfo@2.13.0-79.el8fdp?arch=s390x" } } }, { "category": "product_version", "name": "python3-openvswitch2.13-debuginfo-0:2.13.0-79.el8fdp.s390x", "product": { "name": "python3-openvswitch2.13-debuginfo-0:2.13.0-79.el8fdp.s390x", "product_id": "python3-openvswitch2.13-debuginfo-0:2.13.0-79.el8fdp.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-openvswitch2.13-debuginfo@2.13.0-79.el8fdp?arch=s390x" } } }, { "category": "product_version", "name": "ovn2.13-0:20.09.0-21.el8fdn.s390x", "product": { "name": "ovn2.13-0:20.09.0-21.el8fdn.s390x", "product_id": "ovn2.13-0:20.09.0-21.el8fdn.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn2.13@20.09.0-21.el8fdn?arch=s390x" } } }, { "category": "product_version", "name": "ovn2.13-central-0:20.09.0-21.el8fdn.s390x", "product": { "name": "ovn2.13-central-0:20.09.0-21.el8fdn.s390x", "product_id": "ovn2.13-central-0:20.09.0-21.el8fdn.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn2.13-central@20.09.0-21.el8fdn?arch=s390x" } } }, { "category": "product_version", "name": "ovn2.13-host-0:20.09.0-21.el8fdn.s390x", "product": { "name": "ovn2.13-host-0:20.09.0-21.el8fdn.s390x", "product_id": "ovn2.13-host-0:20.09.0-21.el8fdn.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn2.13-host@20.09.0-21.el8fdn?arch=s390x" } } }, { "category": "product_version", "name": "ovn2.13-vtep-0:20.09.0-21.el8fdn.s390x", "product": { "name": "ovn2.13-vtep-0:20.09.0-21.el8fdn.s390x", "product_id": "ovn2.13-vtep-0:20.09.0-21.el8fdn.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn2.13-vtep@20.09.0-21.el8fdn?arch=s390x" } } }, { "category": "product_version", "name": "ovn2.13-debugsource-0:20.09.0-21.el8fdn.s390x", "product": { "name": "ovn2.13-debugsource-0:20.09.0-21.el8fdn.s390x", "product_id": "ovn2.13-debugsource-0:20.09.0-21.el8fdn.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn2.13-debugsource@20.09.0-21.el8fdn?arch=s390x" } } }, { "category": "product_version", "name": "ovn2.13-central-debuginfo-0:20.09.0-21.el8fdn.s390x", "product": { "name": "ovn2.13-central-debuginfo-0:20.09.0-21.el8fdn.s390x", "product_id": "ovn2.13-central-debuginfo-0:20.09.0-21.el8fdn.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn2.13-central-debuginfo@20.09.0-21.el8fdn?arch=s390x" } } }, { "category": "product_version", "name": "ovn2.13-debuginfo-0:20.09.0-21.el8fdn.s390x", "product": { "name": "ovn2.13-debuginfo-0:20.09.0-21.el8fdn.s390x", "product_id": "ovn2.13-debuginfo-0:20.09.0-21.el8fdn.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn2.13-debuginfo@20.09.0-21.el8fdn?arch=s390x" } } }, { "category": "product_version", "name": "ovn2.13-host-debuginfo-0:20.09.0-21.el8fdn.s390x", "product": { "name": "ovn2.13-host-debuginfo-0:20.09.0-21.el8fdn.s390x", "product_id": "ovn2.13-host-debuginfo-0:20.09.0-21.el8fdn.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn2.13-host-debuginfo@20.09.0-21.el8fdn?arch=s390x" } } }, { "category": "product_version", "name": "ovn2.13-vtep-debuginfo-0:20.09.0-21.el8fdn.s390x", "product": { "name": "ovn2.13-vtep-debuginfo-0:20.09.0-21.el8fdn.s390x", "product_id": "ovn2.13-vtep-debuginfo-0:20.09.0-21.el8fdn.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn2.13-vtep-debuginfo@20.09.0-21.el8fdn?arch=s390x" } } }, { "category": "product_version", "name": "protobuf-0:3.6.1-4.el8ost.s390x", "product": { "name": "protobuf-0:3.6.1-4.el8ost.s390x", "product_id": "protobuf-0:3.6.1-4.el8ost.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/protobuf@3.6.1-4.el8ost?arch=s390x" } } }, { "category": "product_version", "name": "protobuf-compiler-0:3.6.1-4.el8ost.s390x", "product": { "name": "protobuf-compiler-0:3.6.1-4.el8ost.s390x", "product_id": "protobuf-compiler-0:3.6.1-4.el8ost.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/protobuf-compiler@3.6.1-4.el8ost?arch=s390x" } } }, { "category": "product_version", "name": "protobuf-devel-0:3.6.1-4.el8ost.s390x", "product": { "name": "protobuf-devel-0:3.6.1-4.el8ost.s390x", "product_id": "protobuf-devel-0:3.6.1-4.el8ost.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/protobuf-devel@3.6.1-4.el8ost?arch=s390x" } } }, { "category": "product_version", "name": "protobuf-lite-0:3.6.1-4.el8ost.s390x", "product": { "name": "protobuf-lite-0:3.6.1-4.el8ost.s390x", "product_id": "protobuf-lite-0:3.6.1-4.el8ost.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/protobuf-lite@3.6.1-4.el8ost?arch=s390x" } } }, { "category": "product_version", "name": "protobuf-lite-devel-0:3.6.1-4.el8ost.s390x", "product": { "name": "protobuf-lite-devel-0:3.6.1-4.el8ost.s390x", "product_id": "protobuf-lite-devel-0:3.6.1-4.el8ost.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/protobuf-lite-devel@3.6.1-4.el8ost?arch=s390x" } } }, { "category": "product_version", "name": "protobuf-lite-static-0:3.6.1-4.el8ost.s390x", "product": { "name": "protobuf-lite-static-0:3.6.1-4.el8ost.s390x", "product_id": "protobuf-lite-static-0:3.6.1-4.el8ost.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/protobuf-lite-static@3.6.1-4.el8ost?arch=s390x" } } }, { "category": "product_version", "name": "protobuf-static-0:3.6.1-4.el8ost.s390x", "product": { "name": "protobuf-static-0:3.6.1-4.el8ost.s390x", "product_id": "protobuf-static-0:3.6.1-4.el8ost.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/protobuf-static@3.6.1-4.el8ost?arch=s390x" } } }, { "category": "product_version", "name": "protobuf-debugsource-0:3.6.1-4.el8ost.s390x", "product": { "name": "protobuf-debugsource-0:3.6.1-4.el8ost.s390x", "product_id": "protobuf-debugsource-0:3.6.1-4.el8ost.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/protobuf-debugsource@3.6.1-4.el8ost?arch=s390x" } } }, { "category": "product_version", "name": "protobuf-compiler-debuginfo-0:3.6.1-4.el8ost.s390x", "product": { "name": "protobuf-compiler-debuginfo-0:3.6.1-4.el8ost.s390x", "product_id": "protobuf-compiler-debuginfo-0:3.6.1-4.el8ost.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/protobuf-compiler-debuginfo@3.6.1-4.el8ost?arch=s390x" } } }, { "category": "product_version", "name": "protobuf-debuginfo-0:3.6.1-4.el8ost.s390x", "product": { "name": "protobuf-debuginfo-0:3.6.1-4.el8ost.s390x", "product_id": "protobuf-debuginfo-0:3.6.1-4.el8ost.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/protobuf-debuginfo@3.6.1-4.el8ost?arch=s390x" } } }, { "category": "product_version", "name": "protobuf-lite-debuginfo-0:3.6.1-4.el8ost.s390x", "product": { "name": "protobuf-lite-debuginfo-0:3.6.1-4.el8ost.s390x", "product_id": "protobuf-lite-debuginfo-0:3.6.1-4.el8ost.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/protobuf-lite-debuginfo@3.6.1-4.el8ost?arch=s390x" } } }, { "category": "product_version", "name": "python3-psutil-0:5.6.6-1.el8ar.s390x", "product": { "name": "python3-psutil-0:5.6.6-1.el8ar.s390x", "product_id": "python3-psutil-0:5.6.6-1.el8ar.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-psutil@5.6.6-1.el8ar?arch=s390x" } } }, { "category": "product_version", "name": "python-psutil-debugsource-0:5.6.6-1.el8ar.s390x", "product": { "name": "python-psutil-debugsource-0:5.6.6-1.el8ar.s390x", "product_id": "python-psutil-debugsource-0:5.6.6-1.el8ar.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-psutil-debugsource@5.6.6-1.el8ar?arch=s390x" } } }, { "category": "product_version", "name": "python3-psutil-debuginfo-0:5.6.6-1.el8ar.s390x", "product": { "name": "python3-psutil-debuginfo-0:5.6.6-1.el8ar.s390x", "product_id": "python3-psutil-debuginfo-0:5.6.6-1.el8ar.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-psutil-debuginfo@5.6.6-1.el8ar?arch=s390x" } } }, { "category": "product_version", "name": "python3-ruamel-yaml-0:0.15.41-4.el8ost.s390x", "product": { "name": "python3-ruamel-yaml-0:0.15.41-4.el8ost.s390x", "product_id": "python3-ruamel-yaml-0:0.15.41-4.el8ost.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-ruamel-yaml@0.15.41-4.el8ost?arch=s390x" } } }, { "category": "product_version", "name": "python-ruamel-yaml-debugsource-0:0.15.41-4.el8ost.s390x", "product": { "name": "python-ruamel-yaml-debugsource-0:0.15.41-4.el8ost.s390x", "product_id": "python-ruamel-yaml-debugsource-0:0.15.41-4.el8ost.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-ruamel-yaml-debugsource@0.15.41-4.el8ost?arch=s390x" } } }, { "category": "product_version", "name": "python3-ruamel-yaml-debuginfo-0:0.15.41-4.el8ost.s390x", "product": { "name": "python3-ruamel-yaml-debuginfo-0:0.15.41-4.el8ost.s390x", "product_id": "python3-ruamel-yaml-debuginfo-0:0.15.41-4.el8ost.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-ruamel-yaml-debuginfo@0.15.41-4.el8ost?arch=s390x" } } }, { "category": "product_version", "name": "tini-0:0.16.1-1.el8ar.s390x", "product": { "name": "tini-0:0.16.1-1.el8ar.s390x", "product_id": "tini-0:0.16.1-1.el8ar.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/tini@0.16.1-1.el8ar?arch=s390x" } } }, { "category": "product_version", "name": "NetworkManager-1:1.26.0-12.1.rhaos4.7.el8.s390x", "product": { "name": "NetworkManager-1:1.26.0-12.1.rhaos4.7.el8.s390x", "product_id": "NetworkManager-1:1.26.0-12.1.rhaos4.7.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/NetworkManager@1.26.0-12.1.rhaos4.7.el8?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "NetworkManager-adsl-1:1.26.0-12.1.rhaos4.7.el8.s390x", "product": { "name": "NetworkManager-adsl-1:1.26.0-12.1.rhaos4.7.el8.s390x", "product_id": "NetworkManager-adsl-1:1.26.0-12.1.rhaos4.7.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/NetworkManager-adsl@1.26.0-12.1.rhaos4.7.el8?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "NetworkManager-bluetooth-1:1.26.0-12.1.rhaos4.7.el8.s390x", "product": { "name": "NetworkManager-bluetooth-1:1.26.0-12.1.rhaos4.7.el8.s390x", "product_id": "NetworkManager-bluetooth-1:1.26.0-12.1.rhaos4.7.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/NetworkManager-bluetooth@1.26.0-12.1.rhaos4.7.el8?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "NetworkManager-cloud-setup-1:1.26.0-12.1.rhaos4.7.el8.s390x", "product": { "name": "NetworkManager-cloud-setup-1:1.26.0-12.1.rhaos4.7.el8.s390x", "product_id": "NetworkManager-cloud-setup-1:1.26.0-12.1.rhaos4.7.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/NetworkManager-cloud-setup@1.26.0-12.1.rhaos4.7.el8?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "NetworkManager-libnm-1:1.26.0-12.1.rhaos4.7.el8.s390x", "product": { "name": "NetworkManager-libnm-1:1.26.0-12.1.rhaos4.7.el8.s390x", "product_id": "NetworkManager-libnm-1:1.26.0-12.1.rhaos4.7.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/NetworkManager-libnm@1.26.0-12.1.rhaos4.7.el8?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "NetworkManager-libnm-devel-1:1.26.0-12.1.rhaos4.7.el8.s390x", "product": { "name": "NetworkManager-libnm-devel-1:1.26.0-12.1.rhaos4.7.el8.s390x", "product_id": "NetworkManager-libnm-devel-1:1.26.0-12.1.rhaos4.7.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/NetworkManager-libnm-devel@1.26.0-12.1.rhaos4.7.el8?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "NetworkManager-ovs-1:1.26.0-12.1.rhaos4.7.el8.s390x", "product": { "name": "NetworkManager-ovs-1:1.26.0-12.1.rhaos4.7.el8.s390x", "product_id": "NetworkManager-ovs-1:1.26.0-12.1.rhaos4.7.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/NetworkManager-ovs@1.26.0-12.1.rhaos4.7.el8?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "NetworkManager-ppp-1:1.26.0-12.1.rhaos4.7.el8.s390x", "product": { "name": "NetworkManager-ppp-1:1.26.0-12.1.rhaos4.7.el8.s390x", "product_id": "NetworkManager-ppp-1:1.26.0-12.1.rhaos4.7.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/NetworkManager-ppp@1.26.0-12.1.rhaos4.7.el8?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "NetworkManager-team-1:1.26.0-12.1.rhaos4.7.el8.s390x", "product": { "name": "NetworkManager-team-1:1.26.0-12.1.rhaos4.7.el8.s390x", "product_id": "NetworkManager-team-1:1.26.0-12.1.rhaos4.7.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/NetworkManager-team@1.26.0-12.1.rhaos4.7.el8?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "NetworkManager-tui-1:1.26.0-12.1.rhaos4.7.el8.s390x", "product": { "name": "NetworkManager-tui-1:1.26.0-12.1.rhaos4.7.el8.s390x", "product_id": "NetworkManager-tui-1:1.26.0-12.1.rhaos4.7.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/NetworkManager-tui@1.26.0-12.1.rhaos4.7.el8?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "NetworkManager-wifi-1:1.26.0-12.1.rhaos4.7.el8.s390x", "product": { "name": "NetworkManager-wifi-1:1.26.0-12.1.rhaos4.7.el8.s390x", "product_id": "NetworkManager-wifi-1:1.26.0-12.1.rhaos4.7.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/NetworkManager-wifi@1.26.0-12.1.rhaos4.7.el8?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "NetworkManager-wwan-1:1.26.0-12.1.rhaos4.7.el8.s390x", "product": { "name": "NetworkManager-wwan-1:1.26.0-12.1.rhaos4.7.el8.s390x", "product_id": "NetworkManager-wwan-1:1.26.0-12.1.rhaos4.7.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/NetworkManager-wwan@1.26.0-12.1.rhaos4.7.el8?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "NetworkManager-debugsource-1:1.26.0-12.1.rhaos4.7.el8.s390x", "product": { "name": "NetworkManager-debugsource-1:1.26.0-12.1.rhaos4.7.el8.s390x", "product_id": "NetworkManager-debugsource-1:1.26.0-12.1.rhaos4.7.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/NetworkManager-debugsource@1.26.0-12.1.rhaos4.7.el8?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "NetworkManager-adsl-debuginfo-1:1.26.0-12.1.rhaos4.7.el8.s390x", "product": { "name": "NetworkManager-adsl-debuginfo-1:1.26.0-12.1.rhaos4.7.el8.s390x", "product_id": "NetworkManager-adsl-debuginfo-1:1.26.0-12.1.rhaos4.7.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/NetworkManager-adsl-debuginfo@1.26.0-12.1.rhaos4.7.el8?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "NetworkManager-bluetooth-debuginfo-1:1.26.0-12.1.rhaos4.7.el8.s390x", "product": { "name": "NetworkManager-bluetooth-debuginfo-1:1.26.0-12.1.rhaos4.7.el8.s390x", "product_id": "NetworkManager-bluetooth-debuginfo-1:1.26.0-12.1.rhaos4.7.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/NetworkManager-bluetooth-debuginfo@1.26.0-12.1.rhaos4.7.el8?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "NetworkManager-cloud-setup-debuginfo-1:1.26.0-12.1.rhaos4.7.el8.s390x", "product": { "name": "NetworkManager-cloud-setup-debuginfo-1:1.26.0-12.1.rhaos4.7.el8.s390x", "product_id": "NetworkManager-cloud-setup-debuginfo-1:1.26.0-12.1.rhaos4.7.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/NetworkManager-cloud-setup-debuginfo@1.26.0-12.1.rhaos4.7.el8?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "NetworkManager-debuginfo-1:1.26.0-12.1.rhaos4.7.el8.s390x", "product": { "name": "NetworkManager-debuginfo-1:1.26.0-12.1.rhaos4.7.el8.s390x", "product_id": "NetworkManager-debuginfo-1:1.26.0-12.1.rhaos4.7.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/NetworkManager-debuginfo@1.26.0-12.1.rhaos4.7.el8?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "NetworkManager-libnm-debuginfo-1:1.26.0-12.1.rhaos4.7.el8.s390x", "product": { "name": "NetworkManager-libnm-debuginfo-1:1.26.0-12.1.rhaos4.7.el8.s390x", "product_id": "NetworkManager-libnm-debuginfo-1:1.26.0-12.1.rhaos4.7.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/NetworkManager-libnm-debuginfo@1.26.0-12.1.rhaos4.7.el8?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "NetworkManager-ovs-debuginfo-1:1.26.0-12.1.rhaos4.7.el8.s390x", "product": { "name": "NetworkManager-ovs-debuginfo-1:1.26.0-12.1.rhaos4.7.el8.s390x", "product_id": "NetworkManager-ovs-debuginfo-1:1.26.0-12.1.rhaos4.7.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/NetworkManager-ovs-debuginfo@1.26.0-12.1.rhaos4.7.el8?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "NetworkManager-ppp-debuginfo-1:1.26.0-12.1.rhaos4.7.el8.s390x", "product": { "name": "NetworkManager-ppp-debuginfo-1:1.26.0-12.1.rhaos4.7.el8.s390x", "product_id": "NetworkManager-ppp-debuginfo-1:1.26.0-12.1.rhaos4.7.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/NetworkManager-ppp-debuginfo@1.26.0-12.1.rhaos4.7.el8?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "NetworkManager-team-debuginfo-1:1.26.0-12.1.rhaos4.7.el8.s390x", "product": { "name": "NetworkManager-team-debuginfo-1:1.26.0-12.1.rhaos4.7.el8.s390x", "product_id": "NetworkManager-team-debuginfo-1:1.26.0-12.1.rhaos4.7.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/NetworkManager-team-debuginfo@1.26.0-12.1.rhaos4.7.el8?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "NetworkManager-tui-debuginfo-1:1.26.0-12.1.rhaos4.7.el8.s390x", "product": { "name": "NetworkManager-tui-debuginfo-1:1.26.0-12.1.rhaos4.7.el8.s390x", "product_id": "NetworkManager-tui-debuginfo-1:1.26.0-12.1.rhaos4.7.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/NetworkManager-tui-debuginfo@1.26.0-12.1.rhaos4.7.el8?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "NetworkManager-wifi-debuginfo-1:1.26.0-12.1.rhaos4.7.el8.s390x", "product": { "name": "NetworkManager-wifi-debuginfo-1:1.26.0-12.1.rhaos4.7.el8.s390x", "product_id": "NetworkManager-wifi-debuginfo-1:1.26.0-12.1.rhaos4.7.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/NetworkManager-wifi-debuginfo@1.26.0-12.1.rhaos4.7.el8?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "NetworkManager-wwan-debuginfo-1:1.26.0-12.1.rhaos4.7.el8.s390x", "product": { "name": "NetworkManager-wwan-debuginfo-1:1.26.0-12.1.rhaos4.7.el8.s390x", "product_id": "NetworkManager-wwan-debuginfo-1:1.26.0-12.1.rhaos4.7.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/NetworkManager-wwan-debuginfo@1.26.0-12.1.rhaos4.7.el8?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "openshift-clients-0:4.7.0-202102032256.p0.git.3951.0e656ef.el8.s390x", "product": { "name": "openshift-clients-0:4.7.0-202102032256.p0.git.3951.0e656ef.el8.s390x", "product_id": "openshift-clients-0:4.7.0-202102032256.p0.git.3951.0e656ef.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-clients@4.7.0-202102032256.p0.git.3951.0e656ef.el8?arch=s390x" } } }, { "category": "product_version", "name": "gperftools-0:2.6.3-2.el8ost.s390x", "product": { "name": "gperftools-0:2.6.3-2.el8ost.s390x", "product_id": "gperftools-0:2.6.3-2.el8ost.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/gperftools@2.6.3-2.el8ost?arch=s390x" } } }, { "category": "product_version", "name": "gperftools-devel-0:2.6.3-2.el8ost.s390x", "product": { "name": "gperftools-devel-0:2.6.3-2.el8ost.s390x", "product_id": "gperftools-devel-0:2.6.3-2.el8ost.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/gperftools-devel@2.6.3-2.el8ost?arch=s390x" } } }, { "category": "product_version", "name": "gperftools-libs-0:2.6.3-2.el8ost.s390x", "product": { "name": "gperftools-libs-0:2.6.3-2.el8ost.s390x", "product_id": "gperftools-libs-0:2.6.3-2.el8ost.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/gperftools-libs@2.6.3-2.el8ost?arch=s390x" } } }, { "category": "product_version", "name": "gperftools-debugsource-0:2.6.3-2.el8ost.s390x", "product": { "name": "gperftools-debugsource-0:2.6.3-2.el8ost.s390x", "product_id": "gperftools-debugsource-0:2.6.3-2.el8ost.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/gperftools-debugsource@2.6.3-2.el8ost?arch=s390x" } } }, { "category": "product_version", "name": "gperftools-libs-debuginfo-0:2.6.3-2.el8ost.s390x", "product": { "name": "gperftools-libs-debuginfo-0:2.6.3-2.el8ost.s390x", "product_id": "gperftools-libs-debuginfo-0:2.6.3-2.el8ost.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/gperftools-libs-debuginfo@2.6.3-2.el8ost?arch=s390x" } } }, { "category": "product_version", "name": "clevis-0:15-1.el8.s390x", "product": { "name": "clevis-0:15-1.el8.s390x", "product_id": "clevis-0:15-1.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/clevis@15-1.el8?arch=s390x" } } }, { "category": "product_version", "name": "clevis-dracut-0:15-1.el8.s390x", "product": { "name": "clevis-dracut-0:15-1.el8.s390x", "product_id": "clevis-dracut-0:15-1.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/clevis-dracut@15-1.el8?arch=s390x" } } }, { "category": "product_version", "name": "clevis-luks-0:15-1.el8.s390x", "product": { "name": "clevis-luks-0:15-1.el8.s390x", "product_id": "clevis-luks-0:15-1.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/clevis-luks@15-1.el8?arch=s390x" } } }, { "category": "product_version", "name": "clevis-systemd-0:15-1.el8.s390x", "product": { "name": "clevis-systemd-0:15-1.el8.s390x", "product_id": "clevis-systemd-0:15-1.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/clevis-systemd@15-1.el8?arch=s390x" } } }, { "category": "product_version", "name": "clevis-udisks2-0:15-1.el8.s390x", "product": { "name": "clevis-udisks2-0:15-1.el8.s390x", "product_id": "clevis-udisks2-0:15-1.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/clevis-udisks2@15-1.el8?arch=s390x" } } }, { "category": "product_version", "name": "clevis-debugsource-0:15-1.el8.s390x", "product": { "name": "clevis-debugsource-0:15-1.el8.s390x", "product_id": "clevis-debugsource-0:15-1.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/clevis-debugsource@15-1.el8?arch=s390x" } } }, { "category": "product_version", "name": "clevis-debuginfo-0:15-1.el8.s390x", "product": { "name": "clevis-debuginfo-0:15-1.el8.s390x", "product_id": "clevis-debuginfo-0:15-1.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/clevis-debuginfo@15-1.el8?arch=s390x" } } }, { "category": "product_version", "name": "clevis-udisks2-debuginfo-0:15-1.el8.s390x", "product": { "name": "clevis-udisks2-debuginfo-0:15-1.el8.s390x", "product_id": "clevis-udisks2-debuginfo-0:15-1.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/clevis-udisks2-debuginfo@15-1.el8?arch=s390x" } } }, { "category": "product_version", "name": "afterburn-0:4.6.0-1.rhaos4.7.el8.s390x", "product": { "name": "afterburn-0:4.6.0-1.rhaos4.7.el8.s390x", "product_id": "afterburn-0:4.6.0-1.rhaos4.7.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/afterburn@4.6.0-1.rhaos4.7.el8?arch=s390x" } } }, { "category": "product_version", "name": "rust-afterburn-debugsource-0:4.6.0-1.rhaos4.7.el8.s390x", "product": { "name": "rust-afterburn-debugsource-0:4.6.0-1.rhaos4.7.el8.s390x", "product_id": "rust-afterburn-debugsource-0:4.6.0-1.rhaos4.7.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/rust-afterburn-debugsource@4.6.0-1.rhaos4.7.el8?arch=s390x" } } }, { "category": "product_version", "name": "afterburn-debuginfo-0:4.6.0-1.rhaos4.7.el8.s390x", "product": { "name": "afterburn-debuginfo-0:4.6.0-1.rhaos4.7.el8.s390x", "product_id": "afterburn-debuginfo-0:4.6.0-1.rhaos4.7.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/afterburn-debuginfo@4.6.0-1.rhaos4.7.el8?arch=s390x" } } }, { "category": "product_version", "name": "rpm-ostree-0:2020.7-1.el8_3.s390x", "product": { "name": "rpm-ostree-0:2020.7-1.el8_3.s390x", "product_id": "rpm-ostree-0:2020.7-1.el8_3.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/rpm-ostree@2020.7-1.el8_3?arch=s390x" } } }, { "category": "product_version", "name": "rpm-ostree-devel-0:2020.7-1.el8_3.s390x", "product": { "name": "rpm-ostree-devel-0:2020.7-1.el8_3.s390x", "product_id": "rpm-ostree-devel-0:2020.7-1.el8_3.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/rpm-ostree-devel@2020.7-1.el8_3?arch=s390x" } } }, { "category": "product_version", "name": "rpm-ostree-libs-0:2020.7-1.el8_3.s390x", "product": { "name": "rpm-ostree-libs-0:2020.7-1.el8_3.s390x", "product_id": "rpm-ostree-libs-0:2020.7-1.el8_3.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/rpm-ostree-libs@2020.7-1.el8_3?arch=s390x" } } }, { "category": "product_version", "name": "rpm-ostree-debugsource-0:2020.7-1.el8_3.s390x", "product": { "name": "rpm-ostree-debugsource-0:2020.7-1.el8_3.s390x", "product_id": "rpm-ostree-debugsource-0:2020.7-1.el8_3.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/rpm-ostree-debugsource@2020.7-1.el8_3?arch=s390x" } } }, { "category": "product_version", "name": "rpm-ostree-debuginfo-0:2020.7-1.el8_3.s390x", "product": { "name": "rpm-ostree-debuginfo-0:2020.7-1.el8_3.s390x", "product_id": "rpm-ostree-debuginfo-0:2020.7-1.el8_3.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/rpm-ostree-debuginfo@2020.7-1.el8_3?arch=s390x" } } }, { "category": "product_version", "name": "rpm-ostree-libs-debuginfo-0:2020.7-1.el8_3.s390x", "product": { "name": "rpm-ostree-libs-debuginfo-0:2020.7-1.el8_3.s390x", "product_id": "rpm-ostree-libs-debuginfo-0:2020.7-1.el8_3.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/rpm-ostree-libs-debuginfo@2020.7-1.el8_3?arch=s390x" } } }, { "category": "product_version", "name": "redhat-release-coreos-0:47.83-1.el8.s390x", "product": { "name": "redhat-release-coreos-0:47.83-1.el8.s390x", "product_id": "redhat-release-coreos-0:47.83-1.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/redhat-release-coreos@47.83-1.el8?arch=s390x" } } }, { "category": "product_version", "name": "ostree-0:2020.7-1.el8.s390x", "product": { "name": "ostree-0:2020.7-1.el8.s390x", "product_id": "ostree-0:2020.7-1.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/ostree@2020.7-1.el8?arch=s390x" } } }, { "category": "product_version", "name": "ostree-devel-0:2020.7-1.el8.s390x", "product": { "name": "ostree-devel-0:2020.7-1.el8.s390x", "product_id": "ostree-devel-0:2020.7-1.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/ostree-devel@2020.7-1.el8?arch=s390x" } } }, { "category": "product_version", "name": "ostree-libs-0:2020.7-1.el8.s390x", "product": { "name": "ostree-libs-0:2020.7-1.el8.s390x", "product_id": "ostree-libs-0:2020.7-1.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/ostree-libs@2020.7-1.el8?arch=s390x" } } }, { "category": "product_version", "name": "ostree-debugsource-0:2020.7-1.el8.s390x", "product": { "name": "ostree-debugsource-0:2020.7-1.el8.s390x", "product_id": "ostree-debugsource-0:2020.7-1.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/ostree-debugsource@2020.7-1.el8?arch=s390x" } } }, { "category": "product_version", "name": "ostree-debuginfo-0:2020.7-1.el8.s390x", "product": { "name": "ostree-debuginfo-0:2020.7-1.el8.s390x", "product_id": "ostree-debuginfo-0:2020.7-1.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/ostree-debuginfo@2020.7-1.el8?arch=s390x" } } }, { "category": "product_version", "name": "ostree-libs-debuginfo-0:2020.7-1.el8.s390x", "product": { "name": "ostree-libs-debuginfo-0:2020.7-1.el8.s390x", "product_id": "ostree-libs-debuginfo-0:2020.7-1.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/ostree-libs-debuginfo@2020.7-1.el8?arch=s390x" } } }, { "category": "product_version", "name": "inotify-tools-0:3.20.1-2.el8.s390x", "product": { "name": "inotify-tools-0:3.20.1-2.el8.s390x", "product_id": "inotify-tools-0:3.20.1-2.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/inotify-tools@3.20.1-2.el8?arch=s390x" } } }, { "category": "product_version", "name": "inotify-tools-devel-0:3.20.1-2.el8.s390x", "product": { "name": "inotify-tools-devel-0:3.20.1-2.el8.s390x", "product_id": "inotify-tools-devel-0:3.20.1-2.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/inotify-tools-devel@3.20.1-2.el8?arch=s390x" } } }, { "category": "product_version", "name": "inotify-tools-debugsource-0:3.20.1-2.el8.s390x", "product": { "name": "inotify-tools-debugsource-0:3.20.1-2.el8.s390x", "product_id": "inotify-tools-debugsource-0:3.20.1-2.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/inotify-tools-debugsource@3.20.1-2.el8?arch=s390x" } } }, { "category": "product_version", "name": "inotify-tools-debuginfo-0:3.20.1-2.el8.s390x", "product": { "name": "inotify-tools-debuginfo-0:3.20.1-2.el8.s390x", "product_id": "inotify-tools-debuginfo-0:3.20.1-2.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/inotify-tools-debuginfo@3.20.1-2.el8?arch=s390x" } } }, { "category": "product_version", "name": "ignition-0:2.9.0-2.rhaos4.7.git1d56dc8.el8.s390x", "product": { "name": "ignition-0:2.9.0-2.rhaos4.7.git1d56dc8.el8.s390x", "product_id": "ignition-0:2.9.0-2.rhaos4.7.git1d56dc8.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/ignition@2.9.0-2.rhaos4.7.git1d56dc8.el8?arch=s390x" } } }, { "category": "product_version", "name": "ignition-validate-0:2.9.0-2.rhaos4.7.git1d56dc8.el8.s390x", "product": { "name": "ignition-validate-0:2.9.0-2.rhaos4.7.git1d56dc8.el8.s390x", "product_id": "ignition-validate-0:2.9.0-2.rhaos4.7.git1d56dc8.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/ignition-validate@2.9.0-2.rhaos4.7.git1d56dc8.el8?arch=s390x" } } }, { "category": "product_version", "name": "ignition-debugsource-0:2.9.0-2.rhaos4.7.git1d56dc8.el8.s390x", "product": { "name": "ignition-debugsource-0:2.9.0-2.rhaos4.7.git1d56dc8.el8.s390x", "product_id": "ignition-debugsource-0:2.9.0-2.rhaos4.7.git1d56dc8.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/ignition-debugsource@2.9.0-2.rhaos4.7.git1d56dc8.el8?arch=s390x" } } }, { "category": "product_version", "name": "ignition-debuginfo-0:2.9.0-2.rhaos4.7.git1d56dc8.el8.s390x", "product": { "name": "ignition-debuginfo-0:2.9.0-2.rhaos4.7.git1d56dc8.el8.s390x", "product_id": "ignition-debuginfo-0:2.9.0-2.rhaos4.7.git1d56dc8.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/ignition-debuginfo@2.9.0-2.rhaos4.7.git1d56dc8.el8?arch=s390x" } } }, { "category": "product_version", "name": "ignition-validate-debuginfo-0:2.9.0-2.rhaos4.7.git1d56dc8.el8.s390x", "product": { "name": "ignition-validate-debuginfo-0:2.9.0-2.rhaos4.7.git1d56dc8.el8.s390x", "product_id": "ignition-validate-debuginfo-0:2.9.0-2.rhaos4.7.git1d56dc8.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/ignition-validate-debuginfo@2.9.0-2.rhaos4.7.git1d56dc8.el8?arch=s390x" } } }, { "category": "product_version", "name": "coreos-installer-0:0.8.0-3.rhaos4.7.el8.s390x", "product": { "name": "coreos-installer-0:0.8.0-3.rhaos4.7.el8.s390x", "product_id": "coreos-installer-0:0.8.0-3.rhaos4.7.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/coreos-installer@0.8.0-3.rhaos4.7.el8?arch=s390x" } } }, { "category": "product_version", "name": "coreos-installer-bootinfra-0:0.8.0-3.rhaos4.7.el8.s390x", "product": { "name": "coreos-installer-bootinfra-0:0.8.0-3.rhaos4.7.el8.s390x", "product_id": "coreos-installer-bootinfra-0:0.8.0-3.rhaos4.7.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/coreos-installer-bootinfra@0.8.0-3.rhaos4.7.el8?arch=s390x" } } }, { "category": "product_version", "name": "coreos-installer-debugsource-0:0.8.0-3.rhaos4.7.el8.s390x", "product": { "name": "coreos-installer-debugsource-0:0.8.0-3.rhaos4.7.el8.s390x", "product_id": "coreos-installer-debugsource-0:0.8.0-3.rhaos4.7.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/coreos-installer-debugsource@0.8.0-3.rhaos4.7.el8?arch=s390x" } } }, { "category": "product_version", "name": "coreos-installer-bootinfra-debuginfo-0:0.8.0-3.rhaos4.7.el8.s390x", "product": { "name": "coreos-installer-bootinfra-debuginfo-0:0.8.0-3.rhaos4.7.el8.s390x", "product_id": "coreos-installer-bootinfra-debuginfo-0:0.8.0-3.rhaos4.7.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/coreos-installer-bootinfra-debuginfo@0.8.0-3.rhaos4.7.el8?arch=s390x" } } }, { "category": "product_version", "name": "coreos-installer-debuginfo-0:0.8.0-3.rhaos4.7.el8.s390x", "product": { "name": "coreos-installer-debuginfo-0:0.8.0-3.rhaos4.7.el8.s390x", "product_id": "coreos-installer-debuginfo-0:0.8.0-3.rhaos4.7.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/coreos-installer-debuginfo@0.8.0-3.rhaos4.7.el8?arch=s390x" } } }, { "category": "product_version", "name": "conmon-2:2.0.21-2.rhaos4.6.el8.s390x", "product": { "name": "conmon-2:2.0.21-2.rhaos4.6.el8.s390x", "product_id": "conmon-2:2.0.21-2.rhaos4.6.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/conmon@2.0.21-2.rhaos4.6.el8?arch=s390x\u0026epoch=2" } } }, { "category": "product_version", "name": "openshift-hyperkube-0:4.7.0-202102060108.p0.git.97095.7271b90.el8.s390x", "product": { "name": "openshift-hyperkube-0:4.7.0-202102060108.p0.git.97095.7271b90.el8.s390x", "product_id": "openshift-hyperkube-0:4.7.0-202102060108.p0.git.97095.7271b90.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-hyperkube@4.7.0-202102060108.p0.git.97095.7271b90.el8?arch=s390x" } } }, { "category": "product_version", "name": "runc-0:1.0.0-82.rhaos4.6.git086e841.el8.s390x", "product": { "name": "runc-0:1.0.0-82.rhaos4.6.git086e841.el8.s390x", "product_id": "runc-0:1.0.0-82.rhaos4.6.git086e841.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/runc@1.0.0-82.rhaos4.6.git086e841.el8?arch=s390x" } } }, { "category": "product_version", "name": "runc-debugsource-0:1.0.0-82.rhaos4.6.git086e841.el8.s390x", "product": { "name": "runc-debugsource-0:1.0.0-82.rhaos4.6.git086e841.el8.s390x", "product_id": "runc-debugsource-0:1.0.0-82.rhaos4.6.git086e841.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/runc-debugsource@1.0.0-82.rhaos4.6.git086e841.el8?arch=s390x" } } }, { "category": "product_version", "name": "runc-debuginfo-0:1.0.0-82.rhaos4.6.git086e841.el8.s390x", "product": { "name": "runc-debuginfo-0:1.0.0-82.rhaos4.6.git086e841.el8.s390x", "product_id": "runc-debuginfo-0:1.0.0-82.rhaos4.6.git086e841.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/runc-debuginfo@1.0.0-82.rhaos4.6.git086e841.el8?arch=s390x" } } }, { "category": "product_version", "name": "cri-o-0:1.20.0-0.rhaos4.7.git8921e00.el8.51.s390x", "product": { "name": "cri-o-0:1.20.0-0.rhaos4.7.git8921e00.el8.51.s390x", "product_id": "cri-o-0:1.20.0-0.rhaos4.7.git8921e00.el8.51.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/cri-o@1.20.0-0.rhaos4.7.git8921e00.el8.51?arch=s390x" } } }, { "category": "product_version", "name": "cri-o-debugsource-0:1.20.0-0.rhaos4.7.git8921e00.el8.51.s390x", "product": { "name": "cri-o-debugsource-0:1.20.0-0.rhaos4.7.git8921e00.el8.51.s390x", "product_id": "cri-o-debugsource-0:1.20.0-0.rhaos4.7.git8921e00.el8.51.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/cri-o-debugsource@1.20.0-0.rhaos4.7.git8921e00.el8.51?arch=s390x" } } }, { "category": "product_version", "name": "cri-o-debuginfo-0:1.20.0-0.rhaos4.7.git8921e00.el8.51.s390x", "product": { "name": "cri-o-debuginfo-0:1.20.0-0.rhaos4.7.git8921e00.el8.51.s390x", "product_id": "cri-o-debuginfo-0:1.20.0-0.rhaos4.7.git8921e00.el8.51.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/cri-o-debuginfo@1.20.0-0.rhaos4.7.git8921e00.el8.51?arch=s390x" } } } ], "category": "architecture", "name": "s390x" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "conmon-2:2.0.21-2.rhaos4.6.el7.src as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "7Server-RH7-RHOSE-4.7:conmon-2:2.0.21-2.rhaos4.6.el7.src" }, "product_reference": "conmon-2:2.0.21-2.rhaos4.6.el7.src", "relates_to_product_reference": "7Server-RH7-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "conmon-2:2.0.21-2.rhaos4.6.el7.x86_64 as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "7Server-RH7-RHOSE-4.7:conmon-2:2.0.21-2.rhaos4.6.el7.x86_64" }, "product_reference": "conmon-2:2.0.21-2.rhaos4.6.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "containernetworking-plugins-0:0.8.6-1.rhaos4.5.el7.src as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "7Server-RH7-RHOSE-4.7:containernetworking-plugins-0:0.8.6-1.rhaos4.5.el7.src" }, "product_reference": "containernetworking-plugins-0:0.8.6-1.rhaos4.5.el7.src", "relates_to_product_reference": "7Server-RH7-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "containernetworking-plugins-0:0.8.6-1.rhaos4.5.el7.x86_64 as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "7Server-RH7-RHOSE-4.7:containernetworking-plugins-0:0.8.6-1.rhaos4.5.el7.x86_64" }, "product_reference": "containernetworking-plugins-0:0.8.6-1.rhaos4.5.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "containernetworking-plugins-debuginfo-0:0.8.6-1.rhaos4.5.el7.x86_64 as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "7Server-RH7-RHOSE-4.7:containernetworking-plugins-debuginfo-0:0.8.6-1.rhaos4.5.el7.x86_64" }, "product_reference": "containernetworking-plugins-debuginfo-0:0.8.6-1.rhaos4.5.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "cri-o-0:1.20.0-0.rhaos4.7.git8921e00.el7.51.src as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "7Server-RH7-RHOSE-4.7:cri-o-0:1.20.0-0.rhaos4.7.git8921e00.el7.51.src" }, "product_reference": "cri-o-0:1.20.0-0.rhaos4.7.git8921e00.el7.51.src", "relates_to_product_reference": "7Server-RH7-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "cri-o-0:1.20.0-0.rhaos4.7.git8921e00.el7.51.x86_64 as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "7Server-RH7-RHOSE-4.7:cri-o-0:1.20.0-0.rhaos4.7.git8921e00.el7.51.x86_64" }, "product_reference": "cri-o-0:1.20.0-0.rhaos4.7.git8921e00.el7.51.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "cri-o-debuginfo-0:1.20.0-0.rhaos4.7.git8921e00.el7.51.x86_64 as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "7Server-RH7-RHOSE-4.7:cri-o-debuginfo-0:1.20.0-0.rhaos4.7.git8921e00.el7.51.x86_64" }, "product_reference": "cri-o-debuginfo-0:1.20.0-0.rhaos4.7.git8921e00.el7.51.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "cri-tools-0:1.18.0-3.el7.src as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "7Server-RH7-RHOSE-4.7:cri-tools-0:1.18.0-3.el7.src" }, "product_reference": "cri-tools-0:1.18.0-3.el7.src", "relates_to_product_reference": "7Server-RH7-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "cri-tools-0:1.18.0-3.el7.x86_64 as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "7Server-RH7-RHOSE-4.7:cri-tools-0:1.18.0-3.el7.x86_64" }, "product_reference": "cri-tools-0:1.18.0-3.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "cri-tools-debuginfo-0:1.18.0-3.el7.x86_64 as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "7Server-RH7-RHOSE-4.7:cri-tools-debuginfo-0:1.18.0-3.el7.x86_64" }, "product_reference": "cri-tools-debuginfo-0:1.18.0-3.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "haproxy-0:2.0.19-1.el7.src as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "7Server-RH7-RHOSE-4.7:haproxy-0:2.0.19-1.el7.src" }, "product_reference": "haproxy-0:2.0.19-1.el7.src", "relates_to_product_reference": "7Server-RH7-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "haproxy-debuginfo-0:2.0.19-1.el7.x86_64 as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "7Server-RH7-RHOSE-4.7:haproxy-debuginfo-0:2.0.19-1.el7.x86_64" }, "product_reference": "haproxy-debuginfo-0:2.0.19-1.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "haproxy20-0:2.0.19-1.el7.x86_64 as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "7Server-RH7-RHOSE-4.7:haproxy20-0:2.0.19-1.el7.x86_64" }, "product_reference": "haproxy20-0:2.0.19-1.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "jq-0:1.6-2.el7.src as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "7Server-RH7-RHOSE-4.7:jq-0:1.6-2.el7.src" }, "product_reference": "jq-0:1.6-2.el7.src", "relates_to_product_reference": "7Server-RH7-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "jq-0:1.6-2.el7.x86_64 as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "7Server-RH7-RHOSE-4.7:jq-0:1.6-2.el7.x86_64" }, "product_reference": "jq-0:1.6-2.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "jq-debuginfo-0:1.6-2.el7.x86_64 as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "7Server-RH7-RHOSE-4.7:jq-debuginfo-0:1.6-2.el7.x86_64" }, "product_reference": "jq-debuginfo-0:1.6-2.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "jq-devel-0:1.6-2.el7.x86_64 as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "7Server-RH7-RHOSE-4.7:jq-devel-0:1.6-2.el7.x86_64" }, "product_reference": "jq-devel-0:1.6-2.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "oniguruma-0:5.9.2-5.el7.src as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "7Server-RH7-RHOSE-4.7:oniguruma-0:5.9.2-5.el7.src" }, "product_reference": "oniguruma-0:5.9.2-5.el7.src", "relates_to_product_reference": "7Server-RH7-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "oniguruma-0:5.9.2-5.el7.x86_64 as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "7Server-RH7-RHOSE-4.7:oniguruma-0:5.9.2-5.el7.x86_64" }, "product_reference": "oniguruma-0:5.9.2-5.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "oniguruma-debuginfo-0:5.9.2-5.el7.x86_64 as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "7Server-RH7-RHOSE-4.7:oniguruma-debuginfo-0:5.9.2-5.el7.x86_64" }, "product_reference": "oniguruma-debuginfo-0:5.9.2-5.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "oniguruma-devel-0:5.9.2-5.el7.x86_64 as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "7Server-RH7-RHOSE-4.7:oniguruma-devel-0:5.9.2-5.el7.x86_64" }, "product_reference": "oniguruma-devel-0:5.9.2-5.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-0:4.7.0-202102060108.p0.git.97095.7271b90.el7.src as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "7Server-RH7-RHOSE-4.7:openshift-0:4.7.0-202102060108.p0.git.97095.7271b90.el7.src" }, "product_reference": "openshift-0:4.7.0-202102060108.p0.git.97095.7271b90.el7.src", "relates_to_product_reference": "7Server-RH7-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-ansible-0:4.7.0-202102032256.p0.git.0.bf7d9a7.el7.noarch as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "7Server-RH7-RHOSE-4.7:openshift-ansible-0:4.7.0-202102032256.p0.git.0.bf7d9a7.el7.noarch" }, "product_reference": "openshift-ansible-0:4.7.0-202102032256.p0.git.0.bf7d9a7.el7.noarch", "relates_to_product_reference": "7Server-RH7-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-ansible-0:4.7.0-202102032256.p0.git.0.bf7d9a7.el7.src as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "7Server-RH7-RHOSE-4.7:openshift-ansible-0:4.7.0-202102032256.p0.git.0.bf7d9a7.el7.src" }, "product_reference": "openshift-ansible-0:4.7.0-202102032256.p0.git.0.bf7d9a7.el7.src", "relates_to_product_reference": "7Server-RH7-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-ansible-test-0:4.7.0-202102032256.p0.git.0.bf7d9a7.el7.noarch as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "7Server-RH7-RHOSE-4.7:openshift-ansible-test-0:4.7.0-202102032256.p0.git.0.bf7d9a7.el7.noarch" }, "product_reference": "openshift-ansible-test-0:4.7.0-202102032256.p0.git.0.bf7d9a7.el7.noarch", "relates_to_product_reference": "7Server-RH7-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-clients-0:4.7.0-202102032256.p0.git.3951.0e656ef.el7.src as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "7Server-RH7-RHOSE-4.7:openshift-clients-0:4.7.0-202102032256.p0.git.3951.0e656ef.el7.src" }, "product_reference": "openshift-clients-0:4.7.0-202102032256.p0.git.3951.0e656ef.el7.src", "relates_to_product_reference": "7Server-RH7-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-clients-0:4.7.0-202102032256.p0.git.3951.0e656ef.el7.x86_64 as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "7Server-RH7-RHOSE-4.7:openshift-clients-0:4.7.0-202102032256.p0.git.3951.0e656ef.el7.x86_64" }, "product_reference": "openshift-clients-0:4.7.0-202102032256.p0.git.3951.0e656ef.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-clients-redistributable-0:4.7.0-202102032256.p0.git.3951.0e656ef.el7.x86_64 as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "7Server-RH7-RHOSE-4.7:openshift-clients-redistributable-0:4.7.0-202102032256.p0.git.3951.0e656ef.el7.x86_64" }, "product_reference": "openshift-clients-redistributable-0:4.7.0-202102032256.p0.git.3951.0e656ef.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-hyperkube-0:4.7.0-202102060108.p0.git.97095.7271b90.el7.x86_64 as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "7Server-RH7-RHOSE-4.7:openshift-hyperkube-0:4.7.0-202102060108.p0.git.97095.7271b90.el7.x86_64" }, "product_reference": "openshift-hyperkube-0:4.7.0-202102060108.p0.git.97095.7271b90.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "python-botocore-0:1.4.57-5.el7.src as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "7Server-RH7-RHOSE-4.7:python-botocore-0:1.4.57-5.el7.src" }, "product_reference": "python-botocore-0:1.4.57-5.el7.src", "relates_to_product_reference": "7Server-RH7-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "python2-botocore-0:1.4.57-5.el7.noarch as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "7Server-RH7-RHOSE-4.7:python2-botocore-0:1.4.57-5.el7.noarch" }, "product_reference": "python2-botocore-0:1.4.57-5.el7.noarch", "relates_to_product_reference": "7Server-RH7-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "runc-0:1.0.0-82.rhaos4.6.git086e841.el7.src as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "7Server-RH7-RHOSE-4.7:runc-0:1.0.0-82.rhaos4.6.git086e841.el7.src" }, "product_reference": "runc-0:1.0.0-82.rhaos4.6.git086e841.el7.src", "relates_to_product_reference": "7Server-RH7-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "runc-0:1.0.0-82.rhaos4.6.git086e841.el7.x86_64 as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "7Server-RH7-RHOSE-4.7:runc-0:1.0.0-82.rhaos4.6.git086e841.el7.x86_64" }, "product_reference": "runc-0:1.0.0-82.rhaos4.6.git086e841.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "runc-debuginfo-0:1.0.0-82.rhaos4.6.git086e841.el7.x86_64 as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "7Server-RH7-RHOSE-4.7:runc-debuginfo-0:1.0.0-82.rhaos4.6.git086e841.el7.x86_64" }, "product_reference": "runc-debuginfo-0:1.0.0-82.rhaos4.6.git086e841.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "NetworkManager-1:1.26.0-12.1.rhaos4.7.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:NetworkManager-1:1.26.0-12.1.rhaos4.7.el8.ppc64le" }, "product_reference": "NetworkManager-1:1.26.0-12.1.rhaos4.7.el8.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "NetworkManager-1:1.26.0-12.1.rhaos4.7.el8.s390x as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:NetworkManager-1:1.26.0-12.1.rhaos4.7.el8.s390x" }, "product_reference": "NetworkManager-1:1.26.0-12.1.rhaos4.7.el8.s390x", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "NetworkManager-1:1.26.0-12.1.rhaos4.7.el8.src as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:NetworkManager-1:1.26.0-12.1.rhaos4.7.el8.src" }, "product_reference": "NetworkManager-1:1.26.0-12.1.rhaos4.7.el8.src", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "NetworkManager-1:1.26.0-12.1.rhaos4.7.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:NetworkManager-1:1.26.0-12.1.rhaos4.7.el8.x86_64" }, "product_reference": "NetworkManager-1:1.26.0-12.1.rhaos4.7.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "NetworkManager-adsl-1:1.26.0-12.1.rhaos4.7.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:NetworkManager-adsl-1:1.26.0-12.1.rhaos4.7.el8.ppc64le" }, "product_reference": "NetworkManager-adsl-1:1.26.0-12.1.rhaos4.7.el8.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "NetworkManager-adsl-1:1.26.0-12.1.rhaos4.7.el8.s390x as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:NetworkManager-adsl-1:1.26.0-12.1.rhaos4.7.el8.s390x" }, "product_reference": "NetworkManager-adsl-1:1.26.0-12.1.rhaos4.7.el8.s390x", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "NetworkManager-adsl-1:1.26.0-12.1.rhaos4.7.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:NetworkManager-adsl-1:1.26.0-12.1.rhaos4.7.el8.x86_64" }, "product_reference": "NetworkManager-adsl-1:1.26.0-12.1.rhaos4.7.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "NetworkManager-adsl-debuginfo-1:1.26.0-12.1.rhaos4.7.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:NetworkManager-adsl-debuginfo-1:1.26.0-12.1.rhaos4.7.el8.ppc64le" }, "product_reference": "NetworkManager-adsl-debuginfo-1:1.26.0-12.1.rhaos4.7.el8.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "NetworkManager-adsl-debuginfo-1:1.26.0-12.1.rhaos4.7.el8.s390x as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:NetworkManager-adsl-debuginfo-1:1.26.0-12.1.rhaos4.7.el8.s390x" }, "product_reference": "NetworkManager-adsl-debuginfo-1:1.26.0-12.1.rhaos4.7.el8.s390x", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "NetworkManager-adsl-debuginfo-1:1.26.0-12.1.rhaos4.7.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:NetworkManager-adsl-debuginfo-1:1.26.0-12.1.rhaos4.7.el8.x86_64" }, "product_reference": "NetworkManager-adsl-debuginfo-1:1.26.0-12.1.rhaos4.7.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "NetworkManager-bluetooth-1:1.26.0-12.1.rhaos4.7.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:NetworkManager-bluetooth-1:1.26.0-12.1.rhaos4.7.el8.ppc64le" }, "product_reference": "NetworkManager-bluetooth-1:1.26.0-12.1.rhaos4.7.el8.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "NetworkManager-bluetooth-1:1.26.0-12.1.rhaos4.7.el8.s390x as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:NetworkManager-bluetooth-1:1.26.0-12.1.rhaos4.7.el8.s390x" }, "product_reference": "NetworkManager-bluetooth-1:1.26.0-12.1.rhaos4.7.el8.s390x", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "NetworkManager-bluetooth-1:1.26.0-12.1.rhaos4.7.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:NetworkManager-bluetooth-1:1.26.0-12.1.rhaos4.7.el8.x86_64" }, "product_reference": "NetworkManager-bluetooth-1:1.26.0-12.1.rhaos4.7.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "NetworkManager-bluetooth-debuginfo-1:1.26.0-12.1.rhaos4.7.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:NetworkManager-bluetooth-debuginfo-1:1.26.0-12.1.rhaos4.7.el8.ppc64le" }, "product_reference": "NetworkManager-bluetooth-debuginfo-1:1.26.0-12.1.rhaos4.7.el8.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "NetworkManager-bluetooth-debuginfo-1:1.26.0-12.1.rhaos4.7.el8.s390x as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:NetworkManager-bluetooth-debuginfo-1:1.26.0-12.1.rhaos4.7.el8.s390x" }, "product_reference": "NetworkManager-bluetooth-debuginfo-1:1.26.0-12.1.rhaos4.7.el8.s390x", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "NetworkManager-bluetooth-debuginfo-1:1.26.0-12.1.rhaos4.7.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:NetworkManager-bluetooth-debuginfo-1:1.26.0-12.1.rhaos4.7.el8.x86_64" }, "product_reference": "NetworkManager-bluetooth-debuginfo-1:1.26.0-12.1.rhaos4.7.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "NetworkManager-cloud-setup-1:1.26.0-12.1.rhaos4.7.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:NetworkManager-cloud-setup-1:1.26.0-12.1.rhaos4.7.el8.ppc64le" }, "product_reference": "NetworkManager-cloud-setup-1:1.26.0-12.1.rhaos4.7.el8.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "NetworkManager-cloud-setup-1:1.26.0-12.1.rhaos4.7.el8.s390x as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:NetworkManager-cloud-setup-1:1.26.0-12.1.rhaos4.7.el8.s390x" }, "product_reference": "NetworkManager-cloud-setup-1:1.26.0-12.1.rhaos4.7.el8.s390x", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "NetworkManager-cloud-setup-1:1.26.0-12.1.rhaos4.7.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:NetworkManager-cloud-setup-1:1.26.0-12.1.rhaos4.7.el8.x86_64" }, "product_reference": "NetworkManager-cloud-setup-1:1.26.0-12.1.rhaos4.7.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "NetworkManager-cloud-setup-debuginfo-1:1.26.0-12.1.rhaos4.7.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:NetworkManager-cloud-setup-debuginfo-1:1.26.0-12.1.rhaos4.7.el8.ppc64le" }, "product_reference": "NetworkManager-cloud-setup-debuginfo-1:1.26.0-12.1.rhaos4.7.el8.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "NetworkManager-cloud-setup-debuginfo-1:1.26.0-12.1.rhaos4.7.el8.s390x as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:NetworkManager-cloud-setup-debuginfo-1:1.26.0-12.1.rhaos4.7.el8.s390x" }, "product_reference": "NetworkManager-cloud-setup-debuginfo-1:1.26.0-12.1.rhaos4.7.el8.s390x", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "NetworkManager-cloud-setup-debuginfo-1:1.26.0-12.1.rhaos4.7.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:NetworkManager-cloud-setup-debuginfo-1:1.26.0-12.1.rhaos4.7.el8.x86_64" }, "product_reference": "NetworkManager-cloud-setup-debuginfo-1:1.26.0-12.1.rhaos4.7.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "NetworkManager-config-connectivity-redhat-1:1.26.0-12.1.rhaos4.7.el8.noarch as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:NetworkManager-config-connectivity-redhat-1:1.26.0-12.1.rhaos4.7.el8.noarch" }, "product_reference": "NetworkManager-config-connectivity-redhat-1:1.26.0-12.1.rhaos4.7.el8.noarch", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "NetworkManager-config-server-1:1.26.0-12.1.rhaos4.7.el8.noarch as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:NetworkManager-config-server-1:1.26.0-12.1.rhaos4.7.el8.noarch" }, "product_reference": "NetworkManager-config-server-1:1.26.0-12.1.rhaos4.7.el8.noarch", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "NetworkManager-debuginfo-1:1.26.0-12.1.rhaos4.7.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:NetworkManager-debuginfo-1:1.26.0-12.1.rhaos4.7.el8.ppc64le" }, "product_reference": "NetworkManager-debuginfo-1:1.26.0-12.1.rhaos4.7.el8.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "NetworkManager-debuginfo-1:1.26.0-12.1.rhaos4.7.el8.s390x as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:NetworkManager-debuginfo-1:1.26.0-12.1.rhaos4.7.el8.s390x" }, "product_reference": "NetworkManager-debuginfo-1:1.26.0-12.1.rhaos4.7.el8.s390x", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "NetworkManager-debuginfo-1:1.26.0-12.1.rhaos4.7.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:NetworkManager-debuginfo-1:1.26.0-12.1.rhaos4.7.el8.x86_64" }, "product_reference": "NetworkManager-debuginfo-1:1.26.0-12.1.rhaos4.7.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "NetworkManager-debugsource-1:1.26.0-12.1.rhaos4.7.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:NetworkManager-debugsource-1:1.26.0-12.1.rhaos4.7.el8.ppc64le" }, "product_reference": "NetworkManager-debugsource-1:1.26.0-12.1.rhaos4.7.el8.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "NetworkManager-debugsource-1:1.26.0-12.1.rhaos4.7.el8.s390x as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:NetworkManager-debugsource-1:1.26.0-12.1.rhaos4.7.el8.s390x" }, "product_reference": "NetworkManager-debugsource-1:1.26.0-12.1.rhaos4.7.el8.s390x", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "NetworkManager-debugsource-1:1.26.0-12.1.rhaos4.7.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:NetworkManager-debugsource-1:1.26.0-12.1.rhaos4.7.el8.x86_64" }, "product_reference": "NetworkManager-debugsource-1:1.26.0-12.1.rhaos4.7.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "NetworkManager-dispatcher-routing-rules-1:1.26.0-12.1.rhaos4.7.el8.noarch as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:NetworkManager-dispatcher-routing-rules-1:1.26.0-12.1.rhaos4.7.el8.noarch" }, "product_reference": "NetworkManager-dispatcher-routing-rules-1:1.26.0-12.1.rhaos4.7.el8.noarch", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "NetworkManager-libnm-1:1.26.0-12.1.rhaos4.7.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:NetworkManager-libnm-1:1.26.0-12.1.rhaos4.7.el8.ppc64le" }, "product_reference": "NetworkManager-libnm-1:1.26.0-12.1.rhaos4.7.el8.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "NetworkManager-libnm-1:1.26.0-12.1.rhaos4.7.el8.s390x as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:NetworkManager-libnm-1:1.26.0-12.1.rhaos4.7.el8.s390x" }, "product_reference": "NetworkManager-libnm-1:1.26.0-12.1.rhaos4.7.el8.s390x", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "NetworkManager-libnm-1:1.26.0-12.1.rhaos4.7.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:NetworkManager-libnm-1:1.26.0-12.1.rhaos4.7.el8.x86_64" }, "product_reference": "NetworkManager-libnm-1:1.26.0-12.1.rhaos4.7.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "NetworkManager-libnm-debuginfo-1:1.26.0-12.1.rhaos4.7.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:NetworkManager-libnm-debuginfo-1:1.26.0-12.1.rhaos4.7.el8.ppc64le" }, "product_reference": "NetworkManager-libnm-debuginfo-1:1.26.0-12.1.rhaos4.7.el8.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "NetworkManager-libnm-debuginfo-1:1.26.0-12.1.rhaos4.7.el8.s390x as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:NetworkManager-libnm-debuginfo-1:1.26.0-12.1.rhaos4.7.el8.s390x" }, "product_reference": "NetworkManager-libnm-debuginfo-1:1.26.0-12.1.rhaos4.7.el8.s390x", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "NetworkManager-libnm-debuginfo-1:1.26.0-12.1.rhaos4.7.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:NetworkManager-libnm-debuginfo-1:1.26.0-12.1.rhaos4.7.el8.x86_64" }, "product_reference": "NetworkManager-libnm-debuginfo-1:1.26.0-12.1.rhaos4.7.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "NetworkManager-libnm-devel-1:1.26.0-12.1.rhaos4.7.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:NetworkManager-libnm-devel-1:1.26.0-12.1.rhaos4.7.el8.ppc64le" }, "product_reference": "NetworkManager-libnm-devel-1:1.26.0-12.1.rhaos4.7.el8.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "NetworkManager-libnm-devel-1:1.26.0-12.1.rhaos4.7.el8.s390x as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:NetworkManager-libnm-devel-1:1.26.0-12.1.rhaos4.7.el8.s390x" }, "product_reference": "NetworkManager-libnm-devel-1:1.26.0-12.1.rhaos4.7.el8.s390x", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "NetworkManager-libnm-devel-1:1.26.0-12.1.rhaos4.7.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:NetworkManager-libnm-devel-1:1.26.0-12.1.rhaos4.7.el8.x86_64" }, "product_reference": "NetworkManager-libnm-devel-1:1.26.0-12.1.rhaos4.7.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "NetworkManager-ovs-1:1.26.0-12.1.rhaos4.7.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:NetworkManager-ovs-1:1.26.0-12.1.rhaos4.7.el8.ppc64le" }, "product_reference": "NetworkManager-ovs-1:1.26.0-12.1.rhaos4.7.el8.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "NetworkManager-ovs-1:1.26.0-12.1.rhaos4.7.el8.s390x as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:NetworkManager-ovs-1:1.26.0-12.1.rhaos4.7.el8.s390x" }, "product_reference": "NetworkManager-ovs-1:1.26.0-12.1.rhaos4.7.el8.s390x", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "NetworkManager-ovs-1:1.26.0-12.1.rhaos4.7.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:NetworkManager-ovs-1:1.26.0-12.1.rhaos4.7.el8.x86_64" }, "product_reference": "NetworkManager-ovs-1:1.26.0-12.1.rhaos4.7.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "NetworkManager-ovs-debuginfo-1:1.26.0-12.1.rhaos4.7.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:NetworkManager-ovs-debuginfo-1:1.26.0-12.1.rhaos4.7.el8.ppc64le" }, "product_reference": "NetworkManager-ovs-debuginfo-1:1.26.0-12.1.rhaos4.7.el8.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "NetworkManager-ovs-debuginfo-1:1.26.0-12.1.rhaos4.7.el8.s390x as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:NetworkManager-ovs-debuginfo-1:1.26.0-12.1.rhaos4.7.el8.s390x" }, "product_reference": "NetworkManager-ovs-debuginfo-1:1.26.0-12.1.rhaos4.7.el8.s390x", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "NetworkManager-ovs-debuginfo-1:1.26.0-12.1.rhaos4.7.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:NetworkManager-ovs-debuginfo-1:1.26.0-12.1.rhaos4.7.el8.x86_64" }, "product_reference": "NetworkManager-ovs-debuginfo-1:1.26.0-12.1.rhaos4.7.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "NetworkManager-ppp-1:1.26.0-12.1.rhaos4.7.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:NetworkManager-ppp-1:1.26.0-12.1.rhaos4.7.el8.ppc64le" }, "product_reference": "NetworkManager-ppp-1:1.26.0-12.1.rhaos4.7.el8.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "NetworkManager-ppp-1:1.26.0-12.1.rhaos4.7.el8.s390x as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:NetworkManager-ppp-1:1.26.0-12.1.rhaos4.7.el8.s390x" }, "product_reference": "NetworkManager-ppp-1:1.26.0-12.1.rhaos4.7.el8.s390x", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "NetworkManager-ppp-1:1.26.0-12.1.rhaos4.7.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:NetworkManager-ppp-1:1.26.0-12.1.rhaos4.7.el8.x86_64" }, "product_reference": "NetworkManager-ppp-1:1.26.0-12.1.rhaos4.7.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "NetworkManager-ppp-debuginfo-1:1.26.0-12.1.rhaos4.7.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:NetworkManager-ppp-debuginfo-1:1.26.0-12.1.rhaos4.7.el8.ppc64le" }, "product_reference": "NetworkManager-ppp-debuginfo-1:1.26.0-12.1.rhaos4.7.el8.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "NetworkManager-ppp-debuginfo-1:1.26.0-12.1.rhaos4.7.el8.s390x as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:NetworkManager-ppp-debuginfo-1:1.26.0-12.1.rhaos4.7.el8.s390x" }, "product_reference": "NetworkManager-ppp-debuginfo-1:1.26.0-12.1.rhaos4.7.el8.s390x", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "NetworkManager-ppp-debuginfo-1:1.26.0-12.1.rhaos4.7.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:NetworkManager-ppp-debuginfo-1:1.26.0-12.1.rhaos4.7.el8.x86_64" }, "product_reference": "NetworkManager-ppp-debuginfo-1:1.26.0-12.1.rhaos4.7.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "NetworkManager-team-1:1.26.0-12.1.rhaos4.7.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:NetworkManager-team-1:1.26.0-12.1.rhaos4.7.el8.ppc64le" }, "product_reference": "NetworkManager-team-1:1.26.0-12.1.rhaos4.7.el8.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "NetworkManager-team-1:1.26.0-12.1.rhaos4.7.el8.s390x as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:NetworkManager-team-1:1.26.0-12.1.rhaos4.7.el8.s390x" }, "product_reference": "NetworkManager-team-1:1.26.0-12.1.rhaos4.7.el8.s390x", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "NetworkManager-team-1:1.26.0-12.1.rhaos4.7.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:NetworkManager-team-1:1.26.0-12.1.rhaos4.7.el8.x86_64" }, "product_reference": "NetworkManager-team-1:1.26.0-12.1.rhaos4.7.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "NetworkManager-team-debuginfo-1:1.26.0-12.1.rhaos4.7.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:NetworkManager-team-debuginfo-1:1.26.0-12.1.rhaos4.7.el8.ppc64le" }, "product_reference": "NetworkManager-team-debuginfo-1:1.26.0-12.1.rhaos4.7.el8.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "NetworkManager-team-debuginfo-1:1.26.0-12.1.rhaos4.7.el8.s390x as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:NetworkManager-team-debuginfo-1:1.26.0-12.1.rhaos4.7.el8.s390x" }, "product_reference": "NetworkManager-team-debuginfo-1:1.26.0-12.1.rhaos4.7.el8.s390x", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "NetworkManager-team-debuginfo-1:1.26.0-12.1.rhaos4.7.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:NetworkManager-team-debuginfo-1:1.26.0-12.1.rhaos4.7.el8.x86_64" }, "product_reference": "NetworkManager-team-debuginfo-1:1.26.0-12.1.rhaos4.7.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "NetworkManager-tui-1:1.26.0-12.1.rhaos4.7.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:NetworkManager-tui-1:1.26.0-12.1.rhaos4.7.el8.ppc64le" }, "product_reference": "NetworkManager-tui-1:1.26.0-12.1.rhaos4.7.el8.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "NetworkManager-tui-1:1.26.0-12.1.rhaos4.7.el8.s390x as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:NetworkManager-tui-1:1.26.0-12.1.rhaos4.7.el8.s390x" }, "product_reference": "NetworkManager-tui-1:1.26.0-12.1.rhaos4.7.el8.s390x", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "NetworkManager-tui-1:1.26.0-12.1.rhaos4.7.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:NetworkManager-tui-1:1.26.0-12.1.rhaos4.7.el8.x86_64" }, "product_reference": "NetworkManager-tui-1:1.26.0-12.1.rhaos4.7.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "NetworkManager-tui-debuginfo-1:1.26.0-12.1.rhaos4.7.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:NetworkManager-tui-debuginfo-1:1.26.0-12.1.rhaos4.7.el8.ppc64le" }, "product_reference": "NetworkManager-tui-debuginfo-1:1.26.0-12.1.rhaos4.7.el8.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "NetworkManager-tui-debuginfo-1:1.26.0-12.1.rhaos4.7.el8.s390x as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:NetworkManager-tui-debuginfo-1:1.26.0-12.1.rhaos4.7.el8.s390x" }, "product_reference": "NetworkManager-tui-debuginfo-1:1.26.0-12.1.rhaos4.7.el8.s390x", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "NetworkManager-tui-debuginfo-1:1.26.0-12.1.rhaos4.7.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:NetworkManager-tui-debuginfo-1:1.26.0-12.1.rhaos4.7.el8.x86_64" }, "product_reference": "NetworkManager-tui-debuginfo-1:1.26.0-12.1.rhaos4.7.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "NetworkManager-wifi-1:1.26.0-12.1.rhaos4.7.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:NetworkManager-wifi-1:1.26.0-12.1.rhaos4.7.el8.ppc64le" }, "product_reference": "NetworkManager-wifi-1:1.26.0-12.1.rhaos4.7.el8.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "NetworkManager-wifi-1:1.26.0-12.1.rhaos4.7.el8.s390x as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:NetworkManager-wifi-1:1.26.0-12.1.rhaos4.7.el8.s390x" }, "product_reference": "NetworkManager-wifi-1:1.26.0-12.1.rhaos4.7.el8.s390x", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "NetworkManager-wifi-1:1.26.0-12.1.rhaos4.7.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:NetworkManager-wifi-1:1.26.0-12.1.rhaos4.7.el8.x86_64" }, "product_reference": "NetworkManager-wifi-1:1.26.0-12.1.rhaos4.7.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "NetworkManager-wifi-debuginfo-1:1.26.0-12.1.rhaos4.7.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:NetworkManager-wifi-debuginfo-1:1.26.0-12.1.rhaos4.7.el8.ppc64le" }, "product_reference": "NetworkManager-wifi-debuginfo-1:1.26.0-12.1.rhaos4.7.el8.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "NetworkManager-wifi-debuginfo-1:1.26.0-12.1.rhaos4.7.el8.s390x as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:NetworkManager-wifi-debuginfo-1:1.26.0-12.1.rhaos4.7.el8.s390x" }, "product_reference": "NetworkManager-wifi-debuginfo-1:1.26.0-12.1.rhaos4.7.el8.s390x", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "NetworkManager-wifi-debuginfo-1:1.26.0-12.1.rhaos4.7.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:NetworkManager-wifi-debuginfo-1:1.26.0-12.1.rhaos4.7.el8.x86_64" }, "product_reference": "NetworkManager-wifi-debuginfo-1:1.26.0-12.1.rhaos4.7.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "NetworkManager-wwan-1:1.26.0-12.1.rhaos4.7.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:NetworkManager-wwan-1:1.26.0-12.1.rhaos4.7.el8.ppc64le" }, "product_reference": "NetworkManager-wwan-1:1.26.0-12.1.rhaos4.7.el8.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "NetworkManager-wwan-1:1.26.0-12.1.rhaos4.7.el8.s390x as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:NetworkManager-wwan-1:1.26.0-12.1.rhaos4.7.el8.s390x" }, "product_reference": "NetworkManager-wwan-1:1.26.0-12.1.rhaos4.7.el8.s390x", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "NetworkManager-wwan-1:1.26.0-12.1.rhaos4.7.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:NetworkManager-wwan-1:1.26.0-12.1.rhaos4.7.el8.x86_64" }, "product_reference": "NetworkManager-wwan-1:1.26.0-12.1.rhaos4.7.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "NetworkManager-wwan-debuginfo-1:1.26.0-12.1.rhaos4.7.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:NetworkManager-wwan-debuginfo-1:1.26.0-12.1.rhaos4.7.el8.ppc64le" }, "product_reference": "NetworkManager-wwan-debuginfo-1:1.26.0-12.1.rhaos4.7.el8.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "NetworkManager-wwan-debuginfo-1:1.26.0-12.1.rhaos4.7.el8.s390x as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:NetworkManager-wwan-debuginfo-1:1.26.0-12.1.rhaos4.7.el8.s390x" }, "product_reference": "NetworkManager-wwan-debuginfo-1:1.26.0-12.1.rhaos4.7.el8.s390x", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "NetworkManager-wwan-debuginfo-1:1.26.0-12.1.rhaos4.7.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:NetworkManager-wwan-debuginfo-1:1.26.0-12.1.rhaos4.7.el8.x86_64" }, "product_reference": "NetworkManager-wwan-debuginfo-1:1.26.0-12.1.rhaos4.7.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "afterburn-0:4.6.0-1.rhaos4.7.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:afterburn-0:4.6.0-1.rhaos4.7.el8.ppc64le" }, "product_reference": "afterburn-0:4.6.0-1.rhaos4.7.el8.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "afterburn-0:4.6.0-1.rhaos4.7.el8.s390x as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:afterburn-0:4.6.0-1.rhaos4.7.el8.s390x" }, "product_reference": "afterburn-0:4.6.0-1.rhaos4.7.el8.s390x", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "afterburn-0:4.6.0-1.rhaos4.7.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:afterburn-0:4.6.0-1.rhaos4.7.el8.x86_64" }, "product_reference": "afterburn-0:4.6.0-1.rhaos4.7.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "afterburn-debuginfo-0:4.6.0-1.rhaos4.7.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:afterburn-debuginfo-0:4.6.0-1.rhaos4.7.el8.ppc64le" }, "product_reference": "afterburn-debuginfo-0:4.6.0-1.rhaos4.7.el8.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "afterburn-debuginfo-0:4.6.0-1.rhaos4.7.el8.s390x as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:afterburn-debuginfo-0:4.6.0-1.rhaos4.7.el8.s390x" }, "product_reference": "afterburn-debuginfo-0:4.6.0-1.rhaos4.7.el8.s390x", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "afterburn-debuginfo-0:4.6.0-1.rhaos4.7.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:afterburn-debuginfo-0:4.6.0-1.rhaos4.7.el8.x86_64" }, "product_reference": "afterburn-debuginfo-0:4.6.0-1.rhaos4.7.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "ansible-runner-0:1.4.6-2.el8ar.noarch as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:ansible-runner-0:1.4.6-2.el8ar.noarch" }, "product_reference": "ansible-runner-0:1.4.6-2.el8ar.noarch", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "ansible-runner-0:1.4.6-2.el8ar.src as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:ansible-runner-0:1.4.6-2.el8ar.src" }, "product_reference": "ansible-runner-0:1.4.6-2.el8ar.src", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "ansible-runner-http-0:1.0.0-2.el8ar.noarch as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:ansible-runner-http-0:1.0.0-2.el8ar.noarch" }, "product_reference": "ansible-runner-http-0:1.0.0-2.el8ar.noarch", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "ansible-runner-http-0:1.0.0-2.el8ar.src as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:ansible-runner-http-0:1.0.0-2.el8ar.src" }, "product_reference": "ansible-runner-http-0:1.0.0-2.el8ar.src", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-service-idler-0:4.7.0-202011171454.p0.git.15.675c1c8.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:atomic-openshift-service-idler-0:4.7.0-202011171454.p0.git.15.675c1c8.el8.ppc64le" }, "product_reference": "atomic-openshift-service-idler-0:4.7.0-202011171454.p0.git.15.675c1c8.el8.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-service-idler-0:4.7.0-202011171454.p0.git.15.675c1c8.el8.s390x as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:atomic-openshift-service-idler-0:4.7.0-202011171454.p0.git.15.675c1c8.el8.s390x" }, "product_reference": "atomic-openshift-service-idler-0:4.7.0-202011171454.p0.git.15.675c1c8.el8.s390x", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-service-idler-0:4.7.0-202011171454.p0.git.15.675c1c8.el8.src as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:atomic-openshift-service-idler-0:4.7.0-202011171454.p0.git.15.675c1c8.el8.src" }, "product_reference": "atomic-openshift-service-idler-0:4.7.0-202011171454.p0.git.15.675c1c8.el8.src", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-service-idler-0:4.7.0-202011171454.p0.git.15.675c1c8.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:atomic-openshift-service-idler-0:4.7.0-202011171454.p0.git.15.675c1c8.el8.x86_64" }, "product_reference": "atomic-openshift-service-idler-0:4.7.0-202011171454.p0.git.15.675c1c8.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "bootupd-0:0.2.5-2.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:bootupd-0:0.2.5-2.el8.x86_64" }, "product_reference": "bootupd-0:0.2.5-2.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "bootupd-debuginfo-0:0.2.5-2.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:bootupd-debuginfo-0:0.2.5-2.el8.x86_64" }, "product_reference": "bootupd-debuginfo-0:0.2.5-2.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "clevis-0:15-1.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:clevis-0:15-1.el8.ppc64le" }, "product_reference": "clevis-0:15-1.el8.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "clevis-0:15-1.el8.s390x as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:clevis-0:15-1.el8.s390x" }, "product_reference": "clevis-0:15-1.el8.s390x", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "clevis-0:15-1.el8.src as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:clevis-0:15-1.el8.src" }, "product_reference": "clevis-0:15-1.el8.src", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "clevis-0:15-1.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:clevis-0:15-1.el8.x86_64" }, "product_reference": "clevis-0:15-1.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "clevis-debuginfo-0:15-1.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:clevis-debuginfo-0:15-1.el8.ppc64le" }, "product_reference": "clevis-debuginfo-0:15-1.el8.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "clevis-debuginfo-0:15-1.el8.s390x as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:clevis-debuginfo-0:15-1.el8.s390x" }, "product_reference": "clevis-debuginfo-0:15-1.el8.s390x", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "clevis-debuginfo-0:15-1.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:clevis-debuginfo-0:15-1.el8.x86_64" }, "product_reference": "clevis-debuginfo-0:15-1.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "clevis-debugsource-0:15-1.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:clevis-debugsource-0:15-1.el8.ppc64le" }, "product_reference": "clevis-debugsource-0:15-1.el8.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "clevis-debugsource-0:15-1.el8.s390x as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:clevis-debugsource-0:15-1.el8.s390x" }, "product_reference": "clevis-debugsource-0:15-1.el8.s390x", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "clevis-debugsource-0:15-1.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:clevis-debugsource-0:15-1.el8.x86_64" }, "product_reference": "clevis-debugsource-0:15-1.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "clevis-dracut-0:15-1.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:clevis-dracut-0:15-1.el8.ppc64le" }, "product_reference": "clevis-dracut-0:15-1.el8.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "clevis-dracut-0:15-1.el8.s390x as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:clevis-dracut-0:15-1.el8.s390x" }, "product_reference": "clevis-dracut-0:15-1.el8.s390x", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "clevis-dracut-0:15-1.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:clevis-dracut-0:15-1.el8.x86_64" }, "product_reference": "clevis-dracut-0:15-1.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "clevis-luks-0:15-1.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:clevis-luks-0:15-1.el8.ppc64le" }, "product_reference": "clevis-luks-0:15-1.el8.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "clevis-luks-0:15-1.el8.s390x as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:clevis-luks-0:15-1.el8.s390x" }, "product_reference": "clevis-luks-0:15-1.el8.s390x", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "clevis-luks-0:15-1.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:clevis-luks-0:15-1.el8.x86_64" }, "product_reference": "clevis-luks-0:15-1.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "clevis-systemd-0:15-1.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:clevis-systemd-0:15-1.el8.ppc64le" }, "product_reference": "clevis-systemd-0:15-1.el8.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "clevis-systemd-0:15-1.el8.s390x as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:clevis-systemd-0:15-1.el8.s390x" }, "product_reference": "clevis-systemd-0:15-1.el8.s390x", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "clevis-systemd-0:15-1.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:clevis-systemd-0:15-1.el8.x86_64" }, "product_reference": "clevis-systemd-0:15-1.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "clevis-udisks2-0:15-1.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:clevis-udisks2-0:15-1.el8.ppc64le" }, "product_reference": "clevis-udisks2-0:15-1.el8.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "clevis-udisks2-0:15-1.el8.s390x as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:clevis-udisks2-0:15-1.el8.s390x" }, "product_reference": "clevis-udisks2-0:15-1.el8.s390x", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "clevis-udisks2-0:15-1.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:clevis-udisks2-0:15-1.el8.x86_64" }, "product_reference": "clevis-udisks2-0:15-1.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "clevis-udisks2-debuginfo-0:15-1.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:clevis-udisks2-debuginfo-0:15-1.el8.ppc64le" }, "product_reference": "clevis-udisks2-debuginfo-0:15-1.el8.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "clevis-udisks2-debuginfo-0:15-1.el8.s390x as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:clevis-udisks2-debuginfo-0:15-1.el8.s390x" }, "product_reference": "clevis-udisks2-debuginfo-0:15-1.el8.s390x", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "clevis-udisks2-debuginfo-0:15-1.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:clevis-udisks2-debuginfo-0:15-1.el8.x86_64" }, "product_reference": "clevis-udisks2-debuginfo-0:15-1.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "conmon-2:2.0.21-2.rhaos4.6.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:conmon-2:2.0.21-2.rhaos4.6.el8.ppc64le" }, "product_reference": "conmon-2:2.0.21-2.rhaos4.6.el8.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "conmon-2:2.0.21-2.rhaos4.6.el8.s390x as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:conmon-2:2.0.21-2.rhaos4.6.el8.s390x" }, "product_reference": "conmon-2:2.0.21-2.rhaos4.6.el8.s390x", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "conmon-2:2.0.21-2.rhaos4.6.el8.src as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:conmon-2:2.0.21-2.rhaos4.6.el8.src" }, "product_reference": "conmon-2:2.0.21-2.rhaos4.6.el8.src", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "conmon-2:2.0.21-2.rhaos4.6.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:conmon-2:2.0.21-2.rhaos4.6.el8.x86_64" }, "product_reference": "conmon-2:2.0.21-2.rhaos4.6.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "console-login-helper-messages-0:0.20.3-1.rhaos4.7.el8.noarch as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:console-login-helper-messages-0:0.20.3-1.rhaos4.7.el8.noarch" }, "product_reference": "console-login-helper-messages-0:0.20.3-1.rhaos4.7.el8.noarch", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "console-login-helper-messages-0:0.20.3-1.rhaos4.7.el8.src as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:console-login-helper-messages-0:0.20.3-1.rhaos4.7.el8.src" }, "product_reference": "console-login-helper-messages-0:0.20.3-1.rhaos4.7.el8.src", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "console-login-helper-messages-issuegen-0:0.20.3-1.rhaos4.7.el8.noarch as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:console-login-helper-messages-issuegen-0:0.20.3-1.rhaos4.7.el8.noarch" }, "product_reference": "console-login-helper-messages-issuegen-0:0.20.3-1.rhaos4.7.el8.noarch", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "console-login-helper-messages-profile-0:0.20.3-1.rhaos4.7.el8.noarch as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:console-login-helper-messages-profile-0:0.20.3-1.rhaos4.7.el8.noarch" }, "product_reference": "console-login-helper-messages-profile-0:0.20.3-1.rhaos4.7.el8.noarch", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "container-selinux-2:2.151.0-1.rhaos4.7.el8.noarch as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:container-selinux-2:2.151.0-1.rhaos4.7.el8.noarch" }, "product_reference": "container-selinux-2:2.151.0-1.rhaos4.7.el8.noarch", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "container-selinux-2:2.151.0-1.rhaos4.7.el8.src as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:container-selinux-2:2.151.0-1.rhaos4.7.el8.src" }, "product_reference": "container-selinux-2:2.151.0-1.rhaos4.7.el8.src", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "containernetworking-plugins-0:0.8.6-1.rhaos4.5.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:containernetworking-plugins-0:0.8.6-1.rhaos4.5.el8.ppc64le" }, "product_reference": "containernetworking-plugins-0:0.8.6-1.rhaos4.5.el8.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "containernetworking-plugins-0:0.8.6-1.rhaos4.5.el8.s390x as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:containernetworking-plugins-0:0.8.6-1.rhaos4.5.el8.s390x" }, "product_reference": "containernetworking-plugins-0:0.8.6-1.rhaos4.5.el8.s390x", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "containernetworking-plugins-0:0.8.6-1.rhaos4.5.el8.src as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:containernetworking-plugins-0:0.8.6-1.rhaos4.5.el8.src" }, "product_reference": "containernetworking-plugins-0:0.8.6-1.rhaos4.5.el8.src", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "containernetworking-plugins-0:0.8.6-1.rhaos4.5.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:containernetworking-plugins-0:0.8.6-1.rhaos4.5.el8.x86_64" }, "product_reference": "containernetworking-plugins-0:0.8.6-1.rhaos4.5.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "containernetworking-plugins-debuginfo-0:0.8.6-1.rhaos4.5.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:containernetworking-plugins-debuginfo-0:0.8.6-1.rhaos4.5.el8.ppc64le" }, "product_reference": "containernetworking-plugins-debuginfo-0:0.8.6-1.rhaos4.5.el8.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "containernetworking-plugins-debuginfo-0:0.8.6-1.rhaos4.5.el8.s390x as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:containernetworking-plugins-debuginfo-0:0.8.6-1.rhaos4.5.el8.s390x" }, "product_reference": "containernetworking-plugins-debuginfo-0:0.8.6-1.rhaos4.5.el8.s390x", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "containernetworking-plugins-debuginfo-0:0.8.6-1.rhaos4.5.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:containernetworking-plugins-debuginfo-0:0.8.6-1.rhaos4.5.el8.x86_64" }, "product_reference": "containernetworking-plugins-debuginfo-0:0.8.6-1.rhaos4.5.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "containernetworking-plugins-debugsource-0:0.8.6-1.rhaos4.5.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:containernetworking-plugins-debugsource-0:0.8.6-1.rhaos4.5.el8.ppc64le" }, "product_reference": "containernetworking-plugins-debugsource-0:0.8.6-1.rhaos4.5.el8.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "containernetworking-plugins-debugsource-0:0.8.6-1.rhaos4.5.el8.s390x as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:containernetworking-plugins-debugsource-0:0.8.6-1.rhaos4.5.el8.s390x" }, "product_reference": "containernetworking-plugins-debugsource-0:0.8.6-1.rhaos4.5.el8.s390x", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "containernetworking-plugins-debugsource-0:0.8.6-1.rhaos4.5.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:containernetworking-plugins-debugsource-0:0.8.6-1.rhaos4.5.el8.x86_64" }, "product_reference": "containernetworking-plugins-debugsource-0:0.8.6-1.rhaos4.5.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "coreos-installer-0:0.8.0-3.rhaos4.7.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:coreos-installer-0:0.8.0-3.rhaos4.7.el8.ppc64le" }, "product_reference": "coreos-installer-0:0.8.0-3.rhaos4.7.el8.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "coreos-installer-0:0.8.0-3.rhaos4.7.el8.s390x as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:coreos-installer-0:0.8.0-3.rhaos4.7.el8.s390x" }, "product_reference": "coreos-installer-0:0.8.0-3.rhaos4.7.el8.s390x", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "coreos-installer-0:0.8.0-3.rhaos4.7.el8.src as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:coreos-installer-0:0.8.0-3.rhaos4.7.el8.src" }, "product_reference": "coreos-installer-0:0.8.0-3.rhaos4.7.el8.src", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "coreos-installer-0:0.8.0-3.rhaos4.7.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:coreos-installer-0:0.8.0-3.rhaos4.7.el8.x86_64" }, "product_reference": "coreos-installer-0:0.8.0-3.rhaos4.7.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "coreos-installer-bootinfra-0:0.8.0-3.rhaos4.7.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:coreos-installer-bootinfra-0:0.8.0-3.rhaos4.7.el8.ppc64le" }, "product_reference": "coreos-installer-bootinfra-0:0.8.0-3.rhaos4.7.el8.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "coreos-installer-bootinfra-0:0.8.0-3.rhaos4.7.el8.s390x as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:coreos-installer-bootinfra-0:0.8.0-3.rhaos4.7.el8.s390x" }, "product_reference": "coreos-installer-bootinfra-0:0.8.0-3.rhaos4.7.el8.s390x", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "coreos-installer-bootinfra-debuginfo-0:0.8.0-3.rhaos4.7.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:coreos-installer-bootinfra-debuginfo-0:0.8.0-3.rhaos4.7.el8.ppc64le" }, "product_reference": "coreos-installer-bootinfra-debuginfo-0:0.8.0-3.rhaos4.7.el8.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "coreos-installer-bootinfra-debuginfo-0:0.8.0-3.rhaos4.7.el8.s390x as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:coreos-installer-bootinfra-debuginfo-0:0.8.0-3.rhaos4.7.el8.s390x" }, "product_reference": "coreos-installer-bootinfra-debuginfo-0:0.8.0-3.rhaos4.7.el8.s390x", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "coreos-installer-bootinfra-debuginfo-0:0.8.0-3.rhaos4.7.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:coreos-installer-bootinfra-debuginfo-0:0.8.0-3.rhaos4.7.el8.x86_64" }, "product_reference": "coreos-installer-bootinfra-debuginfo-0:0.8.0-3.rhaos4.7.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "coreos-installer-debuginfo-0:0.8.0-3.rhaos4.7.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:coreos-installer-debuginfo-0:0.8.0-3.rhaos4.7.el8.ppc64le" }, "product_reference": "coreos-installer-debuginfo-0:0.8.0-3.rhaos4.7.el8.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "coreos-installer-debuginfo-0:0.8.0-3.rhaos4.7.el8.s390x as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:coreos-installer-debuginfo-0:0.8.0-3.rhaos4.7.el8.s390x" }, "product_reference": "coreos-installer-debuginfo-0:0.8.0-3.rhaos4.7.el8.s390x", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "coreos-installer-debuginfo-0:0.8.0-3.rhaos4.7.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:coreos-installer-debuginfo-0:0.8.0-3.rhaos4.7.el8.x86_64" }, "product_reference": "coreos-installer-debuginfo-0:0.8.0-3.rhaos4.7.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "coreos-installer-debugsource-0:0.8.0-3.rhaos4.7.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:coreos-installer-debugsource-0:0.8.0-3.rhaos4.7.el8.ppc64le" }, "product_reference": "coreos-installer-debugsource-0:0.8.0-3.rhaos4.7.el8.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "coreos-installer-debugsource-0:0.8.0-3.rhaos4.7.el8.s390x as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:coreos-installer-debugsource-0:0.8.0-3.rhaos4.7.el8.s390x" }, "product_reference": "coreos-installer-debugsource-0:0.8.0-3.rhaos4.7.el8.s390x", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "coreos-installer-debugsource-0:0.8.0-3.rhaos4.7.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:coreos-installer-debugsource-0:0.8.0-3.rhaos4.7.el8.x86_64" }, "product_reference": "coreos-installer-debugsource-0:0.8.0-3.rhaos4.7.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "cri-o-0:1.20.0-0.rhaos4.7.git8921e00.el8.51.ppc64le as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:cri-o-0:1.20.0-0.rhaos4.7.git8921e00.el8.51.ppc64le" }, "product_reference": "cri-o-0:1.20.0-0.rhaos4.7.git8921e00.el8.51.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "cri-o-0:1.20.0-0.rhaos4.7.git8921e00.el8.51.s390x as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:cri-o-0:1.20.0-0.rhaos4.7.git8921e00.el8.51.s390x" }, "product_reference": "cri-o-0:1.20.0-0.rhaos4.7.git8921e00.el8.51.s390x", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "cri-o-0:1.20.0-0.rhaos4.7.git8921e00.el8.51.src as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:cri-o-0:1.20.0-0.rhaos4.7.git8921e00.el8.51.src" }, "product_reference": "cri-o-0:1.20.0-0.rhaos4.7.git8921e00.el8.51.src", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "cri-o-0:1.20.0-0.rhaos4.7.git8921e00.el8.51.x86_64 as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:cri-o-0:1.20.0-0.rhaos4.7.git8921e00.el8.51.x86_64" }, "product_reference": "cri-o-0:1.20.0-0.rhaos4.7.git8921e00.el8.51.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "cri-o-debuginfo-0:1.20.0-0.rhaos4.7.git8921e00.el8.51.ppc64le as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:cri-o-debuginfo-0:1.20.0-0.rhaos4.7.git8921e00.el8.51.ppc64le" }, "product_reference": "cri-o-debuginfo-0:1.20.0-0.rhaos4.7.git8921e00.el8.51.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "cri-o-debuginfo-0:1.20.0-0.rhaos4.7.git8921e00.el8.51.s390x as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:cri-o-debuginfo-0:1.20.0-0.rhaos4.7.git8921e00.el8.51.s390x" }, "product_reference": "cri-o-debuginfo-0:1.20.0-0.rhaos4.7.git8921e00.el8.51.s390x", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "cri-o-debuginfo-0:1.20.0-0.rhaos4.7.git8921e00.el8.51.x86_64 as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:cri-o-debuginfo-0:1.20.0-0.rhaos4.7.git8921e00.el8.51.x86_64" }, "product_reference": "cri-o-debuginfo-0:1.20.0-0.rhaos4.7.git8921e00.el8.51.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "cri-o-debugsource-0:1.20.0-0.rhaos4.7.git8921e00.el8.51.ppc64le as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:cri-o-debugsource-0:1.20.0-0.rhaos4.7.git8921e00.el8.51.ppc64le" }, "product_reference": "cri-o-debugsource-0:1.20.0-0.rhaos4.7.git8921e00.el8.51.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "cri-o-debugsource-0:1.20.0-0.rhaos4.7.git8921e00.el8.51.s390x as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:cri-o-debugsource-0:1.20.0-0.rhaos4.7.git8921e00.el8.51.s390x" }, "product_reference": "cri-o-debugsource-0:1.20.0-0.rhaos4.7.git8921e00.el8.51.s390x", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "cri-o-debugsource-0:1.20.0-0.rhaos4.7.git8921e00.el8.51.x86_64 as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:cri-o-debugsource-0:1.20.0-0.rhaos4.7.git8921e00.el8.51.x86_64" }, "product_reference": "cri-o-debugsource-0:1.20.0-0.rhaos4.7.git8921e00.el8.51.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "cri-tools-0:1.20.0-1.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:cri-tools-0:1.20.0-1.el8.ppc64le" }, "product_reference": "cri-tools-0:1.20.0-1.el8.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "cri-tools-0:1.20.0-1.el8.s390x as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:cri-tools-0:1.20.0-1.el8.s390x" }, "product_reference": "cri-tools-0:1.20.0-1.el8.s390x", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "cri-tools-0:1.20.0-1.el8.src as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:cri-tools-0:1.20.0-1.el8.src" }, "product_reference": "cri-tools-0:1.20.0-1.el8.src", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "cri-tools-0:1.20.0-1.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:cri-tools-0:1.20.0-1.el8.x86_64" }, "product_reference": "cri-tools-0:1.20.0-1.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "cri-tools-debuginfo-0:1.20.0-1.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:cri-tools-debuginfo-0:1.20.0-1.el8.ppc64le" }, "product_reference": "cri-tools-debuginfo-0:1.20.0-1.el8.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "cri-tools-debuginfo-0:1.20.0-1.el8.s390x as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:cri-tools-debuginfo-0:1.20.0-1.el8.s390x" }, "product_reference": "cri-tools-debuginfo-0:1.20.0-1.el8.s390x", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "cri-tools-debuginfo-0:1.20.0-1.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:cri-tools-debuginfo-0:1.20.0-1.el8.x86_64" }, "product_reference": "cri-tools-debuginfo-0:1.20.0-1.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "cri-tools-debugsource-0:1.20.0-1.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:cri-tools-debugsource-0:1.20.0-1.el8.ppc64le" }, "product_reference": "cri-tools-debugsource-0:1.20.0-1.el8.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "cri-tools-debugsource-0:1.20.0-1.el8.s390x as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:cri-tools-debugsource-0:1.20.0-1.el8.s390x" }, "product_reference": "cri-tools-debugsource-0:1.20.0-1.el8.s390x", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "cri-tools-debugsource-0:1.20.0-1.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:cri-tools-debugsource-0:1.20.0-1.el8.x86_64" }, "product_reference": "cri-tools-debugsource-0:1.20.0-1.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "dracut-0:049-95.git20200804.el8_3.4.ppc64le as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:dracut-0:049-95.git20200804.el8_3.4.ppc64le" }, "product_reference": "dracut-0:049-95.git20200804.el8_3.4.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "dracut-0:049-95.git20200804.el8_3.4.s390x as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:dracut-0:049-95.git20200804.el8_3.4.s390x" }, "product_reference": "dracut-0:049-95.git20200804.el8_3.4.s390x", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "dracut-0:049-95.git20200804.el8_3.4.src as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:dracut-0:049-95.git20200804.el8_3.4.src" }, "product_reference": "dracut-0:049-95.git20200804.el8_3.4.src", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "dracut-0:049-95.git20200804.el8_3.4.x86_64 as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:dracut-0:049-95.git20200804.el8_3.4.x86_64" }, "product_reference": "dracut-0:049-95.git20200804.el8_3.4.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "dracut-caps-0:049-95.git20200804.el8_3.4.ppc64le as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:dracut-caps-0:049-95.git20200804.el8_3.4.ppc64le" }, "product_reference": "dracut-caps-0:049-95.git20200804.el8_3.4.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "dracut-caps-0:049-95.git20200804.el8_3.4.s390x as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:dracut-caps-0:049-95.git20200804.el8_3.4.s390x" }, "product_reference": "dracut-caps-0:049-95.git20200804.el8_3.4.s390x", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "dracut-caps-0:049-95.git20200804.el8_3.4.x86_64 as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:dracut-caps-0:049-95.git20200804.el8_3.4.x86_64" }, "product_reference": "dracut-caps-0:049-95.git20200804.el8_3.4.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "dracut-config-generic-0:049-95.git20200804.el8_3.4.ppc64le as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:dracut-config-generic-0:049-95.git20200804.el8_3.4.ppc64le" }, "product_reference": "dracut-config-generic-0:049-95.git20200804.el8_3.4.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "dracut-config-generic-0:049-95.git20200804.el8_3.4.s390x as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:dracut-config-generic-0:049-95.git20200804.el8_3.4.s390x" }, "product_reference": "dracut-config-generic-0:049-95.git20200804.el8_3.4.s390x", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "dracut-config-generic-0:049-95.git20200804.el8_3.4.x86_64 as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:dracut-config-generic-0:049-95.git20200804.el8_3.4.x86_64" }, "product_reference": "dracut-config-generic-0:049-95.git20200804.el8_3.4.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "dracut-config-rescue-0:049-95.git20200804.el8_3.4.ppc64le as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:dracut-config-rescue-0:049-95.git20200804.el8_3.4.ppc64le" }, "product_reference": "dracut-config-rescue-0:049-95.git20200804.el8_3.4.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "dracut-config-rescue-0:049-95.git20200804.el8_3.4.s390x as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:dracut-config-rescue-0:049-95.git20200804.el8_3.4.s390x" }, "product_reference": "dracut-config-rescue-0:049-95.git20200804.el8_3.4.s390x", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "dracut-config-rescue-0:049-95.git20200804.el8_3.4.x86_64 as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:dracut-config-rescue-0:049-95.git20200804.el8_3.4.x86_64" }, "product_reference": "dracut-config-rescue-0:049-95.git20200804.el8_3.4.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "dracut-debuginfo-0:049-95.git20200804.el8_3.4.ppc64le as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:dracut-debuginfo-0:049-95.git20200804.el8_3.4.ppc64le" }, "product_reference": "dracut-debuginfo-0:049-95.git20200804.el8_3.4.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "dracut-debuginfo-0:049-95.git20200804.el8_3.4.s390x as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:dracut-debuginfo-0:049-95.git20200804.el8_3.4.s390x" }, "product_reference": "dracut-debuginfo-0:049-95.git20200804.el8_3.4.s390x", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "dracut-debuginfo-0:049-95.git20200804.el8_3.4.x86_64 as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:dracut-debuginfo-0:049-95.git20200804.el8_3.4.x86_64" }, "product_reference": "dracut-debuginfo-0:049-95.git20200804.el8_3.4.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "dracut-debugsource-0:049-95.git20200804.el8_3.4.ppc64le as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:dracut-debugsource-0:049-95.git20200804.el8_3.4.ppc64le" }, "product_reference": "dracut-debugsource-0:049-95.git20200804.el8_3.4.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "dracut-debugsource-0:049-95.git20200804.el8_3.4.s390x as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:dracut-debugsource-0:049-95.git20200804.el8_3.4.s390x" }, "product_reference": "dracut-debugsource-0:049-95.git20200804.el8_3.4.s390x", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "dracut-debugsource-0:049-95.git20200804.el8_3.4.x86_64 as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:dracut-debugsource-0:049-95.git20200804.el8_3.4.x86_64" }, "product_reference": "dracut-debugsource-0:049-95.git20200804.el8_3.4.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "dracut-live-0:049-95.git20200804.el8_3.4.ppc64le as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:dracut-live-0:049-95.git20200804.el8_3.4.ppc64le" }, "product_reference": "dracut-live-0:049-95.git20200804.el8_3.4.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "dracut-live-0:049-95.git20200804.el8_3.4.s390x as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:dracut-live-0:049-95.git20200804.el8_3.4.s390x" }, "product_reference": "dracut-live-0:049-95.git20200804.el8_3.4.s390x", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "dracut-live-0:049-95.git20200804.el8_3.4.x86_64 as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:dracut-live-0:049-95.git20200804.el8_3.4.x86_64" }, "product_reference": "dracut-live-0:049-95.git20200804.el8_3.4.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "dracut-network-0:049-95.git20200804.el8_3.4.ppc64le as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:dracut-network-0:049-95.git20200804.el8_3.4.ppc64le" }, "product_reference": "dracut-network-0:049-95.git20200804.el8_3.4.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "dracut-network-0:049-95.git20200804.el8_3.4.s390x as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:dracut-network-0:049-95.git20200804.el8_3.4.s390x" }, "product_reference": "dracut-network-0:049-95.git20200804.el8_3.4.s390x", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "dracut-network-0:049-95.git20200804.el8_3.4.x86_64 as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:dracut-network-0:049-95.git20200804.el8_3.4.x86_64" }, "product_reference": "dracut-network-0:049-95.git20200804.el8_3.4.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "dracut-squash-0:049-95.git20200804.el8_3.4.ppc64le as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:dracut-squash-0:049-95.git20200804.el8_3.4.ppc64le" }, "product_reference": "dracut-squash-0:049-95.git20200804.el8_3.4.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "dracut-squash-0:049-95.git20200804.el8_3.4.s390x as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:dracut-squash-0:049-95.git20200804.el8_3.4.s390x" }, "product_reference": "dracut-squash-0:049-95.git20200804.el8_3.4.s390x", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "dracut-squash-0:049-95.git20200804.el8_3.4.x86_64 as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:dracut-squash-0:049-95.git20200804.el8_3.4.x86_64" }, "product_reference": "dracut-squash-0:049-95.git20200804.el8_3.4.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "dracut-tools-0:049-95.git20200804.el8_3.4.ppc64le as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:dracut-tools-0:049-95.git20200804.el8_3.4.ppc64le" }, "product_reference": "dracut-tools-0:049-95.git20200804.el8_3.4.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "dracut-tools-0:049-95.git20200804.el8_3.4.s390x as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:dracut-tools-0:049-95.git20200804.el8_3.4.s390x" }, "product_reference": "dracut-tools-0:049-95.git20200804.el8_3.4.s390x", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "dracut-tools-0:049-95.git20200804.el8_3.4.x86_64 as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:dracut-tools-0:049-95.git20200804.el8_3.4.x86_64" }, "product_reference": "dracut-tools-0:049-95.git20200804.el8_3.4.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "faq-0:0.0.6-5.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:faq-0:0.0.6-5.el8.ppc64le" }, "product_reference": "faq-0:0.0.6-5.el8.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "faq-0:0.0.6-5.el8.s390x as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:faq-0:0.0.6-5.el8.s390x" }, "product_reference": "faq-0:0.0.6-5.el8.s390x", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "faq-0:0.0.6-5.el8.src as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:faq-0:0.0.6-5.el8.src" }, "product_reference": "faq-0:0.0.6-5.el8.src", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "faq-0:0.0.6-5.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:faq-0:0.0.6-5.el8.x86_64" }, "product_reference": "faq-0:0.0.6-5.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "golang-github-prometheus-promu-0:0.5.0-2.git642a960.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:golang-github-prometheus-promu-0:0.5.0-2.git642a960.el8.ppc64le" }, "product_reference": "golang-github-prometheus-promu-0:0.5.0-2.git642a960.el8.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "golang-github-prometheus-promu-0:0.5.0-2.git642a960.el8.s390x as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:golang-github-prometheus-promu-0:0.5.0-2.git642a960.el8.s390x" }, "product_reference": "golang-github-prometheus-promu-0:0.5.0-2.git642a960.el8.s390x", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "golang-github-prometheus-promu-0:0.5.0-2.git642a960.el8.src as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:golang-github-prometheus-promu-0:0.5.0-2.git642a960.el8.src" }, "product_reference": "golang-github-prometheus-promu-0:0.5.0-2.git642a960.el8.src", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "golang-github-prometheus-promu-0:0.5.0-2.git642a960.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:golang-github-prometheus-promu-0:0.5.0-2.git642a960.el8.x86_64" }, "product_reference": "golang-github-prometheus-promu-0:0.5.0-2.git642a960.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "gperftools-0:2.6.3-2.el8ost.ppc64le as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:gperftools-0:2.6.3-2.el8ost.ppc64le" }, "product_reference": "gperftools-0:2.6.3-2.el8ost.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "gperftools-0:2.6.3-2.el8ost.s390x as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:gperftools-0:2.6.3-2.el8ost.s390x" }, "product_reference": "gperftools-0:2.6.3-2.el8ost.s390x", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "gperftools-0:2.6.3-2.el8ost.src as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:gperftools-0:2.6.3-2.el8ost.src" }, "product_reference": "gperftools-0:2.6.3-2.el8ost.src", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "gperftools-0:2.6.3-2.el8ost.x86_64 as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:gperftools-0:2.6.3-2.el8ost.x86_64" }, "product_reference": "gperftools-0:2.6.3-2.el8ost.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "gperftools-debugsource-0:2.6.3-2.el8ost.ppc64le as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:gperftools-debugsource-0:2.6.3-2.el8ost.ppc64le" }, "product_reference": "gperftools-debugsource-0:2.6.3-2.el8ost.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "gperftools-debugsource-0:2.6.3-2.el8ost.s390x as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:gperftools-debugsource-0:2.6.3-2.el8ost.s390x" }, "product_reference": "gperftools-debugsource-0:2.6.3-2.el8ost.s390x", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "gperftools-debugsource-0:2.6.3-2.el8ost.x86_64 as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:gperftools-debugsource-0:2.6.3-2.el8ost.x86_64" }, "product_reference": "gperftools-debugsource-0:2.6.3-2.el8ost.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "gperftools-devel-0:2.6.3-2.el8ost.ppc64le as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:gperftools-devel-0:2.6.3-2.el8ost.ppc64le" }, "product_reference": "gperftools-devel-0:2.6.3-2.el8ost.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "gperftools-devel-0:2.6.3-2.el8ost.s390x as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:gperftools-devel-0:2.6.3-2.el8ost.s390x" }, "product_reference": "gperftools-devel-0:2.6.3-2.el8ost.s390x", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "gperftools-devel-0:2.6.3-2.el8ost.x86_64 as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:gperftools-devel-0:2.6.3-2.el8ost.x86_64" }, "product_reference": "gperftools-devel-0:2.6.3-2.el8ost.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "gperftools-libs-0:2.6.3-2.el8ost.ppc64le as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:gperftools-libs-0:2.6.3-2.el8ost.ppc64le" }, "product_reference": "gperftools-libs-0:2.6.3-2.el8ost.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "gperftools-libs-0:2.6.3-2.el8ost.s390x as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:gperftools-libs-0:2.6.3-2.el8ost.s390x" }, "product_reference": "gperftools-libs-0:2.6.3-2.el8ost.s390x", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "gperftools-libs-0:2.6.3-2.el8ost.x86_64 as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:gperftools-libs-0:2.6.3-2.el8ost.x86_64" }, "product_reference": "gperftools-libs-0:2.6.3-2.el8ost.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "gperftools-libs-debuginfo-0:2.6.3-2.el8ost.ppc64le as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:gperftools-libs-debuginfo-0:2.6.3-2.el8ost.ppc64le" }, "product_reference": "gperftools-libs-debuginfo-0:2.6.3-2.el8ost.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "gperftools-libs-debuginfo-0:2.6.3-2.el8ost.s390x as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:gperftools-libs-debuginfo-0:2.6.3-2.el8ost.s390x" }, "product_reference": "gperftools-libs-debuginfo-0:2.6.3-2.el8ost.s390x", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "gperftools-libs-debuginfo-0:2.6.3-2.el8ost.x86_64 as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:gperftools-libs-debuginfo-0:2.6.3-2.el8ost.x86_64" }, "product_reference": "gperftools-libs-debuginfo-0:2.6.3-2.el8ost.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "grpc-0:1.18.0-4.el8ost.ppc64le as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:grpc-0:1.18.0-4.el8ost.ppc64le" }, "product_reference": "grpc-0:1.18.0-4.el8ost.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "grpc-0:1.18.0-4.el8ost.s390x as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:grpc-0:1.18.0-4.el8ost.s390x" }, "product_reference": "grpc-0:1.18.0-4.el8ost.s390x", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "grpc-0:1.18.0-4.el8ost.src as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:grpc-0:1.18.0-4.el8ost.src" }, "product_reference": "grpc-0:1.18.0-4.el8ost.src", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "grpc-0:1.18.0-4.el8ost.x86_64 as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:grpc-0:1.18.0-4.el8ost.x86_64" }, "product_reference": "grpc-0:1.18.0-4.el8ost.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "grpc-cli-0:1.18.0-4.el8ost.ppc64le as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:grpc-cli-0:1.18.0-4.el8ost.ppc64le" }, "product_reference": "grpc-cli-0:1.18.0-4.el8ost.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "grpc-cli-0:1.18.0-4.el8ost.s390x as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:grpc-cli-0:1.18.0-4.el8ost.s390x" }, "product_reference": "grpc-cli-0:1.18.0-4.el8ost.s390x", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "grpc-cli-0:1.18.0-4.el8ost.x86_64 as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:grpc-cli-0:1.18.0-4.el8ost.x86_64" }, "product_reference": "grpc-cli-0:1.18.0-4.el8ost.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "grpc-cli-debuginfo-0:1.18.0-4.el8ost.ppc64le as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:grpc-cli-debuginfo-0:1.18.0-4.el8ost.ppc64le" }, "product_reference": "grpc-cli-debuginfo-0:1.18.0-4.el8ost.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "grpc-cli-debuginfo-0:1.18.0-4.el8ost.s390x as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:grpc-cli-debuginfo-0:1.18.0-4.el8ost.s390x" }, "product_reference": "grpc-cli-debuginfo-0:1.18.0-4.el8ost.s390x", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "grpc-cli-debuginfo-0:1.18.0-4.el8ost.x86_64 as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:grpc-cli-debuginfo-0:1.18.0-4.el8ost.x86_64" }, "product_reference": "grpc-cli-debuginfo-0:1.18.0-4.el8ost.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "grpc-debuginfo-0:1.18.0-4.el8ost.ppc64le as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:grpc-debuginfo-0:1.18.0-4.el8ost.ppc64le" }, "product_reference": "grpc-debuginfo-0:1.18.0-4.el8ost.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "grpc-debuginfo-0:1.18.0-4.el8ost.s390x as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:grpc-debuginfo-0:1.18.0-4.el8ost.s390x" }, "product_reference": "grpc-debuginfo-0:1.18.0-4.el8ost.s390x", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "grpc-debuginfo-0:1.18.0-4.el8ost.x86_64 as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:grpc-debuginfo-0:1.18.0-4.el8ost.x86_64" }, "product_reference": "grpc-debuginfo-0:1.18.0-4.el8ost.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "grpc-debugsource-0:1.18.0-4.el8ost.ppc64le as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:grpc-debugsource-0:1.18.0-4.el8ost.ppc64le" }, "product_reference": "grpc-debugsource-0:1.18.0-4.el8ost.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "grpc-debugsource-0:1.18.0-4.el8ost.s390x as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:grpc-debugsource-0:1.18.0-4.el8ost.s390x" }, "product_reference": "grpc-debugsource-0:1.18.0-4.el8ost.s390x", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "grpc-debugsource-0:1.18.0-4.el8ost.x86_64 as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:grpc-debugsource-0:1.18.0-4.el8ost.x86_64" }, "product_reference": "grpc-debugsource-0:1.18.0-4.el8ost.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "grpc-devel-0:1.18.0-4.el8ost.ppc64le as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:grpc-devel-0:1.18.0-4.el8ost.ppc64le" }, "product_reference": "grpc-devel-0:1.18.0-4.el8ost.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "grpc-devel-0:1.18.0-4.el8ost.s390x as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:grpc-devel-0:1.18.0-4.el8ost.s390x" }, "product_reference": "grpc-devel-0:1.18.0-4.el8ost.s390x", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "grpc-devel-0:1.18.0-4.el8ost.x86_64 as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:grpc-devel-0:1.18.0-4.el8ost.x86_64" }, "product_reference": "grpc-devel-0:1.18.0-4.el8ost.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "grpc-plugins-0:1.18.0-4.el8ost.ppc64le as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:grpc-plugins-0:1.18.0-4.el8ost.ppc64le" }, "product_reference": "grpc-plugins-0:1.18.0-4.el8ost.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "grpc-plugins-0:1.18.0-4.el8ost.s390x as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:grpc-plugins-0:1.18.0-4.el8ost.s390x" }, "product_reference": "grpc-plugins-0:1.18.0-4.el8ost.s390x", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "grpc-plugins-0:1.18.0-4.el8ost.x86_64 as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:grpc-plugins-0:1.18.0-4.el8ost.x86_64" }, "product_reference": "grpc-plugins-0:1.18.0-4.el8ost.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "grpc-plugins-debuginfo-0:1.18.0-4.el8ost.ppc64le as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:grpc-plugins-debuginfo-0:1.18.0-4.el8ost.ppc64le" }, "product_reference": "grpc-plugins-debuginfo-0:1.18.0-4.el8ost.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "grpc-plugins-debuginfo-0:1.18.0-4.el8ost.s390x as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:grpc-plugins-debuginfo-0:1.18.0-4.el8ost.s390x" }, "product_reference": "grpc-plugins-debuginfo-0:1.18.0-4.el8ost.s390x", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "grpc-plugins-debuginfo-0:1.18.0-4.el8ost.x86_64 as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:grpc-plugins-debuginfo-0:1.18.0-4.el8ost.x86_64" }, "product_reference": "grpc-plugins-debuginfo-0:1.18.0-4.el8ost.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "haproxy-0:2.0.19-1.el8.src as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:haproxy-0:2.0.19-1.el8.src" }, "product_reference": "haproxy-0:2.0.19-1.el8.src", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "haproxy-debugsource-0:2.0.19-1.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:haproxy-debugsource-0:2.0.19-1.el8.ppc64le" }, "product_reference": "haproxy-debugsource-0:2.0.19-1.el8.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "haproxy-debugsource-0:2.0.19-1.el8.s390x as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:haproxy-debugsource-0:2.0.19-1.el8.s390x" }, "product_reference": "haproxy-debugsource-0:2.0.19-1.el8.s390x", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "haproxy-debugsource-0:2.0.19-1.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:haproxy-debugsource-0:2.0.19-1.el8.x86_64" }, "product_reference": "haproxy-debugsource-0:2.0.19-1.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "haproxy20-0:2.0.19-1.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:haproxy20-0:2.0.19-1.el8.ppc64le" }, "product_reference": "haproxy20-0:2.0.19-1.el8.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "haproxy20-0:2.0.19-1.el8.s390x as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:haproxy20-0:2.0.19-1.el8.s390x" }, "product_reference": "haproxy20-0:2.0.19-1.el8.s390x", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "haproxy20-0:2.0.19-1.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:haproxy20-0:2.0.19-1.el8.x86_64" }, "product_reference": "haproxy20-0:2.0.19-1.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "haproxy20-debuginfo-0:2.0.19-1.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:haproxy20-debuginfo-0:2.0.19-1.el8.ppc64le" }, "product_reference": "haproxy20-debuginfo-0:2.0.19-1.el8.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "haproxy20-debuginfo-0:2.0.19-1.el8.s390x as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:haproxy20-debuginfo-0:2.0.19-1.el8.s390x" }, "product_reference": "haproxy20-debuginfo-0:2.0.19-1.el8.s390x", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "haproxy20-debuginfo-0:2.0.19-1.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:haproxy20-debuginfo-0:2.0.19-1.el8.x86_64" }, "product_reference": "haproxy20-debuginfo-0:2.0.19-1.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "ignition-0:2.9.0-2.rhaos4.7.git1d56dc8.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:ignition-0:2.9.0-2.rhaos4.7.git1d56dc8.el8.ppc64le" }, "product_reference": "ignition-0:2.9.0-2.rhaos4.7.git1d56dc8.el8.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "ignition-0:2.9.0-2.rhaos4.7.git1d56dc8.el8.s390x as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:ignition-0:2.9.0-2.rhaos4.7.git1d56dc8.el8.s390x" }, "product_reference": "ignition-0:2.9.0-2.rhaos4.7.git1d56dc8.el8.s390x", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "ignition-0:2.9.0-2.rhaos4.7.git1d56dc8.el8.src as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:ignition-0:2.9.0-2.rhaos4.7.git1d56dc8.el8.src" }, "product_reference": "ignition-0:2.9.0-2.rhaos4.7.git1d56dc8.el8.src", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "ignition-0:2.9.0-2.rhaos4.7.git1d56dc8.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:ignition-0:2.9.0-2.rhaos4.7.git1d56dc8.el8.x86_64" }, "product_reference": "ignition-0:2.9.0-2.rhaos4.7.git1d56dc8.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "ignition-debuginfo-0:2.9.0-2.rhaos4.7.git1d56dc8.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:ignition-debuginfo-0:2.9.0-2.rhaos4.7.git1d56dc8.el8.ppc64le" }, "product_reference": "ignition-debuginfo-0:2.9.0-2.rhaos4.7.git1d56dc8.el8.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "ignition-debuginfo-0:2.9.0-2.rhaos4.7.git1d56dc8.el8.s390x as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:ignition-debuginfo-0:2.9.0-2.rhaos4.7.git1d56dc8.el8.s390x" }, "product_reference": "ignition-debuginfo-0:2.9.0-2.rhaos4.7.git1d56dc8.el8.s390x", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "ignition-debuginfo-0:2.9.0-2.rhaos4.7.git1d56dc8.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:ignition-debuginfo-0:2.9.0-2.rhaos4.7.git1d56dc8.el8.x86_64" }, "product_reference": "ignition-debuginfo-0:2.9.0-2.rhaos4.7.git1d56dc8.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "ignition-debugsource-0:2.9.0-2.rhaos4.7.git1d56dc8.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:ignition-debugsource-0:2.9.0-2.rhaos4.7.git1d56dc8.el8.ppc64le" }, "product_reference": "ignition-debugsource-0:2.9.0-2.rhaos4.7.git1d56dc8.el8.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "ignition-debugsource-0:2.9.0-2.rhaos4.7.git1d56dc8.el8.s390x as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:ignition-debugsource-0:2.9.0-2.rhaos4.7.git1d56dc8.el8.s390x" }, "product_reference": "ignition-debugsource-0:2.9.0-2.rhaos4.7.git1d56dc8.el8.s390x", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "ignition-debugsource-0:2.9.0-2.rhaos4.7.git1d56dc8.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:ignition-debugsource-0:2.9.0-2.rhaos4.7.git1d56dc8.el8.x86_64" }, "product_reference": "ignition-debugsource-0:2.9.0-2.rhaos4.7.git1d56dc8.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "ignition-validate-0:2.9.0-2.rhaos4.7.git1d56dc8.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:ignition-validate-0:2.9.0-2.rhaos4.7.git1d56dc8.el8.ppc64le" }, "product_reference": "ignition-validate-0:2.9.0-2.rhaos4.7.git1d56dc8.el8.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "ignition-validate-0:2.9.0-2.rhaos4.7.git1d56dc8.el8.s390x as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:ignition-validate-0:2.9.0-2.rhaos4.7.git1d56dc8.el8.s390x" }, "product_reference": "ignition-validate-0:2.9.0-2.rhaos4.7.git1d56dc8.el8.s390x", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "ignition-validate-0:2.9.0-2.rhaos4.7.git1d56dc8.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:ignition-validate-0:2.9.0-2.rhaos4.7.git1d56dc8.el8.x86_64" }, "product_reference": "ignition-validate-0:2.9.0-2.rhaos4.7.git1d56dc8.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "ignition-validate-debuginfo-0:2.9.0-2.rhaos4.7.git1d56dc8.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:ignition-validate-debuginfo-0:2.9.0-2.rhaos4.7.git1d56dc8.el8.ppc64le" }, "product_reference": "ignition-validate-debuginfo-0:2.9.0-2.rhaos4.7.git1d56dc8.el8.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "ignition-validate-debuginfo-0:2.9.0-2.rhaos4.7.git1d56dc8.el8.s390x as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:ignition-validate-debuginfo-0:2.9.0-2.rhaos4.7.git1d56dc8.el8.s390x" }, "product_reference": "ignition-validate-debuginfo-0:2.9.0-2.rhaos4.7.git1d56dc8.el8.s390x", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "ignition-validate-debuginfo-0:2.9.0-2.rhaos4.7.git1d56dc8.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:ignition-validate-debuginfo-0:2.9.0-2.rhaos4.7.git1d56dc8.el8.x86_64" }, "product_reference": "ignition-validate-debuginfo-0:2.9.0-2.rhaos4.7.git1d56dc8.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "inotify-tools-0:3.20.1-2.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:inotify-tools-0:3.20.1-2.el8.ppc64le" }, "product_reference": "inotify-tools-0:3.20.1-2.el8.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "inotify-tools-0:3.20.1-2.el8.s390x as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:inotify-tools-0:3.20.1-2.el8.s390x" }, "product_reference": "inotify-tools-0:3.20.1-2.el8.s390x", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "inotify-tools-0:3.20.1-2.el8.src as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:inotify-tools-0:3.20.1-2.el8.src" }, "product_reference": "inotify-tools-0:3.20.1-2.el8.src", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "inotify-tools-0:3.20.1-2.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:inotify-tools-0:3.20.1-2.el8.x86_64" }, "product_reference": "inotify-tools-0:3.20.1-2.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "inotify-tools-debuginfo-0:3.20.1-2.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:inotify-tools-debuginfo-0:3.20.1-2.el8.ppc64le" }, "product_reference": "inotify-tools-debuginfo-0:3.20.1-2.el8.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "inotify-tools-debuginfo-0:3.20.1-2.el8.s390x as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:inotify-tools-debuginfo-0:3.20.1-2.el8.s390x" }, "product_reference": "inotify-tools-debuginfo-0:3.20.1-2.el8.s390x", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "inotify-tools-debuginfo-0:3.20.1-2.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:inotify-tools-debuginfo-0:3.20.1-2.el8.x86_64" }, "product_reference": "inotify-tools-debuginfo-0:3.20.1-2.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "inotify-tools-debugsource-0:3.20.1-2.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:inotify-tools-debugsource-0:3.20.1-2.el8.ppc64le" }, "product_reference": "inotify-tools-debugsource-0:3.20.1-2.el8.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "inotify-tools-debugsource-0:3.20.1-2.el8.s390x as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:inotify-tools-debugsource-0:3.20.1-2.el8.s390x" }, "product_reference": "inotify-tools-debugsource-0:3.20.1-2.el8.s390x", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "inotify-tools-debugsource-0:3.20.1-2.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:inotify-tools-debugsource-0:3.20.1-2.el8.x86_64" }, "product_reference": "inotify-tools-debugsource-0:3.20.1-2.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "inotify-tools-devel-0:3.20.1-2.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:inotify-tools-devel-0:3.20.1-2.el8.ppc64le" }, "product_reference": "inotify-tools-devel-0:3.20.1-2.el8.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "inotify-tools-devel-0:3.20.1-2.el8.s390x as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:inotify-tools-devel-0:3.20.1-2.el8.s390x" }, "product_reference": "inotify-tools-devel-0:3.20.1-2.el8.s390x", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "inotify-tools-devel-0:3.20.1-2.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:inotify-tools-devel-0:3.20.1-2.el8.x86_64" }, "product_reference": "inotify-tools-devel-0:3.20.1-2.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "ironic-images-0:15.1-20210114.1.el8.noarch as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:ironic-images-0:15.1-20210114.1.el8.noarch" }, "product_reference": "ironic-images-0:15.1-20210114.1.el8.noarch", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "ironic-images-0:15.1-20210114.1.el8.src as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:ironic-images-0:15.1-20210114.1.el8.src" }, "product_reference": "ironic-images-0:15.1-20210114.1.el8.src", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "ironic-images-all-0:15.1-20210114.1.el8.noarch as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:ironic-images-all-0:15.1-20210114.1.el8.noarch" }, "product_reference": "ironic-images-all-0:15.1-20210114.1.el8.noarch", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "ironic-images-ipa-ppc64le-0:15.1-20210114.1.el8.noarch as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:ironic-images-ipa-ppc64le-0:15.1-20210114.1.el8.noarch" }, "product_reference": "ironic-images-ipa-ppc64le-0:15.1-20210114.1.el8.noarch", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "ironic-images-ipa-x86_64-0:15.1-20210114.1.el8.noarch as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:ironic-images-ipa-x86_64-0:15.1-20210114.1.el8.noarch" }, "product_reference": "ironic-images-ipa-x86_64-0:15.1-20210114.1.el8.noarch", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "jenkins-0:2.263.3.1612449007-1.el8.noarch as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:jenkins-0:2.263.3.1612449007-1.el8.noarch" }, "product_reference": "jenkins-0:2.263.3.1612449007-1.el8.noarch", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "jenkins-0:2.263.3.1612449007-1.el8.src as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:jenkins-0:2.263.3.1612449007-1.el8.src" }, "product_reference": "jenkins-0:2.263.3.1612449007-1.el8.src", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "jenkins-2-plugins-0:4.7.1611636915-1.el8.noarch as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:jenkins-2-plugins-0:4.7.1611636915-1.el8.noarch" }, "product_reference": "jenkins-2-plugins-0:4.7.1611636915-1.el8.noarch", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "jenkins-2-plugins-0:4.7.1611636915-1.el8.src as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:jenkins-2-plugins-0:4.7.1611636915-1.el8.src" }, "product_reference": "jenkins-2-plugins-0:4.7.1611636915-1.el8.src", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "jq-0:1.6-2.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:jq-0:1.6-2.el8.ppc64le" }, "product_reference": "jq-0:1.6-2.el8.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "jq-0:1.6-2.el8.s390x as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:jq-0:1.6-2.el8.s390x" }, "product_reference": "jq-0:1.6-2.el8.s390x", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "jq-0:1.6-2.el8.src as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:jq-0:1.6-2.el8.src" }, "product_reference": "jq-0:1.6-2.el8.src", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "jq-0:1.6-2.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:jq-0:1.6-2.el8.x86_64" }, "product_reference": "jq-0:1.6-2.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "jq-debuginfo-0:1.6-2.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:jq-debuginfo-0:1.6-2.el8.ppc64le" }, "product_reference": "jq-debuginfo-0:1.6-2.el8.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "jq-debuginfo-0:1.6-2.el8.s390x as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:jq-debuginfo-0:1.6-2.el8.s390x" }, "product_reference": "jq-debuginfo-0:1.6-2.el8.s390x", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "jq-debuginfo-0:1.6-2.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:jq-debuginfo-0:1.6-2.el8.x86_64" }, "product_reference": "jq-debuginfo-0:1.6-2.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "jq-debugsource-0:1.6-2.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:jq-debugsource-0:1.6-2.el8.ppc64le" }, "product_reference": "jq-debugsource-0:1.6-2.el8.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "jq-debugsource-0:1.6-2.el8.s390x as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:jq-debugsource-0:1.6-2.el8.s390x" }, "product_reference": "jq-debugsource-0:1.6-2.el8.s390x", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "jq-debugsource-0:1.6-2.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:jq-debugsource-0:1.6-2.el8.x86_64" }, "product_reference": "jq-debugsource-0:1.6-2.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "jq-devel-0:1.6-2.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:jq-devel-0:1.6-2.el8.ppc64le" }, "product_reference": "jq-devel-0:1.6-2.el8.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "jq-devel-0:1.6-2.el8.s390x as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:jq-devel-0:1.6-2.el8.s390x" }, "product_reference": "jq-devel-0:1.6-2.el8.s390x", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "jq-devel-0:1.6-2.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:jq-devel-0:1.6-2.el8.x86_64" }, "product_reference": "jq-devel-0:1.6-2.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "kuryr-binding-scripts-0:1.1.1-0.20190923160834.41e6964.el8ost.noarch as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:kuryr-binding-scripts-0:1.1.1-0.20190923160834.41e6964.el8ost.noarch" }, "product_reference": "kuryr-binding-scripts-0:1.1.1-0.20190923160834.41e6964.el8ost.noarch", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "libnftnl-0:1.1.5-4.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:libnftnl-0:1.1.5-4.el8.ppc64le" }, "product_reference": "libnftnl-0:1.1.5-4.el8.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "libnftnl-0:1.1.5-4.el8.s390x as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:libnftnl-0:1.1.5-4.el8.s390x" }, "product_reference": "libnftnl-0:1.1.5-4.el8.s390x", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "libnftnl-0:1.1.5-4.el8.src as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:libnftnl-0:1.1.5-4.el8.src" }, "product_reference": "libnftnl-0:1.1.5-4.el8.src", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "libnftnl-0:1.1.5-4.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:libnftnl-0:1.1.5-4.el8.x86_64" }, "product_reference": "libnftnl-0:1.1.5-4.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "libnftnl-debuginfo-0:1.1.5-4.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:libnftnl-debuginfo-0:1.1.5-4.el8.ppc64le" }, "product_reference": "libnftnl-debuginfo-0:1.1.5-4.el8.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "libnftnl-debuginfo-0:1.1.5-4.el8.s390x as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:libnftnl-debuginfo-0:1.1.5-4.el8.s390x" }, "product_reference": "libnftnl-debuginfo-0:1.1.5-4.el8.s390x", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "libnftnl-debuginfo-0:1.1.5-4.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:libnftnl-debuginfo-0:1.1.5-4.el8.x86_64" }, "product_reference": "libnftnl-debuginfo-0:1.1.5-4.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "libnftnl-debugsource-0:1.1.5-4.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:libnftnl-debugsource-0:1.1.5-4.el8.ppc64le" }, "product_reference": "libnftnl-debugsource-0:1.1.5-4.el8.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "libnftnl-debugsource-0:1.1.5-4.el8.s390x as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:libnftnl-debugsource-0:1.1.5-4.el8.s390x" }, "product_reference": "libnftnl-debugsource-0:1.1.5-4.el8.s390x", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "libnftnl-debugsource-0:1.1.5-4.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:libnftnl-debugsource-0:1.1.5-4.el8.x86_64" }, "product_reference": "libnftnl-debugsource-0:1.1.5-4.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "libnftnl-devel-0:1.1.5-4.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:libnftnl-devel-0:1.1.5-4.el8.ppc64le" }, "product_reference": "libnftnl-devel-0:1.1.5-4.el8.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "libnftnl-devel-0:1.1.5-4.el8.s390x as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:libnftnl-devel-0:1.1.5-4.el8.s390x" }, "product_reference": "libnftnl-devel-0:1.1.5-4.el8.s390x", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "libnftnl-devel-0:1.1.5-4.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:libnftnl-devel-0:1.1.5-4.el8.x86_64" }, "product_reference": "libnftnl-devel-0:1.1.5-4.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "libsodium-0:1.0.16-4.5.el8ost.ppc64le as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:libsodium-0:1.0.16-4.5.el8ost.ppc64le" }, "product_reference": "libsodium-0:1.0.16-4.5.el8ost.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "libsodium-0:1.0.16-4.5.el8ost.s390x as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:libsodium-0:1.0.16-4.5.el8ost.s390x" }, "product_reference": "libsodium-0:1.0.16-4.5.el8ost.s390x", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "libsodium-0:1.0.16-4.5.el8ost.src as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:libsodium-0:1.0.16-4.5.el8ost.src" }, "product_reference": "libsodium-0:1.0.16-4.5.el8ost.src", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "libsodium-0:1.0.16-4.5.el8ost.x86_64 as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:libsodium-0:1.0.16-4.5.el8ost.x86_64" }, "product_reference": "libsodium-0:1.0.16-4.5.el8ost.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "libsodium-debuginfo-0:1.0.16-4.5.el8ost.ppc64le as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:libsodium-debuginfo-0:1.0.16-4.5.el8ost.ppc64le" }, "product_reference": "libsodium-debuginfo-0:1.0.16-4.5.el8ost.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "libsodium-debuginfo-0:1.0.16-4.5.el8ost.s390x as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:libsodium-debuginfo-0:1.0.16-4.5.el8ost.s390x" }, "product_reference": "libsodium-debuginfo-0:1.0.16-4.5.el8ost.s390x", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "libsodium-debuginfo-0:1.0.16-4.5.el8ost.x86_64 as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:libsodium-debuginfo-0:1.0.16-4.5.el8ost.x86_64" }, "product_reference": "libsodium-debuginfo-0:1.0.16-4.5.el8ost.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "libsodium-debugsource-0:1.0.16-4.5.el8ost.ppc64le as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:libsodium-debugsource-0:1.0.16-4.5.el8ost.ppc64le" }, "product_reference": "libsodium-debugsource-0:1.0.16-4.5.el8ost.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "libsodium-debugsource-0:1.0.16-4.5.el8ost.s390x as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:libsodium-debugsource-0:1.0.16-4.5.el8ost.s390x" }, "product_reference": "libsodium-debugsource-0:1.0.16-4.5.el8ost.s390x", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "libsodium-debugsource-0:1.0.16-4.5.el8ost.x86_64 as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:libsodium-debugsource-0:1.0.16-4.5.el8ost.x86_64" }, "product_reference": "libsodium-debugsource-0:1.0.16-4.5.el8ost.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "libsodium-devel-0:1.0.16-4.5.el8ost.ppc64le as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:libsodium-devel-0:1.0.16-4.5.el8ost.ppc64le" }, "product_reference": "libsodium-devel-0:1.0.16-4.5.el8ost.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "libsodium-devel-0:1.0.16-4.5.el8ost.s390x as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:libsodium-devel-0:1.0.16-4.5.el8ost.s390x" }, "product_reference": "libsodium-devel-0:1.0.16-4.5.el8ost.s390x", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "libsodium-devel-0:1.0.16-4.5.el8ost.x86_64 as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:libsodium-devel-0:1.0.16-4.5.el8ost.x86_64" }, "product_reference": "libsodium-devel-0:1.0.16-4.5.el8ost.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "libsodium-static-0:1.0.16-4.5.el8ost.ppc64le as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:libsodium-static-0:1.0.16-4.5.el8ost.ppc64le" }, "product_reference": "libsodium-static-0:1.0.16-4.5.el8ost.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "libsodium-static-0:1.0.16-4.5.el8ost.s390x as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:libsodium-static-0:1.0.16-4.5.el8ost.s390x" }, "product_reference": "libsodium-static-0:1.0.16-4.5.el8ost.s390x", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "libsodium-static-0:1.0.16-4.5.el8ost.x86_64 as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:libsodium-static-0:1.0.16-4.5.el8ost.x86_64" }, "product_reference": "libsodium-static-0:1.0.16-4.5.el8ost.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "libunwind-0:1.2.1-5.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:libunwind-0:1.2.1-5.el8.ppc64le" }, "product_reference": "libunwind-0:1.2.1-5.el8.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "libunwind-0:1.2.1-5.el8.src as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:libunwind-0:1.2.1-5.el8.src" }, "product_reference": "libunwind-0:1.2.1-5.el8.src", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "libunwind-0:1.2.1-5.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:libunwind-0:1.2.1-5.el8.x86_64" }, "product_reference": "libunwind-0:1.2.1-5.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "libunwind-debuginfo-0:1.2.1-5.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:libunwind-debuginfo-0:1.2.1-5.el8.ppc64le" }, "product_reference": "libunwind-debuginfo-0:1.2.1-5.el8.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "libunwind-debuginfo-0:1.2.1-5.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:libunwind-debuginfo-0:1.2.1-5.el8.x86_64" }, "product_reference": "libunwind-debuginfo-0:1.2.1-5.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "libunwind-debugsource-0:1.2.1-5.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:libunwind-debugsource-0:1.2.1-5.el8.ppc64le" }, "product_reference": "libunwind-debugsource-0:1.2.1-5.el8.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "libunwind-debugsource-0:1.2.1-5.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:libunwind-debugsource-0:1.2.1-5.el8.x86_64" }, "product_reference": "libunwind-debugsource-0:1.2.1-5.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "libunwind-devel-0:1.2.1-5.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:libunwind-devel-0:1.2.1-5.el8.ppc64le" }, "product_reference": "libunwind-devel-0:1.2.1-5.el8.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "libunwind-devel-0:1.2.1-5.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:libunwind-devel-0:1.2.1-5.el8.x86_64" }, "product_reference": "libunwind-devel-0:1.2.1-5.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "network-scripts-openvswitch2.13-0:2.13.0-79.el8fdp.ppc64le as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:network-scripts-openvswitch2.13-0:2.13.0-79.el8fdp.ppc64le" }, "product_reference": "network-scripts-openvswitch2.13-0:2.13.0-79.el8fdp.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "network-scripts-openvswitch2.13-0:2.13.0-79.el8fdp.s390x as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:network-scripts-openvswitch2.13-0:2.13.0-79.el8fdp.s390x" }, "product_reference": "network-scripts-openvswitch2.13-0:2.13.0-79.el8fdp.s390x", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "network-scripts-openvswitch2.13-0:2.13.0-79.el8fdp.x86_64 as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:network-scripts-openvswitch2.13-0:2.13.0-79.el8fdp.x86_64" }, "product_reference": "network-scripts-openvswitch2.13-0:2.13.0-79.el8fdp.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "octavia-amphora-image-x86_64-0:17.0-20200606.1.el8ost.noarch as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:octavia-amphora-image-x86_64-0:17.0-20200606.1.el8ost.noarch" }, "product_reference": "octavia-amphora-image-x86_64-0:17.0-20200606.1.el8ost.noarch", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-0:4.7.0-202102060108.p0.git.97095.7271b90.el8.src as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:openshift-0:4.7.0-202102060108.p0.git.97095.7271b90.el8.src" }, "product_reference": "openshift-0:4.7.0-202102060108.p0.git.97095.7271b90.el8.src", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-clients-0:4.7.0-202102032256.p0.git.3951.0e656ef.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:openshift-clients-0:4.7.0-202102032256.p0.git.3951.0e656ef.el8.ppc64le" }, "product_reference": "openshift-clients-0:4.7.0-202102032256.p0.git.3951.0e656ef.el8.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-clients-0:4.7.0-202102032256.p0.git.3951.0e656ef.el8.s390x as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:openshift-clients-0:4.7.0-202102032256.p0.git.3951.0e656ef.el8.s390x" }, "product_reference": "openshift-clients-0:4.7.0-202102032256.p0.git.3951.0e656ef.el8.s390x", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-clients-0:4.7.0-202102032256.p0.git.3951.0e656ef.el8.src as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:openshift-clients-0:4.7.0-202102032256.p0.git.3951.0e656ef.el8.src" }, "product_reference": "openshift-clients-0:4.7.0-202102032256.p0.git.3951.0e656ef.el8.src", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-clients-0:4.7.0-202102032256.p0.git.3951.0e656ef.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:openshift-clients-0:4.7.0-202102032256.p0.git.3951.0e656ef.el8.x86_64" }, "product_reference": "openshift-clients-0:4.7.0-202102032256.p0.git.3951.0e656ef.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-clients-redistributable-0:4.7.0-202102032256.p0.git.3951.0e656ef.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:openshift-clients-redistributable-0:4.7.0-202102032256.p0.git.3951.0e656ef.el8.x86_64" }, "product_reference": "openshift-clients-redistributable-0:4.7.0-202102032256.p0.git.3951.0e656ef.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-eventrouter-0:0.2-4.git7c289cc.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:openshift-eventrouter-0:0.2-4.git7c289cc.el8.ppc64le" }, "product_reference": "openshift-eventrouter-0:0.2-4.git7c289cc.el8.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-eventrouter-0:0.2-4.git7c289cc.el8.s390x as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:openshift-eventrouter-0:0.2-4.git7c289cc.el8.s390x" }, "product_reference": "openshift-eventrouter-0:0.2-4.git7c289cc.el8.s390x", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-eventrouter-0:0.2-4.git7c289cc.el8.src as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:openshift-eventrouter-0:0.2-4.git7c289cc.el8.src" }, "product_reference": "openshift-eventrouter-0:0.2-4.git7c289cc.el8.src", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-eventrouter-0:0.2-4.git7c289cc.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:openshift-eventrouter-0:0.2-4.git7c289cc.el8.x86_64" }, "product_reference": "openshift-eventrouter-0:0.2-4.git7c289cc.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-eventrouter-debuginfo-0:0.2-4.git7c289cc.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:openshift-eventrouter-debuginfo-0:0.2-4.git7c289cc.el8.ppc64le" }, "product_reference": "openshift-eventrouter-debuginfo-0:0.2-4.git7c289cc.el8.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-eventrouter-debuginfo-0:0.2-4.git7c289cc.el8.s390x as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:openshift-eventrouter-debuginfo-0:0.2-4.git7c289cc.el8.s390x" }, "product_reference": "openshift-eventrouter-debuginfo-0:0.2-4.git7c289cc.el8.s390x", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-eventrouter-debuginfo-0:0.2-4.git7c289cc.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:openshift-eventrouter-debuginfo-0:0.2-4.git7c289cc.el8.x86_64" }, "product_reference": "openshift-eventrouter-debuginfo-0:0.2-4.git7c289cc.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-eventrouter-debugsource-0:0.2-4.git7c289cc.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:openshift-eventrouter-debugsource-0:0.2-4.git7c289cc.el8.ppc64le" }, "product_reference": "openshift-eventrouter-debugsource-0:0.2-4.git7c289cc.el8.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-eventrouter-debugsource-0:0.2-4.git7c289cc.el8.s390x as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:openshift-eventrouter-debugsource-0:0.2-4.git7c289cc.el8.s390x" }, "product_reference": "openshift-eventrouter-debugsource-0:0.2-4.git7c289cc.el8.s390x", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-eventrouter-debugsource-0:0.2-4.git7c289cc.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:openshift-eventrouter-debugsource-0:0.2-4.git7c289cc.el8.x86_64" }, "product_reference": "openshift-eventrouter-debugsource-0:0.2-4.git7c289cc.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-hyperkube-0:4.7.0-202102060108.p0.git.97095.7271b90.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:openshift-hyperkube-0:4.7.0-202102060108.p0.git.97095.7271b90.el8.ppc64le" }, "product_reference": "openshift-hyperkube-0:4.7.0-202102060108.p0.git.97095.7271b90.el8.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-hyperkube-0:4.7.0-202102060108.p0.git.97095.7271b90.el8.s390x as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:openshift-hyperkube-0:4.7.0-202102060108.p0.git.97095.7271b90.el8.s390x" }, "product_reference": "openshift-hyperkube-0:4.7.0-202102060108.p0.git.97095.7271b90.el8.s390x", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-hyperkube-0:4.7.0-202102060108.p0.git.97095.7271b90.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:openshift-hyperkube-0:4.7.0-202102060108.p0.git.97095.7271b90.el8.x86_64" }, "product_reference": "openshift-hyperkube-0:4.7.0-202102060108.p0.git.97095.7271b90.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-kuryr-0:4.7.0-202101262230.p0.git.2494.cd95ce5.el8.src as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:openshift-kuryr-0:4.7.0-202101262230.p0.git.2494.cd95ce5.el8.src" }, "product_reference": "openshift-kuryr-0:4.7.0-202101262230.p0.git.2494.cd95ce5.el8.src", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-kuryr-cni-0:4.7.0-202101262230.p0.git.2494.cd95ce5.el8.noarch as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:openshift-kuryr-cni-0:4.7.0-202101262230.p0.git.2494.cd95ce5.el8.noarch" }, "product_reference": "openshift-kuryr-cni-0:4.7.0-202101262230.p0.git.2494.cd95ce5.el8.noarch", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-kuryr-common-0:4.7.0-202101262230.p0.git.2494.cd95ce5.el8.noarch as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:openshift-kuryr-common-0:4.7.0-202101262230.p0.git.2494.cd95ce5.el8.noarch" }, "product_reference": "openshift-kuryr-common-0:4.7.0-202101262230.p0.git.2494.cd95ce5.el8.noarch", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-kuryr-controller-0:4.7.0-202101262230.p0.git.2494.cd95ce5.el8.noarch as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:openshift-kuryr-controller-0:4.7.0-202101262230.p0.git.2494.cd95ce5.el8.noarch" }, "product_reference": "openshift-kuryr-controller-0:4.7.0-202101262230.p0.git.2494.cd95ce5.el8.noarch", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "openstack-ironic-1:16.0.4-0.20210203051223.7d74ea0.el8.src as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:openstack-ironic-1:16.0.4-0.20210203051223.7d74ea0.el8.src" }, "product_reference": "openstack-ironic-1:16.0.4-0.20210203051223.7d74ea0.el8.src", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "openstack-ironic-api-1:16.0.4-0.20210203051223.7d74ea0.el8.noarch as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:openstack-ironic-api-1:16.0.4-0.20210203051223.7d74ea0.el8.noarch" }, "product_reference": "openstack-ironic-api-1:16.0.4-0.20210203051223.7d74ea0.el8.noarch", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "openstack-ironic-common-1:16.0.4-0.20210203051223.7d74ea0.el8.noarch as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:openstack-ironic-common-1:16.0.4-0.20210203051223.7d74ea0.el8.noarch" }, "product_reference": "openstack-ironic-common-1:16.0.4-0.20210203051223.7d74ea0.el8.noarch", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "openstack-ironic-conductor-1:16.0.4-0.20210203051223.7d74ea0.el8.noarch as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:openstack-ironic-conductor-1:16.0.4-0.20210203051223.7d74ea0.el8.noarch" }, "product_reference": "openstack-ironic-conductor-1:16.0.4-0.20210203051223.7d74ea0.el8.noarch", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "openstack-ironic-inspector-0:10.4.1-0.20201123161216.70fccec.el8.noarch as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:openstack-ironic-inspector-0:10.4.1-0.20201123161216.70fccec.el8.noarch" }, "product_reference": "openstack-ironic-inspector-0:10.4.1-0.20201123161216.70fccec.el8.noarch", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "openstack-ironic-inspector-0:10.4.1-0.20201123161216.70fccec.el8.src as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:openstack-ironic-inspector-0:10.4.1-0.20201123161216.70fccec.el8.src" }, "product_reference": "openstack-ironic-inspector-0:10.4.1-0.20201123161216.70fccec.el8.src", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "openstack-ironic-inspector-api-0:10.4.1-0.20201123161216.70fccec.el8.noarch as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:openstack-ironic-inspector-api-0:10.4.1-0.20201123161216.70fccec.el8.noarch" }, "product_reference": "openstack-ironic-inspector-api-0:10.4.1-0.20201123161216.70fccec.el8.noarch", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "openstack-ironic-inspector-conductor-0:10.4.1-0.20201123161216.70fccec.el8.noarch as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:openstack-ironic-inspector-conductor-0:10.4.1-0.20201123161216.70fccec.el8.noarch" }, "product_reference": "openstack-ironic-inspector-conductor-0:10.4.1-0.20201123161216.70fccec.el8.noarch", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "openstack-ironic-inspector-dnsmasq-0:10.4.1-0.20201123161216.70fccec.el8.noarch as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:openstack-ironic-inspector-dnsmasq-0:10.4.1-0.20201123161216.70fccec.el8.noarch" }, "product_reference": "openstack-ironic-inspector-dnsmasq-0:10.4.1-0.20201123161216.70fccec.el8.noarch", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "openstack-ironic-python-agent-0:6.4.3-0.20201217171210.bd45db1.el8.noarch as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:openstack-ironic-python-agent-0:6.4.3-0.20201217171210.bd45db1.el8.noarch" }, "product_reference": "openstack-ironic-python-agent-0:6.4.3-0.20201217171210.bd45db1.el8.noarch", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "openstack-ironic-python-agent-0:6.4.3-0.20201217171210.bd45db1.el8.src as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:openstack-ironic-python-agent-0:6.4.3-0.20201217171210.bd45db1.el8.src" }, "product_reference": "openstack-ironic-python-agent-0:6.4.3-0.20201217171210.bd45db1.el8.src", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "openvswitch2.13-0:2.13.0-79.el8fdp.ppc64le as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:openvswitch2.13-0:2.13.0-79.el8fdp.ppc64le" }, "product_reference": "openvswitch2.13-0:2.13.0-79.el8fdp.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "openvswitch2.13-0:2.13.0-79.el8fdp.s390x as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:openvswitch2.13-0:2.13.0-79.el8fdp.s390x" }, "product_reference": "openvswitch2.13-0:2.13.0-79.el8fdp.s390x", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "openvswitch2.13-0:2.13.0-79.el8fdp.src as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:openvswitch2.13-0:2.13.0-79.el8fdp.src" }, "product_reference": "openvswitch2.13-0:2.13.0-79.el8fdp.src", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "openvswitch2.13-0:2.13.0-79.el8fdp.x86_64 as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:openvswitch2.13-0:2.13.0-79.el8fdp.x86_64" }, "product_reference": "openvswitch2.13-0:2.13.0-79.el8fdp.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "openvswitch2.13-debuginfo-0:2.13.0-79.el8fdp.ppc64le as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:openvswitch2.13-debuginfo-0:2.13.0-79.el8fdp.ppc64le" }, "product_reference": "openvswitch2.13-debuginfo-0:2.13.0-79.el8fdp.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "openvswitch2.13-debuginfo-0:2.13.0-79.el8fdp.s390x as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:openvswitch2.13-debuginfo-0:2.13.0-79.el8fdp.s390x" }, "product_reference": "openvswitch2.13-debuginfo-0:2.13.0-79.el8fdp.s390x", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "openvswitch2.13-debuginfo-0:2.13.0-79.el8fdp.x86_64 as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:openvswitch2.13-debuginfo-0:2.13.0-79.el8fdp.x86_64" }, "product_reference": "openvswitch2.13-debuginfo-0:2.13.0-79.el8fdp.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "openvswitch2.13-debugsource-0:2.13.0-79.el8fdp.ppc64le as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:openvswitch2.13-debugsource-0:2.13.0-79.el8fdp.ppc64le" }, "product_reference": "openvswitch2.13-debugsource-0:2.13.0-79.el8fdp.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "openvswitch2.13-debugsource-0:2.13.0-79.el8fdp.s390x as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:openvswitch2.13-debugsource-0:2.13.0-79.el8fdp.s390x" }, "product_reference": "openvswitch2.13-debugsource-0:2.13.0-79.el8fdp.s390x", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "openvswitch2.13-debugsource-0:2.13.0-79.el8fdp.x86_64 as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:openvswitch2.13-debugsource-0:2.13.0-79.el8fdp.x86_64" }, "product_reference": "openvswitch2.13-debugsource-0:2.13.0-79.el8fdp.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "openvswitch2.13-devel-0:2.13.0-79.el8fdp.ppc64le as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:openvswitch2.13-devel-0:2.13.0-79.el8fdp.ppc64le" }, "product_reference": "openvswitch2.13-devel-0:2.13.0-79.el8fdp.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "openvswitch2.13-devel-0:2.13.0-79.el8fdp.s390x as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:openvswitch2.13-devel-0:2.13.0-79.el8fdp.s390x" }, "product_reference": "openvswitch2.13-devel-0:2.13.0-79.el8fdp.s390x", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "openvswitch2.13-devel-0:2.13.0-79.el8fdp.x86_64 as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:openvswitch2.13-devel-0:2.13.0-79.el8fdp.x86_64" }, "product_reference": "openvswitch2.13-devel-0:2.13.0-79.el8fdp.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "openvswitch2.13-test-0:2.13.0-79.el8fdp.noarch as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:openvswitch2.13-test-0:2.13.0-79.el8fdp.noarch" }, "product_reference": "openvswitch2.13-test-0:2.13.0-79.el8fdp.noarch", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "ostree-0:2020.7-1.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:ostree-0:2020.7-1.el8.ppc64le" }, "product_reference": "ostree-0:2020.7-1.el8.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "ostree-0:2020.7-1.el8.s390x as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:ostree-0:2020.7-1.el8.s390x" }, "product_reference": "ostree-0:2020.7-1.el8.s390x", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "ostree-0:2020.7-1.el8.src as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:ostree-0:2020.7-1.el8.src" }, "product_reference": "ostree-0:2020.7-1.el8.src", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "ostree-0:2020.7-1.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:ostree-0:2020.7-1.el8.x86_64" }, "product_reference": "ostree-0:2020.7-1.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "ostree-debuginfo-0:2020.7-1.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:ostree-debuginfo-0:2020.7-1.el8.ppc64le" }, "product_reference": "ostree-debuginfo-0:2020.7-1.el8.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "ostree-debuginfo-0:2020.7-1.el8.s390x as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:ostree-debuginfo-0:2020.7-1.el8.s390x" }, "product_reference": "ostree-debuginfo-0:2020.7-1.el8.s390x", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "ostree-debuginfo-0:2020.7-1.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:ostree-debuginfo-0:2020.7-1.el8.x86_64" }, "product_reference": "ostree-debuginfo-0:2020.7-1.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "ostree-debugsource-0:2020.7-1.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:ostree-debugsource-0:2020.7-1.el8.ppc64le" }, "product_reference": "ostree-debugsource-0:2020.7-1.el8.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "ostree-debugsource-0:2020.7-1.el8.s390x as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:ostree-debugsource-0:2020.7-1.el8.s390x" }, "product_reference": "ostree-debugsource-0:2020.7-1.el8.s390x", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "ostree-debugsource-0:2020.7-1.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:ostree-debugsource-0:2020.7-1.el8.x86_64" }, "product_reference": "ostree-debugsource-0:2020.7-1.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "ostree-devel-0:2020.7-1.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:ostree-devel-0:2020.7-1.el8.ppc64le" }, "product_reference": "ostree-devel-0:2020.7-1.el8.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "ostree-devel-0:2020.7-1.el8.s390x as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:ostree-devel-0:2020.7-1.el8.s390x" }, "product_reference": "ostree-devel-0:2020.7-1.el8.s390x", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "ostree-devel-0:2020.7-1.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:ostree-devel-0:2020.7-1.el8.x86_64" }, "product_reference": "ostree-devel-0:2020.7-1.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "ostree-grub2-0:2020.7-1.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:ostree-grub2-0:2020.7-1.el8.ppc64le" }, "product_reference": "ostree-grub2-0:2020.7-1.el8.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "ostree-grub2-0:2020.7-1.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:ostree-grub2-0:2020.7-1.el8.x86_64" }, "product_reference": "ostree-grub2-0:2020.7-1.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "ostree-libs-0:2020.7-1.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:ostree-libs-0:2020.7-1.el8.ppc64le" }, "product_reference": "ostree-libs-0:2020.7-1.el8.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "ostree-libs-0:2020.7-1.el8.s390x as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:ostree-libs-0:2020.7-1.el8.s390x" }, "product_reference": "ostree-libs-0:2020.7-1.el8.s390x", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "ostree-libs-0:2020.7-1.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:ostree-libs-0:2020.7-1.el8.x86_64" }, "product_reference": "ostree-libs-0:2020.7-1.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "ostree-libs-debuginfo-0:2020.7-1.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:ostree-libs-debuginfo-0:2020.7-1.el8.ppc64le" }, "product_reference": "ostree-libs-debuginfo-0:2020.7-1.el8.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "ostree-libs-debuginfo-0:2020.7-1.el8.s390x as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:ostree-libs-debuginfo-0:2020.7-1.el8.s390x" }, "product_reference": "ostree-libs-debuginfo-0:2020.7-1.el8.s390x", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "ostree-libs-debuginfo-0:2020.7-1.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:ostree-libs-debuginfo-0:2020.7-1.el8.x86_64" }, "product_reference": "ostree-libs-debuginfo-0:2020.7-1.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "ovn2.13-0:20.09.0-21.el8fdn.ppc64le as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:ovn2.13-0:20.09.0-21.el8fdn.ppc64le" }, "product_reference": "ovn2.13-0:20.09.0-21.el8fdn.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "ovn2.13-0:20.09.0-21.el8fdn.s390x as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:ovn2.13-0:20.09.0-21.el8fdn.s390x" }, "product_reference": "ovn2.13-0:20.09.0-21.el8fdn.s390x", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "ovn2.13-0:20.09.0-21.el8fdn.src as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:ovn2.13-0:20.09.0-21.el8fdn.src" }, "product_reference": "ovn2.13-0:20.09.0-21.el8fdn.src", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "ovn2.13-0:20.09.0-21.el8fdn.x86_64 as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:ovn2.13-0:20.09.0-21.el8fdn.x86_64" }, "product_reference": "ovn2.13-0:20.09.0-21.el8fdn.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "ovn2.13-central-0:20.09.0-21.el8fdn.ppc64le as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:ovn2.13-central-0:20.09.0-21.el8fdn.ppc64le" }, "product_reference": "ovn2.13-central-0:20.09.0-21.el8fdn.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "ovn2.13-central-0:20.09.0-21.el8fdn.s390x as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:ovn2.13-central-0:20.09.0-21.el8fdn.s390x" }, "product_reference": "ovn2.13-central-0:20.09.0-21.el8fdn.s390x", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "ovn2.13-central-0:20.09.0-21.el8fdn.x86_64 as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:ovn2.13-central-0:20.09.0-21.el8fdn.x86_64" }, "product_reference": "ovn2.13-central-0:20.09.0-21.el8fdn.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "ovn2.13-central-debuginfo-0:20.09.0-21.el8fdn.ppc64le as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:ovn2.13-central-debuginfo-0:20.09.0-21.el8fdn.ppc64le" }, "product_reference": "ovn2.13-central-debuginfo-0:20.09.0-21.el8fdn.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "ovn2.13-central-debuginfo-0:20.09.0-21.el8fdn.s390x as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:ovn2.13-central-debuginfo-0:20.09.0-21.el8fdn.s390x" }, "product_reference": "ovn2.13-central-debuginfo-0:20.09.0-21.el8fdn.s390x", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "ovn2.13-central-debuginfo-0:20.09.0-21.el8fdn.x86_64 as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:ovn2.13-central-debuginfo-0:20.09.0-21.el8fdn.x86_64" }, "product_reference": "ovn2.13-central-debuginfo-0:20.09.0-21.el8fdn.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "ovn2.13-debuginfo-0:20.09.0-21.el8fdn.ppc64le as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:ovn2.13-debuginfo-0:20.09.0-21.el8fdn.ppc64le" }, "product_reference": "ovn2.13-debuginfo-0:20.09.0-21.el8fdn.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "ovn2.13-debuginfo-0:20.09.0-21.el8fdn.s390x as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:ovn2.13-debuginfo-0:20.09.0-21.el8fdn.s390x" }, "product_reference": "ovn2.13-debuginfo-0:20.09.0-21.el8fdn.s390x", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "ovn2.13-debuginfo-0:20.09.0-21.el8fdn.x86_64 as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:ovn2.13-debuginfo-0:20.09.0-21.el8fdn.x86_64" }, "product_reference": "ovn2.13-debuginfo-0:20.09.0-21.el8fdn.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "ovn2.13-debugsource-0:20.09.0-21.el8fdn.ppc64le as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:ovn2.13-debugsource-0:20.09.0-21.el8fdn.ppc64le" }, "product_reference": "ovn2.13-debugsource-0:20.09.0-21.el8fdn.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "ovn2.13-debugsource-0:20.09.0-21.el8fdn.s390x as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:ovn2.13-debugsource-0:20.09.0-21.el8fdn.s390x" }, "product_reference": "ovn2.13-debugsource-0:20.09.0-21.el8fdn.s390x", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "ovn2.13-debugsource-0:20.09.0-21.el8fdn.x86_64 as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:ovn2.13-debugsource-0:20.09.0-21.el8fdn.x86_64" }, "product_reference": "ovn2.13-debugsource-0:20.09.0-21.el8fdn.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "ovn2.13-host-0:20.09.0-21.el8fdn.ppc64le as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:ovn2.13-host-0:20.09.0-21.el8fdn.ppc64le" }, "product_reference": "ovn2.13-host-0:20.09.0-21.el8fdn.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "ovn2.13-host-0:20.09.0-21.el8fdn.s390x as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:ovn2.13-host-0:20.09.0-21.el8fdn.s390x" }, "product_reference": "ovn2.13-host-0:20.09.0-21.el8fdn.s390x", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "ovn2.13-host-0:20.09.0-21.el8fdn.x86_64 as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:ovn2.13-host-0:20.09.0-21.el8fdn.x86_64" }, "product_reference": "ovn2.13-host-0:20.09.0-21.el8fdn.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "ovn2.13-host-debuginfo-0:20.09.0-21.el8fdn.ppc64le as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:ovn2.13-host-debuginfo-0:20.09.0-21.el8fdn.ppc64le" }, "product_reference": "ovn2.13-host-debuginfo-0:20.09.0-21.el8fdn.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "ovn2.13-host-debuginfo-0:20.09.0-21.el8fdn.s390x as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:ovn2.13-host-debuginfo-0:20.09.0-21.el8fdn.s390x" }, "product_reference": "ovn2.13-host-debuginfo-0:20.09.0-21.el8fdn.s390x", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "ovn2.13-host-debuginfo-0:20.09.0-21.el8fdn.x86_64 as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:ovn2.13-host-debuginfo-0:20.09.0-21.el8fdn.x86_64" }, "product_reference": "ovn2.13-host-debuginfo-0:20.09.0-21.el8fdn.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "ovn2.13-vtep-0:20.09.0-21.el8fdn.ppc64le as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:ovn2.13-vtep-0:20.09.0-21.el8fdn.ppc64le" }, "product_reference": "ovn2.13-vtep-0:20.09.0-21.el8fdn.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "ovn2.13-vtep-0:20.09.0-21.el8fdn.s390x as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:ovn2.13-vtep-0:20.09.0-21.el8fdn.s390x" }, "product_reference": "ovn2.13-vtep-0:20.09.0-21.el8fdn.s390x", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "ovn2.13-vtep-0:20.09.0-21.el8fdn.x86_64 as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:ovn2.13-vtep-0:20.09.0-21.el8fdn.x86_64" }, "product_reference": "ovn2.13-vtep-0:20.09.0-21.el8fdn.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "ovn2.13-vtep-debuginfo-0:20.09.0-21.el8fdn.ppc64le as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:ovn2.13-vtep-debuginfo-0:20.09.0-21.el8fdn.ppc64le" }, "product_reference": "ovn2.13-vtep-debuginfo-0:20.09.0-21.el8fdn.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "ovn2.13-vtep-debuginfo-0:20.09.0-21.el8fdn.s390x as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:ovn2.13-vtep-debuginfo-0:20.09.0-21.el8fdn.s390x" }, "product_reference": "ovn2.13-vtep-debuginfo-0:20.09.0-21.el8fdn.s390x", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "ovn2.13-vtep-debuginfo-0:20.09.0-21.el8fdn.x86_64 as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:ovn2.13-vtep-debuginfo-0:20.09.0-21.el8fdn.x86_64" }, "product_reference": "ovn2.13-vtep-debuginfo-0:20.09.0-21.el8fdn.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "powerpc-utils-0:1.3.6-12.el8_3.ppc64le as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:powerpc-utils-0:1.3.6-12.el8_3.ppc64le" }, "product_reference": "powerpc-utils-0:1.3.6-12.el8_3.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "powerpc-utils-0:1.3.6-12.el8_3.src as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:powerpc-utils-0:1.3.6-12.el8_3.src" }, "product_reference": "powerpc-utils-0:1.3.6-12.el8_3.src", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "powerpc-utils-core-0:1.3.6-12.el8_3.ppc64le as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:powerpc-utils-core-0:1.3.6-12.el8_3.ppc64le" }, "product_reference": "powerpc-utils-core-0:1.3.6-12.el8_3.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "powerpc-utils-core-debuginfo-0:1.3.6-12.el8_3.ppc64le as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:powerpc-utils-core-debuginfo-0:1.3.6-12.el8_3.ppc64le" }, "product_reference": "powerpc-utils-core-debuginfo-0:1.3.6-12.el8_3.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "powerpc-utils-debugsource-0:1.3.6-12.el8_3.ppc64le as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:powerpc-utils-debugsource-0:1.3.6-12.el8_3.ppc64le" }, "product_reference": "powerpc-utils-debugsource-0:1.3.6-12.el8_3.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "pprof-0:2.6.3-2.el8ost.noarch as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:pprof-0:2.6.3-2.el8ost.noarch" }, "product_reference": "pprof-0:2.6.3-2.el8ost.noarch", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "prometheus-promu-0:0.5.0-2.git642a960.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:prometheus-promu-0:0.5.0-2.git642a960.el8.ppc64le" }, "product_reference": "prometheus-promu-0:0.5.0-2.git642a960.el8.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "prometheus-promu-0:0.5.0-2.git642a960.el8.s390x as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:prometheus-promu-0:0.5.0-2.git642a960.el8.s390x" }, "product_reference": "prometheus-promu-0:0.5.0-2.git642a960.el8.s390x", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "prometheus-promu-0:0.5.0-2.git642a960.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:prometheus-promu-0:0.5.0-2.git642a960.el8.x86_64" }, "product_reference": "prometheus-promu-0:0.5.0-2.git642a960.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "protobuf-0:3.6.1-4.el8ost.ppc64le as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:protobuf-0:3.6.1-4.el8ost.ppc64le" }, "product_reference": "protobuf-0:3.6.1-4.el8ost.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "protobuf-0:3.6.1-4.el8ost.s390x as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:protobuf-0:3.6.1-4.el8ost.s390x" }, "product_reference": "protobuf-0:3.6.1-4.el8ost.s390x", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "protobuf-0:3.6.1-4.el8ost.src as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:protobuf-0:3.6.1-4.el8ost.src" }, "product_reference": "protobuf-0:3.6.1-4.el8ost.src", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "protobuf-0:3.6.1-4.el8ost.x86_64 as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:protobuf-0:3.6.1-4.el8ost.x86_64" }, "product_reference": "protobuf-0:3.6.1-4.el8ost.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "protobuf-compiler-0:3.6.1-4.el8ost.ppc64le as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:protobuf-compiler-0:3.6.1-4.el8ost.ppc64le" }, "product_reference": "protobuf-compiler-0:3.6.1-4.el8ost.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "protobuf-compiler-0:3.6.1-4.el8ost.s390x as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:protobuf-compiler-0:3.6.1-4.el8ost.s390x" }, "product_reference": "protobuf-compiler-0:3.6.1-4.el8ost.s390x", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "protobuf-compiler-0:3.6.1-4.el8ost.x86_64 as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:protobuf-compiler-0:3.6.1-4.el8ost.x86_64" }, "product_reference": "protobuf-compiler-0:3.6.1-4.el8ost.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "protobuf-compiler-debuginfo-0:3.6.1-4.el8ost.ppc64le as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:protobuf-compiler-debuginfo-0:3.6.1-4.el8ost.ppc64le" }, "product_reference": "protobuf-compiler-debuginfo-0:3.6.1-4.el8ost.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "protobuf-compiler-debuginfo-0:3.6.1-4.el8ost.s390x as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:protobuf-compiler-debuginfo-0:3.6.1-4.el8ost.s390x" }, "product_reference": "protobuf-compiler-debuginfo-0:3.6.1-4.el8ost.s390x", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "protobuf-compiler-debuginfo-0:3.6.1-4.el8ost.x86_64 as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:protobuf-compiler-debuginfo-0:3.6.1-4.el8ost.x86_64" }, "product_reference": "protobuf-compiler-debuginfo-0:3.6.1-4.el8ost.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "protobuf-debuginfo-0:3.6.1-4.el8ost.ppc64le as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:protobuf-debuginfo-0:3.6.1-4.el8ost.ppc64le" }, "product_reference": "protobuf-debuginfo-0:3.6.1-4.el8ost.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "protobuf-debuginfo-0:3.6.1-4.el8ost.s390x as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:protobuf-debuginfo-0:3.6.1-4.el8ost.s390x" }, "product_reference": "protobuf-debuginfo-0:3.6.1-4.el8ost.s390x", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "protobuf-debuginfo-0:3.6.1-4.el8ost.x86_64 as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:protobuf-debuginfo-0:3.6.1-4.el8ost.x86_64" }, "product_reference": "protobuf-debuginfo-0:3.6.1-4.el8ost.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "protobuf-debugsource-0:3.6.1-4.el8ost.ppc64le as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:protobuf-debugsource-0:3.6.1-4.el8ost.ppc64le" }, "product_reference": "protobuf-debugsource-0:3.6.1-4.el8ost.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "protobuf-debugsource-0:3.6.1-4.el8ost.s390x as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:protobuf-debugsource-0:3.6.1-4.el8ost.s390x" }, "product_reference": "protobuf-debugsource-0:3.6.1-4.el8ost.s390x", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "protobuf-debugsource-0:3.6.1-4.el8ost.x86_64 as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:protobuf-debugsource-0:3.6.1-4.el8ost.x86_64" }, "product_reference": "protobuf-debugsource-0:3.6.1-4.el8ost.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "protobuf-devel-0:3.6.1-4.el8ost.ppc64le as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:protobuf-devel-0:3.6.1-4.el8ost.ppc64le" }, "product_reference": "protobuf-devel-0:3.6.1-4.el8ost.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "protobuf-devel-0:3.6.1-4.el8ost.s390x as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:protobuf-devel-0:3.6.1-4.el8ost.s390x" }, "product_reference": "protobuf-devel-0:3.6.1-4.el8ost.s390x", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "protobuf-devel-0:3.6.1-4.el8ost.x86_64 as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:protobuf-devel-0:3.6.1-4.el8ost.x86_64" }, "product_reference": "protobuf-devel-0:3.6.1-4.el8ost.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "protobuf-lite-0:3.6.1-4.el8ost.ppc64le as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:protobuf-lite-0:3.6.1-4.el8ost.ppc64le" }, "product_reference": "protobuf-lite-0:3.6.1-4.el8ost.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "protobuf-lite-0:3.6.1-4.el8ost.s390x as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:protobuf-lite-0:3.6.1-4.el8ost.s390x" }, "product_reference": "protobuf-lite-0:3.6.1-4.el8ost.s390x", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "protobuf-lite-0:3.6.1-4.el8ost.x86_64 as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:protobuf-lite-0:3.6.1-4.el8ost.x86_64" }, "product_reference": "protobuf-lite-0:3.6.1-4.el8ost.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "protobuf-lite-debuginfo-0:3.6.1-4.el8ost.ppc64le as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:protobuf-lite-debuginfo-0:3.6.1-4.el8ost.ppc64le" }, "product_reference": "protobuf-lite-debuginfo-0:3.6.1-4.el8ost.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "protobuf-lite-debuginfo-0:3.6.1-4.el8ost.s390x as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:protobuf-lite-debuginfo-0:3.6.1-4.el8ost.s390x" }, "product_reference": "protobuf-lite-debuginfo-0:3.6.1-4.el8ost.s390x", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "protobuf-lite-debuginfo-0:3.6.1-4.el8ost.x86_64 as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:protobuf-lite-debuginfo-0:3.6.1-4.el8ost.x86_64" }, "product_reference": "protobuf-lite-debuginfo-0:3.6.1-4.el8ost.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "protobuf-lite-devel-0:3.6.1-4.el8ost.ppc64le as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:protobuf-lite-devel-0:3.6.1-4.el8ost.ppc64le" }, "product_reference": "protobuf-lite-devel-0:3.6.1-4.el8ost.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "protobuf-lite-devel-0:3.6.1-4.el8ost.s390x as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:protobuf-lite-devel-0:3.6.1-4.el8ost.s390x" }, "product_reference": "protobuf-lite-devel-0:3.6.1-4.el8ost.s390x", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "protobuf-lite-devel-0:3.6.1-4.el8ost.x86_64 as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:protobuf-lite-devel-0:3.6.1-4.el8ost.x86_64" }, "product_reference": "protobuf-lite-devel-0:3.6.1-4.el8ost.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "protobuf-lite-static-0:3.6.1-4.el8ost.ppc64le as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:protobuf-lite-static-0:3.6.1-4.el8ost.ppc64le" }, "product_reference": "protobuf-lite-static-0:3.6.1-4.el8ost.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "protobuf-lite-static-0:3.6.1-4.el8ost.s390x as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:protobuf-lite-static-0:3.6.1-4.el8ost.s390x" }, "product_reference": "protobuf-lite-static-0:3.6.1-4.el8ost.s390x", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "protobuf-lite-static-0:3.6.1-4.el8ost.x86_64 as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:protobuf-lite-static-0:3.6.1-4.el8ost.x86_64" }, "product_reference": "protobuf-lite-static-0:3.6.1-4.el8ost.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "protobuf-static-0:3.6.1-4.el8ost.ppc64le as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:protobuf-static-0:3.6.1-4.el8ost.ppc64le" }, "product_reference": "protobuf-static-0:3.6.1-4.el8ost.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "protobuf-static-0:3.6.1-4.el8ost.s390x as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:protobuf-static-0:3.6.1-4.el8ost.s390x" }, "product_reference": "protobuf-static-0:3.6.1-4.el8ost.s390x", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "protobuf-static-0:3.6.1-4.el8ost.x86_64 as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:protobuf-static-0:3.6.1-4.el8ost.x86_64" }, "product_reference": "protobuf-static-0:3.6.1-4.el8ost.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "protobuf-vim-0:3.6.1-4.el8ost.noarch as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:protobuf-vim-0:3.6.1-4.el8ost.noarch" }, "product_reference": "protobuf-vim-0:3.6.1-4.el8ost.noarch", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "python-alembic-0:1.4.2-5.el8ost.src as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:python-alembic-0:1.4.2-5.el8ost.src" }, "product_reference": "python-alembic-0:1.4.2-5.el8ost.src", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "python-boto3-0:1.9.101-1.el8ost.src as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:python-boto3-0:1.9.101-1.el8ost.src" }, "product_reference": "python-boto3-0:1.9.101-1.el8ost.src", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "python-botocore-0:1.12.119-1.el8ost.src as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:python-botocore-0:1.12.119-1.el8ost.src" }, "product_reference": "python-botocore-0:1.12.119-1.el8ost.src", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "python-cachetools-0:3.1.0-1.el8ost.src as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:python-cachetools-0:3.1.0-1.el8ost.src" }, "product_reference": "python-cachetools-0:3.1.0-1.el8ost.src", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "python-certifi-0:2018.10.15-4.el8ost.src as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:python-certifi-0:2018.10.15-4.el8ost.src" }, "product_reference": "python-certifi-0:2018.10.15-4.el8ost.src", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "python-construct-0:2.10.56-1.el8ost.src as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:python-construct-0:2.10.56-1.el8ost.src" }, "product_reference": "python-construct-0:2.10.56-1.el8ost.src", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "python-daemon-0:2.1.2-9.el8ar.src as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:python-daemon-0:2.1.2-9.el8ar.src" }, "product_reference": "python-daemon-0:2.1.2-9.el8ar.src", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "python-debtcollector-0:2.2.0-0.20201008171245.649189d.el8.src as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:python-debtcollector-0:2.2.0-0.20201008171245.649189d.el8.src" }, "product_reference": "python-debtcollector-0:2.2.0-0.20201008171245.649189d.el8.src", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "python-dictdiffer-0:0.7.1-2.el8ost.src as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:python-dictdiffer-0:0.7.1-2.el8ost.src" }, "product_reference": "python-dictdiffer-0:0.7.1-2.el8ost.src", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "python-eventlet-0:0.25.2-3.el8ost.src as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:python-eventlet-0:0.25.2-3.el8ost.src" }, "product_reference": "python-eventlet-0:0.25.2-3.el8ost.src", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "python-flask-1:1.1.1-1.el8ost.src as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:python-flask-1:1.1.1-1.el8ost.src" }, "product_reference": "python-flask-1:1.1.1-1.el8ost.src", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "python-flask-doc-1:1.1.1-1.el8ost.noarch as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:python-flask-doc-1:1.1.1-1.el8ost.noarch" }, "product_reference": "python-flask-doc-1:1.1.1-1.el8ost.noarch", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "python-google-auth-0:1.3.0-1.el8ost.src as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:python-google-auth-0:1.3.0-1.el8ost.src" }, "product_reference": "python-google-auth-0:1.3.0-1.el8ost.src", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "python-hardware-0:0.23.0-0.20201031022149.59211cc.el8.src as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:python-hardware-0:0.23.0-0.20201031022149.59211cc.el8.src" }, "product_reference": "python-hardware-0:0.23.0-0.20201031022149.59211cc.el8.src", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "python-ifaddr-0:0.1.6-5.el8ost.src as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:python-ifaddr-0:0.1.6-5.el8ost.src" }, "product_reference": "python-ifaddr-0:0.1.6-5.el8ost.src", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "python-importlib-metadata-0:1.7.0-1.el8ost.src as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:python-importlib-metadata-0:1.7.0-1.el8ost.src" }, "product_reference": "python-importlib-metadata-0:1.7.0-1.el8ost.src", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "python-ironic-lib-0:4.4.1-0.20201218041209.aa7cfec.el8.src as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:python-ironic-lib-0:4.4.1-0.20201218041209.aa7cfec.el8.src" }, "product_reference": "python-ironic-lib-0:4.4.1-0.20201218041209.aa7cfec.el8.src", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "python-keystoneauth1-0:4.2.0-0.20200630234358.dab8e10.el8ost.src as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:python-keystoneauth1-0:4.2.0-0.20200630234358.dab8e10.el8ost.src" }, "product_reference": "python-keystoneauth1-0:4.2.0-0.20200630234358.dab8e10.el8ost.src", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "python-kubernetes-0:11.0.0-1.el8.src as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:python-kubernetes-0:11.0.0-1.el8.src" }, "product_reference": "python-kubernetes-0:11.0.0-1.el8.src", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "python-kuryr-lib-0:1.1.1-0.20190923160834.41e6964.el8ost.src as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:python-kuryr-lib-0:1.1.1-0.20190923160834.41e6964.el8ost.src" }, "product_reference": "python-kuryr-lib-0:1.1.1-0.20190923160834.41e6964.el8ost.src", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "python-lockfile-1:0.11.0-8.el8ar.src as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:python-lockfile-1:0.11.0-8.el8ar.src" }, "product_reference": "python-lockfile-1:0.11.0-8.el8ar.src", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "python-msgpack-0:0.6.2-1.el8ost.src as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:python-msgpack-0:0.6.2-1.el8ost.src" }, "product_reference": "python-msgpack-0:0.6.2-1.el8ost.src", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "python-msgpack-debugsource-0:0.6.2-1.el8ost.x86_64 as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:python-msgpack-debugsource-0:0.6.2-1.el8ost.x86_64" }, "product_reference": "python-msgpack-debugsource-0:0.6.2-1.el8ost.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "python-openshift-1:0.11.2-1.el8.src as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:python-openshift-1:0.11.2-1.el8.src" }, "product_reference": "python-openshift-1:0.11.2-1.el8.src", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "python-openstacksdk-0:0.48.0-0.20200708092906.3b693c2.el8ost.src as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:python-openstacksdk-0:0.48.0-0.20200708092906.3b693c2.el8ost.src" }, "product_reference": "python-openstacksdk-0:0.48.0-0.20200708092906.3b693c2.el8ost.src", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "python-oslo-concurrency-0:4.3.0-0.20201008180343.2f78803.el8.src as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:python-oslo-concurrency-0:4.3.0-0.20201008180343.2f78803.el8.src" }, "product_reference": "python-oslo-concurrency-0:4.3.0-0.20201008180343.2f78803.el8.src", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "python-oslo-concurrency-lang-0:4.3.0-0.20201008180343.2f78803.el8.noarch as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:python-oslo-concurrency-lang-0:4.3.0-0.20201008180343.2f78803.el8.noarch" }, "product_reference": "python-oslo-concurrency-lang-0:4.3.0-0.20201008180343.2f78803.el8.noarch", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "python-oslo-config-2:8.3.2-0.20201008180634.fcb8894.el8.src as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:python-oslo-config-2:8.3.2-0.20201008180634.fcb8894.el8.src" }, "product_reference": "python-oslo-config-2:8.3.2-0.20201008180634.fcb8894.el8.src", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "python-oslo-context-0:3.1.1-0.20201008190523.57dbded.el8.src as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:python-oslo-context-0:3.1.1-0.20201008190523.57dbded.el8.src" }, "product_reference": "python-oslo-context-0:3.1.1-0.20201008190523.57dbded.el8.src", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "python-oslo-db-0:8.4.0-0.20200918104110.e42c733.el8ost.src as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:python-oslo-db-0:8.4.0-0.20200918104110.e42c733.el8ost.src" }, "product_reference": "python-oslo-db-0:8.4.0-0.20200918104110.e42c733.el8ost.src", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "python-oslo-db-lang-0:8.4.0-0.20200918104110.e42c733.el8ost.noarch as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:python-oslo-db-lang-0:8.4.0-0.20200918104110.e42c733.el8ost.noarch" }, "product_reference": "python-oslo-db-lang-0:8.4.0-0.20200918104110.e42c733.el8ost.noarch", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "python-oslo-i18n-0:5.0.1-0.20201009131251.73187bd.el8.src as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:python-oslo-i18n-0:5.0.1-0.20201009131251.73187bd.el8.src" }, "product_reference": "python-oslo-i18n-0:5.0.1-0.20201009131251.73187bd.el8.src", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "python-oslo-i18n-lang-0:5.0.1-0.20201009131251.73187bd.el8.noarch as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:python-oslo-i18n-lang-0:5.0.1-0.20201009131251.73187bd.el8.noarch" }, "product_reference": "python-oslo-i18n-lang-0:5.0.1-0.20201009131251.73187bd.el8.noarch", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "python-oslo-log-0:4.3.1-0.20201207021200.1597f24.el8.src as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:python-oslo-log-0:4.3.1-0.20201207021200.1597f24.el8.src" }, "product_reference": "python-oslo-log-0:4.3.1-0.20201207021200.1597f24.el8.src", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "python-oslo-log-lang-0:4.3.1-0.20201207021200.1597f24.el8.noarch as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:python-oslo-log-lang-0:4.3.1-0.20201207021200.1597f24.el8.noarch" }, "product_reference": "python-oslo-log-lang-0:4.3.1-0.20201207021200.1597f24.el8.noarch", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "python-oslo-serialization-0:4.0.1-0.20201008182423.c7884b2.el8.src as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:python-oslo-serialization-0:4.0.1-0.20201008182423.c7884b2.el8.src" }, "product_reference": "python-oslo-serialization-0:4.0.1-0.20201008182423.c7884b2.el8.src", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "python-oslo-service-0:2.4.0-0.20201008184547.58466a6.el8.src as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:python-oslo-service-0:2.4.0-0.20201008184547.58466a6.el8.src" }, "product_reference": "python-oslo-service-0:2.4.0-0.20201008184547.58466a6.el8.src", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "python-oslo-utils-0:4.6.0-0.20201009175936.91497da.el8.src as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:python-oslo-utils-0:4.6.0-0.20201009175936.91497da.el8.src" }, "product_reference": "python-oslo-utils-0:4.6.0-0.20201009175936.91497da.el8.src", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "python-oslo-utils-lang-0:4.6.0-0.20201009175936.91497da.el8.noarch as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:python-oslo-utils-lang-0:4.6.0-0.20201009175936.91497da.el8.noarch" }, "product_reference": "python-oslo-utils-lang-0:4.6.0-0.20201009175936.91497da.el8.noarch", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "python-packaging-0:20.4-1.el8ost.src as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:python-packaging-0:20.4-1.el8ost.src" }, "product_reference": "python-packaging-0:20.4-1.el8ost.src", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "python-packaging-doc-0:20.4-1.el8ost.noarch as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:python-packaging-doc-0:20.4-1.el8ost.noarch" }, "product_reference": "python-packaging-doc-0:20.4-1.el8ost.noarch", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "python-paste-0:3.2.4-1.el8ost.src as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:python-paste-0:3.2.4-1.el8ost.src" }, "product_reference": "python-paste-0:3.2.4-1.el8ost.src", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "python-paste-deploy-0:2.0.1-4.el8ost.src as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:python-paste-deploy-0:2.0.1-4.el8ost.src" }, "product_reference": "python-paste-deploy-0:2.0.1-4.el8ost.src", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "python-pbr-0:5.4.3-2.el8ost.src as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:python-pbr-0:5.4.3-2.el8ost.src" }, "product_reference": "python-pbr-0:5.4.3-2.el8ost.src", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "python-pexpect-0:4.6-2.el8ar.src as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:python-pexpect-0:4.6-2.el8ar.src" }, "product_reference": "python-pexpect-0:4.6-2.el8ar.src", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "python-pint-0:0.10.1-1.el8ost.src as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:python-pint-0:0.10.1-1.el8ost.src" }, "product_reference": "python-pint-0:0.10.1-1.el8ost.src", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "python-psutil-0:5.6.6-1.el8ar.src as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:python-psutil-0:5.6.6-1.el8ar.src" }, "product_reference": "python-psutil-0:5.6.6-1.el8ar.src", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "python-psutil-debugsource-0:5.6.6-1.el8ar.ppc64le as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:python-psutil-debugsource-0:5.6.6-1.el8ar.ppc64le" }, "product_reference": "python-psutil-debugsource-0:5.6.6-1.el8ar.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "python-psutil-debugsource-0:5.6.6-1.el8ar.s390x as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:python-psutil-debugsource-0:5.6.6-1.el8ar.s390x" }, "product_reference": "python-psutil-debugsource-0:5.6.6-1.el8ar.s390x", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "python-psutil-debugsource-0:5.6.6-1.el8ar.x86_64 as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:python-psutil-debugsource-0:5.6.6-1.el8ar.x86_64" }, "product_reference": "python-psutil-debugsource-0:5.6.6-1.el8ar.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "python-pyghmi-0:1.5.14-2.1.el8ost.src as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:python-pyghmi-0:1.5.14-2.1.el8ost.src" }, "product_reference": "python-pyghmi-0:1.5.14-2.1.el8ost.src", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "python-pyroute2-0:0.5.13-1.el8ost.src as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:python-pyroute2-0:0.5.13-1.el8ost.src" }, "product_reference": "python-pyroute2-0:0.5.13-1.el8ost.src", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "python-requests-unixsocket-0:0.1.5-5.el8ar.src as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:python-requests-unixsocket-0:0.1.5-5.el8ar.src" }, "product_reference": "python-requests-unixsocket-0:0.1.5-5.el8ar.src", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "python-rsa-0:4.7-1.el8.src as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:python-rsa-0:4.7-1.el8.src" }, "product_reference": "python-rsa-0:4.7-1.el8.src", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "python-ruamel-yaml-0:0.15.41-4.el8ost.src as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:python-ruamel-yaml-0:0.15.41-4.el8ost.src" }, "product_reference": "python-ruamel-yaml-0:0.15.41-4.el8ost.src", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "python-ruamel-yaml-debugsource-0:0.15.41-4.el8ost.ppc64le as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:python-ruamel-yaml-debugsource-0:0.15.41-4.el8ost.ppc64le" }, "product_reference": "python-ruamel-yaml-debugsource-0:0.15.41-4.el8ost.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "python-ruamel-yaml-debugsource-0:0.15.41-4.el8ost.s390x as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:python-ruamel-yaml-debugsource-0:0.15.41-4.el8ost.s390x" }, "product_reference": "python-ruamel-yaml-debugsource-0:0.15.41-4.el8ost.s390x", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "python-ruamel-yaml-debugsource-0:0.15.41-4.el8ost.x86_64 as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:python-ruamel-yaml-debugsource-0:0.15.41-4.el8ost.x86_64" }, "product_reference": "python-ruamel-yaml-debugsource-0:0.15.41-4.el8ost.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "python-s3transfer-0:0.2.0-1.el8ost.src as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:python-s3transfer-0:0.2.0-1.el8ost.src" }, "product_reference": "python-s3transfer-0:0.2.0-1.el8ost.src", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "python-stevedore-0:3.2.2-0.20201009151242.274eaa6.el8.src as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:python-stevedore-0:3.2.2-0.20201009151242.274eaa6.el8.src" }, "product_reference": "python-stevedore-0:3.2.2-0.20201009151242.274eaa6.el8.src", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "python-string_utils-0:0.6.0-4.el8ost.src as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:python-string_utils-0:0.6.0-4.el8ost.src" }, "product_reference": "python-string_utils-0:0.6.0-4.el8ost.src", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "python-sushy-0:3.6.1-0.20210122201213.7ec0422.el8.src as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:python-sushy-0:3.6.1-0.20210122201213.7ec0422.el8.src" }, "product_reference": "python-sushy-0:3.6.1-0.20210122201213.7ec0422.el8.src", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "python-sushy-oem-idrac-0:0.0.3-0.20200922221223.1202372.el8ost.src as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:python-sushy-oem-idrac-0:0.0.3-0.20200922221223.1202372.el8ost.src" }, "product_reference": "python-sushy-oem-idrac-0:0.0.3-0.20200922221223.1202372.el8ost.src", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "python-tenacity-0:6.2.0-1.el8ost.src as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:python-tenacity-0:6.2.0-1.el8ost.src" }, "product_reference": "python-tenacity-0:6.2.0-1.el8ost.src", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "python-tooz-0:2.7.0-0.20200723133754.fca43df.el8ost.src as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:python-tooz-0:2.7.0-0.20200723133754.fca43df.el8ost.src" }, "product_reference": "python-tooz-0:2.7.0-0.20200723133754.fca43df.el8ost.src", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "python-websocket-client-0:0.54.0-1.el8ost.src as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:python-websocket-client-0:0.54.0-1.el8ost.src" }, "product_reference": "python-websocket-client-0:0.54.0-1.el8ost.src", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "python-werkzeug-0:1.0.1-3.el8ost.src as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:python-werkzeug-0:1.0.1-3.el8ost.src" }, "product_reference": "python-werkzeug-0:1.0.1-3.el8ost.src", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "python-zeroconf-0:0.24.4-1.el8ost.src as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:python-zeroconf-0:0.24.4-1.el8ost.src" }, "product_reference": "python-zeroconf-0:0.24.4-1.el8ost.src", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "python-zipp-0:0.5.1-2.el8ost.src as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:python-zipp-0:0.5.1-2.el8ost.src" }, "product_reference": "python-zipp-0:0.5.1-2.el8ost.src", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "python2-botocore-0:1.12.119-1.el8ost.noarch as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:python2-botocore-0:1.12.119-1.el8ost.noarch" }, "product_reference": "python2-botocore-0:1.12.119-1.el8ost.noarch", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "python2-cachetools-0:3.1.0-1.el8ost.noarch as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:python2-cachetools-0:3.1.0-1.el8ost.noarch" }, "product_reference": "python2-cachetools-0:3.1.0-1.el8ost.noarch", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "python3-alembic-0:1.4.2-5.el8ost.noarch as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:python3-alembic-0:1.4.2-5.el8ost.noarch" }, "product_reference": "python3-alembic-0:1.4.2-5.el8ost.noarch", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "python3-ansible-runner-0:1.4.6-2.el8ar.noarch as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:python3-ansible-runner-0:1.4.6-2.el8ar.noarch" }, "product_reference": "python3-ansible-runner-0:1.4.6-2.el8ar.noarch", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "python3-boto3-0:1.9.101-1.el8ost.noarch as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:python3-boto3-0:1.9.101-1.el8ost.noarch" }, "product_reference": "python3-boto3-0:1.9.101-1.el8ost.noarch", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "python3-botocore-0:1.12.119-1.el8ost.noarch as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:python3-botocore-0:1.12.119-1.el8ost.noarch" }, "product_reference": "python3-botocore-0:1.12.119-1.el8ost.noarch", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "python3-cachetools-0:3.1.0-1.el8ost.noarch as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:python3-cachetools-0:3.1.0-1.el8ost.noarch" }, "product_reference": "python3-cachetools-0:3.1.0-1.el8ost.noarch", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "python3-certifi-0:2018.10.15-4.el8ost.noarch as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:python3-certifi-0:2018.10.15-4.el8ost.noarch" }, "product_reference": "python3-certifi-0:2018.10.15-4.el8ost.noarch", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "python3-construct-0:2.10.56-1.el8ost.noarch as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:python3-construct-0:2.10.56-1.el8ost.noarch" }, "product_reference": "python3-construct-0:2.10.56-1.el8ost.noarch", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "python3-daemon-0:2.1.2-9.el8ar.noarch as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:python3-daemon-0:2.1.2-9.el8ar.noarch" }, "product_reference": "python3-daemon-0:2.1.2-9.el8ar.noarch", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "python3-debtcollector-0:2.2.0-0.20201008171245.649189d.el8.noarch as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:python3-debtcollector-0:2.2.0-0.20201008171245.649189d.el8.noarch" }, "product_reference": "python3-debtcollector-0:2.2.0-0.20201008171245.649189d.el8.noarch", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "python3-dictdiffer-0:0.7.1-2.el8ost.noarch as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:python3-dictdiffer-0:0.7.1-2.el8ost.noarch" }, "product_reference": "python3-dictdiffer-0:0.7.1-2.el8ost.noarch", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "python3-eventlet-0:0.25.2-3.el8ost.noarch as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:python3-eventlet-0:0.25.2-3.el8ost.noarch" }, "product_reference": "python3-eventlet-0:0.25.2-3.el8ost.noarch", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "python3-flask-1:1.1.1-1.el8ost.noarch as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:python3-flask-1:1.1.1-1.el8ost.noarch" }, "product_reference": "python3-flask-1:1.1.1-1.el8ost.noarch", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "python3-google-auth-0:1.3.0-1.el8ost.noarch as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:python3-google-auth-0:1.3.0-1.el8ost.noarch" }, "product_reference": "python3-google-auth-0:1.3.0-1.el8ost.noarch", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "python3-grpcio-0:1.18.0-4.el8ost.ppc64le as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:python3-grpcio-0:1.18.0-4.el8ost.ppc64le" }, "product_reference": "python3-grpcio-0:1.18.0-4.el8ost.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "python3-grpcio-0:1.18.0-4.el8ost.s390x as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:python3-grpcio-0:1.18.0-4.el8ost.s390x" }, "product_reference": "python3-grpcio-0:1.18.0-4.el8ost.s390x", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "python3-grpcio-0:1.18.0-4.el8ost.x86_64 as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:python3-grpcio-0:1.18.0-4.el8ost.x86_64" }, "product_reference": "python3-grpcio-0:1.18.0-4.el8ost.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "python3-grpcio-debuginfo-0:1.18.0-4.el8ost.ppc64le as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:python3-grpcio-debuginfo-0:1.18.0-4.el8ost.ppc64le" }, "product_reference": "python3-grpcio-debuginfo-0:1.18.0-4.el8ost.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "python3-grpcio-debuginfo-0:1.18.0-4.el8ost.s390x as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:python3-grpcio-debuginfo-0:1.18.0-4.el8ost.s390x" }, "product_reference": "python3-grpcio-debuginfo-0:1.18.0-4.el8ost.s390x", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "python3-grpcio-debuginfo-0:1.18.0-4.el8ost.x86_64 as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:python3-grpcio-debuginfo-0:1.18.0-4.el8ost.x86_64" }, "product_reference": "python3-grpcio-debuginfo-0:1.18.0-4.el8ost.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "python3-hardware-0:0.23.0-0.20201031022149.59211cc.el8.noarch as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:python3-hardware-0:0.23.0-0.20201031022149.59211cc.el8.noarch" }, "product_reference": "python3-hardware-0:0.23.0-0.20201031022149.59211cc.el8.noarch", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "python3-hardware-detect-0:0.23.0-0.20201031022149.59211cc.el8.noarch as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:python3-hardware-detect-0:0.23.0-0.20201031022149.59211cc.el8.noarch" }, "product_reference": "python3-hardware-detect-0:0.23.0-0.20201031022149.59211cc.el8.noarch", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "python3-ifaddr-0:0.1.6-5.el8ost.noarch as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:python3-ifaddr-0:0.1.6-5.el8ost.noarch" }, "product_reference": "python3-ifaddr-0:0.1.6-5.el8ost.noarch", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "python3-importlib-metadata-0:1.7.0-1.el8ost.noarch as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:python3-importlib-metadata-0:1.7.0-1.el8ost.noarch" }, "product_reference": "python3-importlib-metadata-0:1.7.0-1.el8ost.noarch", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "python3-ironic-inspector-tests-0:10.4.1-0.20201123161216.70fccec.el8.noarch as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:python3-ironic-inspector-tests-0:10.4.1-0.20201123161216.70fccec.el8.noarch" }, "product_reference": "python3-ironic-inspector-tests-0:10.4.1-0.20201123161216.70fccec.el8.noarch", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "python3-ironic-lib-0:4.4.1-0.20201218041209.aa7cfec.el8.noarch as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:python3-ironic-lib-0:4.4.1-0.20201218041209.aa7cfec.el8.noarch" }, "product_reference": "python3-ironic-lib-0:4.4.1-0.20201218041209.aa7cfec.el8.noarch", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "python3-ironic-python-agent-0:6.4.3-0.20201217171210.bd45db1.el8.noarch as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:python3-ironic-python-agent-0:6.4.3-0.20201217171210.bd45db1.el8.noarch" }, "product_reference": "python3-ironic-python-agent-0:6.4.3-0.20201217171210.bd45db1.el8.noarch", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "python3-ironic-tests-1:16.0.4-0.20210203051223.7d74ea0.el8.noarch as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:python3-ironic-tests-1:16.0.4-0.20210203051223.7d74ea0.el8.noarch" }, "product_reference": "python3-ironic-tests-1:16.0.4-0.20210203051223.7d74ea0.el8.noarch", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "python3-keystoneauth1-0:4.2.0-0.20200630234358.dab8e10.el8ost.noarch as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:python3-keystoneauth1-0:4.2.0-0.20200630234358.dab8e10.el8ost.noarch" }, "product_reference": "python3-keystoneauth1-0:4.2.0-0.20200630234358.dab8e10.el8ost.noarch", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "python3-kubernetes-0:11.0.0-1.el8.noarch as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:python3-kubernetes-0:11.0.0-1.el8.noarch" }, "product_reference": "python3-kubernetes-0:11.0.0-1.el8.noarch", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "python3-kubernetes-tests-0:11.0.0-1.el8.noarch as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:python3-kubernetes-tests-0:11.0.0-1.el8.noarch" }, "product_reference": "python3-kubernetes-tests-0:11.0.0-1.el8.noarch", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "python3-kuryr-kubernetes-0:4.7.0-202101262230.p0.git.2494.cd95ce5.el8.noarch as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:python3-kuryr-kubernetes-0:4.7.0-202101262230.p0.git.2494.cd95ce5.el8.noarch" }, "product_reference": "python3-kuryr-kubernetes-0:4.7.0-202101262230.p0.git.2494.cd95ce5.el8.noarch", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "python3-kuryr-lib-0:1.1.1-0.20190923160834.41e6964.el8ost.noarch as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:python3-kuryr-lib-0:1.1.1-0.20190923160834.41e6964.el8ost.noarch" }, "product_reference": "python3-kuryr-lib-0:1.1.1-0.20190923160834.41e6964.el8ost.noarch", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "python3-kuryr-lib-tests-0:1.1.1-0.20190923160834.41e6964.el8ost.noarch as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:python3-kuryr-lib-tests-0:1.1.1-0.20190923160834.41e6964.el8ost.noarch" }, "product_reference": "python3-kuryr-lib-tests-0:1.1.1-0.20190923160834.41e6964.el8ost.noarch", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "python3-lockfile-1:0.11.0-8.el8ar.noarch as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:python3-lockfile-1:0.11.0-8.el8ar.noarch" }, "product_reference": "python3-lockfile-1:0.11.0-8.el8ar.noarch", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "python3-msgpack-0:0.6.2-1.el8ost.x86_64 as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:python3-msgpack-0:0.6.2-1.el8ost.x86_64" }, "product_reference": "python3-msgpack-0:0.6.2-1.el8ost.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "python3-msgpack-debuginfo-0:0.6.2-1.el8ost.x86_64 as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:python3-msgpack-debuginfo-0:0.6.2-1.el8ost.x86_64" }, "product_reference": "python3-msgpack-debuginfo-0:0.6.2-1.el8ost.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "python3-openshift-1:0.11.2-1.el8.noarch as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:python3-openshift-1:0.11.2-1.el8.noarch" }, "product_reference": "python3-openshift-1:0.11.2-1.el8.noarch", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "python3-openstacksdk-0:0.48.0-0.20200708092906.3b693c2.el8ost.noarch as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:python3-openstacksdk-0:0.48.0-0.20200708092906.3b693c2.el8ost.noarch" }, "product_reference": "python3-openstacksdk-0:0.48.0-0.20200708092906.3b693c2.el8ost.noarch", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "python3-openstacksdk-tests-0:0.48.0-0.20200708092906.3b693c2.el8ost.noarch as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:python3-openstacksdk-tests-0:0.48.0-0.20200708092906.3b693c2.el8ost.noarch" }, "product_reference": "python3-openstacksdk-tests-0:0.48.0-0.20200708092906.3b693c2.el8ost.noarch", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "python3-openvswitch2.13-0:2.13.0-79.el8fdp.ppc64le as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:python3-openvswitch2.13-0:2.13.0-79.el8fdp.ppc64le" }, "product_reference": "python3-openvswitch2.13-0:2.13.0-79.el8fdp.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "python3-openvswitch2.13-0:2.13.0-79.el8fdp.s390x as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:python3-openvswitch2.13-0:2.13.0-79.el8fdp.s390x" }, "product_reference": "python3-openvswitch2.13-0:2.13.0-79.el8fdp.s390x", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "python3-openvswitch2.13-0:2.13.0-79.el8fdp.x86_64 as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:python3-openvswitch2.13-0:2.13.0-79.el8fdp.x86_64" }, "product_reference": "python3-openvswitch2.13-0:2.13.0-79.el8fdp.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "python3-openvswitch2.13-debuginfo-0:2.13.0-79.el8fdp.ppc64le as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:python3-openvswitch2.13-debuginfo-0:2.13.0-79.el8fdp.ppc64le" }, "product_reference": "python3-openvswitch2.13-debuginfo-0:2.13.0-79.el8fdp.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "python3-openvswitch2.13-debuginfo-0:2.13.0-79.el8fdp.s390x as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:python3-openvswitch2.13-debuginfo-0:2.13.0-79.el8fdp.s390x" }, "product_reference": "python3-openvswitch2.13-debuginfo-0:2.13.0-79.el8fdp.s390x", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "python3-openvswitch2.13-debuginfo-0:2.13.0-79.el8fdp.x86_64 as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:python3-openvswitch2.13-debuginfo-0:2.13.0-79.el8fdp.x86_64" }, "product_reference": "python3-openvswitch2.13-debuginfo-0:2.13.0-79.el8fdp.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "python3-oslo-concurrency-0:4.3.0-0.20201008180343.2f78803.el8.noarch as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:python3-oslo-concurrency-0:4.3.0-0.20201008180343.2f78803.el8.noarch" }, "product_reference": "python3-oslo-concurrency-0:4.3.0-0.20201008180343.2f78803.el8.noarch", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "python3-oslo-concurrency-tests-0:4.3.0-0.20201008180343.2f78803.el8.noarch as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:python3-oslo-concurrency-tests-0:4.3.0-0.20201008180343.2f78803.el8.noarch" }, "product_reference": "python3-oslo-concurrency-tests-0:4.3.0-0.20201008180343.2f78803.el8.noarch", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "python3-oslo-config-2:8.3.2-0.20201008180634.fcb8894.el8.noarch as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:python3-oslo-config-2:8.3.2-0.20201008180634.fcb8894.el8.noarch" }, "product_reference": "python3-oslo-config-2:8.3.2-0.20201008180634.fcb8894.el8.noarch", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "python3-oslo-context-0:3.1.1-0.20201008190523.57dbded.el8.noarch as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:python3-oslo-context-0:3.1.1-0.20201008190523.57dbded.el8.noarch" }, "product_reference": "python3-oslo-context-0:3.1.1-0.20201008190523.57dbded.el8.noarch", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "python3-oslo-context-tests-0:3.1.1-0.20201008190523.57dbded.el8.noarch as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:python3-oslo-context-tests-0:3.1.1-0.20201008190523.57dbded.el8.noarch" }, "product_reference": "python3-oslo-context-tests-0:3.1.1-0.20201008190523.57dbded.el8.noarch", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "python3-oslo-db-0:8.4.0-0.20200918104110.e42c733.el8ost.noarch as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:python3-oslo-db-0:8.4.0-0.20200918104110.e42c733.el8ost.noarch" }, "product_reference": "python3-oslo-db-0:8.4.0-0.20200918104110.e42c733.el8ost.noarch", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "python3-oslo-db-tests-0:8.4.0-0.20200918104110.e42c733.el8ost.noarch as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:python3-oslo-db-tests-0:8.4.0-0.20200918104110.e42c733.el8ost.noarch" }, "product_reference": "python3-oslo-db-tests-0:8.4.0-0.20200918104110.e42c733.el8ost.noarch", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "python3-oslo-i18n-0:5.0.1-0.20201009131251.73187bd.el8.noarch as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:python3-oslo-i18n-0:5.0.1-0.20201009131251.73187bd.el8.noarch" }, "product_reference": "python3-oslo-i18n-0:5.0.1-0.20201009131251.73187bd.el8.noarch", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "python3-oslo-log-0:4.3.1-0.20201207021200.1597f24.el8.noarch as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:python3-oslo-log-0:4.3.1-0.20201207021200.1597f24.el8.noarch" }, "product_reference": "python3-oslo-log-0:4.3.1-0.20201207021200.1597f24.el8.noarch", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "python3-oslo-log-tests-0:4.3.1-0.20201207021200.1597f24.el8.noarch as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:python3-oslo-log-tests-0:4.3.1-0.20201207021200.1597f24.el8.noarch" }, "product_reference": "python3-oslo-log-tests-0:4.3.1-0.20201207021200.1597f24.el8.noarch", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "python3-oslo-serialization-0:4.0.1-0.20201008182423.c7884b2.el8.noarch as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:python3-oslo-serialization-0:4.0.1-0.20201008182423.c7884b2.el8.noarch" }, "product_reference": "python3-oslo-serialization-0:4.0.1-0.20201008182423.c7884b2.el8.noarch", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "python3-oslo-serialization-tests-0:4.0.1-0.20201008182423.c7884b2.el8.noarch as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:python3-oslo-serialization-tests-0:4.0.1-0.20201008182423.c7884b2.el8.noarch" }, "product_reference": "python3-oslo-serialization-tests-0:4.0.1-0.20201008182423.c7884b2.el8.noarch", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "python3-oslo-service-0:2.4.0-0.20201008184547.58466a6.el8.noarch as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:python3-oslo-service-0:2.4.0-0.20201008184547.58466a6.el8.noarch" }, "product_reference": "python3-oslo-service-0:2.4.0-0.20201008184547.58466a6.el8.noarch", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "python3-oslo-service-tests-0:2.4.0-0.20201008184547.58466a6.el8.noarch as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:python3-oslo-service-tests-0:2.4.0-0.20201008184547.58466a6.el8.noarch" }, "product_reference": "python3-oslo-service-tests-0:2.4.0-0.20201008184547.58466a6.el8.noarch", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "python3-oslo-utils-0:4.6.0-0.20201009175936.91497da.el8.noarch as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:python3-oslo-utils-0:4.6.0-0.20201009175936.91497da.el8.noarch" }, "product_reference": "python3-oslo-utils-0:4.6.0-0.20201009175936.91497da.el8.noarch", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "python3-oslo-utils-tests-0:4.6.0-0.20201009175936.91497da.el8.noarch as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:python3-oslo-utils-tests-0:4.6.0-0.20201009175936.91497da.el8.noarch" }, "product_reference": "python3-oslo-utils-tests-0:4.6.0-0.20201009175936.91497da.el8.noarch", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "python3-packaging-0:20.4-1.el8ost.noarch as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:python3-packaging-0:20.4-1.el8ost.noarch" }, "product_reference": "python3-packaging-0:20.4-1.el8ost.noarch", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "python3-paste-0:3.2.4-1.el8ost.noarch as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:python3-paste-0:3.2.4-1.el8ost.noarch" }, "product_reference": "python3-paste-0:3.2.4-1.el8ost.noarch", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "python3-paste-deploy-0:2.0.1-4.el8ost.noarch as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:python3-paste-deploy-0:2.0.1-4.el8ost.noarch" }, "product_reference": "python3-paste-deploy-0:2.0.1-4.el8ost.noarch", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "python3-pbr-0:5.4.3-2.el8ost.noarch as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:python3-pbr-0:5.4.3-2.el8ost.noarch" }, "product_reference": "python3-pbr-0:5.4.3-2.el8ost.noarch", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "python3-pexpect-0:4.6-2.el8ar.noarch as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:python3-pexpect-0:4.6-2.el8ar.noarch" }, "product_reference": "python3-pexpect-0:4.6-2.el8ar.noarch", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "python3-pint-0:0.10.1-1.el8ost.noarch as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:python3-pint-0:0.10.1-1.el8ost.noarch" }, "product_reference": "python3-pint-0:0.10.1-1.el8ost.noarch", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "python3-protobuf-0:3.6.1-4.el8ost.noarch as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:python3-protobuf-0:3.6.1-4.el8ost.noarch" }, "product_reference": "python3-protobuf-0:3.6.1-4.el8ost.noarch", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "python3-psutil-0:5.6.6-1.el8ar.ppc64le as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:python3-psutil-0:5.6.6-1.el8ar.ppc64le" }, "product_reference": "python3-psutil-0:5.6.6-1.el8ar.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "python3-psutil-0:5.6.6-1.el8ar.s390x as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:python3-psutil-0:5.6.6-1.el8ar.s390x" }, "product_reference": "python3-psutil-0:5.6.6-1.el8ar.s390x", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "python3-psutil-0:5.6.6-1.el8ar.x86_64 as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:python3-psutil-0:5.6.6-1.el8ar.x86_64" }, "product_reference": "python3-psutil-0:5.6.6-1.el8ar.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "python3-psutil-debuginfo-0:5.6.6-1.el8ar.ppc64le as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:python3-psutil-debuginfo-0:5.6.6-1.el8ar.ppc64le" }, "product_reference": "python3-psutil-debuginfo-0:5.6.6-1.el8ar.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "python3-psutil-debuginfo-0:5.6.6-1.el8ar.s390x as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:python3-psutil-debuginfo-0:5.6.6-1.el8ar.s390x" }, "product_reference": "python3-psutil-debuginfo-0:5.6.6-1.el8ar.s390x", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "python3-psutil-debuginfo-0:5.6.6-1.el8ar.x86_64 as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:python3-psutil-debuginfo-0:5.6.6-1.el8ar.x86_64" }, "product_reference": "python3-psutil-debuginfo-0:5.6.6-1.el8ar.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "python3-pyghmi-0:1.5.14-2.1.el8ost.noarch as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:python3-pyghmi-0:1.5.14-2.1.el8ost.noarch" }, "product_reference": "python3-pyghmi-0:1.5.14-2.1.el8ost.noarch", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "python3-pyroute2-0:0.5.13-1.el8ost.noarch as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:python3-pyroute2-0:0.5.13-1.el8ost.noarch" }, "product_reference": "python3-pyroute2-0:0.5.13-1.el8ost.noarch", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "python3-requests-unixsocket-0:0.1.5-5.el8ar.noarch as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:python3-requests-unixsocket-0:0.1.5-5.el8ar.noarch" }, "product_reference": "python3-requests-unixsocket-0:0.1.5-5.el8ar.noarch", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "python3-rsa-0:4.7-1.el8.noarch as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:python3-rsa-0:4.7-1.el8.noarch" }, "product_reference": "python3-rsa-0:4.7-1.el8.noarch", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "python3-ruamel-yaml-0:0.15.41-4.el8ost.ppc64le as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:python3-ruamel-yaml-0:0.15.41-4.el8ost.ppc64le" }, "product_reference": "python3-ruamel-yaml-0:0.15.41-4.el8ost.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "python3-ruamel-yaml-0:0.15.41-4.el8ost.s390x as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:python3-ruamel-yaml-0:0.15.41-4.el8ost.s390x" }, "product_reference": "python3-ruamel-yaml-0:0.15.41-4.el8ost.s390x", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "python3-ruamel-yaml-0:0.15.41-4.el8ost.x86_64 as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:python3-ruamel-yaml-0:0.15.41-4.el8ost.x86_64" }, "product_reference": "python3-ruamel-yaml-0:0.15.41-4.el8ost.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "python3-ruamel-yaml-debuginfo-0:0.15.41-4.el8ost.ppc64le as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:python3-ruamel-yaml-debuginfo-0:0.15.41-4.el8ost.ppc64le" }, "product_reference": "python3-ruamel-yaml-debuginfo-0:0.15.41-4.el8ost.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "python3-ruamel-yaml-debuginfo-0:0.15.41-4.el8ost.s390x as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:python3-ruamel-yaml-debuginfo-0:0.15.41-4.el8ost.s390x" }, "product_reference": "python3-ruamel-yaml-debuginfo-0:0.15.41-4.el8ost.s390x", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "python3-ruamel-yaml-debuginfo-0:0.15.41-4.el8ost.x86_64 as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:python3-ruamel-yaml-debuginfo-0:0.15.41-4.el8ost.x86_64" }, "product_reference": "python3-ruamel-yaml-debuginfo-0:0.15.41-4.el8ost.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "python3-s3transfer-0:0.2.0-1.el8ost.noarch as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:python3-s3transfer-0:0.2.0-1.el8ost.noarch" }, "product_reference": "python3-s3transfer-0:0.2.0-1.el8ost.noarch", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "python3-stevedore-0:3.2.2-0.20201009151242.274eaa6.el8.noarch as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:python3-stevedore-0:3.2.2-0.20201009151242.274eaa6.el8.noarch" }, "product_reference": "python3-stevedore-0:3.2.2-0.20201009151242.274eaa6.el8.noarch", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "python3-string_utils-0:0.6.0-4.el8ost.noarch as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:python3-string_utils-0:0.6.0-4.el8ost.noarch" }, "product_reference": "python3-string_utils-0:0.6.0-4.el8ost.noarch", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "python3-sushy-0:3.6.1-0.20210122201213.7ec0422.el8.noarch as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:python3-sushy-0:3.6.1-0.20210122201213.7ec0422.el8.noarch" }, "product_reference": "python3-sushy-0:3.6.1-0.20210122201213.7ec0422.el8.noarch", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "python3-sushy-oem-idrac-0:0.0.3-0.20200922221223.1202372.el8ost.noarch as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:python3-sushy-oem-idrac-0:0.0.3-0.20200922221223.1202372.el8ost.noarch" }, "product_reference": "python3-sushy-oem-idrac-0:0.0.3-0.20200922221223.1202372.el8ost.noarch", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "python3-sushy-oem-idrac-tests-0:0.0.3-0.20200922221223.1202372.el8ost.noarch as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:python3-sushy-oem-idrac-tests-0:0.0.3-0.20200922221223.1202372.el8ost.noarch" }, "product_reference": "python3-sushy-oem-idrac-tests-0:0.0.3-0.20200922221223.1202372.el8ost.noarch", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "python3-sushy-tests-0:3.6.1-0.20210122201213.7ec0422.el8.noarch as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:python3-sushy-tests-0:3.6.1-0.20210122201213.7ec0422.el8.noarch" }, "product_reference": "python3-sushy-tests-0:3.6.1-0.20210122201213.7ec0422.el8.noarch", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "python3-tenacity-0:6.2.0-1.el8ost.noarch as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:python3-tenacity-0:6.2.0-1.el8ost.noarch" }, "product_reference": "python3-tenacity-0:6.2.0-1.el8ost.noarch", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "python3-tooz-0:2.7.0-0.20200723133754.fca43df.el8ost.noarch as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:python3-tooz-0:2.7.0-0.20200723133754.fca43df.el8ost.noarch" }, "product_reference": "python3-tooz-0:2.7.0-0.20200723133754.fca43df.el8ost.noarch", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "python3-websocket-client-0:0.54.0-1.el8ost.noarch as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:python3-websocket-client-0:0.54.0-1.el8ost.noarch" }, "product_reference": "python3-websocket-client-0:0.54.0-1.el8ost.noarch", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "python3-werkzeug-0:1.0.1-3.el8ost.noarch as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:python3-werkzeug-0:1.0.1-3.el8ost.noarch" }, "product_reference": "python3-werkzeug-0:1.0.1-3.el8ost.noarch", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "python3-zeroconf-0:0.24.4-1.el8ost.noarch as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:python3-zeroconf-0:0.24.4-1.el8ost.noarch" }, "product_reference": "python3-zeroconf-0:0.24.4-1.el8ost.noarch", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "python3-zipp-0:0.5.1-2.el8ost.noarch as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:python3-zipp-0:0.5.1-2.el8ost.noarch" }, "product_reference": "python3-zipp-0:0.5.1-2.el8ost.noarch", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "redhat-release-coreos-0:47.83-1.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:redhat-release-coreos-0:47.83-1.el8.ppc64le" }, "product_reference": "redhat-release-coreos-0:47.83-1.el8.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "redhat-release-coreos-0:47.83-1.el8.s390x as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:redhat-release-coreos-0:47.83-1.el8.s390x" }, "product_reference": "redhat-release-coreos-0:47.83-1.el8.s390x", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "redhat-release-coreos-0:47.83-1.el8.src as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:redhat-release-coreos-0:47.83-1.el8.src" }, "product_reference": "redhat-release-coreos-0:47.83-1.el8.src", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "redhat-release-coreos-0:47.83-1.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:redhat-release-coreos-0:47.83-1.el8.x86_64" }, "product_reference": "redhat-release-coreos-0:47.83-1.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "rhcos-tools-0:0.0.0-1.rhaos4.2.el8.noarch as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:rhcos-tools-0:0.0.0-1.rhaos4.2.el8.noarch" }, "product_reference": "rhcos-tools-0:0.0.0-1.rhaos4.2.el8.noarch", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "rhcos-tools-0:0.0.0-1.rhaos4.2.el8.src as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:rhcos-tools-0:0.0.0-1.rhaos4.2.el8.src" }, "product_reference": "rhcos-tools-0:0.0.0-1.rhaos4.2.el8.src", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "rhosp-director-images-0:17.0-20200606.1.el8ost.noarch as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:rhosp-director-images-0:17.0-20200606.1.el8ost.noarch" }, "product_reference": "rhosp-director-images-0:17.0-20200606.1.el8ost.noarch", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "rhosp-director-images-0:17.0-20200606.1.el8ost.src as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:rhosp-director-images-0:17.0-20200606.1.el8ost.src" }, "product_reference": "rhosp-director-images-0:17.0-20200606.1.el8ost.src", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "rhosp-director-images-all-0:17.0-20200606.1.el8ost.noarch as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:rhosp-director-images-all-0:17.0-20200606.1.el8ost.noarch" }, "product_reference": "rhosp-director-images-all-0:17.0-20200606.1.el8ost.noarch", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "rhosp-director-images-ipa-0:17.0-20200606.1.el8ost.noarch as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:rhosp-director-images-ipa-0:17.0-20200606.1.el8ost.noarch" }, "product_reference": "rhosp-director-images-ipa-0:17.0-20200606.1.el8ost.noarch", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "rhosp-director-images-ipa-ppc64le-0:17.0-20200606.1.el8ost.noarch as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:rhosp-director-images-ipa-ppc64le-0:17.0-20200606.1.el8ost.noarch" }, "product_reference": "rhosp-director-images-ipa-ppc64le-0:17.0-20200606.1.el8ost.noarch", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "rhosp-director-images-ipa-x86_64-0:17.0-20200606.1.el8ost.noarch as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:rhosp-director-images-ipa-x86_64-0:17.0-20200606.1.el8ost.noarch" }, "product_reference": "rhosp-director-images-ipa-x86_64-0:17.0-20200606.1.el8ost.noarch", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "rhosp-director-images-minimal-0:17.0-20200606.1.el8ost.noarch as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:rhosp-director-images-minimal-0:17.0-20200606.1.el8ost.noarch" }, "product_reference": "rhosp-director-images-minimal-0:17.0-20200606.1.el8ost.noarch", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "rhosp-director-images-ppc64le-0:17.0-20200606.1.el8ost.noarch as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:rhosp-director-images-ppc64le-0:17.0-20200606.1.el8ost.noarch" }, "product_reference": "rhosp-director-images-ppc64le-0:17.0-20200606.1.el8ost.noarch", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "rhosp-director-images-x86_64-0:17.0-20200606.1.el8ost.noarch as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:rhosp-director-images-x86_64-0:17.0-20200606.1.el8ost.noarch" }, "product_reference": "rhosp-director-images-x86_64-0:17.0-20200606.1.el8ost.noarch", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "rpm-ostree-0:2020.7-1.el8_3.ppc64le as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:rpm-ostree-0:2020.7-1.el8_3.ppc64le" }, "product_reference": "rpm-ostree-0:2020.7-1.el8_3.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "rpm-ostree-0:2020.7-1.el8_3.s390x as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:rpm-ostree-0:2020.7-1.el8_3.s390x" }, "product_reference": "rpm-ostree-0:2020.7-1.el8_3.s390x", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "rpm-ostree-0:2020.7-1.el8_3.src as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:rpm-ostree-0:2020.7-1.el8_3.src" }, "product_reference": "rpm-ostree-0:2020.7-1.el8_3.src", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "rpm-ostree-0:2020.7-1.el8_3.x86_64 as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:rpm-ostree-0:2020.7-1.el8_3.x86_64" }, "product_reference": "rpm-ostree-0:2020.7-1.el8_3.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "rpm-ostree-debuginfo-0:2020.7-1.el8_3.ppc64le as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:rpm-ostree-debuginfo-0:2020.7-1.el8_3.ppc64le" }, "product_reference": "rpm-ostree-debuginfo-0:2020.7-1.el8_3.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "rpm-ostree-debuginfo-0:2020.7-1.el8_3.s390x as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:rpm-ostree-debuginfo-0:2020.7-1.el8_3.s390x" }, "product_reference": "rpm-ostree-debuginfo-0:2020.7-1.el8_3.s390x", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "rpm-ostree-debuginfo-0:2020.7-1.el8_3.x86_64 as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:rpm-ostree-debuginfo-0:2020.7-1.el8_3.x86_64" }, "product_reference": "rpm-ostree-debuginfo-0:2020.7-1.el8_3.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "rpm-ostree-debugsource-0:2020.7-1.el8_3.ppc64le as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:rpm-ostree-debugsource-0:2020.7-1.el8_3.ppc64le" }, "product_reference": "rpm-ostree-debugsource-0:2020.7-1.el8_3.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "rpm-ostree-debugsource-0:2020.7-1.el8_3.s390x as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:rpm-ostree-debugsource-0:2020.7-1.el8_3.s390x" }, "product_reference": "rpm-ostree-debugsource-0:2020.7-1.el8_3.s390x", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "rpm-ostree-debugsource-0:2020.7-1.el8_3.x86_64 as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:rpm-ostree-debugsource-0:2020.7-1.el8_3.x86_64" }, "product_reference": "rpm-ostree-debugsource-0:2020.7-1.el8_3.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "rpm-ostree-devel-0:2020.7-1.el8_3.ppc64le as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:rpm-ostree-devel-0:2020.7-1.el8_3.ppc64le" }, "product_reference": "rpm-ostree-devel-0:2020.7-1.el8_3.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "rpm-ostree-devel-0:2020.7-1.el8_3.s390x as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:rpm-ostree-devel-0:2020.7-1.el8_3.s390x" }, "product_reference": "rpm-ostree-devel-0:2020.7-1.el8_3.s390x", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "rpm-ostree-devel-0:2020.7-1.el8_3.x86_64 as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:rpm-ostree-devel-0:2020.7-1.el8_3.x86_64" }, "product_reference": "rpm-ostree-devel-0:2020.7-1.el8_3.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "rpm-ostree-libs-0:2020.7-1.el8_3.ppc64le as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:rpm-ostree-libs-0:2020.7-1.el8_3.ppc64le" }, "product_reference": "rpm-ostree-libs-0:2020.7-1.el8_3.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "rpm-ostree-libs-0:2020.7-1.el8_3.s390x as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:rpm-ostree-libs-0:2020.7-1.el8_3.s390x" }, "product_reference": "rpm-ostree-libs-0:2020.7-1.el8_3.s390x", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "rpm-ostree-libs-0:2020.7-1.el8_3.x86_64 as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:rpm-ostree-libs-0:2020.7-1.el8_3.x86_64" }, "product_reference": "rpm-ostree-libs-0:2020.7-1.el8_3.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "rpm-ostree-libs-debuginfo-0:2020.7-1.el8_3.ppc64le as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:rpm-ostree-libs-debuginfo-0:2020.7-1.el8_3.ppc64le" }, "product_reference": "rpm-ostree-libs-debuginfo-0:2020.7-1.el8_3.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "rpm-ostree-libs-debuginfo-0:2020.7-1.el8_3.s390x as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:rpm-ostree-libs-debuginfo-0:2020.7-1.el8_3.s390x" }, "product_reference": "rpm-ostree-libs-debuginfo-0:2020.7-1.el8_3.s390x", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "rpm-ostree-libs-debuginfo-0:2020.7-1.el8_3.x86_64 as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:rpm-ostree-libs-debuginfo-0:2020.7-1.el8_3.x86_64" }, "product_reference": "rpm-ostree-libs-debuginfo-0:2020.7-1.el8_3.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "runc-0:1.0.0-82.rhaos4.6.git086e841.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:runc-0:1.0.0-82.rhaos4.6.git086e841.el8.ppc64le" }, "product_reference": "runc-0:1.0.0-82.rhaos4.6.git086e841.el8.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "runc-0:1.0.0-82.rhaos4.6.git086e841.el8.s390x as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:runc-0:1.0.0-82.rhaos4.6.git086e841.el8.s390x" }, "product_reference": "runc-0:1.0.0-82.rhaos4.6.git086e841.el8.s390x", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "runc-0:1.0.0-82.rhaos4.6.git086e841.el8.src as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:runc-0:1.0.0-82.rhaos4.6.git086e841.el8.src" }, "product_reference": "runc-0:1.0.0-82.rhaos4.6.git086e841.el8.src", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "runc-0:1.0.0-82.rhaos4.6.git086e841.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:runc-0:1.0.0-82.rhaos4.6.git086e841.el8.x86_64" }, "product_reference": "runc-0:1.0.0-82.rhaos4.6.git086e841.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "runc-debuginfo-0:1.0.0-82.rhaos4.6.git086e841.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:runc-debuginfo-0:1.0.0-82.rhaos4.6.git086e841.el8.ppc64le" }, "product_reference": "runc-debuginfo-0:1.0.0-82.rhaos4.6.git086e841.el8.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "runc-debuginfo-0:1.0.0-82.rhaos4.6.git086e841.el8.s390x as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:runc-debuginfo-0:1.0.0-82.rhaos4.6.git086e841.el8.s390x" }, "product_reference": "runc-debuginfo-0:1.0.0-82.rhaos4.6.git086e841.el8.s390x", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "runc-debuginfo-0:1.0.0-82.rhaos4.6.git086e841.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:runc-debuginfo-0:1.0.0-82.rhaos4.6.git086e841.el8.x86_64" }, "product_reference": "runc-debuginfo-0:1.0.0-82.rhaos4.6.git086e841.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "runc-debugsource-0:1.0.0-82.rhaos4.6.git086e841.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:runc-debugsource-0:1.0.0-82.rhaos4.6.git086e841.el8.ppc64le" }, "product_reference": "runc-debugsource-0:1.0.0-82.rhaos4.6.git086e841.el8.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "runc-debugsource-0:1.0.0-82.rhaos4.6.git086e841.el8.s390x as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:runc-debugsource-0:1.0.0-82.rhaos4.6.git086e841.el8.s390x" }, "product_reference": "runc-debugsource-0:1.0.0-82.rhaos4.6.git086e841.el8.s390x", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "runc-debugsource-0:1.0.0-82.rhaos4.6.git086e841.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:runc-debugsource-0:1.0.0-82.rhaos4.6.git086e841.el8.x86_64" }, "product_reference": "runc-debugsource-0:1.0.0-82.rhaos4.6.git086e841.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "rust-afterburn-0:4.6.0-1.rhaos4.7.el8.src as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:rust-afterburn-0:4.6.0-1.rhaos4.7.el8.src" }, "product_reference": "rust-afterburn-0:4.6.0-1.rhaos4.7.el8.src", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "rust-afterburn-debugsource-0:4.6.0-1.rhaos4.7.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:rust-afterburn-debugsource-0:4.6.0-1.rhaos4.7.el8.ppc64le" }, "product_reference": "rust-afterburn-debugsource-0:4.6.0-1.rhaos4.7.el8.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "rust-afterburn-debugsource-0:4.6.0-1.rhaos4.7.el8.s390x as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:rust-afterburn-debugsource-0:4.6.0-1.rhaos4.7.el8.s390x" }, "product_reference": "rust-afterburn-debugsource-0:4.6.0-1.rhaos4.7.el8.s390x", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "rust-afterburn-debugsource-0:4.6.0-1.rhaos4.7.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:rust-afterburn-debugsource-0:4.6.0-1.rhaos4.7.el8.x86_64" }, "product_reference": "rust-afterburn-debugsource-0:4.6.0-1.rhaos4.7.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "rust-bootupd-0:0.2.5-2.el8.src as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:rust-bootupd-0:0.2.5-2.el8.src" }, "product_reference": "rust-bootupd-0:0.2.5-2.el8.src", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "rust-bootupd-debugsource-0:0.2.5-2.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:rust-bootupd-debugsource-0:0.2.5-2.el8.x86_64" }, "product_reference": "rust-bootupd-debugsource-0:0.2.5-2.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "tini-0:0.16.1-1.el8ar.ppc64le as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:tini-0:0.16.1-1.el8ar.ppc64le" }, "product_reference": "tini-0:0.16.1-1.el8ar.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "tini-0:0.16.1-1.el8ar.s390x as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:tini-0:0.16.1-1.el8ar.s390x" }, "product_reference": "tini-0:0.16.1-1.el8ar.s390x", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "tini-0:0.16.1-1.el8ar.src as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:tini-0:0.16.1-1.el8ar.src" }, "product_reference": "tini-0:0.16.1-1.el8ar.src", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "tini-0:0.16.1-1.el8ar.x86_64 as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:tini-0:0.16.1-1.el8ar.x86_64" }, "product_reference": "tini-0:0.16.1-1.el8ar.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "toolbox-0:0.0.8-3.rhaos4.7.el8.noarch as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:toolbox-0:0.0.8-3.rhaos4.7.el8.noarch" }, "product_reference": "toolbox-0:0.0.8-3.rhaos4.7.el8.noarch", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "toolbox-0:0.0.8-3.rhaos4.7.el8.src as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:toolbox-0:0.0.8-3.rhaos4.7.el8.src" }, "product_reference": "toolbox-0:0.0.8-3.rhaos4.7.el8.src", "relates_to_product_reference": "8Base-RHOSE-4.7" } ] }, "vulnerabilities": [ { "acknowledgments": [ { "names": [ "Jessica Forrester" ], "organization": "Red Hat", "summary": "This issue was discovered by Red Hat." } ], "cve": "CVE-2019-3884", "cwe": { "id": "CWE-290", "name": "Authentication Bypass by Spoofing" }, "discovery_date": "2019-03-29T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "7Server-RH7-RHOSE-4.7:conmon-2:2.0.21-2.rhaos4.6.el7.src", "7Server-RH7-RHOSE-4.7:conmon-2:2.0.21-2.rhaos4.6.el7.x86_64", "7Server-RH7-RHOSE-4.7:containernetworking-plugins-0:0.8.6-1.rhaos4.5.el7.src", "7Server-RH7-RHOSE-4.7:containernetworking-plugins-0:0.8.6-1.rhaos4.5.el7.x86_64", "7Server-RH7-RHOSE-4.7:containernetworking-plugins-debuginfo-0:0.8.6-1.rhaos4.5.el7.x86_64", "7Server-RH7-RHOSE-4.7:cri-o-0:1.20.0-0.rhaos4.7.git8921e00.el7.51.src", "7Server-RH7-RHOSE-4.7:cri-o-0:1.20.0-0.rhaos4.7.git8921e00.el7.51.x86_64", "7Server-RH7-RHOSE-4.7:cri-o-debuginfo-0:1.20.0-0.rhaos4.7.git8921e00.el7.51.x86_64", "7Server-RH7-RHOSE-4.7:cri-tools-0:1.18.0-3.el7.src", "7Server-RH7-RHOSE-4.7:cri-tools-0:1.18.0-3.el7.x86_64", "7Server-RH7-RHOSE-4.7:cri-tools-debuginfo-0:1.18.0-3.el7.x86_64", "7Server-RH7-RHOSE-4.7:haproxy-0:2.0.19-1.el7.src", "7Server-RH7-RHOSE-4.7:haproxy-debuginfo-0:2.0.19-1.el7.x86_64", "7Server-RH7-RHOSE-4.7:haproxy20-0:2.0.19-1.el7.x86_64", "7Server-RH7-RHOSE-4.7:jq-0:1.6-2.el7.src", "7Server-RH7-RHOSE-4.7:jq-0:1.6-2.el7.x86_64", "7Server-RH7-RHOSE-4.7:jq-debuginfo-0:1.6-2.el7.x86_64", "7Server-RH7-RHOSE-4.7:jq-devel-0:1.6-2.el7.x86_64", "7Server-RH7-RHOSE-4.7:oniguruma-0:5.9.2-5.el7.src", "7Server-RH7-RHOSE-4.7:oniguruma-0:5.9.2-5.el7.x86_64", "7Server-RH7-RHOSE-4.7:oniguruma-debuginfo-0:5.9.2-5.el7.x86_64", "7Server-RH7-RHOSE-4.7:oniguruma-devel-0:5.9.2-5.el7.x86_64", "7Server-RH7-RHOSE-4.7:openshift-ansible-0:4.7.0-202102032256.p0.git.0.bf7d9a7.el7.noarch", "7Server-RH7-RHOSE-4.7:openshift-ansible-0:4.7.0-202102032256.p0.git.0.bf7d9a7.el7.src", "7Server-RH7-RHOSE-4.7:openshift-ansible-test-0:4.7.0-202102032256.p0.git.0.bf7d9a7.el7.noarch", "7Server-RH7-RHOSE-4.7:openshift-clients-0:4.7.0-202102032256.p0.git.3951.0e656ef.el7.src", "7Server-RH7-RHOSE-4.7:openshift-clients-0:4.7.0-202102032256.p0.git.3951.0e656ef.el7.x86_64", "7Server-RH7-RHOSE-4.7:openshift-clients-redistributable-0:4.7.0-202102032256.p0.git.3951.0e656ef.el7.x86_64", "7Server-RH7-RHOSE-4.7:python-botocore-0:1.4.57-5.el7.src", "7Server-RH7-RHOSE-4.7:python2-botocore-0:1.4.57-5.el7.noarch", "7Server-RH7-RHOSE-4.7:runc-0:1.0.0-82.rhaos4.6.git086e841.el7.src", "7Server-RH7-RHOSE-4.7:runc-0:1.0.0-82.rhaos4.6.git086e841.el7.x86_64", "7Server-RH7-RHOSE-4.7:runc-debuginfo-0:1.0.0-82.rhaos4.6.git086e841.el7.x86_64", "8Base-RHOSE-4.7:NetworkManager-1:1.26.0-12.1.rhaos4.7.el8.ppc64le", "8Base-RHOSE-4.7:NetworkManager-1:1.26.0-12.1.rhaos4.7.el8.s390x", "8Base-RHOSE-4.7:NetworkManager-1:1.26.0-12.1.rhaos4.7.el8.src", "8Base-RHOSE-4.7:NetworkManager-1:1.26.0-12.1.rhaos4.7.el8.x86_64", "8Base-RHOSE-4.7:NetworkManager-adsl-1:1.26.0-12.1.rhaos4.7.el8.ppc64le", "8Base-RHOSE-4.7:NetworkManager-adsl-1:1.26.0-12.1.rhaos4.7.el8.s390x", "8Base-RHOSE-4.7:NetworkManager-adsl-1:1.26.0-12.1.rhaos4.7.el8.x86_64", "8Base-RHOSE-4.7:NetworkManager-adsl-debuginfo-1:1.26.0-12.1.rhaos4.7.el8.ppc64le", "8Base-RHOSE-4.7:NetworkManager-adsl-debuginfo-1:1.26.0-12.1.rhaos4.7.el8.s390x", "8Base-RHOSE-4.7:NetworkManager-adsl-debuginfo-1:1.26.0-12.1.rhaos4.7.el8.x86_64", "8Base-RHOSE-4.7:NetworkManager-bluetooth-1:1.26.0-12.1.rhaos4.7.el8.ppc64le", "8Base-RHOSE-4.7:NetworkManager-bluetooth-1:1.26.0-12.1.rhaos4.7.el8.s390x", "8Base-RHOSE-4.7:NetworkManager-bluetooth-1:1.26.0-12.1.rhaos4.7.el8.x86_64", "8Base-RHOSE-4.7:NetworkManager-bluetooth-debuginfo-1:1.26.0-12.1.rhaos4.7.el8.ppc64le", "8Base-RHOSE-4.7:NetworkManager-bluetooth-debuginfo-1:1.26.0-12.1.rhaos4.7.el8.s390x", "8Base-RHOSE-4.7:NetworkManager-bluetooth-debuginfo-1:1.26.0-12.1.rhaos4.7.el8.x86_64", "8Base-RHOSE-4.7:NetworkManager-cloud-setup-1:1.26.0-12.1.rhaos4.7.el8.ppc64le", "8Base-RHOSE-4.7:NetworkManager-cloud-setup-1:1.26.0-12.1.rhaos4.7.el8.s390x", "8Base-RHOSE-4.7:NetworkManager-cloud-setup-1:1.26.0-12.1.rhaos4.7.el8.x86_64", "8Base-RHOSE-4.7:NetworkManager-cloud-setup-debuginfo-1:1.26.0-12.1.rhaos4.7.el8.ppc64le", "8Base-RHOSE-4.7:NetworkManager-cloud-setup-debuginfo-1:1.26.0-12.1.rhaos4.7.el8.s390x", "8Base-RHOSE-4.7:NetworkManager-cloud-setup-debuginfo-1:1.26.0-12.1.rhaos4.7.el8.x86_64", "8Base-RHOSE-4.7:NetworkManager-config-connectivity-redhat-1:1.26.0-12.1.rhaos4.7.el8.noarch", "8Base-RHOSE-4.7:NetworkManager-config-server-1:1.26.0-12.1.rhaos4.7.el8.noarch", "8Base-RHOSE-4.7:NetworkManager-debuginfo-1:1.26.0-12.1.rhaos4.7.el8.ppc64le", "8Base-RHOSE-4.7:NetworkManager-debuginfo-1:1.26.0-12.1.rhaos4.7.el8.s390x", "8Base-RHOSE-4.7:NetworkManager-debuginfo-1:1.26.0-12.1.rhaos4.7.el8.x86_64", "8Base-RHOSE-4.7:NetworkManager-debugsource-1:1.26.0-12.1.rhaos4.7.el8.ppc64le", "8Base-RHOSE-4.7:NetworkManager-debugsource-1:1.26.0-12.1.rhaos4.7.el8.s390x", "8Base-RHOSE-4.7:NetworkManager-debugsource-1:1.26.0-12.1.rhaos4.7.el8.x86_64", "8Base-RHOSE-4.7:NetworkManager-dispatcher-routing-rules-1:1.26.0-12.1.rhaos4.7.el8.noarch", "8Base-RHOSE-4.7:NetworkManager-libnm-1:1.26.0-12.1.rhaos4.7.el8.ppc64le", "8Base-RHOSE-4.7:NetworkManager-libnm-1:1.26.0-12.1.rhaos4.7.el8.s390x", "8Base-RHOSE-4.7:NetworkManager-libnm-1:1.26.0-12.1.rhaos4.7.el8.x86_64", "8Base-RHOSE-4.7:NetworkManager-libnm-debuginfo-1:1.26.0-12.1.rhaos4.7.el8.ppc64le", "8Base-RHOSE-4.7:NetworkManager-libnm-debuginfo-1:1.26.0-12.1.rhaos4.7.el8.s390x", "8Base-RHOSE-4.7:NetworkManager-libnm-debuginfo-1:1.26.0-12.1.rhaos4.7.el8.x86_64", "8Base-RHOSE-4.7:NetworkManager-libnm-devel-1:1.26.0-12.1.rhaos4.7.el8.ppc64le", "8Base-RHOSE-4.7:NetworkManager-libnm-devel-1:1.26.0-12.1.rhaos4.7.el8.s390x", "8Base-RHOSE-4.7:NetworkManager-libnm-devel-1:1.26.0-12.1.rhaos4.7.el8.x86_64", "8Base-RHOSE-4.7:NetworkManager-ovs-1:1.26.0-12.1.rhaos4.7.el8.ppc64le", "8Base-RHOSE-4.7:NetworkManager-ovs-1:1.26.0-12.1.rhaos4.7.el8.s390x", "8Base-RHOSE-4.7:NetworkManager-ovs-1:1.26.0-12.1.rhaos4.7.el8.x86_64", "8Base-RHOSE-4.7:NetworkManager-ovs-debuginfo-1:1.26.0-12.1.rhaos4.7.el8.ppc64le", "8Base-RHOSE-4.7:NetworkManager-ovs-debuginfo-1:1.26.0-12.1.rhaos4.7.el8.s390x", "8Base-RHOSE-4.7:NetworkManager-ovs-debuginfo-1:1.26.0-12.1.rhaos4.7.el8.x86_64", "8Base-RHOSE-4.7:NetworkManager-ppp-1:1.26.0-12.1.rhaos4.7.el8.ppc64le", "8Base-RHOSE-4.7:NetworkManager-ppp-1:1.26.0-12.1.rhaos4.7.el8.s390x", "8Base-RHOSE-4.7:NetworkManager-ppp-1:1.26.0-12.1.rhaos4.7.el8.x86_64", "8Base-RHOSE-4.7:NetworkManager-ppp-debuginfo-1:1.26.0-12.1.rhaos4.7.el8.ppc64le", "8Base-RHOSE-4.7:NetworkManager-ppp-debuginfo-1:1.26.0-12.1.rhaos4.7.el8.s390x", "8Base-RHOSE-4.7:NetworkManager-ppp-debuginfo-1:1.26.0-12.1.rhaos4.7.el8.x86_64", "8Base-RHOSE-4.7:NetworkManager-team-1:1.26.0-12.1.rhaos4.7.el8.ppc64le", "8Base-RHOSE-4.7:NetworkManager-team-1:1.26.0-12.1.rhaos4.7.el8.s390x", "8Base-RHOSE-4.7:NetworkManager-team-1:1.26.0-12.1.rhaos4.7.el8.x86_64", "8Base-RHOSE-4.7:NetworkManager-team-debuginfo-1:1.26.0-12.1.rhaos4.7.el8.ppc64le", "8Base-RHOSE-4.7:NetworkManager-team-debuginfo-1:1.26.0-12.1.rhaos4.7.el8.s390x", "8Base-RHOSE-4.7:NetworkManager-team-debuginfo-1:1.26.0-12.1.rhaos4.7.el8.x86_64", "8Base-RHOSE-4.7:NetworkManager-tui-1:1.26.0-12.1.rhaos4.7.el8.ppc64le", "8Base-RHOSE-4.7:NetworkManager-tui-1:1.26.0-12.1.rhaos4.7.el8.s390x", "8Base-RHOSE-4.7:NetworkManager-tui-1:1.26.0-12.1.rhaos4.7.el8.x86_64", "8Base-RHOSE-4.7:NetworkManager-tui-debuginfo-1:1.26.0-12.1.rhaos4.7.el8.ppc64le", "8Base-RHOSE-4.7:NetworkManager-tui-debuginfo-1:1.26.0-12.1.rhaos4.7.el8.s390x", "8Base-RHOSE-4.7:NetworkManager-tui-debuginfo-1:1.26.0-12.1.rhaos4.7.el8.x86_64", "8Base-RHOSE-4.7:NetworkManager-wifi-1:1.26.0-12.1.rhaos4.7.el8.ppc64le", "8Base-RHOSE-4.7:NetworkManager-wifi-1:1.26.0-12.1.rhaos4.7.el8.s390x", "8Base-RHOSE-4.7:NetworkManager-wifi-1:1.26.0-12.1.rhaos4.7.el8.x86_64", "8Base-RHOSE-4.7:NetworkManager-wifi-debuginfo-1:1.26.0-12.1.rhaos4.7.el8.ppc64le", "8Base-RHOSE-4.7:NetworkManager-wifi-debuginfo-1:1.26.0-12.1.rhaos4.7.el8.s390x", "8Base-RHOSE-4.7:NetworkManager-wifi-debuginfo-1:1.26.0-12.1.rhaos4.7.el8.x86_64", "8Base-RHOSE-4.7:NetworkManager-wwan-1:1.26.0-12.1.rhaos4.7.el8.ppc64le", "8Base-RHOSE-4.7:NetworkManager-wwan-1:1.26.0-12.1.rhaos4.7.el8.s390x", "8Base-RHOSE-4.7:NetworkManager-wwan-1:1.26.0-12.1.rhaos4.7.el8.x86_64", "8Base-RHOSE-4.7:NetworkManager-wwan-debuginfo-1:1.26.0-12.1.rhaos4.7.el8.ppc64le", "8Base-RHOSE-4.7:NetworkManager-wwan-debuginfo-1:1.26.0-12.1.rhaos4.7.el8.s390x", "8Base-RHOSE-4.7:NetworkManager-wwan-debuginfo-1:1.26.0-12.1.rhaos4.7.el8.x86_64", "8Base-RHOSE-4.7:afterburn-0:4.6.0-1.rhaos4.7.el8.ppc64le", "8Base-RHOSE-4.7:afterburn-0:4.6.0-1.rhaos4.7.el8.s390x", "8Base-RHOSE-4.7:afterburn-0:4.6.0-1.rhaos4.7.el8.x86_64", "8Base-RHOSE-4.7:afterburn-debuginfo-0:4.6.0-1.rhaos4.7.el8.ppc64le", "8Base-RHOSE-4.7:afterburn-debuginfo-0:4.6.0-1.rhaos4.7.el8.s390x", "8Base-RHOSE-4.7:afterburn-debuginfo-0:4.6.0-1.rhaos4.7.el8.x86_64", "8Base-RHOSE-4.7:ansible-runner-0:1.4.6-2.el8ar.noarch", "8Base-RHOSE-4.7:ansible-runner-0:1.4.6-2.el8ar.src", "8Base-RHOSE-4.7:ansible-runner-http-0:1.0.0-2.el8ar.noarch", "8Base-RHOSE-4.7:ansible-runner-http-0:1.0.0-2.el8ar.src", "8Base-RHOSE-4.7:atomic-openshift-service-idler-0:4.7.0-202011171454.p0.git.15.675c1c8.el8.ppc64le", "8Base-RHOSE-4.7:atomic-openshift-service-idler-0:4.7.0-202011171454.p0.git.15.675c1c8.el8.s390x", "8Base-RHOSE-4.7:atomic-openshift-service-idler-0:4.7.0-202011171454.p0.git.15.675c1c8.el8.src", "8Base-RHOSE-4.7:atomic-openshift-service-idler-0:4.7.0-202011171454.p0.git.15.675c1c8.el8.x86_64", "8Base-RHOSE-4.7:bootupd-0:0.2.5-2.el8.x86_64", "8Base-RHOSE-4.7:bootupd-debuginfo-0:0.2.5-2.el8.x86_64", "8Base-RHOSE-4.7:clevis-0:15-1.el8.ppc64le", "8Base-RHOSE-4.7:clevis-0:15-1.el8.s390x", "8Base-RHOSE-4.7:clevis-0:15-1.el8.src", "8Base-RHOSE-4.7:clevis-0:15-1.el8.x86_64", "8Base-RHOSE-4.7:clevis-debuginfo-0:15-1.el8.ppc64le", "8Base-RHOSE-4.7:clevis-debuginfo-0:15-1.el8.s390x", "8Base-RHOSE-4.7:clevis-debuginfo-0:15-1.el8.x86_64", "8Base-RHOSE-4.7:clevis-debugsource-0:15-1.el8.ppc64le", "8Base-RHOSE-4.7:clevis-debugsource-0:15-1.el8.s390x", "8Base-RHOSE-4.7:clevis-debugsource-0:15-1.el8.x86_64", "8Base-RHOSE-4.7:clevis-dracut-0:15-1.el8.ppc64le", "8Base-RHOSE-4.7:clevis-dracut-0:15-1.el8.s390x", "8Base-RHOSE-4.7:clevis-dracut-0:15-1.el8.x86_64", "8Base-RHOSE-4.7:clevis-luks-0:15-1.el8.ppc64le", "8Base-RHOSE-4.7:clevis-luks-0:15-1.el8.s390x", "8Base-RHOSE-4.7:clevis-luks-0:15-1.el8.x86_64", "8Base-RHOSE-4.7:clevis-systemd-0:15-1.el8.ppc64le", "8Base-RHOSE-4.7:clevis-systemd-0:15-1.el8.s390x", "8Base-RHOSE-4.7:clevis-systemd-0:15-1.el8.x86_64", "8Base-RHOSE-4.7:clevis-udisks2-0:15-1.el8.ppc64le", "8Base-RHOSE-4.7:clevis-udisks2-0:15-1.el8.s390x", "8Base-RHOSE-4.7:clevis-udisks2-0:15-1.el8.x86_64", "8Base-RHOSE-4.7:clevis-udisks2-debuginfo-0:15-1.el8.ppc64le", "8Base-RHOSE-4.7:clevis-udisks2-debuginfo-0:15-1.el8.s390x", "8Base-RHOSE-4.7:clevis-udisks2-debuginfo-0:15-1.el8.x86_64", "8Base-RHOSE-4.7:conmon-2:2.0.21-2.rhaos4.6.el8.ppc64le", "8Base-RHOSE-4.7:conmon-2:2.0.21-2.rhaos4.6.el8.s390x", "8Base-RHOSE-4.7:conmon-2:2.0.21-2.rhaos4.6.el8.src", "8Base-RHOSE-4.7:conmon-2:2.0.21-2.rhaos4.6.el8.x86_64", "8Base-RHOSE-4.7:console-login-helper-messages-0:0.20.3-1.rhaos4.7.el8.noarch", "8Base-RHOSE-4.7:console-login-helper-messages-0:0.20.3-1.rhaos4.7.el8.src", "8Base-RHOSE-4.7:console-login-helper-messages-issuegen-0:0.20.3-1.rhaos4.7.el8.noarch", "8Base-RHOSE-4.7:console-login-helper-messages-profile-0:0.20.3-1.rhaos4.7.el8.noarch", "8Base-RHOSE-4.7:container-selinux-2:2.151.0-1.rhaos4.7.el8.noarch", "8Base-RHOSE-4.7:container-selinux-2:2.151.0-1.rhaos4.7.el8.src", "8Base-RHOSE-4.7:containernetworking-plugins-0:0.8.6-1.rhaos4.5.el8.ppc64le", "8Base-RHOSE-4.7:containernetworking-plugins-0:0.8.6-1.rhaos4.5.el8.s390x", "8Base-RHOSE-4.7:containernetworking-plugins-0:0.8.6-1.rhaos4.5.el8.src", "8Base-RHOSE-4.7:containernetworking-plugins-0:0.8.6-1.rhaos4.5.el8.x86_64", "8Base-RHOSE-4.7:containernetworking-plugins-debuginfo-0:0.8.6-1.rhaos4.5.el8.ppc64le", "8Base-RHOSE-4.7:containernetworking-plugins-debuginfo-0:0.8.6-1.rhaos4.5.el8.s390x", "8Base-RHOSE-4.7:containernetworking-plugins-debuginfo-0:0.8.6-1.rhaos4.5.el8.x86_64", "8Base-RHOSE-4.7:containernetworking-plugins-debugsource-0:0.8.6-1.rhaos4.5.el8.ppc64le", "8Base-RHOSE-4.7:containernetworking-plugins-debugsource-0:0.8.6-1.rhaos4.5.el8.s390x", "8Base-RHOSE-4.7:containernetworking-plugins-debugsource-0:0.8.6-1.rhaos4.5.el8.x86_64", "8Base-RHOSE-4.7:coreos-installer-0:0.8.0-3.rhaos4.7.el8.ppc64le", "8Base-RHOSE-4.7:coreos-installer-0:0.8.0-3.rhaos4.7.el8.s390x", "8Base-RHOSE-4.7:coreos-installer-0:0.8.0-3.rhaos4.7.el8.src", "8Base-RHOSE-4.7:coreos-installer-0:0.8.0-3.rhaos4.7.el8.x86_64", "8Base-RHOSE-4.7:coreos-installer-bootinfra-0:0.8.0-3.rhaos4.7.el8.ppc64le", "8Base-RHOSE-4.7:coreos-installer-bootinfra-0:0.8.0-3.rhaos4.7.el8.s390x", "8Base-RHOSE-4.7:coreos-installer-bootinfra-debuginfo-0:0.8.0-3.rhaos4.7.el8.ppc64le", "8Base-RHOSE-4.7:coreos-installer-bootinfra-debuginfo-0:0.8.0-3.rhaos4.7.el8.s390x", "8Base-RHOSE-4.7:coreos-installer-bootinfra-debuginfo-0:0.8.0-3.rhaos4.7.el8.x86_64", "8Base-RHOSE-4.7:coreos-installer-debuginfo-0:0.8.0-3.rhaos4.7.el8.ppc64le", "8Base-RHOSE-4.7:coreos-installer-debuginfo-0:0.8.0-3.rhaos4.7.el8.s390x", "8Base-RHOSE-4.7:coreos-installer-debuginfo-0:0.8.0-3.rhaos4.7.el8.x86_64", "8Base-RHOSE-4.7:coreos-installer-debugsource-0:0.8.0-3.rhaos4.7.el8.ppc64le", "8Base-RHOSE-4.7:coreos-installer-debugsource-0:0.8.0-3.rhaos4.7.el8.s390x", "8Base-RHOSE-4.7:coreos-installer-debugsource-0:0.8.0-3.rhaos4.7.el8.x86_64", "8Base-RHOSE-4.7:cri-o-0:1.20.0-0.rhaos4.7.git8921e00.el8.51.ppc64le", "8Base-RHOSE-4.7:cri-o-0:1.20.0-0.rhaos4.7.git8921e00.el8.51.s390x", "8Base-RHOSE-4.7:cri-o-0:1.20.0-0.rhaos4.7.git8921e00.el8.51.src", "8Base-RHOSE-4.7:cri-o-0:1.20.0-0.rhaos4.7.git8921e00.el8.51.x86_64", "8Base-RHOSE-4.7:cri-o-debuginfo-0:1.20.0-0.rhaos4.7.git8921e00.el8.51.ppc64le", "8Base-RHOSE-4.7:cri-o-debuginfo-0:1.20.0-0.rhaos4.7.git8921e00.el8.51.s390x", "8Base-RHOSE-4.7:cri-o-debuginfo-0:1.20.0-0.rhaos4.7.git8921e00.el8.51.x86_64", "8Base-RHOSE-4.7:cri-o-debugsource-0:1.20.0-0.rhaos4.7.git8921e00.el8.51.ppc64le", "8Base-RHOSE-4.7:cri-o-debugsource-0:1.20.0-0.rhaos4.7.git8921e00.el8.51.s390x", "8Base-RHOSE-4.7:cri-o-debugsource-0:1.20.0-0.rhaos4.7.git8921e00.el8.51.x86_64", "8Base-RHOSE-4.7:cri-tools-0:1.20.0-1.el8.ppc64le", "8Base-RHOSE-4.7:cri-tools-0:1.20.0-1.el8.s390x", "8Base-RHOSE-4.7:cri-tools-0:1.20.0-1.el8.src", "8Base-RHOSE-4.7:cri-tools-0:1.20.0-1.el8.x86_64", "8Base-RHOSE-4.7:cri-tools-debuginfo-0:1.20.0-1.el8.ppc64le", "8Base-RHOSE-4.7:cri-tools-debuginfo-0:1.20.0-1.el8.s390x", "8Base-RHOSE-4.7:cri-tools-debuginfo-0:1.20.0-1.el8.x86_64", "8Base-RHOSE-4.7:cri-tools-debugsource-0:1.20.0-1.el8.ppc64le", "8Base-RHOSE-4.7:cri-tools-debugsource-0:1.20.0-1.el8.s390x", "8Base-RHOSE-4.7:cri-tools-debugsource-0:1.20.0-1.el8.x86_64", "8Base-RHOSE-4.7:dracut-0:049-95.git20200804.el8_3.4.ppc64le", "8Base-RHOSE-4.7:dracut-0:049-95.git20200804.el8_3.4.s390x", "8Base-RHOSE-4.7:dracut-0:049-95.git20200804.el8_3.4.src", "8Base-RHOSE-4.7:dracut-0:049-95.git20200804.el8_3.4.x86_64", "8Base-RHOSE-4.7:dracut-caps-0:049-95.git20200804.el8_3.4.ppc64le", "8Base-RHOSE-4.7:dracut-caps-0:049-95.git20200804.el8_3.4.s390x", "8Base-RHOSE-4.7:dracut-caps-0:049-95.git20200804.el8_3.4.x86_64", "8Base-RHOSE-4.7:dracut-config-generic-0:049-95.git20200804.el8_3.4.ppc64le", "8Base-RHOSE-4.7:dracut-config-generic-0:049-95.git20200804.el8_3.4.s390x", "8Base-RHOSE-4.7:dracut-config-generic-0:049-95.git20200804.el8_3.4.x86_64", "8Base-RHOSE-4.7:dracut-config-rescue-0:049-95.git20200804.el8_3.4.ppc64le", "8Base-RHOSE-4.7:dracut-config-rescue-0:049-95.git20200804.el8_3.4.s390x", "8Base-RHOSE-4.7:dracut-config-rescue-0:049-95.git20200804.el8_3.4.x86_64", "8Base-RHOSE-4.7:dracut-debuginfo-0:049-95.git20200804.el8_3.4.ppc64le", "8Base-RHOSE-4.7:dracut-debuginfo-0:049-95.git20200804.el8_3.4.s390x", "8Base-RHOSE-4.7:dracut-debuginfo-0:049-95.git20200804.el8_3.4.x86_64", "8Base-RHOSE-4.7:dracut-debugsource-0:049-95.git20200804.el8_3.4.ppc64le", "8Base-RHOSE-4.7:dracut-debugsource-0:049-95.git20200804.el8_3.4.s390x", "8Base-RHOSE-4.7:dracut-debugsource-0:049-95.git20200804.el8_3.4.x86_64", "8Base-RHOSE-4.7:dracut-live-0:049-95.git20200804.el8_3.4.ppc64le", "8Base-RHOSE-4.7:dracut-live-0:049-95.git20200804.el8_3.4.s390x", "8Base-RHOSE-4.7:dracut-live-0:049-95.git20200804.el8_3.4.x86_64", "8Base-RHOSE-4.7:dracut-network-0:049-95.git20200804.el8_3.4.ppc64le", "8Base-RHOSE-4.7:dracut-network-0:049-95.git20200804.el8_3.4.s390x", "8Base-RHOSE-4.7:dracut-network-0:049-95.git20200804.el8_3.4.x86_64", "8Base-RHOSE-4.7:dracut-squash-0:049-95.git20200804.el8_3.4.ppc64le", "8Base-RHOSE-4.7:dracut-squash-0:049-95.git20200804.el8_3.4.s390x", "8Base-RHOSE-4.7:dracut-squash-0:049-95.git20200804.el8_3.4.x86_64", "8Base-RHOSE-4.7:dracut-tools-0:049-95.git20200804.el8_3.4.ppc64le", "8Base-RHOSE-4.7:dracut-tools-0:049-95.git20200804.el8_3.4.s390x", "8Base-RHOSE-4.7:dracut-tools-0:049-95.git20200804.el8_3.4.x86_64", "8Base-RHOSE-4.7:faq-0:0.0.6-5.el8.ppc64le", "8Base-RHOSE-4.7:faq-0:0.0.6-5.el8.s390x", "8Base-RHOSE-4.7:faq-0:0.0.6-5.el8.src", "8Base-RHOSE-4.7:faq-0:0.0.6-5.el8.x86_64", "8Base-RHOSE-4.7:golang-github-prometheus-promu-0:0.5.0-2.git642a960.el8.ppc64le", "8Base-RHOSE-4.7:golang-github-prometheus-promu-0:0.5.0-2.git642a960.el8.s390x", "8Base-RHOSE-4.7:golang-github-prometheus-promu-0:0.5.0-2.git642a960.el8.src", "8Base-RHOSE-4.7:golang-github-prometheus-promu-0:0.5.0-2.git642a960.el8.x86_64", "8Base-RHOSE-4.7:gperftools-0:2.6.3-2.el8ost.ppc64le", "8Base-RHOSE-4.7:gperftools-0:2.6.3-2.el8ost.s390x", "8Base-RHOSE-4.7:gperftools-0:2.6.3-2.el8ost.src", "8Base-RHOSE-4.7:gperftools-0:2.6.3-2.el8ost.x86_64", "8Base-RHOSE-4.7:gperftools-debugsource-0:2.6.3-2.el8ost.ppc64le", "8Base-RHOSE-4.7:gperftools-debugsource-0:2.6.3-2.el8ost.s390x", "8Base-RHOSE-4.7:gperftools-debugsource-0:2.6.3-2.el8ost.x86_64", "8Base-RHOSE-4.7:gperftools-devel-0:2.6.3-2.el8ost.ppc64le", "8Base-RHOSE-4.7:gperftools-devel-0:2.6.3-2.el8ost.s390x", "8Base-RHOSE-4.7:gperftools-devel-0:2.6.3-2.el8ost.x86_64", "8Base-RHOSE-4.7:gperftools-libs-0:2.6.3-2.el8ost.ppc64le", "8Base-RHOSE-4.7:gperftools-libs-0:2.6.3-2.el8ost.s390x", "8Base-RHOSE-4.7:gperftools-libs-0:2.6.3-2.el8ost.x86_64", "8Base-RHOSE-4.7:gperftools-libs-debuginfo-0:2.6.3-2.el8ost.ppc64le", "8Base-RHOSE-4.7:gperftools-libs-debuginfo-0:2.6.3-2.el8ost.s390x", "8Base-RHOSE-4.7:gperftools-libs-debuginfo-0:2.6.3-2.el8ost.x86_64", "8Base-RHOSE-4.7:grpc-0:1.18.0-4.el8ost.ppc64le", "8Base-RHOSE-4.7:grpc-0:1.18.0-4.el8ost.s390x", "8Base-RHOSE-4.7:grpc-0:1.18.0-4.el8ost.src", "8Base-RHOSE-4.7:grpc-0:1.18.0-4.el8ost.x86_64", "8Base-RHOSE-4.7:grpc-cli-0:1.18.0-4.el8ost.ppc64le", "8Base-RHOSE-4.7:grpc-cli-0:1.18.0-4.el8ost.s390x", "8Base-RHOSE-4.7:grpc-cli-0:1.18.0-4.el8ost.x86_64", "8Base-RHOSE-4.7:grpc-cli-debuginfo-0:1.18.0-4.el8ost.ppc64le", "8Base-RHOSE-4.7:grpc-cli-debuginfo-0:1.18.0-4.el8ost.s390x", "8Base-RHOSE-4.7:grpc-cli-debuginfo-0:1.18.0-4.el8ost.x86_64", "8Base-RHOSE-4.7:grpc-debuginfo-0:1.18.0-4.el8ost.ppc64le", "8Base-RHOSE-4.7:grpc-debuginfo-0:1.18.0-4.el8ost.s390x", "8Base-RHOSE-4.7:grpc-debuginfo-0:1.18.0-4.el8ost.x86_64", "8Base-RHOSE-4.7:grpc-debugsource-0:1.18.0-4.el8ost.ppc64le", "8Base-RHOSE-4.7:grpc-debugsource-0:1.18.0-4.el8ost.s390x", "8Base-RHOSE-4.7:grpc-debugsource-0:1.18.0-4.el8ost.x86_64", "8Base-RHOSE-4.7:grpc-devel-0:1.18.0-4.el8ost.ppc64le", "8Base-RHOSE-4.7:grpc-devel-0:1.18.0-4.el8ost.s390x", "8Base-RHOSE-4.7:grpc-devel-0:1.18.0-4.el8ost.x86_64", "8Base-RHOSE-4.7:grpc-plugins-0:1.18.0-4.el8ost.ppc64le", "8Base-RHOSE-4.7:grpc-plugins-0:1.18.0-4.el8ost.s390x", "8Base-RHOSE-4.7:grpc-plugins-0:1.18.0-4.el8ost.x86_64", "8Base-RHOSE-4.7:grpc-plugins-debuginfo-0:1.18.0-4.el8ost.ppc64le", "8Base-RHOSE-4.7:grpc-plugins-debuginfo-0:1.18.0-4.el8ost.s390x", "8Base-RHOSE-4.7:grpc-plugins-debuginfo-0:1.18.0-4.el8ost.x86_64", "8Base-RHOSE-4.7:haproxy-0:2.0.19-1.el8.src", "8Base-RHOSE-4.7:haproxy-debugsource-0:2.0.19-1.el8.ppc64le", "8Base-RHOSE-4.7:haproxy-debugsource-0:2.0.19-1.el8.s390x", "8Base-RHOSE-4.7:haproxy-debugsource-0:2.0.19-1.el8.x86_64", "8Base-RHOSE-4.7:haproxy20-0:2.0.19-1.el8.ppc64le", "8Base-RHOSE-4.7:haproxy20-0:2.0.19-1.el8.s390x", "8Base-RHOSE-4.7:haproxy20-0:2.0.19-1.el8.x86_64", "8Base-RHOSE-4.7:haproxy20-debuginfo-0:2.0.19-1.el8.ppc64le", "8Base-RHOSE-4.7:haproxy20-debuginfo-0:2.0.19-1.el8.s390x", "8Base-RHOSE-4.7:haproxy20-debuginfo-0:2.0.19-1.el8.x86_64", "8Base-RHOSE-4.7:ignition-0:2.9.0-2.rhaos4.7.git1d56dc8.el8.ppc64le", "8Base-RHOSE-4.7:ignition-0:2.9.0-2.rhaos4.7.git1d56dc8.el8.s390x", "8Base-RHOSE-4.7:ignition-0:2.9.0-2.rhaos4.7.git1d56dc8.el8.src", "8Base-RHOSE-4.7:ignition-0:2.9.0-2.rhaos4.7.git1d56dc8.el8.x86_64", "8Base-RHOSE-4.7:ignition-debuginfo-0:2.9.0-2.rhaos4.7.git1d56dc8.el8.ppc64le", "8Base-RHOSE-4.7:ignition-debuginfo-0:2.9.0-2.rhaos4.7.git1d56dc8.el8.s390x", "8Base-RHOSE-4.7:ignition-debuginfo-0:2.9.0-2.rhaos4.7.git1d56dc8.el8.x86_64", "8Base-RHOSE-4.7:ignition-debugsource-0:2.9.0-2.rhaos4.7.git1d56dc8.el8.ppc64le", "8Base-RHOSE-4.7:ignition-debugsource-0:2.9.0-2.rhaos4.7.git1d56dc8.el8.s390x", "8Base-RHOSE-4.7:ignition-debugsource-0:2.9.0-2.rhaos4.7.git1d56dc8.el8.x86_64", "8Base-RHOSE-4.7:ignition-validate-0:2.9.0-2.rhaos4.7.git1d56dc8.el8.ppc64le", "8Base-RHOSE-4.7:ignition-validate-0:2.9.0-2.rhaos4.7.git1d56dc8.el8.s390x", "8Base-RHOSE-4.7:ignition-validate-0:2.9.0-2.rhaos4.7.git1d56dc8.el8.x86_64", "8Base-RHOSE-4.7:ignition-validate-debuginfo-0:2.9.0-2.rhaos4.7.git1d56dc8.el8.ppc64le", "8Base-RHOSE-4.7:ignition-validate-debuginfo-0:2.9.0-2.rhaos4.7.git1d56dc8.el8.s390x", "8Base-RHOSE-4.7:ignition-validate-debuginfo-0:2.9.0-2.rhaos4.7.git1d56dc8.el8.x86_64", "8Base-RHOSE-4.7:inotify-tools-0:3.20.1-2.el8.ppc64le", "8Base-RHOSE-4.7:inotify-tools-0:3.20.1-2.el8.s390x", "8Base-RHOSE-4.7:inotify-tools-0:3.20.1-2.el8.src", "8Base-RHOSE-4.7:inotify-tools-0:3.20.1-2.el8.x86_64", "8Base-RHOSE-4.7:inotify-tools-debuginfo-0:3.20.1-2.el8.ppc64le", "8Base-RHOSE-4.7:inotify-tools-debuginfo-0:3.20.1-2.el8.s390x", "8Base-RHOSE-4.7:inotify-tools-debuginfo-0:3.20.1-2.el8.x86_64", "8Base-RHOSE-4.7:inotify-tools-debugsource-0:3.20.1-2.el8.ppc64le", "8Base-RHOSE-4.7:inotify-tools-debugsource-0:3.20.1-2.el8.s390x", "8Base-RHOSE-4.7:inotify-tools-debugsource-0:3.20.1-2.el8.x86_64", "8Base-RHOSE-4.7:inotify-tools-devel-0:3.20.1-2.el8.ppc64le", "8Base-RHOSE-4.7:inotify-tools-devel-0:3.20.1-2.el8.s390x", "8Base-RHOSE-4.7:inotify-tools-devel-0:3.20.1-2.el8.x86_64", "8Base-RHOSE-4.7:ironic-images-0:15.1-20210114.1.el8.noarch", "8Base-RHOSE-4.7:ironic-images-0:15.1-20210114.1.el8.src", "8Base-RHOSE-4.7:ironic-images-all-0:15.1-20210114.1.el8.noarch", "8Base-RHOSE-4.7:ironic-images-ipa-ppc64le-0:15.1-20210114.1.el8.noarch", "8Base-RHOSE-4.7:ironic-images-ipa-x86_64-0:15.1-20210114.1.el8.noarch", "8Base-RHOSE-4.7:jenkins-0:2.263.3.1612449007-1.el8.noarch", "8Base-RHOSE-4.7:jenkins-0:2.263.3.1612449007-1.el8.src", "8Base-RHOSE-4.7:jenkins-2-plugins-0:4.7.1611636915-1.el8.noarch", "8Base-RHOSE-4.7:jenkins-2-plugins-0:4.7.1611636915-1.el8.src", "8Base-RHOSE-4.7:jq-0:1.6-2.el8.ppc64le", "8Base-RHOSE-4.7:jq-0:1.6-2.el8.s390x", "8Base-RHOSE-4.7:jq-0:1.6-2.el8.src", "8Base-RHOSE-4.7:jq-0:1.6-2.el8.x86_64", "8Base-RHOSE-4.7:jq-debuginfo-0:1.6-2.el8.ppc64le", "8Base-RHOSE-4.7:jq-debuginfo-0:1.6-2.el8.s390x", "8Base-RHOSE-4.7:jq-debuginfo-0:1.6-2.el8.x86_64", "8Base-RHOSE-4.7:jq-debugsource-0:1.6-2.el8.ppc64le", "8Base-RHOSE-4.7:jq-debugsource-0:1.6-2.el8.s390x", "8Base-RHOSE-4.7:jq-debugsource-0:1.6-2.el8.x86_64", "8Base-RHOSE-4.7:jq-devel-0:1.6-2.el8.ppc64le", "8Base-RHOSE-4.7:jq-devel-0:1.6-2.el8.s390x", "8Base-RHOSE-4.7:jq-devel-0:1.6-2.el8.x86_64", "8Base-RHOSE-4.7:kuryr-binding-scripts-0:1.1.1-0.20190923160834.41e6964.el8ost.noarch", "8Base-RHOSE-4.7:libnftnl-0:1.1.5-4.el8.ppc64le", "8Base-RHOSE-4.7:libnftnl-0:1.1.5-4.el8.s390x", "8Base-RHOSE-4.7:libnftnl-0:1.1.5-4.el8.src", "8Base-RHOSE-4.7:libnftnl-0:1.1.5-4.el8.x86_64", "8Base-RHOSE-4.7:libnftnl-debuginfo-0:1.1.5-4.el8.ppc64le", "8Base-RHOSE-4.7:libnftnl-debuginfo-0:1.1.5-4.el8.s390x", "8Base-RHOSE-4.7:libnftnl-debuginfo-0:1.1.5-4.el8.x86_64", "8Base-RHOSE-4.7:libnftnl-debugsource-0:1.1.5-4.el8.ppc64le", "8Base-RHOSE-4.7:libnftnl-debugsource-0:1.1.5-4.el8.s390x", "8Base-RHOSE-4.7:libnftnl-debugsource-0:1.1.5-4.el8.x86_64", "8Base-RHOSE-4.7:libnftnl-devel-0:1.1.5-4.el8.ppc64le", "8Base-RHOSE-4.7:libnftnl-devel-0:1.1.5-4.el8.s390x", "8Base-RHOSE-4.7:libnftnl-devel-0:1.1.5-4.el8.x86_64", "8Base-RHOSE-4.7:libsodium-0:1.0.16-4.5.el8ost.ppc64le", "8Base-RHOSE-4.7:libsodium-0:1.0.16-4.5.el8ost.s390x", "8Base-RHOSE-4.7:libsodium-0:1.0.16-4.5.el8ost.src", "8Base-RHOSE-4.7:libsodium-0:1.0.16-4.5.el8ost.x86_64", "8Base-RHOSE-4.7:libsodium-debuginfo-0:1.0.16-4.5.el8ost.ppc64le", "8Base-RHOSE-4.7:libsodium-debuginfo-0:1.0.16-4.5.el8ost.s390x", "8Base-RHOSE-4.7:libsodium-debuginfo-0:1.0.16-4.5.el8ost.x86_64", "8Base-RHOSE-4.7:libsodium-debugsource-0:1.0.16-4.5.el8ost.ppc64le", "8Base-RHOSE-4.7:libsodium-debugsource-0:1.0.16-4.5.el8ost.s390x", "8Base-RHOSE-4.7:libsodium-debugsource-0:1.0.16-4.5.el8ost.x86_64", "8Base-RHOSE-4.7:libsodium-devel-0:1.0.16-4.5.el8ost.ppc64le", "8Base-RHOSE-4.7:libsodium-devel-0:1.0.16-4.5.el8ost.s390x", "8Base-RHOSE-4.7:libsodium-devel-0:1.0.16-4.5.el8ost.x86_64", "8Base-RHOSE-4.7:libsodium-static-0:1.0.16-4.5.el8ost.ppc64le", "8Base-RHOSE-4.7:libsodium-static-0:1.0.16-4.5.el8ost.s390x", "8Base-RHOSE-4.7:libsodium-static-0:1.0.16-4.5.el8ost.x86_64", "8Base-RHOSE-4.7:libunwind-0:1.2.1-5.el8.ppc64le", "8Base-RHOSE-4.7:libunwind-0:1.2.1-5.el8.src", "8Base-RHOSE-4.7:libunwind-0:1.2.1-5.el8.x86_64", "8Base-RHOSE-4.7:libunwind-debuginfo-0:1.2.1-5.el8.ppc64le", "8Base-RHOSE-4.7:libunwind-debuginfo-0:1.2.1-5.el8.x86_64", "8Base-RHOSE-4.7:libunwind-debugsource-0:1.2.1-5.el8.ppc64le", "8Base-RHOSE-4.7:libunwind-debugsource-0:1.2.1-5.el8.x86_64", "8Base-RHOSE-4.7:libunwind-devel-0:1.2.1-5.el8.ppc64le", "8Base-RHOSE-4.7:libunwind-devel-0:1.2.1-5.el8.x86_64", "8Base-RHOSE-4.7:network-scripts-openvswitch2.13-0:2.13.0-79.el8fdp.ppc64le", "8Base-RHOSE-4.7:network-scripts-openvswitch2.13-0:2.13.0-79.el8fdp.s390x", "8Base-RHOSE-4.7:network-scripts-openvswitch2.13-0:2.13.0-79.el8fdp.x86_64", "8Base-RHOSE-4.7:octavia-amphora-image-x86_64-0:17.0-20200606.1.el8ost.noarch", "8Base-RHOSE-4.7:openshift-clients-0:4.7.0-202102032256.p0.git.3951.0e656ef.el8.ppc64le", "8Base-RHOSE-4.7:openshift-clients-0:4.7.0-202102032256.p0.git.3951.0e656ef.el8.s390x", "8Base-RHOSE-4.7:openshift-clients-0:4.7.0-202102032256.p0.git.3951.0e656ef.el8.src", "8Base-RHOSE-4.7:openshift-clients-0:4.7.0-202102032256.p0.git.3951.0e656ef.el8.x86_64", "8Base-RHOSE-4.7:openshift-clients-redistributable-0:4.7.0-202102032256.p0.git.3951.0e656ef.el8.x86_64", "8Base-RHOSE-4.7:openshift-eventrouter-0:0.2-4.git7c289cc.el8.ppc64le", "8Base-RHOSE-4.7:openshift-eventrouter-0:0.2-4.git7c289cc.el8.s390x", "8Base-RHOSE-4.7:openshift-eventrouter-0:0.2-4.git7c289cc.el8.src", "8Base-RHOSE-4.7:openshift-eventrouter-0:0.2-4.git7c289cc.el8.x86_64", "8Base-RHOSE-4.7:openshift-eventrouter-debuginfo-0:0.2-4.git7c289cc.el8.ppc64le", "8Base-RHOSE-4.7:openshift-eventrouter-debuginfo-0:0.2-4.git7c289cc.el8.s390x", "8Base-RHOSE-4.7:openshift-eventrouter-debuginfo-0:0.2-4.git7c289cc.el8.x86_64", "8Base-RHOSE-4.7:openshift-eventrouter-debugsource-0:0.2-4.git7c289cc.el8.ppc64le", "8Base-RHOSE-4.7:openshift-eventrouter-debugsource-0:0.2-4.git7c289cc.el8.s390x", "8Base-RHOSE-4.7:openshift-eventrouter-debugsource-0:0.2-4.git7c289cc.el8.x86_64", "8Base-RHOSE-4.7:openshift-kuryr-0:4.7.0-202101262230.p0.git.2494.cd95ce5.el8.src", "8Base-RHOSE-4.7:openshift-kuryr-cni-0:4.7.0-202101262230.p0.git.2494.cd95ce5.el8.noarch", "8Base-RHOSE-4.7:openshift-kuryr-common-0:4.7.0-202101262230.p0.git.2494.cd95ce5.el8.noarch", "8Base-RHOSE-4.7:openshift-kuryr-controller-0:4.7.0-202101262230.p0.git.2494.cd95ce5.el8.noarch", "8Base-RHOSE-4.7:openstack-ironic-1:16.0.4-0.20210203051223.7d74ea0.el8.src", "8Base-RHOSE-4.7:openstack-ironic-api-1:16.0.4-0.20210203051223.7d74ea0.el8.noarch", "8Base-RHOSE-4.7:openstack-ironic-common-1:16.0.4-0.20210203051223.7d74ea0.el8.noarch", "8Base-RHOSE-4.7:openstack-ironic-conductor-1:16.0.4-0.20210203051223.7d74ea0.el8.noarch", "8Base-RHOSE-4.7:openstack-ironic-inspector-0:10.4.1-0.20201123161216.70fccec.el8.noarch", "8Base-RHOSE-4.7:openstack-ironic-inspector-0:10.4.1-0.20201123161216.70fccec.el8.src", "8Base-RHOSE-4.7:openstack-ironic-inspector-api-0:10.4.1-0.20201123161216.70fccec.el8.noarch", "8Base-RHOSE-4.7:openstack-ironic-inspector-conductor-0:10.4.1-0.20201123161216.70fccec.el8.noarch", "8Base-RHOSE-4.7:openstack-ironic-inspector-dnsmasq-0:10.4.1-0.20201123161216.70fccec.el8.noarch", "8Base-RHOSE-4.7:openstack-ironic-python-agent-0:6.4.3-0.20201217171210.bd45db1.el8.noarch", "8Base-RHOSE-4.7:openstack-ironic-python-agent-0:6.4.3-0.20201217171210.bd45db1.el8.src", "8Base-RHOSE-4.7:openvswitch2.13-0:2.13.0-79.el8fdp.ppc64le", "8Base-RHOSE-4.7:openvswitch2.13-0:2.13.0-79.el8fdp.s390x", "8Base-RHOSE-4.7:openvswitch2.13-0:2.13.0-79.el8fdp.src", "8Base-RHOSE-4.7:openvswitch2.13-0:2.13.0-79.el8fdp.x86_64", "8Base-RHOSE-4.7:openvswitch2.13-debuginfo-0:2.13.0-79.el8fdp.ppc64le", "8Base-RHOSE-4.7:openvswitch2.13-debuginfo-0:2.13.0-79.el8fdp.s390x", "8Base-RHOSE-4.7:openvswitch2.13-debuginfo-0:2.13.0-79.el8fdp.x86_64", "8Base-RHOSE-4.7:openvswitch2.13-debugsource-0:2.13.0-79.el8fdp.ppc64le", "8Base-RHOSE-4.7:openvswitch2.13-debugsource-0:2.13.0-79.el8fdp.s390x", "8Base-RHOSE-4.7:openvswitch2.13-debugsource-0:2.13.0-79.el8fdp.x86_64", "8Base-RHOSE-4.7:openvswitch2.13-devel-0:2.13.0-79.el8fdp.ppc64le", "8Base-RHOSE-4.7:openvswitch2.13-devel-0:2.13.0-79.el8fdp.s390x", "8Base-RHOSE-4.7:openvswitch2.13-devel-0:2.13.0-79.el8fdp.x86_64", "8Base-RHOSE-4.7:openvswitch2.13-test-0:2.13.0-79.el8fdp.noarch", "8Base-RHOSE-4.7:ostree-0:2020.7-1.el8.ppc64le", "8Base-RHOSE-4.7:ostree-0:2020.7-1.el8.s390x", "8Base-RHOSE-4.7:ostree-0:2020.7-1.el8.src", "8Base-RHOSE-4.7:ostree-0:2020.7-1.el8.x86_64", "8Base-RHOSE-4.7:ostree-debuginfo-0:2020.7-1.el8.ppc64le", "8Base-RHOSE-4.7:ostree-debuginfo-0:2020.7-1.el8.s390x", "8Base-RHOSE-4.7:ostree-debuginfo-0:2020.7-1.el8.x86_64", "8Base-RHOSE-4.7:ostree-debugsource-0:2020.7-1.el8.ppc64le", "8Base-RHOSE-4.7:ostree-debugsource-0:2020.7-1.el8.s390x", "8Base-RHOSE-4.7:ostree-debugsource-0:2020.7-1.el8.x86_64", "8Base-RHOSE-4.7:ostree-devel-0:2020.7-1.el8.ppc64le", "8Base-RHOSE-4.7:ostree-devel-0:2020.7-1.el8.s390x", "8Base-RHOSE-4.7:ostree-devel-0:2020.7-1.el8.x86_64", "8Base-RHOSE-4.7:ostree-grub2-0:2020.7-1.el8.ppc64le", "8Base-RHOSE-4.7:ostree-grub2-0:2020.7-1.el8.x86_64", "8Base-RHOSE-4.7:ostree-libs-0:2020.7-1.el8.ppc64le", "8Base-RHOSE-4.7:ostree-libs-0:2020.7-1.el8.s390x", "8Base-RHOSE-4.7:ostree-libs-0:2020.7-1.el8.x86_64", "8Base-RHOSE-4.7:ostree-libs-debuginfo-0:2020.7-1.el8.ppc64le", "8Base-RHOSE-4.7:ostree-libs-debuginfo-0:2020.7-1.el8.s390x", "8Base-RHOSE-4.7:ostree-libs-debuginfo-0:2020.7-1.el8.x86_64", "8Base-RHOSE-4.7:ovn2.13-0:20.09.0-21.el8fdn.ppc64le", "8Base-RHOSE-4.7:ovn2.13-0:20.09.0-21.el8fdn.s390x", "8Base-RHOSE-4.7:ovn2.13-0:20.09.0-21.el8fdn.src", "8Base-RHOSE-4.7:ovn2.13-0:20.09.0-21.el8fdn.x86_64", "8Base-RHOSE-4.7:ovn2.13-central-0:20.09.0-21.el8fdn.ppc64le", "8Base-RHOSE-4.7:ovn2.13-central-0:20.09.0-21.el8fdn.s390x", "8Base-RHOSE-4.7:ovn2.13-central-0:20.09.0-21.el8fdn.x86_64", "8Base-RHOSE-4.7:ovn2.13-central-debuginfo-0:20.09.0-21.el8fdn.ppc64le", "8Base-RHOSE-4.7:ovn2.13-central-debuginfo-0:20.09.0-21.el8fdn.s390x", "8Base-RHOSE-4.7:ovn2.13-central-debuginfo-0:20.09.0-21.el8fdn.x86_64", "8Base-RHOSE-4.7:ovn2.13-debuginfo-0:20.09.0-21.el8fdn.ppc64le", "8Base-RHOSE-4.7:ovn2.13-debuginfo-0:20.09.0-21.el8fdn.s390x", "8Base-RHOSE-4.7:ovn2.13-debuginfo-0:20.09.0-21.el8fdn.x86_64", "8Base-RHOSE-4.7:ovn2.13-debugsource-0:20.09.0-21.el8fdn.ppc64le", "8Base-RHOSE-4.7:ovn2.13-debugsource-0:20.09.0-21.el8fdn.s390x", "8Base-RHOSE-4.7:ovn2.13-debugsource-0:20.09.0-21.el8fdn.x86_64", "8Base-RHOSE-4.7:ovn2.13-host-0:20.09.0-21.el8fdn.ppc64le", "8Base-RHOSE-4.7:ovn2.13-host-0:20.09.0-21.el8fdn.s390x", "8Base-RHOSE-4.7:ovn2.13-host-0:20.09.0-21.el8fdn.x86_64", "8Base-RHOSE-4.7:ovn2.13-host-debuginfo-0:20.09.0-21.el8fdn.ppc64le", "8Base-RHOSE-4.7:ovn2.13-host-debuginfo-0:20.09.0-21.el8fdn.s390x", "8Base-RHOSE-4.7:ovn2.13-host-debuginfo-0:20.09.0-21.el8fdn.x86_64", "8Base-RHOSE-4.7:ovn2.13-vtep-0:20.09.0-21.el8fdn.ppc64le", "8Base-RHOSE-4.7:ovn2.13-vtep-0:20.09.0-21.el8fdn.s390x", "8Base-RHOSE-4.7:ovn2.13-vtep-0:20.09.0-21.el8fdn.x86_64", "8Base-RHOSE-4.7:ovn2.13-vtep-debuginfo-0:20.09.0-21.el8fdn.ppc64le", "8Base-RHOSE-4.7:ovn2.13-vtep-debuginfo-0:20.09.0-21.el8fdn.s390x", "8Base-RHOSE-4.7:ovn2.13-vtep-debuginfo-0:20.09.0-21.el8fdn.x86_64", "8Base-RHOSE-4.7:powerpc-utils-0:1.3.6-12.el8_3.ppc64le", "8Base-RHOSE-4.7:powerpc-utils-0:1.3.6-12.el8_3.src", "8Base-RHOSE-4.7:powerpc-utils-core-0:1.3.6-12.el8_3.ppc64le", "8Base-RHOSE-4.7:powerpc-utils-core-debuginfo-0:1.3.6-12.el8_3.ppc64le", "8Base-RHOSE-4.7:powerpc-utils-debugsource-0:1.3.6-12.el8_3.ppc64le", "8Base-RHOSE-4.7:pprof-0:2.6.3-2.el8ost.noarch", "8Base-RHOSE-4.7:prometheus-promu-0:0.5.0-2.git642a960.el8.ppc64le", "8Base-RHOSE-4.7:prometheus-promu-0:0.5.0-2.git642a960.el8.s390x", "8Base-RHOSE-4.7:prometheus-promu-0:0.5.0-2.git642a960.el8.x86_64", "8Base-RHOSE-4.7:protobuf-0:3.6.1-4.el8ost.ppc64le", "8Base-RHOSE-4.7:protobuf-0:3.6.1-4.el8ost.s390x", "8Base-RHOSE-4.7:protobuf-0:3.6.1-4.el8ost.src", "8Base-RHOSE-4.7:protobuf-0:3.6.1-4.el8ost.x86_64", "8Base-RHOSE-4.7:protobuf-compiler-0:3.6.1-4.el8ost.ppc64le", "8Base-RHOSE-4.7:protobuf-compiler-0:3.6.1-4.el8ost.s390x", "8Base-RHOSE-4.7:protobuf-compiler-0:3.6.1-4.el8ost.x86_64", "8Base-RHOSE-4.7:protobuf-compiler-debuginfo-0:3.6.1-4.el8ost.ppc64le", "8Base-RHOSE-4.7:protobuf-compiler-debuginfo-0:3.6.1-4.el8ost.s390x", "8Base-RHOSE-4.7:protobuf-compiler-debuginfo-0:3.6.1-4.el8ost.x86_64", "8Base-RHOSE-4.7:protobuf-debuginfo-0:3.6.1-4.el8ost.ppc64le", "8Base-RHOSE-4.7:protobuf-debuginfo-0:3.6.1-4.el8ost.s390x", "8Base-RHOSE-4.7:protobuf-debuginfo-0:3.6.1-4.el8ost.x86_64", "8Base-RHOSE-4.7:protobuf-debugsource-0:3.6.1-4.el8ost.ppc64le", "8Base-RHOSE-4.7:protobuf-debugsource-0:3.6.1-4.el8ost.s390x", "8Base-RHOSE-4.7:protobuf-debugsource-0:3.6.1-4.el8ost.x86_64", "8Base-RHOSE-4.7:protobuf-devel-0:3.6.1-4.el8ost.ppc64le", "8Base-RHOSE-4.7:protobuf-devel-0:3.6.1-4.el8ost.s390x", "8Base-RHOSE-4.7:protobuf-devel-0:3.6.1-4.el8ost.x86_64", "8Base-RHOSE-4.7:protobuf-lite-0:3.6.1-4.el8ost.ppc64le", "8Base-RHOSE-4.7:protobuf-lite-0:3.6.1-4.el8ost.s390x", "8Base-RHOSE-4.7:protobuf-lite-0:3.6.1-4.el8ost.x86_64", "8Base-RHOSE-4.7:protobuf-lite-debuginfo-0:3.6.1-4.el8ost.ppc64le", "8Base-RHOSE-4.7:protobuf-lite-debuginfo-0:3.6.1-4.el8ost.s390x", "8Base-RHOSE-4.7:protobuf-lite-debuginfo-0:3.6.1-4.el8ost.x86_64", "8Base-RHOSE-4.7:protobuf-lite-devel-0:3.6.1-4.el8ost.ppc64le", "8Base-RHOSE-4.7:protobuf-lite-devel-0:3.6.1-4.el8ost.s390x", "8Base-RHOSE-4.7:protobuf-lite-devel-0:3.6.1-4.el8ost.x86_64", "8Base-RHOSE-4.7:protobuf-lite-static-0:3.6.1-4.el8ost.ppc64le", "8Base-RHOSE-4.7:protobuf-lite-static-0:3.6.1-4.el8ost.s390x", "8Base-RHOSE-4.7:protobuf-lite-static-0:3.6.1-4.el8ost.x86_64", "8Base-RHOSE-4.7:protobuf-static-0:3.6.1-4.el8ost.ppc64le", "8Base-RHOSE-4.7:protobuf-static-0:3.6.1-4.el8ost.s390x", "8Base-RHOSE-4.7:protobuf-static-0:3.6.1-4.el8ost.x86_64", "8Base-RHOSE-4.7:protobuf-vim-0:3.6.1-4.el8ost.noarch", "8Base-RHOSE-4.7:python-alembic-0:1.4.2-5.el8ost.src", "8Base-RHOSE-4.7:python-boto3-0:1.9.101-1.el8ost.src", "8Base-RHOSE-4.7:python-botocore-0:1.12.119-1.el8ost.src", "8Base-RHOSE-4.7:python-cachetools-0:3.1.0-1.el8ost.src", "8Base-RHOSE-4.7:python-certifi-0:2018.10.15-4.el8ost.src", "8Base-RHOSE-4.7:python-construct-0:2.10.56-1.el8ost.src", "8Base-RHOSE-4.7:python-daemon-0:2.1.2-9.el8ar.src", "8Base-RHOSE-4.7:python-debtcollector-0:2.2.0-0.20201008171245.649189d.el8.src", "8Base-RHOSE-4.7:python-dictdiffer-0:0.7.1-2.el8ost.src", "8Base-RHOSE-4.7:python-eventlet-0:0.25.2-3.el8ost.src", "8Base-RHOSE-4.7:python-flask-1:1.1.1-1.el8ost.src", "8Base-RHOSE-4.7:python-flask-doc-1:1.1.1-1.el8ost.noarch", "8Base-RHOSE-4.7:python-google-auth-0:1.3.0-1.el8ost.src", "8Base-RHOSE-4.7:python-hardware-0:0.23.0-0.20201031022149.59211cc.el8.src", "8Base-RHOSE-4.7:python-ifaddr-0:0.1.6-5.el8ost.src", "8Base-RHOSE-4.7:python-importlib-metadata-0:1.7.0-1.el8ost.src", "8Base-RHOSE-4.7:python-ironic-lib-0:4.4.1-0.20201218041209.aa7cfec.el8.src", "8Base-RHOSE-4.7:python-keystoneauth1-0:4.2.0-0.20200630234358.dab8e10.el8ost.src", "8Base-RHOSE-4.7:python-kubernetes-0:11.0.0-1.el8.src", "8Base-RHOSE-4.7:python-kuryr-lib-0:1.1.1-0.20190923160834.41e6964.el8ost.src", "8Base-RHOSE-4.7:python-lockfile-1:0.11.0-8.el8ar.src", "8Base-RHOSE-4.7:python-msgpack-0:0.6.2-1.el8ost.src", "8Base-RHOSE-4.7:python-msgpack-debugsource-0:0.6.2-1.el8ost.x86_64", "8Base-RHOSE-4.7:python-openshift-1:0.11.2-1.el8.src", "8Base-RHOSE-4.7:python-openstacksdk-0:0.48.0-0.20200708092906.3b693c2.el8ost.src", "8Base-RHOSE-4.7:python-oslo-concurrency-0:4.3.0-0.20201008180343.2f78803.el8.src", "8Base-RHOSE-4.7:python-oslo-concurrency-lang-0:4.3.0-0.20201008180343.2f78803.el8.noarch", "8Base-RHOSE-4.7:python-oslo-config-2:8.3.2-0.20201008180634.fcb8894.el8.src", "8Base-RHOSE-4.7:python-oslo-context-0:3.1.1-0.20201008190523.57dbded.el8.src", "8Base-RHOSE-4.7:python-oslo-db-0:8.4.0-0.20200918104110.e42c733.el8ost.src", "8Base-RHOSE-4.7:python-oslo-db-lang-0:8.4.0-0.20200918104110.e42c733.el8ost.noarch", "8Base-RHOSE-4.7:python-oslo-i18n-0:5.0.1-0.20201009131251.73187bd.el8.src", "8Base-RHOSE-4.7:python-oslo-i18n-lang-0:5.0.1-0.20201009131251.73187bd.el8.noarch", "8Base-RHOSE-4.7:python-oslo-log-0:4.3.1-0.20201207021200.1597f24.el8.src", "8Base-RHOSE-4.7:python-oslo-log-lang-0:4.3.1-0.20201207021200.1597f24.el8.noarch", "8Base-RHOSE-4.7:python-oslo-serialization-0:4.0.1-0.20201008182423.c7884b2.el8.src", "8Base-RHOSE-4.7:python-oslo-service-0:2.4.0-0.20201008184547.58466a6.el8.src", "8Base-RHOSE-4.7:python-oslo-utils-0:4.6.0-0.20201009175936.91497da.el8.src", "8Base-RHOSE-4.7:python-oslo-utils-lang-0:4.6.0-0.20201009175936.91497da.el8.noarch", "8Base-RHOSE-4.7:python-packaging-0:20.4-1.el8ost.src", "8Base-RHOSE-4.7:python-packaging-doc-0:20.4-1.el8ost.noarch", "8Base-RHOSE-4.7:python-paste-0:3.2.4-1.el8ost.src", "8Base-RHOSE-4.7:python-paste-deploy-0:2.0.1-4.el8ost.src", "8Base-RHOSE-4.7:python-pbr-0:5.4.3-2.el8ost.src", "8Base-RHOSE-4.7:python-pexpect-0:4.6-2.el8ar.src", "8Base-RHOSE-4.7:python-pint-0:0.10.1-1.el8ost.src", "8Base-RHOSE-4.7:python-psutil-0:5.6.6-1.el8ar.src", "8Base-RHOSE-4.7:python-psutil-debugsource-0:5.6.6-1.el8ar.ppc64le", "8Base-RHOSE-4.7:python-psutil-debugsource-0:5.6.6-1.el8ar.s390x", "8Base-RHOSE-4.7:python-psutil-debugsource-0:5.6.6-1.el8ar.x86_64", "8Base-RHOSE-4.7:python-pyghmi-0:1.5.14-2.1.el8ost.src", "8Base-RHOSE-4.7:python-pyroute2-0:0.5.13-1.el8ost.src", "8Base-RHOSE-4.7:python-requests-unixsocket-0:0.1.5-5.el8ar.src", "8Base-RHOSE-4.7:python-rsa-0:4.7-1.el8.src", "8Base-RHOSE-4.7:python-ruamel-yaml-0:0.15.41-4.el8ost.src", "8Base-RHOSE-4.7:python-ruamel-yaml-debugsource-0:0.15.41-4.el8ost.ppc64le", "8Base-RHOSE-4.7:python-ruamel-yaml-debugsource-0:0.15.41-4.el8ost.s390x", "8Base-RHOSE-4.7:python-ruamel-yaml-debugsource-0:0.15.41-4.el8ost.x86_64", "8Base-RHOSE-4.7:python-s3transfer-0:0.2.0-1.el8ost.src", "8Base-RHOSE-4.7:python-stevedore-0:3.2.2-0.20201009151242.274eaa6.el8.src", "8Base-RHOSE-4.7:python-string_utils-0:0.6.0-4.el8ost.src", "8Base-RHOSE-4.7:python-sushy-0:3.6.1-0.20210122201213.7ec0422.el8.src", "8Base-RHOSE-4.7:python-sushy-oem-idrac-0:0.0.3-0.20200922221223.1202372.el8ost.src", "8Base-RHOSE-4.7:python-tenacity-0:6.2.0-1.el8ost.src", "8Base-RHOSE-4.7:python-tooz-0:2.7.0-0.20200723133754.fca43df.el8ost.src", "8Base-RHOSE-4.7:python-websocket-client-0:0.54.0-1.el8ost.src", "8Base-RHOSE-4.7:python-werkzeug-0:1.0.1-3.el8ost.src", "8Base-RHOSE-4.7:python-zeroconf-0:0.24.4-1.el8ost.src", "8Base-RHOSE-4.7:python-zipp-0:0.5.1-2.el8ost.src", "8Base-RHOSE-4.7:python2-botocore-0:1.12.119-1.el8ost.noarch", "8Base-RHOSE-4.7:python2-cachetools-0:3.1.0-1.el8ost.noarch", "8Base-RHOSE-4.7:python3-alembic-0:1.4.2-5.el8ost.noarch", "8Base-RHOSE-4.7:python3-ansible-runner-0:1.4.6-2.el8ar.noarch", "8Base-RHOSE-4.7:python3-boto3-0:1.9.101-1.el8ost.noarch", "8Base-RHOSE-4.7:python3-botocore-0:1.12.119-1.el8ost.noarch", "8Base-RHOSE-4.7:python3-cachetools-0:3.1.0-1.el8ost.noarch", "8Base-RHOSE-4.7:python3-certifi-0:2018.10.15-4.el8ost.noarch", "8Base-RHOSE-4.7:python3-construct-0:2.10.56-1.el8ost.noarch", "8Base-RHOSE-4.7:python3-daemon-0:2.1.2-9.el8ar.noarch", "8Base-RHOSE-4.7:python3-debtcollector-0:2.2.0-0.20201008171245.649189d.el8.noarch", "8Base-RHOSE-4.7:python3-dictdiffer-0:0.7.1-2.el8ost.noarch", "8Base-RHOSE-4.7:python3-eventlet-0:0.25.2-3.el8ost.noarch", "8Base-RHOSE-4.7:python3-flask-1:1.1.1-1.el8ost.noarch", "8Base-RHOSE-4.7:python3-google-auth-0:1.3.0-1.el8ost.noarch", "8Base-RHOSE-4.7:python3-grpcio-0:1.18.0-4.el8ost.ppc64le", "8Base-RHOSE-4.7:python3-grpcio-0:1.18.0-4.el8ost.s390x", "8Base-RHOSE-4.7:python3-grpcio-0:1.18.0-4.el8ost.x86_64", "8Base-RHOSE-4.7:python3-grpcio-debuginfo-0:1.18.0-4.el8ost.ppc64le", "8Base-RHOSE-4.7:python3-grpcio-debuginfo-0:1.18.0-4.el8ost.s390x", "8Base-RHOSE-4.7:python3-grpcio-debuginfo-0:1.18.0-4.el8ost.x86_64", "8Base-RHOSE-4.7:python3-hardware-0:0.23.0-0.20201031022149.59211cc.el8.noarch", "8Base-RHOSE-4.7:python3-hardware-detect-0:0.23.0-0.20201031022149.59211cc.el8.noarch", "8Base-RHOSE-4.7:python3-ifaddr-0:0.1.6-5.el8ost.noarch", "8Base-RHOSE-4.7:python3-importlib-metadata-0:1.7.0-1.el8ost.noarch", "8Base-RHOSE-4.7:python3-ironic-inspector-tests-0:10.4.1-0.20201123161216.70fccec.el8.noarch", "8Base-RHOSE-4.7:python3-ironic-lib-0:4.4.1-0.20201218041209.aa7cfec.el8.noarch", "8Base-RHOSE-4.7:python3-ironic-python-agent-0:6.4.3-0.20201217171210.bd45db1.el8.noarch", "8Base-RHOSE-4.7:python3-ironic-tests-1:16.0.4-0.20210203051223.7d74ea0.el8.noarch", "8Base-RHOSE-4.7:python3-keystoneauth1-0:4.2.0-0.20200630234358.dab8e10.el8ost.noarch", "8Base-RHOSE-4.7:python3-kubernetes-0:11.0.0-1.el8.noarch", "8Base-RHOSE-4.7:python3-kubernetes-tests-0:11.0.0-1.el8.noarch", "8Base-RHOSE-4.7:python3-kuryr-kubernetes-0:4.7.0-202101262230.p0.git.2494.cd95ce5.el8.noarch", "8Base-RHOSE-4.7:python3-kuryr-lib-0:1.1.1-0.20190923160834.41e6964.el8ost.noarch", "8Base-RHOSE-4.7:python3-kuryr-lib-tests-0:1.1.1-0.20190923160834.41e6964.el8ost.noarch", "8Base-RHOSE-4.7:python3-lockfile-1:0.11.0-8.el8ar.noarch", "8Base-RHOSE-4.7:python3-msgpack-0:0.6.2-1.el8ost.x86_64", "8Base-RHOSE-4.7:python3-msgpack-debuginfo-0:0.6.2-1.el8ost.x86_64", "8Base-RHOSE-4.7:python3-openshift-1:0.11.2-1.el8.noarch", "8Base-RHOSE-4.7:python3-openstacksdk-0:0.48.0-0.20200708092906.3b693c2.el8ost.noarch", "8Base-RHOSE-4.7:python3-openstacksdk-tests-0:0.48.0-0.20200708092906.3b693c2.el8ost.noarch", "8Base-RHOSE-4.7:python3-openvswitch2.13-0:2.13.0-79.el8fdp.ppc64le", "8Base-RHOSE-4.7:python3-openvswitch2.13-0:2.13.0-79.el8fdp.s390x", "8Base-RHOSE-4.7:python3-openvswitch2.13-0:2.13.0-79.el8fdp.x86_64", "8Base-RHOSE-4.7:python3-openvswitch2.13-debuginfo-0:2.13.0-79.el8fdp.ppc64le", "8Base-RHOSE-4.7:python3-openvswitch2.13-debuginfo-0:2.13.0-79.el8fdp.s390x", "8Base-RHOSE-4.7:python3-openvswitch2.13-debuginfo-0:2.13.0-79.el8fdp.x86_64", "8Base-RHOSE-4.7:python3-oslo-concurrency-0:4.3.0-0.20201008180343.2f78803.el8.noarch", "8Base-RHOSE-4.7:python3-oslo-concurrency-tests-0:4.3.0-0.20201008180343.2f78803.el8.noarch", "8Base-RHOSE-4.7:python3-oslo-config-2:8.3.2-0.20201008180634.fcb8894.el8.noarch", "8Base-RHOSE-4.7:python3-oslo-context-0:3.1.1-0.20201008190523.57dbded.el8.noarch", "8Base-RHOSE-4.7:python3-oslo-context-tests-0:3.1.1-0.20201008190523.57dbded.el8.noarch", "8Base-RHOSE-4.7:python3-oslo-db-0:8.4.0-0.20200918104110.e42c733.el8ost.noarch", "8Base-RHOSE-4.7:python3-oslo-db-tests-0:8.4.0-0.20200918104110.e42c733.el8ost.noarch", "8Base-RHOSE-4.7:python3-oslo-i18n-0:5.0.1-0.20201009131251.73187bd.el8.noarch", "8Base-RHOSE-4.7:python3-oslo-log-0:4.3.1-0.20201207021200.1597f24.el8.noarch", "8Base-RHOSE-4.7:python3-oslo-log-tests-0:4.3.1-0.20201207021200.1597f24.el8.noarch", "8Base-RHOSE-4.7:python3-oslo-serialization-0:4.0.1-0.20201008182423.c7884b2.el8.noarch", "8Base-RHOSE-4.7:python3-oslo-serialization-tests-0:4.0.1-0.20201008182423.c7884b2.el8.noarch", "8Base-RHOSE-4.7:python3-oslo-service-0:2.4.0-0.20201008184547.58466a6.el8.noarch", "8Base-RHOSE-4.7:python3-oslo-service-tests-0:2.4.0-0.20201008184547.58466a6.el8.noarch", "8Base-RHOSE-4.7:python3-oslo-utils-0:4.6.0-0.20201009175936.91497da.el8.noarch", "8Base-RHOSE-4.7:python3-oslo-utils-tests-0:4.6.0-0.20201009175936.91497da.el8.noarch", "8Base-RHOSE-4.7:python3-packaging-0:20.4-1.el8ost.noarch", "8Base-RHOSE-4.7:python3-paste-0:3.2.4-1.el8ost.noarch", "8Base-RHOSE-4.7:python3-paste-deploy-0:2.0.1-4.el8ost.noarch", "8Base-RHOSE-4.7:python3-pbr-0:5.4.3-2.el8ost.noarch", "8Base-RHOSE-4.7:python3-pexpect-0:4.6-2.el8ar.noarch", "8Base-RHOSE-4.7:python3-pint-0:0.10.1-1.el8ost.noarch", "8Base-RHOSE-4.7:python3-protobuf-0:3.6.1-4.el8ost.noarch", "8Base-RHOSE-4.7:python3-psutil-0:5.6.6-1.el8ar.ppc64le", "8Base-RHOSE-4.7:python3-psutil-0:5.6.6-1.el8ar.s390x", "8Base-RHOSE-4.7:python3-psutil-0:5.6.6-1.el8ar.x86_64", "8Base-RHOSE-4.7:python3-psutil-debuginfo-0:5.6.6-1.el8ar.ppc64le", "8Base-RHOSE-4.7:python3-psutil-debuginfo-0:5.6.6-1.el8ar.s390x", "8Base-RHOSE-4.7:python3-psutil-debuginfo-0:5.6.6-1.el8ar.x86_64", "8Base-RHOSE-4.7:python3-pyghmi-0:1.5.14-2.1.el8ost.noarch", "8Base-RHOSE-4.7:python3-pyroute2-0:0.5.13-1.el8ost.noarch", "8Base-RHOSE-4.7:python3-requests-unixsocket-0:0.1.5-5.el8ar.noarch", "8Base-RHOSE-4.7:python3-rsa-0:4.7-1.el8.noarch", "8Base-RHOSE-4.7:python3-ruamel-yaml-0:0.15.41-4.el8ost.ppc64le", "8Base-RHOSE-4.7:python3-ruamel-yaml-0:0.15.41-4.el8ost.s390x", "8Base-RHOSE-4.7:python3-ruamel-yaml-0:0.15.41-4.el8ost.x86_64", "8Base-RHOSE-4.7:python3-ruamel-yaml-debuginfo-0:0.15.41-4.el8ost.ppc64le", "8Base-RHOSE-4.7:python3-ruamel-yaml-debuginfo-0:0.15.41-4.el8ost.s390x", "8Base-RHOSE-4.7:python3-ruamel-yaml-debuginfo-0:0.15.41-4.el8ost.x86_64", "8Base-RHOSE-4.7:python3-s3transfer-0:0.2.0-1.el8ost.noarch", "8Base-RHOSE-4.7:python3-stevedore-0:3.2.2-0.20201009151242.274eaa6.el8.noarch", "8Base-RHOSE-4.7:python3-string_utils-0:0.6.0-4.el8ost.noarch", "8Base-RHOSE-4.7:python3-sushy-0:3.6.1-0.20210122201213.7ec0422.el8.noarch", "8Base-RHOSE-4.7:python3-sushy-oem-idrac-0:0.0.3-0.20200922221223.1202372.el8ost.noarch", "8Base-RHOSE-4.7:python3-sushy-oem-idrac-tests-0:0.0.3-0.20200922221223.1202372.el8ost.noarch", "8Base-RHOSE-4.7:python3-sushy-tests-0:3.6.1-0.20210122201213.7ec0422.el8.noarch", "8Base-RHOSE-4.7:python3-tenacity-0:6.2.0-1.el8ost.noarch", "8Base-RHOSE-4.7:python3-tooz-0:2.7.0-0.20200723133754.fca43df.el8ost.noarch", "8Base-RHOSE-4.7:python3-websocket-client-0:0.54.0-1.el8ost.noarch", "8Base-RHOSE-4.7:python3-werkzeug-0:1.0.1-3.el8ost.noarch", "8Base-RHOSE-4.7:python3-zeroconf-0:0.24.4-1.el8ost.noarch", "8Base-RHOSE-4.7:python3-zipp-0:0.5.1-2.el8ost.noarch", "8Base-RHOSE-4.7:redhat-release-coreos-0:47.83-1.el8.ppc64le", "8Base-RHOSE-4.7:redhat-release-coreos-0:47.83-1.el8.s390x", "8Base-RHOSE-4.7:redhat-release-coreos-0:47.83-1.el8.src", "8Base-RHOSE-4.7:redhat-release-coreos-0:47.83-1.el8.x86_64", "8Base-RHOSE-4.7:rhcos-tools-0:0.0.0-1.rhaos4.2.el8.noarch", "8Base-RHOSE-4.7:rhcos-tools-0:0.0.0-1.rhaos4.2.el8.src", "8Base-RHOSE-4.7:rhosp-director-images-0:17.0-20200606.1.el8ost.noarch", "8Base-RHOSE-4.7:rhosp-director-images-0:17.0-20200606.1.el8ost.src", "8Base-RHOSE-4.7:rhosp-director-images-all-0:17.0-20200606.1.el8ost.noarch", "8Base-RHOSE-4.7:rhosp-director-images-ipa-0:17.0-20200606.1.el8ost.noarch", "8Base-RHOSE-4.7:rhosp-director-images-ipa-ppc64le-0:17.0-20200606.1.el8ost.noarch", "8Base-RHOSE-4.7:rhosp-director-images-ipa-x86_64-0:17.0-20200606.1.el8ost.noarch", "8Base-RHOSE-4.7:rhosp-director-images-minimal-0:17.0-20200606.1.el8ost.noarch", "8Base-RHOSE-4.7:rhosp-director-images-ppc64le-0:17.0-20200606.1.el8ost.noarch", "8Base-RHOSE-4.7:rhosp-director-images-x86_64-0:17.0-20200606.1.el8ost.noarch", "8Base-RHOSE-4.7:rpm-ostree-0:2020.7-1.el8_3.ppc64le", "8Base-RHOSE-4.7:rpm-ostree-0:2020.7-1.el8_3.s390x", "8Base-RHOSE-4.7:rpm-ostree-0:2020.7-1.el8_3.src", "8Base-RHOSE-4.7:rpm-ostree-0:2020.7-1.el8_3.x86_64", "8Base-RHOSE-4.7:rpm-ostree-debuginfo-0:2020.7-1.el8_3.ppc64le", "8Base-RHOSE-4.7:rpm-ostree-debuginfo-0:2020.7-1.el8_3.s390x", "8Base-RHOSE-4.7:rpm-ostree-debuginfo-0:2020.7-1.el8_3.x86_64", "8Base-RHOSE-4.7:rpm-ostree-debugsource-0:2020.7-1.el8_3.ppc64le", "8Base-RHOSE-4.7:rpm-ostree-debugsource-0:2020.7-1.el8_3.s390x", "8Base-RHOSE-4.7:rpm-ostree-debugsource-0:2020.7-1.el8_3.x86_64", "8Base-RHOSE-4.7:rpm-ostree-devel-0:2020.7-1.el8_3.ppc64le", "8Base-RHOSE-4.7:rpm-ostree-devel-0:2020.7-1.el8_3.s390x", "8Base-RHOSE-4.7:rpm-ostree-devel-0:2020.7-1.el8_3.x86_64", "8Base-RHOSE-4.7:rpm-ostree-libs-0:2020.7-1.el8_3.ppc64le", "8Base-RHOSE-4.7:rpm-ostree-libs-0:2020.7-1.el8_3.s390x", "8Base-RHOSE-4.7:rpm-ostree-libs-0:2020.7-1.el8_3.x86_64", "8Base-RHOSE-4.7:rpm-ostree-libs-debuginfo-0:2020.7-1.el8_3.ppc64le", "8Base-RHOSE-4.7:rpm-ostree-libs-debuginfo-0:2020.7-1.el8_3.s390x", "8Base-RHOSE-4.7:rpm-ostree-libs-debuginfo-0:2020.7-1.el8_3.x86_64", "8Base-RHOSE-4.7:runc-0:1.0.0-82.rhaos4.6.git086e841.el8.ppc64le", "8Base-RHOSE-4.7:runc-0:1.0.0-82.rhaos4.6.git086e841.el8.s390x", "8Base-RHOSE-4.7:runc-0:1.0.0-82.rhaos4.6.git086e841.el8.src", "8Base-RHOSE-4.7:runc-0:1.0.0-82.rhaos4.6.git086e841.el8.x86_64", "8Base-RHOSE-4.7:runc-debuginfo-0:1.0.0-82.rhaos4.6.git086e841.el8.ppc64le", "8Base-RHOSE-4.7:runc-debuginfo-0:1.0.0-82.rhaos4.6.git086e841.el8.s390x", "8Base-RHOSE-4.7:runc-debuginfo-0:1.0.0-82.rhaos4.6.git086e841.el8.x86_64", "8Base-RHOSE-4.7:runc-debugsource-0:1.0.0-82.rhaos4.6.git086e841.el8.ppc64le", "8Base-RHOSE-4.7:runc-debugsource-0:1.0.0-82.rhaos4.6.git086e841.el8.s390x", "8Base-RHOSE-4.7:runc-debugsource-0:1.0.0-82.rhaos4.6.git086e841.el8.x86_64", "8Base-RHOSE-4.7:rust-afterburn-0:4.6.0-1.rhaos4.7.el8.src", "8Base-RHOSE-4.7:rust-afterburn-debugsource-0:4.6.0-1.rhaos4.7.el8.ppc64le", "8Base-RHOSE-4.7:rust-afterburn-debugsource-0:4.6.0-1.rhaos4.7.el8.s390x", "8Base-RHOSE-4.7:rust-afterburn-debugsource-0:4.6.0-1.rhaos4.7.el8.x86_64", "8Base-RHOSE-4.7:rust-bootupd-0:0.2.5-2.el8.src", "8Base-RHOSE-4.7:rust-bootupd-debugsource-0:0.2.5-2.el8.x86_64", "8Base-RHOSE-4.7:tini-0:0.16.1-1.el8ar.ppc64le", "8Base-RHOSE-4.7:tini-0:0.16.1-1.el8ar.s390x", "8Base-RHOSE-4.7:tini-0:0.16.1-1.el8ar.src", "8Base-RHOSE-4.7:tini-0:0.16.1-1.el8ar.x86_64", "8Base-RHOSE-4.7:toolbox-0:0.0.8-3.rhaos4.7.el8.noarch", "8Base-RHOSE-4.7:toolbox-0:0.0.8-3.rhaos4.7.el8.src" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1693905" } ], "notes": [ { "category": "description", "text": "A vulnerability exists in the garbage collection mechanism of atomic-openshift. An attacker able spoof the UUID of a valid object from another namespace is able to delete children of those objects.", "title": "Vulnerability description" }, { "category": "summary", "text": "atomic-openshift: cross-namespace owner references can trigger deletions of valid children", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RH7-RHOSE-4.7:openshift-0:4.7.0-202102060108.p0.git.97095.7271b90.el7.src", "7Server-RH7-RHOSE-4.7:openshift-hyperkube-0:4.7.0-202102060108.p0.git.97095.7271b90.el7.x86_64", "8Base-RHOSE-4.7:openshift-0:4.7.0-202102060108.p0.git.97095.7271b90.el8.src", "8Base-RHOSE-4.7:openshift-hyperkube-0:4.7.0-202102060108.p0.git.97095.7271b90.el8.ppc64le", "8Base-RHOSE-4.7:openshift-hyperkube-0:4.7.0-202102060108.p0.git.97095.7271b90.el8.s390x", "8Base-RHOSE-4.7:openshift-hyperkube-0:4.7.0-202102060108.p0.git.97095.7271b90.el8.x86_64" ], "known_not_affected": [ "7Server-RH7-RHOSE-4.7:conmon-2:2.0.21-2.rhaos4.6.el7.src", "7Server-RH7-RHOSE-4.7:conmon-2:2.0.21-2.rhaos4.6.el7.x86_64", "7Server-RH7-RHOSE-4.7:containernetworking-plugins-0:0.8.6-1.rhaos4.5.el7.src", "7Server-RH7-RHOSE-4.7:containernetworking-plugins-0:0.8.6-1.rhaos4.5.el7.x86_64", "7Server-RH7-RHOSE-4.7:containernetworking-plugins-debuginfo-0:0.8.6-1.rhaos4.5.el7.x86_64", "7Server-RH7-RHOSE-4.7:cri-o-0:1.20.0-0.rhaos4.7.git8921e00.el7.51.src", "7Server-RH7-RHOSE-4.7:cri-o-0:1.20.0-0.rhaos4.7.git8921e00.el7.51.x86_64", "7Server-RH7-RHOSE-4.7:cri-o-debuginfo-0:1.20.0-0.rhaos4.7.git8921e00.el7.51.x86_64", "7Server-RH7-RHOSE-4.7:cri-tools-0:1.18.0-3.el7.src", "7Server-RH7-RHOSE-4.7:cri-tools-0:1.18.0-3.el7.x86_64", "7Server-RH7-RHOSE-4.7:cri-tools-debuginfo-0:1.18.0-3.el7.x86_64", "7Server-RH7-RHOSE-4.7:haproxy-0:2.0.19-1.el7.src", "7Server-RH7-RHOSE-4.7:haproxy-debuginfo-0:2.0.19-1.el7.x86_64", "7Server-RH7-RHOSE-4.7:haproxy20-0:2.0.19-1.el7.x86_64", "7Server-RH7-RHOSE-4.7:jq-0:1.6-2.el7.src", "7Server-RH7-RHOSE-4.7:jq-0:1.6-2.el7.x86_64", "7Server-RH7-RHOSE-4.7:jq-debuginfo-0:1.6-2.el7.x86_64", "7Server-RH7-RHOSE-4.7:jq-devel-0:1.6-2.el7.x86_64", "7Server-RH7-RHOSE-4.7:oniguruma-0:5.9.2-5.el7.src", "7Server-RH7-RHOSE-4.7:oniguruma-0:5.9.2-5.el7.x86_64", "7Server-RH7-RHOSE-4.7:oniguruma-debuginfo-0:5.9.2-5.el7.x86_64", "7Server-RH7-RHOSE-4.7:oniguruma-devel-0:5.9.2-5.el7.x86_64", "7Server-RH7-RHOSE-4.7:openshift-ansible-0:4.7.0-202102032256.p0.git.0.bf7d9a7.el7.noarch", "7Server-RH7-RHOSE-4.7:openshift-ansible-0:4.7.0-202102032256.p0.git.0.bf7d9a7.el7.src", "7Server-RH7-RHOSE-4.7:openshift-ansible-test-0:4.7.0-202102032256.p0.git.0.bf7d9a7.el7.noarch", "7Server-RH7-RHOSE-4.7:openshift-clients-0:4.7.0-202102032256.p0.git.3951.0e656ef.el7.src", "7Server-RH7-RHOSE-4.7:openshift-clients-0:4.7.0-202102032256.p0.git.3951.0e656ef.el7.x86_64", "7Server-RH7-RHOSE-4.7:openshift-clients-redistributable-0:4.7.0-202102032256.p0.git.3951.0e656ef.el7.x86_64", "7Server-RH7-RHOSE-4.7:python-botocore-0:1.4.57-5.el7.src", "7Server-RH7-RHOSE-4.7:python2-botocore-0:1.4.57-5.el7.noarch", "7Server-RH7-RHOSE-4.7:runc-0:1.0.0-82.rhaos4.6.git086e841.el7.src", "7Server-RH7-RHOSE-4.7:runc-0:1.0.0-82.rhaos4.6.git086e841.el7.x86_64", "7Server-RH7-RHOSE-4.7:runc-debuginfo-0:1.0.0-82.rhaos4.6.git086e841.el7.x86_64", "8Base-RHOSE-4.7:NetworkManager-1:1.26.0-12.1.rhaos4.7.el8.ppc64le", "8Base-RHOSE-4.7:NetworkManager-1:1.26.0-12.1.rhaos4.7.el8.s390x", "8Base-RHOSE-4.7:NetworkManager-1:1.26.0-12.1.rhaos4.7.el8.src", "8Base-RHOSE-4.7:NetworkManager-1:1.26.0-12.1.rhaos4.7.el8.x86_64", "8Base-RHOSE-4.7:NetworkManager-adsl-1:1.26.0-12.1.rhaos4.7.el8.ppc64le", "8Base-RHOSE-4.7:NetworkManager-adsl-1:1.26.0-12.1.rhaos4.7.el8.s390x", "8Base-RHOSE-4.7:NetworkManager-adsl-1:1.26.0-12.1.rhaos4.7.el8.x86_64", "8Base-RHOSE-4.7:NetworkManager-adsl-debuginfo-1:1.26.0-12.1.rhaos4.7.el8.ppc64le", "8Base-RHOSE-4.7:NetworkManager-adsl-debuginfo-1:1.26.0-12.1.rhaos4.7.el8.s390x", "8Base-RHOSE-4.7:NetworkManager-adsl-debuginfo-1:1.26.0-12.1.rhaos4.7.el8.x86_64", "8Base-RHOSE-4.7:NetworkManager-bluetooth-1:1.26.0-12.1.rhaos4.7.el8.ppc64le", "8Base-RHOSE-4.7:NetworkManager-bluetooth-1:1.26.0-12.1.rhaos4.7.el8.s390x", "8Base-RHOSE-4.7:NetworkManager-bluetooth-1:1.26.0-12.1.rhaos4.7.el8.x86_64", "8Base-RHOSE-4.7:NetworkManager-bluetooth-debuginfo-1:1.26.0-12.1.rhaos4.7.el8.ppc64le", "8Base-RHOSE-4.7:NetworkManager-bluetooth-debuginfo-1:1.26.0-12.1.rhaos4.7.el8.s390x", "8Base-RHOSE-4.7:NetworkManager-bluetooth-debuginfo-1:1.26.0-12.1.rhaos4.7.el8.x86_64", "8Base-RHOSE-4.7:NetworkManager-cloud-setup-1:1.26.0-12.1.rhaos4.7.el8.ppc64le", "8Base-RHOSE-4.7:NetworkManager-cloud-setup-1:1.26.0-12.1.rhaos4.7.el8.s390x", "8Base-RHOSE-4.7:NetworkManager-cloud-setup-1:1.26.0-12.1.rhaos4.7.el8.x86_64", "8Base-RHOSE-4.7:NetworkManager-cloud-setup-debuginfo-1:1.26.0-12.1.rhaos4.7.el8.ppc64le", "8Base-RHOSE-4.7:NetworkManager-cloud-setup-debuginfo-1:1.26.0-12.1.rhaos4.7.el8.s390x", "8Base-RHOSE-4.7:NetworkManager-cloud-setup-debuginfo-1:1.26.0-12.1.rhaos4.7.el8.x86_64", "8Base-RHOSE-4.7:NetworkManager-config-connectivity-redhat-1:1.26.0-12.1.rhaos4.7.el8.noarch", "8Base-RHOSE-4.7:NetworkManager-config-server-1:1.26.0-12.1.rhaos4.7.el8.noarch", "8Base-RHOSE-4.7:NetworkManager-debuginfo-1:1.26.0-12.1.rhaos4.7.el8.ppc64le", "8Base-RHOSE-4.7:NetworkManager-debuginfo-1:1.26.0-12.1.rhaos4.7.el8.s390x", "8Base-RHOSE-4.7:NetworkManager-debuginfo-1:1.26.0-12.1.rhaos4.7.el8.x86_64", "8Base-RHOSE-4.7:NetworkManager-debugsource-1:1.26.0-12.1.rhaos4.7.el8.ppc64le", "8Base-RHOSE-4.7:NetworkManager-debugsource-1:1.26.0-12.1.rhaos4.7.el8.s390x", "8Base-RHOSE-4.7:NetworkManager-debugsource-1:1.26.0-12.1.rhaos4.7.el8.x86_64", "8Base-RHOSE-4.7:NetworkManager-dispatcher-routing-rules-1:1.26.0-12.1.rhaos4.7.el8.noarch", "8Base-RHOSE-4.7:NetworkManager-libnm-1:1.26.0-12.1.rhaos4.7.el8.ppc64le", "8Base-RHOSE-4.7:NetworkManager-libnm-1:1.26.0-12.1.rhaos4.7.el8.s390x", "8Base-RHOSE-4.7:NetworkManager-libnm-1:1.26.0-12.1.rhaos4.7.el8.x86_64", "8Base-RHOSE-4.7:NetworkManager-libnm-debuginfo-1:1.26.0-12.1.rhaos4.7.el8.ppc64le", "8Base-RHOSE-4.7:NetworkManager-libnm-debuginfo-1:1.26.0-12.1.rhaos4.7.el8.s390x", "8Base-RHOSE-4.7:NetworkManager-libnm-debuginfo-1:1.26.0-12.1.rhaos4.7.el8.x86_64", "8Base-RHOSE-4.7:NetworkManager-libnm-devel-1:1.26.0-12.1.rhaos4.7.el8.ppc64le", "8Base-RHOSE-4.7:NetworkManager-libnm-devel-1:1.26.0-12.1.rhaos4.7.el8.s390x", "8Base-RHOSE-4.7:NetworkManager-libnm-devel-1:1.26.0-12.1.rhaos4.7.el8.x86_64", "8Base-RHOSE-4.7:NetworkManager-ovs-1:1.26.0-12.1.rhaos4.7.el8.ppc64le", "8Base-RHOSE-4.7:NetworkManager-ovs-1:1.26.0-12.1.rhaos4.7.el8.s390x", "8Base-RHOSE-4.7:NetworkManager-ovs-1:1.26.0-12.1.rhaos4.7.el8.x86_64", "8Base-RHOSE-4.7:NetworkManager-ovs-debuginfo-1:1.26.0-12.1.rhaos4.7.el8.ppc64le", "8Base-RHOSE-4.7:NetworkManager-ovs-debuginfo-1:1.26.0-12.1.rhaos4.7.el8.s390x", "8Base-RHOSE-4.7:NetworkManager-ovs-debuginfo-1:1.26.0-12.1.rhaos4.7.el8.x86_64", "8Base-RHOSE-4.7:NetworkManager-ppp-1:1.26.0-12.1.rhaos4.7.el8.ppc64le", "8Base-RHOSE-4.7:NetworkManager-ppp-1:1.26.0-12.1.rhaos4.7.el8.s390x", "8Base-RHOSE-4.7:NetworkManager-ppp-1:1.26.0-12.1.rhaos4.7.el8.x86_64", "8Base-RHOSE-4.7:NetworkManager-ppp-debuginfo-1:1.26.0-12.1.rhaos4.7.el8.ppc64le", "8Base-RHOSE-4.7:NetworkManager-ppp-debuginfo-1:1.26.0-12.1.rhaos4.7.el8.s390x", "8Base-RHOSE-4.7:NetworkManager-ppp-debuginfo-1:1.26.0-12.1.rhaos4.7.el8.x86_64", "8Base-RHOSE-4.7:NetworkManager-team-1:1.26.0-12.1.rhaos4.7.el8.ppc64le", "8Base-RHOSE-4.7:NetworkManager-team-1:1.26.0-12.1.rhaos4.7.el8.s390x", "8Base-RHOSE-4.7:NetworkManager-team-1:1.26.0-12.1.rhaos4.7.el8.x86_64", "8Base-RHOSE-4.7:NetworkManager-team-debuginfo-1:1.26.0-12.1.rhaos4.7.el8.ppc64le", "8Base-RHOSE-4.7:NetworkManager-team-debuginfo-1:1.26.0-12.1.rhaos4.7.el8.s390x", "8Base-RHOSE-4.7:NetworkManager-team-debuginfo-1:1.26.0-12.1.rhaos4.7.el8.x86_64", "8Base-RHOSE-4.7:NetworkManager-tui-1:1.26.0-12.1.rhaos4.7.el8.ppc64le", "8Base-RHOSE-4.7:NetworkManager-tui-1:1.26.0-12.1.rhaos4.7.el8.s390x", "8Base-RHOSE-4.7:NetworkManager-tui-1:1.26.0-12.1.rhaos4.7.el8.x86_64", "8Base-RHOSE-4.7:NetworkManager-tui-debuginfo-1:1.26.0-12.1.rhaos4.7.el8.ppc64le", "8Base-RHOSE-4.7:NetworkManager-tui-debuginfo-1:1.26.0-12.1.rhaos4.7.el8.s390x", "8Base-RHOSE-4.7:NetworkManager-tui-debuginfo-1:1.26.0-12.1.rhaos4.7.el8.x86_64", "8Base-RHOSE-4.7:NetworkManager-wifi-1:1.26.0-12.1.rhaos4.7.el8.ppc64le", "8Base-RHOSE-4.7:NetworkManager-wifi-1:1.26.0-12.1.rhaos4.7.el8.s390x", "8Base-RHOSE-4.7:NetworkManager-wifi-1:1.26.0-12.1.rhaos4.7.el8.x86_64", "8Base-RHOSE-4.7:NetworkManager-wifi-debuginfo-1:1.26.0-12.1.rhaos4.7.el8.ppc64le", "8Base-RHOSE-4.7:NetworkManager-wifi-debuginfo-1:1.26.0-12.1.rhaos4.7.el8.s390x", "8Base-RHOSE-4.7:NetworkManager-wifi-debuginfo-1:1.26.0-12.1.rhaos4.7.el8.x86_64", "8Base-RHOSE-4.7:NetworkManager-wwan-1:1.26.0-12.1.rhaos4.7.el8.ppc64le", "8Base-RHOSE-4.7:NetworkManager-wwan-1:1.26.0-12.1.rhaos4.7.el8.s390x", "8Base-RHOSE-4.7:NetworkManager-wwan-1:1.26.0-12.1.rhaos4.7.el8.x86_64", "8Base-RHOSE-4.7:NetworkManager-wwan-debuginfo-1:1.26.0-12.1.rhaos4.7.el8.ppc64le", "8Base-RHOSE-4.7:NetworkManager-wwan-debuginfo-1:1.26.0-12.1.rhaos4.7.el8.s390x", "8Base-RHOSE-4.7:NetworkManager-wwan-debuginfo-1:1.26.0-12.1.rhaos4.7.el8.x86_64", "8Base-RHOSE-4.7:afterburn-0:4.6.0-1.rhaos4.7.el8.ppc64le", "8Base-RHOSE-4.7:afterburn-0:4.6.0-1.rhaos4.7.el8.s390x", "8Base-RHOSE-4.7:afterburn-0:4.6.0-1.rhaos4.7.el8.x86_64", "8Base-RHOSE-4.7:afterburn-debuginfo-0:4.6.0-1.rhaos4.7.el8.ppc64le", "8Base-RHOSE-4.7:afterburn-debuginfo-0:4.6.0-1.rhaos4.7.el8.s390x", "8Base-RHOSE-4.7:afterburn-debuginfo-0:4.6.0-1.rhaos4.7.el8.x86_64", "8Base-RHOSE-4.7:ansible-runner-0:1.4.6-2.el8ar.noarch", "8Base-RHOSE-4.7:ansible-runner-0:1.4.6-2.el8ar.src", "8Base-RHOSE-4.7:ansible-runner-http-0:1.0.0-2.el8ar.noarch", "8Base-RHOSE-4.7:ansible-runner-http-0:1.0.0-2.el8ar.src", "8Base-RHOSE-4.7:atomic-openshift-service-idler-0:4.7.0-202011171454.p0.git.15.675c1c8.el8.ppc64le", "8Base-RHOSE-4.7:atomic-openshift-service-idler-0:4.7.0-202011171454.p0.git.15.675c1c8.el8.s390x", "8Base-RHOSE-4.7:atomic-openshift-service-idler-0:4.7.0-202011171454.p0.git.15.675c1c8.el8.src", "8Base-RHOSE-4.7:atomic-openshift-service-idler-0:4.7.0-202011171454.p0.git.15.675c1c8.el8.x86_64", "8Base-RHOSE-4.7:bootupd-0:0.2.5-2.el8.x86_64", "8Base-RHOSE-4.7:bootupd-debuginfo-0:0.2.5-2.el8.x86_64", "8Base-RHOSE-4.7:clevis-0:15-1.el8.ppc64le", "8Base-RHOSE-4.7:clevis-0:15-1.el8.s390x", "8Base-RHOSE-4.7:clevis-0:15-1.el8.src", "8Base-RHOSE-4.7:clevis-0:15-1.el8.x86_64", "8Base-RHOSE-4.7:clevis-debuginfo-0:15-1.el8.ppc64le", "8Base-RHOSE-4.7:clevis-debuginfo-0:15-1.el8.s390x", "8Base-RHOSE-4.7:clevis-debuginfo-0:15-1.el8.x86_64", "8Base-RHOSE-4.7:clevis-debugsource-0:15-1.el8.ppc64le", "8Base-RHOSE-4.7:clevis-debugsource-0:15-1.el8.s390x", "8Base-RHOSE-4.7:clevis-debugsource-0:15-1.el8.x86_64", "8Base-RHOSE-4.7:clevis-dracut-0:15-1.el8.ppc64le", "8Base-RHOSE-4.7:clevis-dracut-0:15-1.el8.s390x", "8Base-RHOSE-4.7:clevis-dracut-0:15-1.el8.x86_64", "8Base-RHOSE-4.7:clevis-luks-0:15-1.el8.ppc64le", "8Base-RHOSE-4.7:clevis-luks-0:15-1.el8.s390x", "8Base-RHOSE-4.7:clevis-luks-0:15-1.el8.x86_64", "8Base-RHOSE-4.7:clevis-systemd-0:15-1.el8.ppc64le", "8Base-RHOSE-4.7:clevis-systemd-0:15-1.el8.s390x", "8Base-RHOSE-4.7:clevis-systemd-0:15-1.el8.x86_64", "8Base-RHOSE-4.7:clevis-udisks2-0:15-1.el8.ppc64le", "8Base-RHOSE-4.7:clevis-udisks2-0:15-1.el8.s390x", "8Base-RHOSE-4.7:clevis-udisks2-0:15-1.el8.x86_64", "8Base-RHOSE-4.7:clevis-udisks2-debuginfo-0:15-1.el8.ppc64le", "8Base-RHOSE-4.7:clevis-udisks2-debuginfo-0:15-1.el8.s390x", "8Base-RHOSE-4.7:clevis-udisks2-debuginfo-0:15-1.el8.x86_64", "8Base-RHOSE-4.7:conmon-2:2.0.21-2.rhaos4.6.el8.ppc64le", "8Base-RHOSE-4.7:conmon-2:2.0.21-2.rhaos4.6.el8.s390x", "8Base-RHOSE-4.7:conmon-2:2.0.21-2.rhaos4.6.el8.src", "8Base-RHOSE-4.7:conmon-2:2.0.21-2.rhaos4.6.el8.x86_64", "8Base-RHOSE-4.7:console-login-helper-messages-0:0.20.3-1.rhaos4.7.el8.noarch", "8Base-RHOSE-4.7:console-login-helper-messages-0:0.20.3-1.rhaos4.7.el8.src", "8Base-RHOSE-4.7:console-login-helper-messages-issuegen-0:0.20.3-1.rhaos4.7.el8.noarch", "8Base-RHOSE-4.7:console-login-helper-messages-profile-0:0.20.3-1.rhaos4.7.el8.noarch", "8Base-RHOSE-4.7:container-selinux-2:2.151.0-1.rhaos4.7.el8.noarch", "8Base-RHOSE-4.7:container-selinux-2:2.151.0-1.rhaos4.7.el8.src", "8Base-RHOSE-4.7:containernetworking-plugins-0:0.8.6-1.rhaos4.5.el8.ppc64le", "8Base-RHOSE-4.7:containernetworking-plugins-0:0.8.6-1.rhaos4.5.el8.s390x", "8Base-RHOSE-4.7:containernetworking-plugins-0:0.8.6-1.rhaos4.5.el8.src", "8Base-RHOSE-4.7:containernetworking-plugins-0:0.8.6-1.rhaos4.5.el8.x86_64", "8Base-RHOSE-4.7:containernetworking-plugins-debuginfo-0:0.8.6-1.rhaos4.5.el8.ppc64le", "8Base-RHOSE-4.7:containernetworking-plugins-debuginfo-0:0.8.6-1.rhaos4.5.el8.s390x", "8Base-RHOSE-4.7:containernetworking-plugins-debuginfo-0:0.8.6-1.rhaos4.5.el8.x86_64", "8Base-RHOSE-4.7:containernetworking-plugins-debugsource-0:0.8.6-1.rhaos4.5.el8.ppc64le", "8Base-RHOSE-4.7:containernetworking-plugins-debugsource-0:0.8.6-1.rhaos4.5.el8.s390x", "8Base-RHOSE-4.7:containernetworking-plugins-debugsource-0:0.8.6-1.rhaos4.5.el8.x86_64", "8Base-RHOSE-4.7:coreos-installer-0:0.8.0-3.rhaos4.7.el8.ppc64le", "8Base-RHOSE-4.7:coreos-installer-0:0.8.0-3.rhaos4.7.el8.s390x", "8Base-RHOSE-4.7:coreos-installer-0:0.8.0-3.rhaos4.7.el8.src", "8Base-RHOSE-4.7:coreos-installer-0:0.8.0-3.rhaos4.7.el8.x86_64", "8Base-RHOSE-4.7:coreos-installer-bootinfra-0:0.8.0-3.rhaos4.7.el8.ppc64le", "8Base-RHOSE-4.7:coreos-installer-bootinfra-0:0.8.0-3.rhaos4.7.el8.s390x", "8Base-RHOSE-4.7:coreos-installer-bootinfra-debuginfo-0:0.8.0-3.rhaos4.7.el8.ppc64le", "8Base-RHOSE-4.7:coreos-installer-bootinfra-debuginfo-0:0.8.0-3.rhaos4.7.el8.s390x", "8Base-RHOSE-4.7:coreos-installer-bootinfra-debuginfo-0:0.8.0-3.rhaos4.7.el8.x86_64", "8Base-RHOSE-4.7:coreos-installer-debuginfo-0:0.8.0-3.rhaos4.7.el8.ppc64le", "8Base-RHOSE-4.7:coreos-installer-debuginfo-0:0.8.0-3.rhaos4.7.el8.s390x", "8Base-RHOSE-4.7:coreos-installer-debuginfo-0:0.8.0-3.rhaos4.7.el8.x86_64", "8Base-RHOSE-4.7:coreos-installer-debugsource-0:0.8.0-3.rhaos4.7.el8.ppc64le", "8Base-RHOSE-4.7:coreos-installer-debugsource-0:0.8.0-3.rhaos4.7.el8.s390x", "8Base-RHOSE-4.7:coreos-installer-debugsource-0:0.8.0-3.rhaos4.7.el8.x86_64", "8Base-RHOSE-4.7:cri-o-0:1.20.0-0.rhaos4.7.git8921e00.el8.51.ppc64le", "8Base-RHOSE-4.7:cri-o-0:1.20.0-0.rhaos4.7.git8921e00.el8.51.s390x", "8Base-RHOSE-4.7:cri-o-0:1.20.0-0.rhaos4.7.git8921e00.el8.51.src", "8Base-RHOSE-4.7:cri-o-0:1.20.0-0.rhaos4.7.git8921e00.el8.51.x86_64", "8Base-RHOSE-4.7:cri-o-debuginfo-0:1.20.0-0.rhaos4.7.git8921e00.el8.51.ppc64le", "8Base-RHOSE-4.7:cri-o-debuginfo-0:1.20.0-0.rhaos4.7.git8921e00.el8.51.s390x", "8Base-RHOSE-4.7:cri-o-debuginfo-0:1.20.0-0.rhaos4.7.git8921e00.el8.51.x86_64", "8Base-RHOSE-4.7:cri-o-debugsource-0:1.20.0-0.rhaos4.7.git8921e00.el8.51.ppc64le", "8Base-RHOSE-4.7:cri-o-debugsource-0:1.20.0-0.rhaos4.7.git8921e00.el8.51.s390x", "8Base-RHOSE-4.7:cri-o-debugsource-0:1.20.0-0.rhaos4.7.git8921e00.el8.51.x86_64", "8Base-RHOSE-4.7:cri-tools-0:1.20.0-1.el8.ppc64le", "8Base-RHOSE-4.7:cri-tools-0:1.20.0-1.el8.s390x", "8Base-RHOSE-4.7:cri-tools-0:1.20.0-1.el8.src", "8Base-RHOSE-4.7:cri-tools-0:1.20.0-1.el8.x86_64", "8Base-RHOSE-4.7:cri-tools-debuginfo-0:1.20.0-1.el8.ppc64le", "8Base-RHOSE-4.7:cri-tools-debuginfo-0:1.20.0-1.el8.s390x", "8Base-RHOSE-4.7:cri-tools-debuginfo-0:1.20.0-1.el8.x86_64", "8Base-RHOSE-4.7:cri-tools-debugsource-0:1.20.0-1.el8.ppc64le", "8Base-RHOSE-4.7:cri-tools-debugsource-0:1.20.0-1.el8.s390x", "8Base-RHOSE-4.7:cri-tools-debugsource-0:1.20.0-1.el8.x86_64", "8Base-RHOSE-4.7:dracut-0:049-95.git20200804.el8_3.4.ppc64le", "8Base-RHOSE-4.7:dracut-0:049-95.git20200804.el8_3.4.s390x", "8Base-RHOSE-4.7:dracut-0:049-95.git20200804.el8_3.4.src", "8Base-RHOSE-4.7:dracut-0:049-95.git20200804.el8_3.4.x86_64", "8Base-RHOSE-4.7:dracut-caps-0:049-95.git20200804.el8_3.4.ppc64le", "8Base-RHOSE-4.7:dracut-caps-0:049-95.git20200804.el8_3.4.s390x", "8Base-RHOSE-4.7:dracut-caps-0:049-95.git20200804.el8_3.4.x86_64", "8Base-RHOSE-4.7:dracut-config-generic-0:049-95.git20200804.el8_3.4.ppc64le", "8Base-RHOSE-4.7:dracut-config-generic-0:049-95.git20200804.el8_3.4.s390x", "8Base-RHOSE-4.7:dracut-config-generic-0:049-95.git20200804.el8_3.4.x86_64", "8Base-RHOSE-4.7:dracut-config-rescue-0:049-95.git20200804.el8_3.4.ppc64le", "8Base-RHOSE-4.7:dracut-config-rescue-0:049-95.git20200804.el8_3.4.s390x", "8Base-RHOSE-4.7:dracut-config-rescue-0:049-95.git20200804.el8_3.4.x86_64", "8Base-RHOSE-4.7:dracut-debuginfo-0:049-95.git20200804.el8_3.4.ppc64le", "8Base-RHOSE-4.7:dracut-debuginfo-0:049-95.git20200804.el8_3.4.s390x", "8Base-RHOSE-4.7:dracut-debuginfo-0:049-95.git20200804.el8_3.4.x86_64", "8Base-RHOSE-4.7:dracut-debugsource-0:049-95.git20200804.el8_3.4.ppc64le", "8Base-RHOSE-4.7:dracut-debugsource-0:049-95.git20200804.el8_3.4.s390x", "8Base-RHOSE-4.7:dracut-debugsource-0:049-95.git20200804.el8_3.4.x86_64", "8Base-RHOSE-4.7:dracut-live-0:049-95.git20200804.el8_3.4.ppc64le", "8Base-RHOSE-4.7:dracut-live-0:049-95.git20200804.el8_3.4.s390x", "8Base-RHOSE-4.7:dracut-live-0:049-95.git20200804.el8_3.4.x86_64", "8Base-RHOSE-4.7:dracut-network-0:049-95.git20200804.el8_3.4.ppc64le", "8Base-RHOSE-4.7:dracut-network-0:049-95.git20200804.el8_3.4.s390x", "8Base-RHOSE-4.7:dracut-network-0:049-95.git20200804.el8_3.4.x86_64", "8Base-RHOSE-4.7:dracut-squash-0:049-95.git20200804.el8_3.4.ppc64le", "8Base-RHOSE-4.7:dracut-squash-0:049-95.git20200804.el8_3.4.s390x", "8Base-RHOSE-4.7:dracut-squash-0:049-95.git20200804.el8_3.4.x86_64", "8Base-RHOSE-4.7:dracut-tools-0:049-95.git20200804.el8_3.4.ppc64le", "8Base-RHOSE-4.7:dracut-tools-0:049-95.git20200804.el8_3.4.s390x", "8Base-RHOSE-4.7:dracut-tools-0:049-95.git20200804.el8_3.4.x86_64", "8Base-RHOSE-4.7:faq-0:0.0.6-5.el8.ppc64le", "8Base-RHOSE-4.7:faq-0:0.0.6-5.el8.s390x", "8Base-RHOSE-4.7:faq-0:0.0.6-5.el8.src", "8Base-RHOSE-4.7:faq-0:0.0.6-5.el8.x86_64", "8Base-RHOSE-4.7:golang-github-prometheus-promu-0:0.5.0-2.git642a960.el8.ppc64le", "8Base-RHOSE-4.7:golang-github-prometheus-promu-0:0.5.0-2.git642a960.el8.s390x", "8Base-RHOSE-4.7:golang-github-prometheus-promu-0:0.5.0-2.git642a960.el8.src", "8Base-RHOSE-4.7:golang-github-prometheus-promu-0:0.5.0-2.git642a960.el8.x86_64", "8Base-RHOSE-4.7:gperftools-0:2.6.3-2.el8ost.ppc64le", "8Base-RHOSE-4.7:gperftools-0:2.6.3-2.el8ost.s390x", "8Base-RHOSE-4.7:gperftools-0:2.6.3-2.el8ost.src", "8Base-RHOSE-4.7:gperftools-0:2.6.3-2.el8ost.x86_64", "8Base-RHOSE-4.7:gperftools-debugsource-0:2.6.3-2.el8ost.ppc64le", "8Base-RHOSE-4.7:gperftools-debugsource-0:2.6.3-2.el8ost.s390x", "8Base-RHOSE-4.7:gperftools-debugsource-0:2.6.3-2.el8ost.x86_64", "8Base-RHOSE-4.7:gperftools-devel-0:2.6.3-2.el8ost.ppc64le", "8Base-RHOSE-4.7:gperftools-devel-0:2.6.3-2.el8ost.s390x", "8Base-RHOSE-4.7:gperftools-devel-0:2.6.3-2.el8ost.x86_64", "8Base-RHOSE-4.7:gperftools-libs-0:2.6.3-2.el8ost.ppc64le", "8Base-RHOSE-4.7:gperftools-libs-0:2.6.3-2.el8ost.s390x", "8Base-RHOSE-4.7:gperftools-libs-0:2.6.3-2.el8ost.x86_64", "8Base-RHOSE-4.7:gperftools-libs-debuginfo-0:2.6.3-2.el8ost.ppc64le", "8Base-RHOSE-4.7:gperftools-libs-debuginfo-0:2.6.3-2.el8ost.s390x", "8Base-RHOSE-4.7:gperftools-libs-debuginfo-0:2.6.3-2.el8ost.x86_64", "8Base-RHOSE-4.7:grpc-0:1.18.0-4.el8ost.ppc64le", "8Base-RHOSE-4.7:grpc-0:1.18.0-4.el8ost.s390x", "8Base-RHOSE-4.7:grpc-0:1.18.0-4.el8ost.src", "8Base-RHOSE-4.7:grpc-0:1.18.0-4.el8ost.x86_64", "8Base-RHOSE-4.7:grpc-cli-0:1.18.0-4.el8ost.ppc64le", "8Base-RHOSE-4.7:grpc-cli-0:1.18.0-4.el8ost.s390x", "8Base-RHOSE-4.7:grpc-cli-0:1.18.0-4.el8ost.x86_64", "8Base-RHOSE-4.7:grpc-cli-debuginfo-0:1.18.0-4.el8ost.ppc64le", "8Base-RHOSE-4.7:grpc-cli-debuginfo-0:1.18.0-4.el8ost.s390x", "8Base-RHOSE-4.7:grpc-cli-debuginfo-0:1.18.0-4.el8ost.x86_64", "8Base-RHOSE-4.7:grpc-debuginfo-0:1.18.0-4.el8ost.ppc64le", "8Base-RHOSE-4.7:grpc-debuginfo-0:1.18.0-4.el8ost.s390x", "8Base-RHOSE-4.7:grpc-debuginfo-0:1.18.0-4.el8ost.x86_64", "8Base-RHOSE-4.7:grpc-debugsource-0:1.18.0-4.el8ost.ppc64le", "8Base-RHOSE-4.7:grpc-debugsource-0:1.18.0-4.el8ost.s390x", "8Base-RHOSE-4.7:grpc-debugsource-0:1.18.0-4.el8ost.x86_64", "8Base-RHOSE-4.7:grpc-devel-0:1.18.0-4.el8ost.ppc64le", "8Base-RHOSE-4.7:grpc-devel-0:1.18.0-4.el8ost.s390x", "8Base-RHOSE-4.7:grpc-devel-0:1.18.0-4.el8ost.x86_64", "8Base-RHOSE-4.7:grpc-plugins-0:1.18.0-4.el8ost.ppc64le", "8Base-RHOSE-4.7:grpc-plugins-0:1.18.0-4.el8ost.s390x", "8Base-RHOSE-4.7:grpc-plugins-0:1.18.0-4.el8ost.x86_64", "8Base-RHOSE-4.7:grpc-plugins-debuginfo-0:1.18.0-4.el8ost.ppc64le", "8Base-RHOSE-4.7:grpc-plugins-debuginfo-0:1.18.0-4.el8ost.s390x", "8Base-RHOSE-4.7:grpc-plugins-debuginfo-0:1.18.0-4.el8ost.x86_64", "8Base-RHOSE-4.7:haproxy-0:2.0.19-1.el8.src", "8Base-RHOSE-4.7:haproxy-debugsource-0:2.0.19-1.el8.ppc64le", "8Base-RHOSE-4.7:haproxy-debugsource-0:2.0.19-1.el8.s390x", "8Base-RHOSE-4.7:haproxy-debugsource-0:2.0.19-1.el8.x86_64", "8Base-RHOSE-4.7:haproxy20-0:2.0.19-1.el8.ppc64le", "8Base-RHOSE-4.7:haproxy20-0:2.0.19-1.el8.s390x", "8Base-RHOSE-4.7:haproxy20-0:2.0.19-1.el8.x86_64", "8Base-RHOSE-4.7:haproxy20-debuginfo-0:2.0.19-1.el8.ppc64le", "8Base-RHOSE-4.7:haproxy20-debuginfo-0:2.0.19-1.el8.s390x", "8Base-RHOSE-4.7:haproxy20-debuginfo-0:2.0.19-1.el8.x86_64", "8Base-RHOSE-4.7:ignition-0:2.9.0-2.rhaos4.7.git1d56dc8.el8.ppc64le", "8Base-RHOSE-4.7:ignition-0:2.9.0-2.rhaos4.7.git1d56dc8.el8.s390x", "8Base-RHOSE-4.7:ignition-0:2.9.0-2.rhaos4.7.git1d56dc8.el8.src", "8Base-RHOSE-4.7:ignition-0:2.9.0-2.rhaos4.7.git1d56dc8.el8.x86_64", "8Base-RHOSE-4.7:ignition-debuginfo-0:2.9.0-2.rhaos4.7.git1d56dc8.el8.ppc64le", "8Base-RHOSE-4.7:ignition-debuginfo-0:2.9.0-2.rhaos4.7.git1d56dc8.el8.s390x", "8Base-RHOSE-4.7:ignition-debuginfo-0:2.9.0-2.rhaos4.7.git1d56dc8.el8.x86_64", "8Base-RHOSE-4.7:ignition-debugsource-0:2.9.0-2.rhaos4.7.git1d56dc8.el8.ppc64le", "8Base-RHOSE-4.7:ignition-debugsource-0:2.9.0-2.rhaos4.7.git1d56dc8.el8.s390x", "8Base-RHOSE-4.7:ignition-debugsource-0:2.9.0-2.rhaos4.7.git1d56dc8.el8.x86_64", "8Base-RHOSE-4.7:ignition-validate-0:2.9.0-2.rhaos4.7.git1d56dc8.el8.ppc64le", "8Base-RHOSE-4.7:ignition-validate-0:2.9.0-2.rhaos4.7.git1d56dc8.el8.s390x", "8Base-RHOSE-4.7:ignition-validate-0:2.9.0-2.rhaos4.7.git1d56dc8.el8.x86_64", "8Base-RHOSE-4.7:ignition-validate-debuginfo-0:2.9.0-2.rhaos4.7.git1d56dc8.el8.ppc64le", "8Base-RHOSE-4.7:ignition-validate-debuginfo-0:2.9.0-2.rhaos4.7.git1d56dc8.el8.s390x", "8Base-RHOSE-4.7:ignition-validate-debuginfo-0:2.9.0-2.rhaos4.7.git1d56dc8.el8.x86_64", "8Base-RHOSE-4.7:inotify-tools-0:3.20.1-2.el8.ppc64le", "8Base-RHOSE-4.7:inotify-tools-0:3.20.1-2.el8.s390x", "8Base-RHOSE-4.7:inotify-tools-0:3.20.1-2.el8.src", "8Base-RHOSE-4.7:inotify-tools-0:3.20.1-2.el8.x86_64", "8Base-RHOSE-4.7:inotify-tools-debuginfo-0:3.20.1-2.el8.ppc64le", "8Base-RHOSE-4.7:inotify-tools-debuginfo-0:3.20.1-2.el8.s390x", "8Base-RHOSE-4.7:inotify-tools-debuginfo-0:3.20.1-2.el8.x86_64", "8Base-RHOSE-4.7:inotify-tools-debugsource-0:3.20.1-2.el8.ppc64le", "8Base-RHOSE-4.7:inotify-tools-debugsource-0:3.20.1-2.el8.s390x", "8Base-RHOSE-4.7:inotify-tools-debugsource-0:3.20.1-2.el8.x86_64", "8Base-RHOSE-4.7:inotify-tools-devel-0:3.20.1-2.el8.ppc64le", "8Base-RHOSE-4.7:inotify-tools-devel-0:3.20.1-2.el8.s390x", "8Base-RHOSE-4.7:inotify-tools-devel-0:3.20.1-2.el8.x86_64", "8Base-RHOSE-4.7:ironic-images-0:15.1-20210114.1.el8.noarch", "8Base-RHOSE-4.7:ironic-images-0:15.1-20210114.1.el8.src", "8Base-RHOSE-4.7:ironic-images-all-0:15.1-20210114.1.el8.noarch", "8Base-RHOSE-4.7:ironic-images-ipa-ppc64le-0:15.1-20210114.1.el8.noarch", "8Base-RHOSE-4.7:ironic-images-ipa-x86_64-0:15.1-20210114.1.el8.noarch", "8Base-RHOSE-4.7:jenkins-0:2.263.3.1612449007-1.el8.noarch", "8Base-RHOSE-4.7:jenkins-0:2.263.3.1612449007-1.el8.src", "8Base-RHOSE-4.7:jenkins-2-plugins-0:4.7.1611636915-1.el8.noarch", "8Base-RHOSE-4.7:jenkins-2-plugins-0:4.7.1611636915-1.el8.src", "8Base-RHOSE-4.7:jq-0:1.6-2.el8.ppc64le", "8Base-RHOSE-4.7:jq-0:1.6-2.el8.s390x", "8Base-RHOSE-4.7:jq-0:1.6-2.el8.src", "8Base-RHOSE-4.7:jq-0:1.6-2.el8.x86_64", "8Base-RHOSE-4.7:jq-debuginfo-0:1.6-2.el8.ppc64le", "8Base-RHOSE-4.7:jq-debuginfo-0:1.6-2.el8.s390x", "8Base-RHOSE-4.7:jq-debuginfo-0:1.6-2.el8.x86_64", "8Base-RHOSE-4.7:jq-debugsource-0:1.6-2.el8.ppc64le", "8Base-RHOSE-4.7:jq-debugsource-0:1.6-2.el8.s390x", "8Base-RHOSE-4.7:jq-debugsource-0:1.6-2.el8.x86_64", "8Base-RHOSE-4.7:jq-devel-0:1.6-2.el8.ppc64le", "8Base-RHOSE-4.7:jq-devel-0:1.6-2.el8.s390x", "8Base-RHOSE-4.7:jq-devel-0:1.6-2.el8.x86_64", "8Base-RHOSE-4.7:kuryr-binding-scripts-0:1.1.1-0.20190923160834.41e6964.el8ost.noarch", "8Base-RHOSE-4.7:libnftnl-0:1.1.5-4.el8.ppc64le", "8Base-RHOSE-4.7:libnftnl-0:1.1.5-4.el8.s390x", "8Base-RHOSE-4.7:libnftnl-0:1.1.5-4.el8.src", "8Base-RHOSE-4.7:libnftnl-0:1.1.5-4.el8.x86_64", "8Base-RHOSE-4.7:libnftnl-debuginfo-0:1.1.5-4.el8.ppc64le", "8Base-RHOSE-4.7:libnftnl-debuginfo-0:1.1.5-4.el8.s390x", "8Base-RHOSE-4.7:libnftnl-debuginfo-0:1.1.5-4.el8.x86_64", "8Base-RHOSE-4.7:libnftnl-debugsource-0:1.1.5-4.el8.ppc64le", "8Base-RHOSE-4.7:libnftnl-debugsource-0:1.1.5-4.el8.s390x", "8Base-RHOSE-4.7:libnftnl-debugsource-0:1.1.5-4.el8.x86_64", "8Base-RHOSE-4.7:libnftnl-devel-0:1.1.5-4.el8.ppc64le", "8Base-RHOSE-4.7:libnftnl-devel-0:1.1.5-4.el8.s390x", "8Base-RHOSE-4.7:libnftnl-devel-0:1.1.5-4.el8.x86_64", "8Base-RHOSE-4.7:libsodium-0:1.0.16-4.5.el8ost.ppc64le", "8Base-RHOSE-4.7:libsodium-0:1.0.16-4.5.el8ost.s390x", "8Base-RHOSE-4.7:libsodium-0:1.0.16-4.5.el8ost.src", "8Base-RHOSE-4.7:libsodium-0:1.0.16-4.5.el8ost.x86_64", "8Base-RHOSE-4.7:libsodium-debuginfo-0:1.0.16-4.5.el8ost.ppc64le", "8Base-RHOSE-4.7:libsodium-debuginfo-0:1.0.16-4.5.el8ost.s390x", "8Base-RHOSE-4.7:libsodium-debuginfo-0:1.0.16-4.5.el8ost.x86_64", "8Base-RHOSE-4.7:libsodium-debugsource-0:1.0.16-4.5.el8ost.ppc64le", "8Base-RHOSE-4.7:libsodium-debugsource-0:1.0.16-4.5.el8ost.s390x", "8Base-RHOSE-4.7:libsodium-debugsource-0:1.0.16-4.5.el8ost.x86_64", "8Base-RHOSE-4.7:libsodium-devel-0:1.0.16-4.5.el8ost.ppc64le", "8Base-RHOSE-4.7:libsodium-devel-0:1.0.16-4.5.el8ost.s390x", "8Base-RHOSE-4.7:libsodium-devel-0:1.0.16-4.5.el8ost.x86_64", "8Base-RHOSE-4.7:libsodium-static-0:1.0.16-4.5.el8ost.ppc64le", "8Base-RHOSE-4.7:libsodium-static-0:1.0.16-4.5.el8ost.s390x", "8Base-RHOSE-4.7:libsodium-static-0:1.0.16-4.5.el8ost.x86_64", "8Base-RHOSE-4.7:libunwind-0:1.2.1-5.el8.ppc64le", "8Base-RHOSE-4.7:libunwind-0:1.2.1-5.el8.src", "8Base-RHOSE-4.7:libunwind-0:1.2.1-5.el8.x86_64", "8Base-RHOSE-4.7:libunwind-debuginfo-0:1.2.1-5.el8.ppc64le", "8Base-RHOSE-4.7:libunwind-debuginfo-0:1.2.1-5.el8.x86_64", "8Base-RHOSE-4.7:libunwind-debugsource-0:1.2.1-5.el8.ppc64le", "8Base-RHOSE-4.7:libunwind-debugsource-0:1.2.1-5.el8.x86_64", "8Base-RHOSE-4.7:libunwind-devel-0:1.2.1-5.el8.ppc64le", "8Base-RHOSE-4.7:libunwind-devel-0:1.2.1-5.el8.x86_64", "8Base-RHOSE-4.7:network-scripts-openvswitch2.13-0:2.13.0-79.el8fdp.ppc64le", "8Base-RHOSE-4.7:network-scripts-openvswitch2.13-0:2.13.0-79.el8fdp.s390x", "8Base-RHOSE-4.7:network-scripts-openvswitch2.13-0:2.13.0-79.el8fdp.x86_64", "8Base-RHOSE-4.7:octavia-amphora-image-x86_64-0:17.0-20200606.1.el8ost.noarch", "8Base-RHOSE-4.7:openshift-clients-0:4.7.0-202102032256.p0.git.3951.0e656ef.el8.ppc64le", "8Base-RHOSE-4.7:openshift-clients-0:4.7.0-202102032256.p0.git.3951.0e656ef.el8.s390x", "8Base-RHOSE-4.7:openshift-clients-0:4.7.0-202102032256.p0.git.3951.0e656ef.el8.src", "8Base-RHOSE-4.7:openshift-clients-0:4.7.0-202102032256.p0.git.3951.0e656ef.el8.x86_64", "8Base-RHOSE-4.7:openshift-clients-redistributable-0:4.7.0-202102032256.p0.git.3951.0e656ef.el8.x86_64", "8Base-RHOSE-4.7:openshift-eventrouter-0:0.2-4.git7c289cc.el8.ppc64le", "8Base-RHOSE-4.7:openshift-eventrouter-0:0.2-4.git7c289cc.el8.s390x", "8Base-RHOSE-4.7:openshift-eventrouter-0:0.2-4.git7c289cc.el8.src", "8Base-RHOSE-4.7:openshift-eventrouter-0:0.2-4.git7c289cc.el8.x86_64", "8Base-RHOSE-4.7:openshift-eventrouter-debuginfo-0:0.2-4.git7c289cc.el8.ppc64le", "8Base-RHOSE-4.7:openshift-eventrouter-debuginfo-0:0.2-4.git7c289cc.el8.s390x", "8Base-RHOSE-4.7:openshift-eventrouter-debuginfo-0:0.2-4.git7c289cc.el8.x86_64", "8Base-RHOSE-4.7:openshift-eventrouter-debugsource-0:0.2-4.git7c289cc.el8.ppc64le", "8Base-RHOSE-4.7:openshift-eventrouter-debugsource-0:0.2-4.git7c289cc.el8.s390x", "8Base-RHOSE-4.7:openshift-eventrouter-debugsource-0:0.2-4.git7c289cc.el8.x86_64", "8Base-RHOSE-4.7:openshift-kuryr-0:4.7.0-202101262230.p0.git.2494.cd95ce5.el8.src", "8Base-RHOSE-4.7:openshift-kuryr-cni-0:4.7.0-202101262230.p0.git.2494.cd95ce5.el8.noarch", "8Base-RHOSE-4.7:openshift-kuryr-common-0:4.7.0-202101262230.p0.git.2494.cd95ce5.el8.noarch", "8Base-RHOSE-4.7:openshift-kuryr-controller-0:4.7.0-202101262230.p0.git.2494.cd95ce5.el8.noarch", "8Base-RHOSE-4.7:openstack-ironic-1:16.0.4-0.20210203051223.7d74ea0.el8.src", "8Base-RHOSE-4.7:openstack-ironic-api-1:16.0.4-0.20210203051223.7d74ea0.el8.noarch", "8Base-RHOSE-4.7:openstack-ironic-common-1:16.0.4-0.20210203051223.7d74ea0.el8.noarch", "8Base-RHOSE-4.7:openstack-ironic-conductor-1:16.0.4-0.20210203051223.7d74ea0.el8.noarch", "8Base-RHOSE-4.7:openstack-ironic-inspector-0:10.4.1-0.20201123161216.70fccec.el8.noarch", "8Base-RHOSE-4.7:openstack-ironic-inspector-0:10.4.1-0.20201123161216.70fccec.el8.src", "8Base-RHOSE-4.7:openstack-ironic-inspector-api-0:10.4.1-0.20201123161216.70fccec.el8.noarch", "8Base-RHOSE-4.7:openstack-ironic-inspector-conductor-0:10.4.1-0.20201123161216.70fccec.el8.noarch", "8Base-RHOSE-4.7:openstack-ironic-inspector-dnsmasq-0:10.4.1-0.20201123161216.70fccec.el8.noarch", "8Base-RHOSE-4.7:openstack-ironic-python-agent-0:6.4.3-0.20201217171210.bd45db1.el8.noarch", "8Base-RHOSE-4.7:openstack-ironic-python-agent-0:6.4.3-0.20201217171210.bd45db1.el8.src", "8Base-RHOSE-4.7:openvswitch2.13-0:2.13.0-79.el8fdp.ppc64le", "8Base-RHOSE-4.7:openvswitch2.13-0:2.13.0-79.el8fdp.s390x", "8Base-RHOSE-4.7:openvswitch2.13-0:2.13.0-79.el8fdp.src", "8Base-RHOSE-4.7:openvswitch2.13-0:2.13.0-79.el8fdp.x86_64", "8Base-RHOSE-4.7:openvswitch2.13-debuginfo-0:2.13.0-79.el8fdp.ppc64le", "8Base-RHOSE-4.7:openvswitch2.13-debuginfo-0:2.13.0-79.el8fdp.s390x", "8Base-RHOSE-4.7:openvswitch2.13-debuginfo-0:2.13.0-79.el8fdp.x86_64", "8Base-RHOSE-4.7:openvswitch2.13-debugsource-0:2.13.0-79.el8fdp.ppc64le", "8Base-RHOSE-4.7:openvswitch2.13-debugsource-0:2.13.0-79.el8fdp.s390x", "8Base-RHOSE-4.7:openvswitch2.13-debugsource-0:2.13.0-79.el8fdp.x86_64", "8Base-RHOSE-4.7:openvswitch2.13-devel-0:2.13.0-79.el8fdp.ppc64le", "8Base-RHOSE-4.7:openvswitch2.13-devel-0:2.13.0-79.el8fdp.s390x", "8Base-RHOSE-4.7:openvswitch2.13-devel-0:2.13.0-79.el8fdp.x86_64", "8Base-RHOSE-4.7:openvswitch2.13-test-0:2.13.0-79.el8fdp.noarch", "8Base-RHOSE-4.7:ostree-0:2020.7-1.el8.ppc64le", "8Base-RHOSE-4.7:ostree-0:2020.7-1.el8.s390x", "8Base-RHOSE-4.7:ostree-0:2020.7-1.el8.src", "8Base-RHOSE-4.7:ostree-0:2020.7-1.el8.x86_64", "8Base-RHOSE-4.7:ostree-debuginfo-0:2020.7-1.el8.ppc64le", "8Base-RHOSE-4.7:ostree-debuginfo-0:2020.7-1.el8.s390x", "8Base-RHOSE-4.7:ostree-debuginfo-0:2020.7-1.el8.x86_64", "8Base-RHOSE-4.7:ostree-debugsource-0:2020.7-1.el8.ppc64le", "8Base-RHOSE-4.7:ostree-debugsource-0:2020.7-1.el8.s390x", "8Base-RHOSE-4.7:ostree-debugsource-0:2020.7-1.el8.x86_64", "8Base-RHOSE-4.7:ostree-devel-0:2020.7-1.el8.ppc64le", "8Base-RHOSE-4.7:ostree-devel-0:2020.7-1.el8.s390x", "8Base-RHOSE-4.7:ostree-devel-0:2020.7-1.el8.x86_64", "8Base-RHOSE-4.7:ostree-grub2-0:2020.7-1.el8.ppc64le", "8Base-RHOSE-4.7:ostree-grub2-0:2020.7-1.el8.x86_64", "8Base-RHOSE-4.7:ostree-libs-0:2020.7-1.el8.ppc64le", "8Base-RHOSE-4.7:ostree-libs-0:2020.7-1.el8.s390x", "8Base-RHOSE-4.7:ostree-libs-0:2020.7-1.el8.x86_64", "8Base-RHOSE-4.7:ostree-libs-debuginfo-0:2020.7-1.el8.ppc64le", "8Base-RHOSE-4.7:ostree-libs-debuginfo-0:2020.7-1.el8.s390x", "8Base-RHOSE-4.7:ostree-libs-debuginfo-0:2020.7-1.el8.x86_64", "8Base-RHOSE-4.7:ovn2.13-0:20.09.0-21.el8fdn.ppc64le", "8Base-RHOSE-4.7:ovn2.13-0:20.09.0-21.el8fdn.s390x", "8Base-RHOSE-4.7:ovn2.13-0:20.09.0-21.el8fdn.src", "8Base-RHOSE-4.7:ovn2.13-0:20.09.0-21.el8fdn.x86_64", "8Base-RHOSE-4.7:ovn2.13-central-0:20.09.0-21.el8fdn.ppc64le", "8Base-RHOSE-4.7:ovn2.13-central-0:20.09.0-21.el8fdn.s390x", "8Base-RHOSE-4.7:ovn2.13-central-0:20.09.0-21.el8fdn.x86_64", "8Base-RHOSE-4.7:ovn2.13-central-debuginfo-0:20.09.0-21.el8fdn.ppc64le", "8Base-RHOSE-4.7:ovn2.13-central-debuginfo-0:20.09.0-21.el8fdn.s390x", "8Base-RHOSE-4.7:ovn2.13-central-debuginfo-0:20.09.0-21.el8fdn.x86_64", "8Base-RHOSE-4.7:ovn2.13-debuginfo-0:20.09.0-21.el8fdn.ppc64le", "8Base-RHOSE-4.7:ovn2.13-debuginfo-0:20.09.0-21.el8fdn.s390x", "8Base-RHOSE-4.7:ovn2.13-debuginfo-0:20.09.0-21.el8fdn.x86_64", "8Base-RHOSE-4.7:ovn2.13-debugsource-0:20.09.0-21.el8fdn.ppc64le", "8Base-RHOSE-4.7:ovn2.13-debugsource-0:20.09.0-21.el8fdn.s390x", "8Base-RHOSE-4.7:ovn2.13-debugsource-0:20.09.0-21.el8fdn.x86_64", "8Base-RHOSE-4.7:ovn2.13-host-0:20.09.0-21.el8fdn.ppc64le", "8Base-RHOSE-4.7:ovn2.13-host-0:20.09.0-21.el8fdn.s390x", "8Base-RHOSE-4.7:ovn2.13-host-0:20.09.0-21.el8fdn.x86_64", "8Base-RHOSE-4.7:ovn2.13-host-debuginfo-0:20.09.0-21.el8fdn.ppc64le", "8Base-RHOSE-4.7:ovn2.13-host-debuginfo-0:20.09.0-21.el8fdn.s390x", "8Base-RHOSE-4.7:ovn2.13-host-debuginfo-0:20.09.0-21.el8fdn.x86_64", "8Base-RHOSE-4.7:ovn2.13-vtep-0:20.09.0-21.el8fdn.ppc64le", "8Base-RHOSE-4.7:ovn2.13-vtep-0:20.09.0-21.el8fdn.s390x", "8Base-RHOSE-4.7:ovn2.13-vtep-0:20.09.0-21.el8fdn.x86_64", "8Base-RHOSE-4.7:ovn2.13-vtep-debuginfo-0:20.09.0-21.el8fdn.ppc64le", "8Base-RHOSE-4.7:ovn2.13-vtep-debuginfo-0:20.09.0-21.el8fdn.s390x", "8Base-RHOSE-4.7:ovn2.13-vtep-debuginfo-0:20.09.0-21.el8fdn.x86_64", "8Base-RHOSE-4.7:powerpc-utils-0:1.3.6-12.el8_3.ppc64le", "8Base-RHOSE-4.7:powerpc-utils-0:1.3.6-12.el8_3.src", "8Base-RHOSE-4.7:powerpc-utils-core-0:1.3.6-12.el8_3.ppc64le", "8Base-RHOSE-4.7:powerpc-utils-core-debuginfo-0:1.3.6-12.el8_3.ppc64le", "8Base-RHOSE-4.7:powerpc-utils-debugsource-0:1.3.6-12.el8_3.ppc64le", "8Base-RHOSE-4.7:pprof-0:2.6.3-2.el8ost.noarch", "8Base-RHOSE-4.7:prometheus-promu-0:0.5.0-2.git642a960.el8.ppc64le", "8Base-RHOSE-4.7:prometheus-promu-0:0.5.0-2.git642a960.el8.s390x", "8Base-RHOSE-4.7:prometheus-promu-0:0.5.0-2.git642a960.el8.x86_64", "8Base-RHOSE-4.7:protobuf-0:3.6.1-4.el8ost.ppc64le", "8Base-RHOSE-4.7:protobuf-0:3.6.1-4.el8ost.s390x", "8Base-RHOSE-4.7:protobuf-0:3.6.1-4.el8ost.src", "8Base-RHOSE-4.7:protobuf-0:3.6.1-4.el8ost.x86_64", "8Base-RHOSE-4.7:protobuf-compiler-0:3.6.1-4.el8ost.ppc64le", "8Base-RHOSE-4.7:protobuf-compiler-0:3.6.1-4.el8ost.s390x", "8Base-RHOSE-4.7:protobuf-compiler-0:3.6.1-4.el8ost.x86_64", "8Base-RHOSE-4.7:protobuf-compiler-debuginfo-0:3.6.1-4.el8ost.ppc64le", "8Base-RHOSE-4.7:protobuf-compiler-debuginfo-0:3.6.1-4.el8ost.s390x", "8Base-RHOSE-4.7:protobuf-compiler-debuginfo-0:3.6.1-4.el8ost.x86_64", "8Base-RHOSE-4.7:protobuf-debuginfo-0:3.6.1-4.el8ost.ppc64le", "8Base-RHOSE-4.7:protobuf-debuginfo-0:3.6.1-4.el8ost.s390x", "8Base-RHOSE-4.7:protobuf-debuginfo-0:3.6.1-4.el8ost.x86_64", "8Base-RHOSE-4.7:protobuf-debugsource-0:3.6.1-4.el8ost.ppc64le", "8Base-RHOSE-4.7:protobuf-debugsource-0:3.6.1-4.el8ost.s390x", "8Base-RHOSE-4.7:protobuf-debugsource-0:3.6.1-4.el8ost.x86_64", "8Base-RHOSE-4.7:protobuf-devel-0:3.6.1-4.el8ost.ppc64le", "8Base-RHOSE-4.7:protobuf-devel-0:3.6.1-4.el8ost.s390x", "8Base-RHOSE-4.7:protobuf-devel-0:3.6.1-4.el8ost.x86_64", "8Base-RHOSE-4.7:protobuf-lite-0:3.6.1-4.el8ost.ppc64le", "8Base-RHOSE-4.7:protobuf-lite-0:3.6.1-4.el8ost.s390x", "8Base-RHOSE-4.7:protobuf-lite-0:3.6.1-4.el8ost.x86_64", "8Base-RHOSE-4.7:protobuf-lite-debuginfo-0:3.6.1-4.el8ost.ppc64le", "8Base-RHOSE-4.7:protobuf-lite-debuginfo-0:3.6.1-4.el8ost.s390x", "8Base-RHOSE-4.7:protobuf-lite-debuginfo-0:3.6.1-4.el8ost.x86_64", "8Base-RHOSE-4.7:protobuf-lite-devel-0:3.6.1-4.el8ost.ppc64le", "8Base-RHOSE-4.7:protobuf-lite-devel-0:3.6.1-4.el8ost.s390x", "8Base-RHOSE-4.7:protobuf-lite-devel-0:3.6.1-4.el8ost.x86_64", "8Base-RHOSE-4.7:protobuf-lite-static-0:3.6.1-4.el8ost.ppc64le", "8Base-RHOSE-4.7:protobuf-lite-static-0:3.6.1-4.el8ost.s390x", "8Base-RHOSE-4.7:protobuf-lite-static-0:3.6.1-4.el8ost.x86_64", "8Base-RHOSE-4.7:protobuf-static-0:3.6.1-4.el8ost.ppc64le", "8Base-RHOSE-4.7:protobuf-static-0:3.6.1-4.el8ost.s390x", "8Base-RHOSE-4.7:protobuf-static-0:3.6.1-4.el8ost.x86_64", "8Base-RHOSE-4.7:protobuf-vim-0:3.6.1-4.el8ost.noarch", "8Base-RHOSE-4.7:python-alembic-0:1.4.2-5.el8ost.src", "8Base-RHOSE-4.7:python-boto3-0:1.9.101-1.el8ost.src", "8Base-RHOSE-4.7:python-botocore-0:1.12.119-1.el8ost.src", "8Base-RHOSE-4.7:python-cachetools-0:3.1.0-1.el8ost.src", "8Base-RHOSE-4.7:python-certifi-0:2018.10.15-4.el8ost.src", "8Base-RHOSE-4.7:python-construct-0:2.10.56-1.el8ost.src", "8Base-RHOSE-4.7:python-daemon-0:2.1.2-9.el8ar.src", "8Base-RHOSE-4.7:python-debtcollector-0:2.2.0-0.20201008171245.649189d.el8.src", "8Base-RHOSE-4.7:python-dictdiffer-0:0.7.1-2.el8ost.src", "8Base-RHOSE-4.7:python-eventlet-0:0.25.2-3.el8ost.src", "8Base-RHOSE-4.7:python-flask-1:1.1.1-1.el8ost.src", "8Base-RHOSE-4.7:python-flask-doc-1:1.1.1-1.el8ost.noarch", "8Base-RHOSE-4.7:python-google-auth-0:1.3.0-1.el8ost.src", "8Base-RHOSE-4.7:python-hardware-0:0.23.0-0.20201031022149.59211cc.el8.src", "8Base-RHOSE-4.7:python-ifaddr-0:0.1.6-5.el8ost.src", "8Base-RHOSE-4.7:python-importlib-metadata-0:1.7.0-1.el8ost.src", "8Base-RHOSE-4.7:python-ironic-lib-0:4.4.1-0.20201218041209.aa7cfec.el8.src", "8Base-RHOSE-4.7:python-keystoneauth1-0:4.2.0-0.20200630234358.dab8e10.el8ost.src", "8Base-RHOSE-4.7:python-kubernetes-0:11.0.0-1.el8.src", "8Base-RHOSE-4.7:python-kuryr-lib-0:1.1.1-0.20190923160834.41e6964.el8ost.src", "8Base-RHOSE-4.7:python-lockfile-1:0.11.0-8.el8ar.src", "8Base-RHOSE-4.7:python-msgpack-0:0.6.2-1.el8ost.src", "8Base-RHOSE-4.7:python-msgpack-debugsource-0:0.6.2-1.el8ost.x86_64", "8Base-RHOSE-4.7:python-openshift-1:0.11.2-1.el8.src", "8Base-RHOSE-4.7:python-openstacksdk-0:0.48.0-0.20200708092906.3b693c2.el8ost.src", "8Base-RHOSE-4.7:python-oslo-concurrency-0:4.3.0-0.20201008180343.2f78803.el8.src", "8Base-RHOSE-4.7:python-oslo-concurrency-lang-0:4.3.0-0.20201008180343.2f78803.el8.noarch", "8Base-RHOSE-4.7:python-oslo-config-2:8.3.2-0.20201008180634.fcb8894.el8.src", "8Base-RHOSE-4.7:python-oslo-context-0:3.1.1-0.20201008190523.57dbded.el8.src", "8Base-RHOSE-4.7:python-oslo-db-0:8.4.0-0.20200918104110.e42c733.el8ost.src", "8Base-RHOSE-4.7:python-oslo-db-lang-0:8.4.0-0.20200918104110.e42c733.el8ost.noarch", "8Base-RHOSE-4.7:python-oslo-i18n-0:5.0.1-0.20201009131251.73187bd.el8.src", "8Base-RHOSE-4.7:python-oslo-i18n-lang-0:5.0.1-0.20201009131251.73187bd.el8.noarch", "8Base-RHOSE-4.7:python-oslo-log-0:4.3.1-0.20201207021200.1597f24.el8.src", "8Base-RHOSE-4.7:python-oslo-log-lang-0:4.3.1-0.20201207021200.1597f24.el8.noarch", "8Base-RHOSE-4.7:python-oslo-serialization-0:4.0.1-0.20201008182423.c7884b2.el8.src", "8Base-RHOSE-4.7:python-oslo-service-0:2.4.0-0.20201008184547.58466a6.el8.src", "8Base-RHOSE-4.7:python-oslo-utils-0:4.6.0-0.20201009175936.91497da.el8.src", "8Base-RHOSE-4.7:python-oslo-utils-lang-0:4.6.0-0.20201009175936.91497da.el8.noarch", "8Base-RHOSE-4.7:python-packaging-0:20.4-1.el8ost.src", "8Base-RHOSE-4.7:python-packaging-doc-0:20.4-1.el8ost.noarch", "8Base-RHOSE-4.7:python-paste-0:3.2.4-1.el8ost.src", "8Base-RHOSE-4.7:python-paste-deploy-0:2.0.1-4.el8ost.src", "8Base-RHOSE-4.7:python-pbr-0:5.4.3-2.el8ost.src", "8Base-RHOSE-4.7:python-pexpect-0:4.6-2.el8ar.src", "8Base-RHOSE-4.7:python-pint-0:0.10.1-1.el8ost.src", "8Base-RHOSE-4.7:python-psutil-0:5.6.6-1.el8ar.src", "8Base-RHOSE-4.7:python-psutil-debugsource-0:5.6.6-1.el8ar.ppc64le", "8Base-RHOSE-4.7:python-psutil-debugsource-0:5.6.6-1.el8ar.s390x", "8Base-RHOSE-4.7:python-psutil-debugsource-0:5.6.6-1.el8ar.x86_64", "8Base-RHOSE-4.7:python-pyghmi-0:1.5.14-2.1.el8ost.src", "8Base-RHOSE-4.7:python-pyroute2-0:0.5.13-1.el8ost.src", "8Base-RHOSE-4.7:python-requests-unixsocket-0:0.1.5-5.el8ar.src", "8Base-RHOSE-4.7:python-rsa-0:4.7-1.el8.src", "8Base-RHOSE-4.7:python-ruamel-yaml-0:0.15.41-4.el8ost.src", "8Base-RHOSE-4.7:python-ruamel-yaml-debugsource-0:0.15.41-4.el8ost.ppc64le", "8Base-RHOSE-4.7:python-ruamel-yaml-debugsource-0:0.15.41-4.el8ost.s390x", "8Base-RHOSE-4.7:python-ruamel-yaml-debugsource-0:0.15.41-4.el8ost.x86_64", "8Base-RHOSE-4.7:python-s3transfer-0:0.2.0-1.el8ost.src", "8Base-RHOSE-4.7:python-stevedore-0:3.2.2-0.20201009151242.274eaa6.el8.src", "8Base-RHOSE-4.7:python-string_utils-0:0.6.0-4.el8ost.src", "8Base-RHOSE-4.7:python-sushy-0:3.6.1-0.20210122201213.7ec0422.el8.src", "8Base-RHOSE-4.7:python-sushy-oem-idrac-0:0.0.3-0.20200922221223.1202372.el8ost.src", "8Base-RHOSE-4.7:python-tenacity-0:6.2.0-1.el8ost.src", "8Base-RHOSE-4.7:python-tooz-0:2.7.0-0.20200723133754.fca43df.el8ost.src", "8Base-RHOSE-4.7:python-websocket-client-0:0.54.0-1.el8ost.src", "8Base-RHOSE-4.7:python-werkzeug-0:1.0.1-3.el8ost.src", "8Base-RHOSE-4.7:python-zeroconf-0:0.24.4-1.el8ost.src", "8Base-RHOSE-4.7:python-zipp-0:0.5.1-2.el8ost.src", "8Base-RHOSE-4.7:python2-botocore-0:1.12.119-1.el8ost.noarch", "8Base-RHOSE-4.7:python2-cachetools-0:3.1.0-1.el8ost.noarch", "8Base-RHOSE-4.7:python3-alembic-0:1.4.2-5.el8ost.noarch", "8Base-RHOSE-4.7:python3-ansible-runner-0:1.4.6-2.el8ar.noarch", "8Base-RHOSE-4.7:python3-boto3-0:1.9.101-1.el8ost.noarch", "8Base-RHOSE-4.7:python3-botocore-0:1.12.119-1.el8ost.noarch", "8Base-RHOSE-4.7:python3-cachetools-0:3.1.0-1.el8ost.noarch", "8Base-RHOSE-4.7:python3-certifi-0:2018.10.15-4.el8ost.noarch", "8Base-RHOSE-4.7:python3-construct-0:2.10.56-1.el8ost.noarch", "8Base-RHOSE-4.7:python3-daemon-0:2.1.2-9.el8ar.noarch", "8Base-RHOSE-4.7:python3-debtcollector-0:2.2.0-0.20201008171245.649189d.el8.noarch", "8Base-RHOSE-4.7:python3-dictdiffer-0:0.7.1-2.el8ost.noarch", "8Base-RHOSE-4.7:python3-eventlet-0:0.25.2-3.el8ost.noarch", "8Base-RHOSE-4.7:python3-flask-1:1.1.1-1.el8ost.noarch", "8Base-RHOSE-4.7:python3-google-auth-0:1.3.0-1.el8ost.noarch", "8Base-RHOSE-4.7:python3-grpcio-0:1.18.0-4.el8ost.ppc64le", "8Base-RHOSE-4.7:python3-grpcio-0:1.18.0-4.el8ost.s390x", "8Base-RHOSE-4.7:python3-grpcio-0:1.18.0-4.el8ost.x86_64", "8Base-RHOSE-4.7:python3-grpcio-debuginfo-0:1.18.0-4.el8ost.ppc64le", "8Base-RHOSE-4.7:python3-grpcio-debuginfo-0:1.18.0-4.el8ost.s390x", "8Base-RHOSE-4.7:python3-grpcio-debuginfo-0:1.18.0-4.el8ost.x86_64", "8Base-RHOSE-4.7:python3-hardware-0:0.23.0-0.20201031022149.59211cc.el8.noarch", "8Base-RHOSE-4.7:python3-hardware-detect-0:0.23.0-0.20201031022149.59211cc.el8.noarch", "8Base-RHOSE-4.7:python3-ifaddr-0:0.1.6-5.el8ost.noarch", "8Base-RHOSE-4.7:python3-importlib-metadata-0:1.7.0-1.el8ost.noarch", "8Base-RHOSE-4.7:python3-ironic-inspector-tests-0:10.4.1-0.20201123161216.70fccec.el8.noarch", "8Base-RHOSE-4.7:python3-ironic-lib-0:4.4.1-0.20201218041209.aa7cfec.el8.noarch", "8Base-RHOSE-4.7:python3-ironic-python-agent-0:6.4.3-0.20201217171210.bd45db1.el8.noarch", "8Base-RHOSE-4.7:python3-ironic-tests-1:16.0.4-0.20210203051223.7d74ea0.el8.noarch", "8Base-RHOSE-4.7:python3-keystoneauth1-0:4.2.0-0.20200630234358.dab8e10.el8ost.noarch", "8Base-RHOSE-4.7:python3-kubernetes-0:11.0.0-1.el8.noarch", "8Base-RHOSE-4.7:python3-kubernetes-tests-0:11.0.0-1.el8.noarch", "8Base-RHOSE-4.7:python3-kuryr-kubernetes-0:4.7.0-202101262230.p0.git.2494.cd95ce5.el8.noarch", "8Base-RHOSE-4.7:python3-kuryr-lib-0:1.1.1-0.20190923160834.41e6964.el8ost.noarch", "8Base-RHOSE-4.7:python3-kuryr-lib-tests-0:1.1.1-0.20190923160834.41e6964.el8ost.noarch", "8Base-RHOSE-4.7:python3-lockfile-1:0.11.0-8.el8ar.noarch", "8Base-RHOSE-4.7:python3-msgpack-0:0.6.2-1.el8ost.x86_64", "8Base-RHOSE-4.7:python3-msgpack-debuginfo-0:0.6.2-1.el8ost.x86_64", "8Base-RHOSE-4.7:python3-openshift-1:0.11.2-1.el8.noarch", "8Base-RHOSE-4.7:python3-openstacksdk-0:0.48.0-0.20200708092906.3b693c2.el8ost.noarch", "8Base-RHOSE-4.7:python3-openstacksdk-tests-0:0.48.0-0.20200708092906.3b693c2.el8ost.noarch", "8Base-RHOSE-4.7:python3-openvswitch2.13-0:2.13.0-79.el8fdp.ppc64le", "8Base-RHOSE-4.7:python3-openvswitch2.13-0:2.13.0-79.el8fdp.s390x", "8Base-RHOSE-4.7:python3-openvswitch2.13-0:2.13.0-79.el8fdp.x86_64", "8Base-RHOSE-4.7:python3-openvswitch2.13-debuginfo-0:2.13.0-79.el8fdp.ppc64le", "8Base-RHOSE-4.7:python3-openvswitch2.13-debuginfo-0:2.13.0-79.el8fdp.s390x", "8Base-RHOSE-4.7:python3-openvswitch2.13-debuginfo-0:2.13.0-79.el8fdp.x86_64", "8Base-RHOSE-4.7:python3-oslo-concurrency-0:4.3.0-0.20201008180343.2f78803.el8.noarch", "8Base-RHOSE-4.7:python3-oslo-concurrency-tests-0:4.3.0-0.20201008180343.2f78803.el8.noarch", "8Base-RHOSE-4.7:python3-oslo-config-2:8.3.2-0.20201008180634.fcb8894.el8.noarch", "8Base-RHOSE-4.7:python3-oslo-context-0:3.1.1-0.20201008190523.57dbded.el8.noarch", "8Base-RHOSE-4.7:python3-oslo-context-tests-0:3.1.1-0.20201008190523.57dbded.el8.noarch", "8Base-RHOSE-4.7:python3-oslo-db-0:8.4.0-0.20200918104110.e42c733.el8ost.noarch", "8Base-RHOSE-4.7:python3-oslo-db-tests-0:8.4.0-0.20200918104110.e42c733.el8ost.noarch", "8Base-RHOSE-4.7:python3-oslo-i18n-0:5.0.1-0.20201009131251.73187bd.el8.noarch", "8Base-RHOSE-4.7:python3-oslo-log-0:4.3.1-0.20201207021200.1597f24.el8.noarch", "8Base-RHOSE-4.7:python3-oslo-log-tests-0:4.3.1-0.20201207021200.1597f24.el8.noarch", "8Base-RHOSE-4.7:python3-oslo-serialization-0:4.0.1-0.20201008182423.c7884b2.el8.noarch", "8Base-RHOSE-4.7:python3-oslo-serialization-tests-0:4.0.1-0.20201008182423.c7884b2.el8.noarch", "8Base-RHOSE-4.7:python3-oslo-service-0:2.4.0-0.20201008184547.58466a6.el8.noarch", "8Base-RHOSE-4.7:python3-oslo-service-tests-0:2.4.0-0.20201008184547.58466a6.el8.noarch", "8Base-RHOSE-4.7:python3-oslo-utils-0:4.6.0-0.20201009175936.91497da.el8.noarch", "8Base-RHOSE-4.7:python3-oslo-utils-tests-0:4.6.0-0.20201009175936.91497da.el8.noarch", "8Base-RHOSE-4.7:python3-packaging-0:20.4-1.el8ost.noarch", "8Base-RHOSE-4.7:python3-paste-0:3.2.4-1.el8ost.noarch", "8Base-RHOSE-4.7:python3-paste-deploy-0:2.0.1-4.el8ost.noarch", "8Base-RHOSE-4.7:python3-pbr-0:5.4.3-2.el8ost.noarch", "8Base-RHOSE-4.7:python3-pexpect-0:4.6-2.el8ar.noarch", "8Base-RHOSE-4.7:python3-pint-0:0.10.1-1.el8ost.noarch", "8Base-RHOSE-4.7:python3-protobuf-0:3.6.1-4.el8ost.noarch", "8Base-RHOSE-4.7:python3-psutil-0:5.6.6-1.el8ar.ppc64le", "8Base-RHOSE-4.7:python3-psutil-0:5.6.6-1.el8ar.s390x", "8Base-RHOSE-4.7:python3-psutil-0:5.6.6-1.el8ar.x86_64", "8Base-RHOSE-4.7:python3-psutil-debuginfo-0:5.6.6-1.el8ar.ppc64le", "8Base-RHOSE-4.7:python3-psutil-debuginfo-0:5.6.6-1.el8ar.s390x", "8Base-RHOSE-4.7:python3-psutil-debuginfo-0:5.6.6-1.el8ar.x86_64", "8Base-RHOSE-4.7:python3-pyghmi-0:1.5.14-2.1.el8ost.noarch", "8Base-RHOSE-4.7:python3-pyroute2-0:0.5.13-1.el8ost.noarch", "8Base-RHOSE-4.7:python3-requests-unixsocket-0:0.1.5-5.el8ar.noarch", "8Base-RHOSE-4.7:python3-rsa-0:4.7-1.el8.noarch", "8Base-RHOSE-4.7:python3-ruamel-yaml-0:0.15.41-4.el8ost.ppc64le", "8Base-RHOSE-4.7:python3-ruamel-yaml-0:0.15.41-4.el8ost.s390x", "8Base-RHOSE-4.7:python3-ruamel-yaml-0:0.15.41-4.el8ost.x86_64", "8Base-RHOSE-4.7:python3-ruamel-yaml-debuginfo-0:0.15.41-4.el8ost.ppc64le", "8Base-RHOSE-4.7:python3-ruamel-yaml-debuginfo-0:0.15.41-4.el8ost.s390x", "8Base-RHOSE-4.7:python3-ruamel-yaml-debuginfo-0:0.15.41-4.el8ost.x86_64", "8Base-RHOSE-4.7:python3-s3transfer-0:0.2.0-1.el8ost.noarch", "8Base-RHOSE-4.7:python3-stevedore-0:3.2.2-0.20201009151242.274eaa6.el8.noarch", "8Base-RHOSE-4.7:python3-string_utils-0:0.6.0-4.el8ost.noarch", "8Base-RHOSE-4.7:python3-sushy-0:3.6.1-0.20210122201213.7ec0422.el8.noarch", "8Base-RHOSE-4.7:python3-sushy-oem-idrac-0:0.0.3-0.20200922221223.1202372.el8ost.noarch", "8Base-RHOSE-4.7:python3-sushy-oem-idrac-tests-0:0.0.3-0.20200922221223.1202372.el8ost.noarch", "8Base-RHOSE-4.7:python3-sushy-tests-0:3.6.1-0.20210122201213.7ec0422.el8.noarch", "8Base-RHOSE-4.7:python3-tenacity-0:6.2.0-1.el8ost.noarch", "8Base-RHOSE-4.7:python3-tooz-0:2.7.0-0.20200723133754.fca43df.el8ost.noarch", "8Base-RHOSE-4.7:python3-websocket-client-0:0.54.0-1.el8ost.noarch", "8Base-RHOSE-4.7:python3-werkzeug-0:1.0.1-3.el8ost.noarch", "8Base-RHOSE-4.7:python3-zeroconf-0:0.24.4-1.el8ost.noarch", "8Base-RHOSE-4.7:python3-zipp-0:0.5.1-2.el8ost.noarch", "8Base-RHOSE-4.7:redhat-release-coreos-0:47.83-1.el8.ppc64le", "8Base-RHOSE-4.7:redhat-release-coreos-0:47.83-1.el8.s390x", "8Base-RHOSE-4.7:redhat-release-coreos-0:47.83-1.el8.src", "8Base-RHOSE-4.7:redhat-release-coreos-0:47.83-1.el8.x86_64", "8Base-RHOSE-4.7:rhcos-tools-0:0.0.0-1.rhaos4.2.el8.noarch", "8Base-RHOSE-4.7:rhcos-tools-0:0.0.0-1.rhaos4.2.el8.src", "8Base-RHOSE-4.7:rhosp-director-images-0:17.0-20200606.1.el8ost.noarch", "8Base-RHOSE-4.7:rhosp-director-images-0:17.0-20200606.1.el8ost.src", "8Base-RHOSE-4.7:rhosp-director-images-all-0:17.0-20200606.1.el8ost.noarch", "8Base-RHOSE-4.7:rhosp-director-images-ipa-0:17.0-20200606.1.el8ost.noarch", "8Base-RHOSE-4.7:rhosp-director-images-ipa-ppc64le-0:17.0-20200606.1.el8ost.noarch", "8Base-RHOSE-4.7:rhosp-director-images-ipa-x86_64-0:17.0-20200606.1.el8ost.noarch", "8Base-RHOSE-4.7:rhosp-director-images-minimal-0:17.0-20200606.1.el8ost.noarch", "8Base-RHOSE-4.7:rhosp-director-images-ppc64le-0:17.0-20200606.1.el8ost.noarch", "8Base-RHOSE-4.7:rhosp-director-images-x86_64-0:17.0-20200606.1.el8ost.noarch", "8Base-RHOSE-4.7:rpm-ostree-0:2020.7-1.el8_3.ppc64le", "8Base-RHOSE-4.7:rpm-ostree-0:2020.7-1.el8_3.s390x", "8Base-RHOSE-4.7:rpm-ostree-0:2020.7-1.el8_3.src", "8Base-RHOSE-4.7:rpm-ostree-0:2020.7-1.el8_3.x86_64", "8Base-RHOSE-4.7:rpm-ostree-debuginfo-0:2020.7-1.el8_3.ppc64le", "8Base-RHOSE-4.7:rpm-ostree-debuginfo-0:2020.7-1.el8_3.s390x", "8Base-RHOSE-4.7:rpm-ostree-debuginfo-0:2020.7-1.el8_3.x86_64", "8Base-RHOSE-4.7:rpm-ostree-debugsource-0:2020.7-1.el8_3.ppc64le", "8Base-RHOSE-4.7:rpm-ostree-debugsource-0:2020.7-1.el8_3.s390x", "8Base-RHOSE-4.7:rpm-ostree-debugsource-0:2020.7-1.el8_3.x86_64", "8Base-RHOSE-4.7:rpm-ostree-devel-0:2020.7-1.el8_3.ppc64le", "8Base-RHOSE-4.7:rpm-ostree-devel-0:2020.7-1.el8_3.s390x", "8Base-RHOSE-4.7:rpm-ostree-devel-0:2020.7-1.el8_3.x86_64", "8Base-RHOSE-4.7:rpm-ostree-libs-0:2020.7-1.el8_3.ppc64le", "8Base-RHOSE-4.7:rpm-ostree-libs-0:2020.7-1.el8_3.s390x", "8Base-RHOSE-4.7:rpm-ostree-libs-0:2020.7-1.el8_3.x86_64", "8Base-RHOSE-4.7:rpm-ostree-libs-debuginfo-0:2020.7-1.el8_3.ppc64le", "8Base-RHOSE-4.7:rpm-ostree-libs-debuginfo-0:2020.7-1.el8_3.s390x", "8Base-RHOSE-4.7:rpm-ostree-libs-debuginfo-0:2020.7-1.el8_3.x86_64", "8Base-RHOSE-4.7:runc-0:1.0.0-82.rhaos4.6.git086e841.el8.ppc64le", "8Base-RHOSE-4.7:runc-0:1.0.0-82.rhaos4.6.git086e841.el8.s390x", "8Base-RHOSE-4.7:runc-0:1.0.0-82.rhaos4.6.git086e841.el8.src", "8Base-RHOSE-4.7:runc-0:1.0.0-82.rhaos4.6.git086e841.el8.x86_64", "8Base-RHOSE-4.7:runc-debuginfo-0:1.0.0-82.rhaos4.6.git086e841.el8.ppc64le", "8Base-RHOSE-4.7:runc-debuginfo-0:1.0.0-82.rhaos4.6.git086e841.el8.s390x", "8Base-RHOSE-4.7:runc-debuginfo-0:1.0.0-82.rhaos4.6.git086e841.el8.x86_64", "8Base-RHOSE-4.7:runc-debugsource-0:1.0.0-82.rhaos4.6.git086e841.el8.ppc64le", "8Base-RHOSE-4.7:runc-debugsource-0:1.0.0-82.rhaos4.6.git086e841.el8.s390x", "8Base-RHOSE-4.7:runc-debugsource-0:1.0.0-82.rhaos4.6.git086e841.el8.x86_64", "8Base-RHOSE-4.7:rust-afterburn-0:4.6.0-1.rhaos4.7.el8.src", "8Base-RHOSE-4.7:rust-afterburn-debugsource-0:4.6.0-1.rhaos4.7.el8.ppc64le", "8Base-RHOSE-4.7:rust-afterburn-debugsource-0:4.6.0-1.rhaos4.7.el8.s390x", "8Base-RHOSE-4.7:rust-afterburn-debugsource-0:4.6.0-1.rhaos4.7.el8.x86_64", "8Base-RHOSE-4.7:rust-bootupd-0:0.2.5-2.el8.src", "8Base-RHOSE-4.7:rust-bootupd-debugsource-0:0.2.5-2.el8.x86_64", "8Base-RHOSE-4.7:tini-0:0.16.1-1.el8ar.ppc64le", "8Base-RHOSE-4.7:tini-0:0.16.1-1.el8ar.s390x", "8Base-RHOSE-4.7:tini-0:0.16.1-1.el8ar.src", "8Base-RHOSE-4.7:tini-0:0.16.1-1.el8ar.x86_64", "8Base-RHOSE-4.7:toolbox-0:0.0.8-3.rhaos4.7.el8.noarch", "8Base-RHOSE-4.7:toolbox-0:0.0.8-3.rhaos4.7.el8.src" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-3884" }, { "category": "external", "summary": "RHBZ#1693905", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1693905" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-3884", "url": "https://www.cve.org/CVERecord?id=CVE-2019-3884" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-3884", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-3884" } ], "release_date": "2019-03-29T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-02-24T14:45:13+00:00", "details": "For OpenShift Container Platform 4.7 see the following documentation, which\nwill be updated shortly for this release, for important instructions on how\nto upgrade your cluster and fully apply this asynchronous errata update:\n\nhttps://docs.openshift.com/container-platform/4.7/release_notes/ocp-4-7-release-notes.html\n\nDetails on how to access this content are available at\nhttps://docs.openshift.com/container-platform/4.7/updating/updating-cluster-cli.html.", "product_ids": [ "7Server-RH7-RHOSE-4.7:openshift-0:4.7.0-202102060108.p0.git.97095.7271b90.el7.src", "7Server-RH7-RHOSE-4.7:openshift-hyperkube-0:4.7.0-202102060108.p0.git.97095.7271b90.el7.x86_64", "8Base-RHOSE-4.7:openshift-0:4.7.0-202102060108.p0.git.97095.7271b90.el8.src", "8Base-RHOSE-4.7:openshift-hyperkube-0:4.7.0-202102060108.p0.git.97095.7271b90.el8.ppc64le", "8Base-RHOSE-4.7:openshift-hyperkube-0:4.7.0-202102060108.p0.git.97095.7271b90.el8.s390x", "8Base-RHOSE-4.7:openshift-hyperkube-0:4.7.0-202102060108.p0.git.97095.7271b90.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:5634" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "LOW", "baseScore": 3.6, "baseSeverity": "LOW", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:L", "version": "3.0" }, "products": [ "7Server-RH7-RHOSE-4.7:openshift-0:4.7.0-202102060108.p0.git.97095.7271b90.el7.src", "7Server-RH7-RHOSE-4.7:openshift-hyperkube-0:4.7.0-202102060108.p0.git.97095.7271b90.el7.x86_64", "8Base-RHOSE-4.7:openshift-0:4.7.0-202102060108.p0.git.97095.7271b90.el8.src", "8Base-RHOSE-4.7:openshift-hyperkube-0:4.7.0-202102060108.p0.git.97095.7271b90.el8.ppc64le", "8Base-RHOSE-4.7:openshift-hyperkube-0:4.7.0-202102060108.p0.git.97095.7271b90.el8.s390x", "8Base-RHOSE-4.7:openshift-hyperkube-0:4.7.0-202102060108.p0.git.97095.7271b90.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "atomic-openshift: cross-namespace owner references can trigger deletions of valid children" }, { "acknowledgments": [ { "names": [ "the Kubernetes Product Security Committee" ] }, { "names": [ "Kaizhe Huang" ], "organization": "derek0405", "summary": "Acknowledged by upstream." } ], "cve": "CVE-2020-8566", "cwe": { "id": "CWE-117", "name": "Improper Output Neutralization for Logs" }, "discovery_date": "2020-10-09T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "7Server-RH7-RHOSE-4.7:conmon-2:2.0.21-2.rhaos4.6.el7.src", "7Server-RH7-RHOSE-4.7:conmon-2:2.0.21-2.rhaos4.6.el7.x86_64", "7Server-RH7-RHOSE-4.7:containernetworking-plugins-0:0.8.6-1.rhaos4.5.el7.src", "7Server-RH7-RHOSE-4.7:containernetworking-plugins-0:0.8.6-1.rhaos4.5.el7.x86_64", "7Server-RH7-RHOSE-4.7:containernetworking-plugins-debuginfo-0:0.8.6-1.rhaos4.5.el7.x86_64", "7Server-RH7-RHOSE-4.7:cri-o-0:1.20.0-0.rhaos4.7.git8921e00.el7.51.src", "7Server-RH7-RHOSE-4.7:cri-o-0:1.20.0-0.rhaos4.7.git8921e00.el7.51.x86_64", "7Server-RH7-RHOSE-4.7:cri-o-debuginfo-0:1.20.0-0.rhaos4.7.git8921e00.el7.51.x86_64", "7Server-RH7-RHOSE-4.7:cri-tools-0:1.18.0-3.el7.src", "7Server-RH7-RHOSE-4.7:cri-tools-0:1.18.0-3.el7.x86_64", "7Server-RH7-RHOSE-4.7:cri-tools-debuginfo-0:1.18.0-3.el7.x86_64", "7Server-RH7-RHOSE-4.7:haproxy-0:2.0.19-1.el7.src", "7Server-RH7-RHOSE-4.7:haproxy-debuginfo-0:2.0.19-1.el7.x86_64", "7Server-RH7-RHOSE-4.7:haproxy20-0:2.0.19-1.el7.x86_64", "7Server-RH7-RHOSE-4.7:jq-0:1.6-2.el7.src", "7Server-RH7-RHOSE-4.7:jq-0:1.6-2.el7.x86_64", "7Server-RH7-RHOSE-4.7:jq-debuginfo-0:1.6-2.el7.x86_64", "7Server-RH7-RHOSE-4.7:jq-devel-0:1.6-2.el7.x86_64", "7Server-RH7-RHOSE-4.7:oniguruma-0:5.9.2-5.el7.src", "7Server-RH7-RHOSE-4.7:oniguruma-0:5.9.2-5.el7.x86_64", "7Server-RH7-RHOSE-4.7:oniguruma-debuginfo-0:5.9.2-5.el7.x86_64", "7Server-RH7-RHOSE-4.7:oniguruma-devel-0:5.9.2-5.el7.x86_64", "7Server-RH7-RHOSE-4.7:openshift-ansible-0:4.7.0-202102032256.p0.git.0.bf7d9a7.el7.noarch", "7Server-RH7-RHOSE-4.7:openshift-ansible-0:4.7.0-202102032256.p0.git.0.bf7d9a7.el7.src", "7Server-RH7-RHOSE-4.7:openshift-ansible-test-0:4.7.0-202102032256.p0.git.0.bf7d9a7.el7.noarch", "7Server-RH7-RHOSE-4.7:openshift-clients-0:4.7.0-202102032256.p0.git.3951.0e656ef.el7.src", "7Server-RH7-RHOSE-4.7:openshift-clients-0:4.7.0-202102032256.p0.git.3951.0e656ef.el7.x86_64", "7Server-RH7-RHOSE-4.7:openshift-clients-redistributable-0:4.7.0-202102032256.p0.git.3951.0e656ef.el7.x86_64", "7Server-RH7-RHOSE-4.7:python-botocore-0:1.4.57-5.el7.src", "7Server-RH7-RHOSE-4.7:python2-botocore-0:1.4.57-5.el7.noarch", "7Server-RH7-RHOSE-4.7:runc-0:1.0.0-82.rhaos4.6.git086e841.el7.src", "7Server-RH7-RHOSE-4.7:runc-0:1.0.0-82.rhaos4.6.git086e841.el7.x86_64", "7Server-RH7-RHOSE-4.7:runc-debuginfo-0:1.0.0-82.rhaos4.6.git086e841.el7.x86_64", "8Base-RHOSE-4.7:NetworkManager-1:1.26.0-12.1.rhaos4.7.el8.ppc64le", "8Base-RHOSE-4.7:NetworkManager-1:1.26.0-12.1.rhaos4.7.el8.s390x", "8Base-RHOSE-4.7:NetworkManager-1:1.26.0-12.1.rhaos4.7.el8.src", "8Base-RHOSE-4.7:NetworkManager-1:1.26.0-12.1.rhaos4.7.el8.x86_64", "8Base-RHOSE-4.7:NetworkManager-adsl-1:1.26.0-12.1.rhaos4.7.el8.ppc64le", "8Base-RHOSE-4.7:NetworkManager-adsl-1:1.26.0-12.1.rhaos4.7.el8.s390x", "8Base-RHOSE-4.7:NetworkManager-adsl-1:1.26.0-12.1.rhaos4.7.el8.x86_64", "8Base-RHOSE-4.7:NetworkManager-adsl-debuginfo-1:1.26.0-12.1.rhaos4.7.el8.ppc64le", "8Base-RHOSE-4.7:NetworkManager-adsl-debuginfo-1:1.26.0-12.1.rhaos4.7.el8.s390x", "8Base-RHOSE-4.7:NetworkManager-adsl-debuginfo-1:1.26.0-12.1.rhaos4.7.el8.x86_64", "8Base-RHOSE-4.7:NetworkManager-bluetooth-1:1.26.0-12.1.rhaos4.7.el8.ppc64le", "8Base-RHOSE-4.7:NetworkManager-bluetooth-1:1.26.0-12.1.rhaos4.7.el8.s390x", "8Base-RHOSE-4.7:NetworkManager-bluetooth-1:1.26.0-12.1.rhaos4.7.el8.x86_64", "8Base-RHOSE-4.7:NetworkManager-bluetooth-debuginfo-1:1.26.0-12.1.rhaos4.7.el8.ppc64le", "8Base-RHOSE-4.7:NetworkManager-bluetooth-debuginfo-1:1.26.0-12.1.rhaos4.7.el8.s390x", "8Base-RHOSE-4.7:NetworkManager-bluetooth-debuginfo-1:1.26.0-12.1.rhaos4.7.el8.x86_64", "8Base-RHOSE-4.7:NetworkManager-cloud-setup-1:1.26.0-12.1.rhaos4.7.el8.ppc64le", "8Base-RHOSE-4.7:NetworkManager-cloud-setup-1:1.26.0-12.1.rhaos4.7.el8.s390x", "8Base-RHOSE-4.7:NetworkManager-cloud-setup-1:1.26.0-12.1.rhaos4.7.el8.x86_64", "8Base-RHOSE-4.7:NetworkManager-cloud-setup-debuginfo-1:1.26.0-12.1.rhaos4.7.el8.ppc64le", "8Base-RHOSE-4.7:NetworkManager-cloud-setup-debuginfo-1:1.26.0-12.1.rhaos4.7.el8.s390x", "8Base-RHOSE-4.7:NetworkManager-cloud-setup-debuginfo-1:1.26.0-12.1.rhaos4.7.el8.x86_64", "8Base-RHOSE-4.7:NetworkManager-config-connectivity-redhat-1:1.26.0-12.1.rhaos4.7.el8.noarch", "8Base-RHOSE-4.7:NetworkManager-config-server-1:1.26.0-12.1.rhaos4.7.el8.noarch", "8Base-RHOSE-4.7:NetworkManager-debuginfo-1:1.26.0-12.1.rhaos4.7.el8.ppc64le", "8Base-RHOSE-4.7:NetworkManager-debuginfo-1:1.26.0-12.1.rhaos4.7.el8.s390x", "8Base-RHOSE-4.7:NetworkManager-debuginfo-1:1.26.0-12.1.rhaos4.7.el8.x86_64", "8Base-RHOSE-4.7:NetworkManager-debugsource-1:1.26.0-12.1.rhaos4.7.el8.ppc64le", "8Base-RHOSE-4.7:NetworkManager-debugsource-1:1.26.0-12.1.rhaos4.7.el8.s390x", "8Base-RHOSE-4.7:NetworkManager-debugsource-1:1.26.0-12.1.rhaos4.7.el8.x86_64", "8Base-RHOSE-4.7:NetworkManager-dispatcher-routing-rules-1:1.26.0-12.1.rhaos4.7.el8.noarch", "8Base-RHOSE-4.7:NetworkManager-libnm-1:1.26.0-12.1.rhaos4.7.el8.ppc64le", "8Base-RHOSE-4.7:NetworkManager-libnm-1:1.26.0-12.1.rhaos4.7.el8.s390x", "8Base-RHOSE-4.7:NetworkManager-libnm-1:1.26.0-12.1.rhaos4.7.el8.x86_64", "8Base-RHOSE-4.7:NetworkManager-libnm-debuginfo-1:1.26.0-12.1.rhaos4.7.el8.ppc64le", "8Base-RHOSE-4.7:NetworkManager-libnm-debuginfo-1:1.26.0-12.1.rhaos4.7.el8.s390x", "8Base-RHOSE-4.7:NetworkManager-libnm-debuginfo-1:1.26.0-12.1.rhaos4.7.el8.x86_64", "8Base-RHOSE-4.7:NetworkManager-libnm-devel-1:1.26.0-12.1.rhaos4.7.el8.ppc64le", "8Base-RHOSE-4.7:NetworkManager-libnm-devel-1:1.26.0-12.1.rhaos4.7.el8.s390x", "8Base-RHOSE-4.7:NetworkManager-libnm-devel-1:1.26.0-12.1.rhaos4.7.el8.x86_64", "8Base-RHOSE-4.7:NetworkManager-ovs-1:1.26.0-12.1.rhaos4.7.el8.ppc64le", "8Base-RHOSE-4.7:NetworkManager-ovs-1:1.26.0-12.1.rhaos4.7.el8.s390x", "8Base-RHOSE-4.7:NetworkManager-ovs-1:1.26.0-12.1.rhaos4.7.el8.x86_64", "8Base-RHOSE-4.7:NetworkManager-ovs-debuginfo-1:1.26.0-12.1.rhaos4.7.el8.ppc64le", "8Base-RHOSE-4.7:NetworkManager-ovs-debuginfo-1:1.26.0-12.1.rhaos4.7.el8.s390x", "8Base-RHOSE-4.7:NetworkManager-ovs-debuginfo-1:1.26.0-12.1.rhaos4.7.el8.x86_64", "8Base-RHOSE-4.7:NetworkManager-ppp-1:1.26.0-12.1.rhaos4.7.el8.ppc64le", "8Base-RHOSE-4.7:NetworkManager-ppp-1:1.26.0-12.1.rhaos4.7.el8.s390x", "8Base-RHOSE-4.7:NetworkManager-ppp-1:1.26.0-12.1.rhaos4.7.el8.x86_64", "8Base-RHOSE-4.7:NetworkManager-ppp-debuginfo-1:1.26.0-12.1.rhaos4.7.el8.ppc64le", "8Base-RHOSE-4.7:NetworkManager-ppp-debuginfo-1:1.26.0-12.1.rhaos4.7.el8.s390x", "8Base-RHOSE-4.7:NetworkManager-ppp-debuginfo-1:1.26.0-12.1.rhaos4.7.el8.x86_64", "8Base-RHOSE-4.7:NetworkManager-team-1:1.26.0-12.1.rhaos4.7.el8.ppc64le", "8Base-RHOSE-4.7:NetworkManager-team-1:1.26.0-12.1.rhaos4.7.el8.s390x", "8Base-RHOSE-4.7:NetworkManager-team-1:1.26.0-12.1.rhaos4.7.el8.x86_64", "8Base-RHOSE-4.7:NetworkManager-team-debuginfo-1:1.26.0-12.1.rhaos4.7.el8.ppc64le", "8Base-RHOSE-4.7:NetworkManager-team-debuginfo-1:1.26.0-12.1.rhaos4.7.el8.s390x", "8Base-RHOSE-4.7:NetworkManager-team-debuginfo-1:1.26.0-12.1.rhaos4.7.el8.x86_64", "8Base-RHOSE-4.7:NetworkManager-tui-1:1.26.0-12.1.rhaos4.7.el8.ppc64le", "8Base-RHOSE-4.7:NetworkManager-tui-1:1.26.0-12.1.rhaos4.7.el8.s390x", "8Base-RHOSE-4.7:NetworkManager-tui-1:1.26.0-12.1.rhaos4.7.el8.x86_64", "8Base-RHOSE-4.7:NetworkManager-tui-debuginfo-1:1.26.0-12.1.rhaos4.7.el8.ppc64le", "8Base-RHOSE-4.7:NetworkManager-tui-debuginfo-1:1.26.0-12.1.rhaos4.7.el8.s390x", "8Base-RHOSE-4.7:NetworkManager-tui-debuginfo-1:1.26.0-12.1.rhaos4.7.el8.x86_64", "8Base-RHOSE-4.7:NetworkManager-wifi-1:1.26.0-12.1.rhaos4.7.el8.ppc64le", "8Base-RHOSE-4.7:NetworkManager-wifi-1:1.26.0-12.1.rhaos4.7.el8.s390x", "8Base-RHOSE-4.7:NetworkManager-wifi-1:1.26.0-12.1.rhaos4.7.el8.x86_64", "8Base-RHOSE-4.7:NetworkManager-wifi-debuginfo-1:1.26.0-12.1.rhaos4.7.el8.ppc64le", "8Base-RHOSE-4.7:NetworkManager-wifi-debuginfo-1:1.26.0-12.1.rhaos4.7.el8.s390x", "8Base-RHOSE-4.7:NetworkManager-wifi-debuginfo-1:1.26.0-12.1.rhaos4.7.el8.x86_64", "8Base-RHOSE-4.7:NetworkManager-wwan-1:1.26.0-12.1.rhaos4.7.el8.ppc64le", "8Base-RHOSE-4.7:NetworkManager-wwan-1:1.26.0-12.1.rhaos4.7.el8.s390x", "8Base-RHOSE-4.7:NetworkManager-wwan-1:1.26.0-12.1.rhaos4.7.el8.x86_64", "8Base-RHOSE-4.7:NetworkManager-wwan-debuginfo-1:1.26.0-12.1.rhaos4.7.el8.ppc64le", "8Base-RHOSE-4.7:NetworkManager-wwan-debuginfo-1:1.26.0-12.1.rhaos4.7.el8.s390x", "8Base-RHOSE-4.7:NetworkManager-wwan-debuginfo-1:1.26.0-12.1.rhaos4.7.el8.x86_64", "8Base-RHOSE-4.7:afterburn-0:4.6.0-1.rhaos4.7.el8.ppc64le", "8Base-RHOSE-4.7:afterburn-0:4.6.0-1.rhaos4.7.el8.s390x", "8Base-RHOSE-4.7:afterburn-0:4.6.0-1.rhaos4.7.el8.x86_64", "8Base-RHOSE-4.7:afterburn-debuginfo-0:4.6.0-1.rhaos4.7.el8.ppc64le", "8Base-RHOSE-4.7:afterburn-debuginfo-0:4.6.0-1.rhaos4.7.el8.s390x", "8Base-RHOSE-4.7:afterburn-debuginfo-0:4.6.0-1.rhaos4.7.el8.x86_64", "8Base-RHOSE-4.7:ansible-runner-0:1.4.6-2.el8ar.noarch", "8Base-RHOSE-4.7:ansible-runner-0:1.4.6-2.el8ar.src", "8Base-RHOSE-4.7:ansible-runner-http-0:1.0.0-2.el8ar.noarch", "8Base-RHOSE-4.7:ansible-runner-http-0:1.0.0-2.el8ar.src", "8Base-RHOSE-4.7:atomic-openshift-service-idler-0:4.7.0-202011171454.p0.git.15.675c1c8.el8.ppc64le", "8Base-RHOSE-4.7:atomic-openshift-service-idler-0:4.7.0-202011171454.p0.git.15.675c1c8.el8.s390x", "8Base-RHOSE-4.7:atomic-openshift-service-idler-0:4.7.0-202011171454.p0.git.15.675c1c8.el8.src", "8Base-RHOSE-4.7:atomic-openshift-service-idler-0:4.7.0-202011171454.p0.git.15.675c1c8.el8.x86_64", "8Base-RHOSE-4.7:bootupd-0:0.2.5-2.el8.x86_64", "8Base-RHOSE-4.7:bootupd-debuginfo-0:0.2.5-2.el8.x86_64", "8Base-RHOSE-4.7:clevis-0:15-1.el8.ppc64le", "8Base-RHOSE-4.7:clevis-0:15-1.el8.s390x", "8Base-RHOSE-4.7:clevis-0:15-1.el8.src", "8Base-RHOSE-4.7:clevis-0:15-1.el8.x86_64", "8Base-RHOSE-4.7:clevis-debuginfo-0:15-1.el8.ppc64le", "8Base-RHOSE-4.7:clevis-debuginfo-0:15-1.el8.s390x", "8Base-RHOSE-4.7:clevis-debuginfo-0:15-1.el8.x86_64", "8Base-RHOSE-4.7:clevis-debugsource-0:15-1.el8.ppc64le", "8Base-RHOSE-4.7:clevis-debugsource-0:15-1.el8.s390x", "8Base-RHOSE-4.7:clevis-debugsource-0:15-1.el8.x86_64", "8Base-RHOSE-4.7:clevis-dracut-0:15-1.el8.ppc64le", "8Base-RHOSE-4.7:clevis-dracut-0:15-1.el8.s390x", "8Base-RHOSE-4.7:clevis-dracut-0:15-1.el8.x86_64", "8Base-RHOSE-4.7:clevis-luks-0:15-1.el8.ppc64le", "8Base-RHOSE-4.7:clevis-luks-0:15-1.el8.s390x", "8Base-RHOSE-4.7:clevis-luks-0:15-1.el8.x86_64", "8Base-RHOSE-4.7:clevis-systemd-0:15-1.el8.ppc64le", "8Base-RHOSE-4.7:clevis-systemd-0:15-1.el8.s390x", "8Base-RHOSE-4.7:clevis-systemd-0:15-1.el8.x86_64", "8Base-RHOSE-4.7:clevis-udisks2-0:15-1.el8.ppc64le", "8Base-RHOSE-4.7:clevis-udisks2-0:15-1.el8.s390x", "8Base-RHOSE-4.7:clevis-udisks2-0:15-1.el8.x86_64", "8Base-RHOSE-4.7:clevis-udisks2-debuginfo-0:15-1.el8.ppc64le", "8Base-RHOSE-4.7:clevis-udisks2-debuginfo-0:15-1.el8.s390x", "8Base-RHOSE-4.7:clevis-udisks2-debuginfo-0:15-1.el8.x86_64", "8Base-RHOSE-4.7:conmon-2:2.0.21-2.rhaos4.6.el8.ppc64le", "8Base-RHOSE-4.7:conmon-2:2.0.21-2.rhaos4.6.el8.s390x", "8Base-RHOSE-4.7:conmon-2:2.0.21-2.rhaos4.6.el8.src", "8Base-RHOSE-4.7:conmon-2:2.0.21-2.rhaos4.6.el8.x86_64", "8Base-RHOSE-4.7:console-login-helper-messages-0:0.20.3-1.rhaos4.7.el8.noarch", "8Base-RHOSE-4.7:console-login-helper-messages-0:0.20.3-1.rhaos4.7.el8.src", "8Base-RHOSE-4.7:console-login-helper-messages-issuegen-0:0.20.3-1.rhaos4.7.el8.noarch", "8Base-RHOSE-4.7:console-login-helper-messages-profile-0:0.20.3-1.rhaos4.7.el8.noarch", "8Base-RHOSE-4.7:container-selinux-2:2.151.0-1.rhaos4.7.el8.noarch", "8Base-RHOSE-4.7:container-selinux-2:2.151.0-1.rhaos4.7.el8.src", "8Base-RHOSE-4.7:containernetworking-plugins-0:0.8.6-1.rhaos4.5.el8.ppc64le", "8Base-RHOSE-4.7:containernetworking-plugins-0:0.8.6-1.rhaos4.5.el8.s390x", "8Base-RHOSE-4.7:containernetworking-plugins-0:0.8.6-1.rhaos4.5.el8.src", "8Base-RHOSE-4.7:containernetworking-plugins-0:0.8.6-1.rhaos4.5.el8.x86_64", "8Base-RHOSE-4.7:containernetworking-plugins-debuginfo-0:0.8.6-1.rhaos4.5.el8.ppc64le", "8Base-RHOSE-4.7:containernetworking-plugins-debuginfo-0:0.8.6-1.rhaos4.5.el8.s390x", "8Base-RHOSE-4.7:containernetworking-plugins-debuginfo-0:0.8.6-1.rhaos4.5.el8.x86_64", "8Base-RHOSE-4.7:containernetworking-plugins-debugsource-0:0.8.6-1.rhaos4.5.el8.ppc64le", "8Base-RHOSE-4.7:containernetworking-plugins-debugsource-0:0.8.6-1.rhaos4.5.el8.s390x", "8Base-RHOSE-4.7:containernetworking-plugins-debugsource-0:0.8.6-1.rhaos4.5.el8.x86_64", "8Base-RHOSE-4.7:coreos-installer-0:0.8.0-3.rhaos4.7.el8.ppc64le", "8Base-RHOSE-4.7:coreos-installer-0:0.8.0-3.rhaos4.7.el8.s390x", "8Base-RHOSE-4.7:coreos-installer-0:0.8.0-3.rhaos4.7.el8.src", "8Base-RHOSE-4.7:coreos-installer-0:0.8.0-3.rhaos4.7.el8.x86_64", "8Base-RHOSE-4.7:coreos-installer-bootinfra-0:0.8.0-3.rhaos4.7.el8.ppc64le", "8Base-RHOSE-4.7:coreos-installer-bootinfra-0:0.8.0-3.rhaos4.7.el8.s390x", "8Base-RHOSE-4.7:coreos-installer-bootinfra-debuginfo-0:0.8.0-3.rhaos4.7.el8.ppc64le", "8Base-RHOSE-4.7:coreos-installer-bootinfra-debuginfo-0:0.8.0-3.rhaos4.7.el8.s390x", "8Base-RHOSE-4.7:coreos-installer-bootinfra-debuginfo-0:0.8.0-3.rhaos4.7.el8.x86_64", "8Base-RHOSE-4.7:coreos-installer-debuginfo-0:0.8.0-3.rhaos4.7.el8.ppc64le", "8Base-RHOSE-4.7:coreos-installer-debuginfo-0:0.8.0-3.rhaos4.7.el8.s390x", "8Base-RHOSE-4.7:coreos-installer-debuginfo-0:0.8.0-3.rhaos4.7.el8.x86_64", "8Base-RHOSE-4.7:coreos-installer-debugsource-0:0.8.0-3.rhaos4.7.el8.ppc64le", "8Base-RHOSE-4.7:coreos-installer-debugsource-0:0.8.0-3.rhaos4.7.el8.s390x", "8Base-RHOSE-4.7:coreos-installer-debugsource-0:0.8.0-3.rhaos4.7.el8.x86_64", "8Base-RHOSE-4.7:cri-o-0:1.20.0-0.rhaos4.7.git8921e00.el8.51.ppc64le", "8Base-RHOSE-4.7:cri-o-0:1.20.0-0.rhaos4.7.git8921e00.el8.51.s390x", "8Base-RHOSE-4.7:cri-o-0:1.20.0-0.rhaos4.7.git8921e00.el8.51.src", "8Base-RHOSE-4.7:cri-o-0:1.20.0-0.rhaos4.7.git8921e00.el8.51.x86_64", "8Base-RHOSE-4.7:cri-o-debuginfo-0:1.20.0-0.rhaos4.7.git8921e00.el8.51.ppc64le", "8Base-RHOSE-4.7:cri-o-debuginfo-0:1.20.0-0.rhaos4.7.git8921e00.el8.51.s390x", "8Base-RHOSE-4.7:cri-o-debuginfo-0:1.20.0-0.rhaos4.7.git8921e00.el8.51.x86_64", "8Base-RHOSE-4.7:cri-o-debugsource-0:1.20.0-0.rhaos4.7.git8921e00.el8.51.ppc64le", "8Base-RHOSE-4.7:cri-o-debugsource-0:1.20.0-0.rhaos4.7.git8921e00.el8.51.s390x", "8Base-RHOSE-4.7:cri-o-debugsource-0:1.20.0-0.rhaos4.7.git8921e00.el8.51.x86_64", "8Base-RHOSE-4.7:cri-tools-0:1.20.0-1.el8.ppc64le", "8Base-RHOSE-4.7:cri-tools-0:1.20.0-1.el8.s390x", "8Base-RHOSE-4.7:cri-tools-0:1.20.0-1.el8.src", "8Base-RHOSE-4.7:cri-tools-0:1.20.0-1.el8.x86_64", "8Base-RHOSE-4.7:cri-tools-debuginfo-0:1.20.0-1.el8.ppc64le", "8Base-RHOSE-4.7:cri-tools-debuginfo-0:1.20.0-1.el8.s390x", "8Base-RHOSE-4.7:cri-tools-debuginfo-0:1.20.0-1.el8.x86_64", "8Base-RHOSE-4.7:cri-tools-debugsource-0:1.20.0-1.el8.ppc64le", "8Base-RHOSE-4.7:cri-tools-debugsource-0:1.20.0-1.el8.s390x", "8Base-RHOSE-4.7:cri-tools-debugsource-0:1.20.0-1.el8.x86_64", "8Base-RHOSE-4.7:dracut-0:049-95.git20200804.el8_3.4.ppc64le", "8Base-RHOSE-4.7:dracut-0:049-95.git20200804.el8_3.4.s390x", "8Base-RHOSE-4.7:dracut-0:049-95.git20200804.el8_3.4.src", "8Base-RHOSE-4.7:dracut-0:049-95.git20200804.el8_3.4.x86_64", "8Base-RHOSE-4.7:dracut-caps-0:049-95.git20200804.el8_3.4.ppc64le", "8Base-RHOSE-4.7:dracut-caps-0:049-95.git20200804.el8_3.4.s390x", "8Base-RHOSE-4.7:dracut-caps-0:049-95.git20200804.el8_3.4.x86_64", "8Base-RHOSE-4.7:dracut-config-generic-0:049-95.git20200804.el8_3.4.ppc64le", "8Base-RHOSE-4.7:dracut-config-generic-0:049-95.git20200804.el8_3.4.s390x", "8Base-RHOSE-4.7:dracut-config-generic-0:049-95.git20200804.el8_3.4.x86_64", "8Base-RHOSE-4.7:dracut-config-rescue-0:049-95.git20200804.el8_3.4.ppc64le", "8Base-RHOSE-4.7:dracut-config-rescue-0:049-95.git20200804.el8_3.4.s390x", "8Base-RHOSE-4.7:dracut-config-rescue-0:049-95.git20200804.el8_3.4.x86_64", "8Base-RHOSE-4.7:dracut-debuginfo-0:049-95.git20200804.el8_3.4.ppc64le", "8Base-RHOSE-4.7:dracut-debuginfo-0:049-95.git20200804.el8_3.4.s390x", "8Base-RHOSE-4.7:dracut-debuginfo-0:049-95.git20200804.el8_3.4.x86_64", "8Base-RHOSE-4.7:dracut-debugsource-0:049-95.git20200804.el8_3.4.ppc64le", "8Base-RHOSE-4.7:dracut-debugsource-0:049-95.git20200804.el8_3.4.s390x", "8Base-RHOSE-4.7:dracut-debugsource-0:049-95.git20200804.el8_3.4.x86_64", "8Base-RHOSE-4.7:dracut-live-0:049-95.git20200804.el8_3.4.ppc64le", "8Base-RHOSE-4.7:dracut-live-0:049-95.git20200804.el8_3.4.s390x", "8Base-RHOSE-4.7:dracut-live-0:049-95.git20200804.el8_3.4.x86_64", "8Base-RHOSE-4.7:dracut-network-0:049-95.git20200804.el8_3.4.ppc64le", "8Base-RHOSE-4.7:dracut-network-0:049-95.git20200804.el8_3.4.s390x", "8Base-RHOSE-4.7:dracut-network-0:049-95.git20200804.el8_3.4.x86_64", "8Base-RHOSE-4.7:dracut-squash-0:049-95.git20200804.el8_3.4.ppc64le", "8Base-RHOSE-4.7:dracut-squash-0:049-95.git20200804.el8_3.4.s390x", "8Base-RHOSE-4.7:dracut-squash-0:049-95.git20200804.el8_3.4.x86_64", "8Base-RHOSE-4.7:dracut-tools-0:049-95.git20200804.el8_3.4.ppc64le", "8Base-RHOSE-4.7:dracut-tools-0:049-95.git20200804.el8_3.4.s390x", "8Base-RHOSE-4.7:dracut-tools-0:049-95.git20200804.el8_3.4.x86_64", "8Base-RHOSE-4.7:faq-0:0.0.6-5.el8.ppc64le", "8Base-RHOSE-4.7:faq-0:0.0.6-5.el8.s390x", "8Base-RHOSE-4.7:faq-0:0.0.6-5.el8.src", "8Base-RHOSE-4.7:faq-0:0.0.6-5.el8.x86_64", "8Base-RHOSE-4.7:golang-github-prometheus-promu-0:0.5.0-2.git642a960.el8.ppc64le", "8Base-RHOSE-4.7:golang-github-prometheus-promu-0:0.5.0-2.git642a960.el8.s390x", "8Base-RHOSE-4.7:golang-github-prometheus-promu-0:0.5.0-2.git642a960.el8.src", "8Base-RHOSE-4.7:golang-github-prometheus-promu-0:0.5.0-2.git642a960.el8.x86_64", "8Base-RHOSE-4.7:gperftools-0:2.6.3-2.el8ost.ppc64le", "8Base-RHOSE-4.7:gperftools-0:2.6.3-2.el8ost.s390x", "8Base-RHOSE-4.7:gperftools-0:2.6.3-2.el8ost.src", "8Base-RHOSE-4.7:gperftools-0:2.6.3-2.el8ost.x86_64", "8Base-RHOSE-4.7:gperftools-debugsource-0:2.6.3-2.el8ost.ppc64le", "8Base-RHOSE-4.7:gperftools-debugsource-0:2.6.3-2.el8ost.s390x", "8Base-RHOSE-4.7:gperftools-debugsource-0:2.6.3-2.el8ost.x86_64", "8Base-RHOSE-4.7:gperftools-devel-0:2.6.3-2.el8ost.ppc64le", "8Base-RHOSE-4.7:gperftools-devel-0:2.6.3-2.el8ost.s390x", "8Base-RHOSE-4.7:gperftools-devel-0:2.6.3-2.el8ost.x86_64", "8Base-RHOSE-4.7:gperftools-libs-0:2.6.3-2.el8ost.ppc64le", "8Base-RHOSE-4.7:gperftools-libs-0:2.6.3-2.el8ost.s390x", "8Base-RHOSE-4.7:gperftools-libs-0:2.6.3-2.el8ost.x86_64", "8Base-RHOSE-4.7:gperftools-libs-debuginfo-0:2.6.3-2.el8ost.ppc64le", "8Base-RHOSE-4.7:gperftools-libs-debuginfo-0:2.6.3-2.el8ost.s390x", "8Base-RHOSE-4.7:gperftools-libs-debuginfo-0:2.6.3-2.el8ost.x86_64", "8Base-RHOSE-4.7:grpc-0:1.18.0-4.el8ost.ppc64le", "8Base-RHOSE-4.7:grpc-0:1.18.0-4.el8ost.s390x", "8Base-RHOSE-4.7:grpc-0:1.18.0-4.el8ost.src", "8Base-RHOSE-4.7:grpc-0:1.18.0-4.el8ost.x86_64", "8Base-RHOSE-4.7:grpc-cli-0:1.18.0-4.el8ost.ppc64le", "8Base-RHOSE-4.7:grpc-cli-0:1.18.0-4.el8ost.s390x", "8Base-RHOSE-4.7:grpc-cli-0:1.18.0-4.el8ost.x86_64", "8Base-RHOSE-4.7:grpc-cli-debuginfo-0:1.18.0-4.el8ost.ppc64le", "8Base-RHOSE-4.7:grpc-cli-debuginfo-0:1.18.0-4.el8ost.s390x", "8Base-RHOSE-4.7:grpc-cli-debuginfo-0:1.18.0-4.el8ost.x86_64", "8Base-RHOSE-4.7:grpc-debuginfo-0:1.18.0-4.el8ost.ppc64le", "8Base-RHOSE-4.7:grpc-debuginfo-0:1.18.0-4.el8ost.s390x", "8Base-RHOSE-4.7:grpc-debuginfo-0:1.18.0-4.el8ost.x86_64", "8Base-RHOSE-4.7:grpc-debugsource-0:1.18.0-4.el8ost.ppc64le", "8Base-RHOSE-4.7:grpc-debugsource-0:1.18.0-4.el8ost.s390x", "8Base-RHOSE-4.7:grpc-debugsource-0:1.18.0-4.el8ost.x86_64", "8Base-RHOSE-4.7:grpc-devel-0:1.18.0-4.el8ost.ppc64le", "8Base-RHOSE-4.7:grpc-devel-0:1.18.0-4.el8ost.s390x", "8Base-RHOSE-4.7:grpc-devel-0:1.18.0-4.el8ost.x86_64", "8Base-RHOSE-4.7:grpc-plugins-0:1.18.0-4.el8ost.ppc64le", "8Base-RHOSE-4.7:grpc-plugins-0:1.18.0-4.el8ost.s390x", "8Base-RHOSE-4.7:grpc-plugins-0:1.18.0-4.el8ost.x86_64", "8Base-RHOSE-4.7:grpc-plugins-debuginfo-0:1.18.0-4.el8ost.ppc64le", "8Base-RHOSE-4.7:grpc-plugins-debuginfo-0:1.18.0-4.el8ost.s390x", "8Base-RHOSE-4.7:grpc-plugins-debuginfo-0:1.18.0-4.el8ost.x86_64", "8Base-RHOSE-4.7:haproxy-0:2.0.19-1.el8.src", "8Base-RHOSE-4.7:haproxy-debugsource-0:2.0.19-1.el8.ppc64le", "8Base-RHOSE-4.7:haproxy-debugsource-0:2.0.19-1.el8.s390x", "8Base-RHOSE-4.7:haproxy-debugsource-0:2.0.19-1.el8.x86_64", "8Base-RHOSE-4.7:haproxy20-0:2.0.19-1.el8.ppc64le", "8Base-RHOSE-4.7:haproxy20-0:2.0.19-1.el8.s390x", "8Base-RHOSE-4.7:haproxy20-0:2.0.19-1.el8.x86_64", "8Base-RHOSE-4.7:haproxy20-debuginfo-0:2.0.19-1.el8.ppc64le", "8Base-RHOSE-4.7:haproxy20-debuginfo-0:2.0.19-1.el8.s390x", "8Base-RHOSE-4.7:haproxy20-debuginfo-0:2.0.19-1.el8.x86_64", "8Base-RHOSE-4.7:ignition-0:2.9.0-2.rhaos4.7.git1d56dc8.el8.ppc64le", "8Base-RHOSE-4.7:ignition-0:2.9.0-2.rhaos4.7.git1d56dc8.el8.s390x", "8Base-RHOSE-4.7:ignition-0:2.9.0-2.rhaos4.7.git1d56dc8.el8.src", "8Base-RHOSE-4.7:ignition-0:2.9.0-2.rhaos4.7.git1d56dc8.el8.x86_64", "8Base-RHOSE-4.7:ignition-debuginfo-0:2.9.0-2.rhaos4.7.git1d56dc8.el8.ppc64le", "8Base-RHOSE-4.7:ignition-debuginfo-0:2.9.0-2.rhaos4.7.git1d56dc8.el8.s390x", "8Base-RHOSE-4.7:ignition-debuginfo-0:2.9.0-2.rhaos4.7.git1d56dc8.el8.x86_64", "8Base-RHOSE-4.7:ignition-debugsource-0:2.9.0-2.rhaos4.7.git1d56dc8.el8.ppc64le", "8Base-RHOSE-4.7:ignition-debugsource-0:2.9.0-2.rhaos4.7.git1d56dc8.el8.s390x", "8Base-RHOSE-4.7:ignition-debugsource-0:2.9.0-2.rhaos4.7.git1d56dc8.el8.x86_64", "8Base-RHOSE-4.7:ignition-validate-0:2.9.0-2.rhaos4.7.git1d56dc8.el8.ppc64le", "8Base-RHOSE-4.7:ignition-validate-0:2.9.0-2.rhaos4.7.git1d56dc8.el8.s390x", "8Base-RHOSE-4.7:ignition-validate-0:2.9.0-2.rhaos4.7.git1d56dc8.el8.x86_64", "8Base-RHOSE-4.7:ignition-validate-debuginfo-0:2.9.0-2.rhaos4.7.git1d56dc8.el8.ppc64le", "8Base-RHOSE-4.7:ignition-validate-debuginfo-0:2.9.0-2.rhaos4.7.git1d56dc8.el8.s390x", "8Base-RHOSE-4.7:ignition-validate-debuginfo-0:2.9.0-2.rhaos4.7.git1d56dc8.el8.x86_64", "8Base-RHOSE-4.7:inotify-tools-0:3.20.1-2.el8.ppc64le", "8Base-RHOSE-4.7:inotify-tools-0:3.20.1-2.el8.s390x", "8Base-RHOSE-4.7:inotify-tools-0:3.20.1-2.el8.src", "8Base-RHOSE-4.7:inotify-tools-0:3.20.1-2.el8.x86_64", "8Base-RHOSE-4.7:inotify-tools-debuginfo-0:3.20.1-2.el8.ppc64le", "8Base-RHOSE-4.7:inotify-tools-debuginfo-0:3.20.1-2.el8.s390x", "8Base-RHOSE-4.7:inotify-tools-debuginfo-0:3.20.1-2.el8.x86_64", "8Base-RHOSE-4.7:inotify-tools-debugsource-0:3.20.1-2.el8.ppc64le", "8Base-RHOSE-4.7:inotify-tools-debugsource-0:3.20.1-2.el8.s390x", "8Base-RHOSE-4.7:inotify-tools-debugsource-0:3.20.1-2.el8.x86_64", "8Base-RHOSE-4.7:inotify-tools-devel-0:3.20.1-2.el8.ppc64le", "8Base-RHOSE-4.7:inotify-tools-devel-0:3.20.1-2.el8.s390x", "8Base-RHOSE-4.7:inotify-tools-devel-0:3.20.1-2.el8.x86_64", "8Base-RHOSE-4.7:ironic-images-0:15.1-20210114.1.el8.noarch", "8Base-RHOSE-4.7:ironic-images-0:15.1-20210114.1.el8.src", "8Base-RHOSE-4.7:ironic-images-all-0:15.1-20210114.1.el8.noarch", "8Base-RHOSE-4.7:ironic-images-ipa-ppc64le-0:15.1-20210114.1.el8.noarch", "8Base-RHOSE-4.7:ironic-images-ipa-x86_64-0:15.1-20210114.1.el8.noarch", "8Base-RHOSE-4.7:jenkins-0:2.263.3.1612449007-1.el8.noarch", "8Base-RHOSE-4.7:jenkins-0:2.263.3.1612449007-1.el8.src", "8Base-RHOSE-4.7:jenkins-2-plugins-0:4.7.1611636915-1.el8.noarch", "8Base-RHOSE-4.7:jenkins-2-plugins-0:4.7.1611636915-1.el8.src", "8Base-RHOSE-4.7:jq-0:1.6-2.el8.ppc64le", "8Base-RHOSE-4.7:jq-0:1.6-2.el8.s390x", "8Base-RHOSE-4.7:jq-0:1.6-2.el8.src", "8Base-RHOSE-4.7:jq-0:1.6-2.el8.x86_64", "8Base-RHOSE-4.7:jq-debuginfo-0:1.6-2.el8.ppc64le", "8Base-RHOSE-4.7:jq-debuginfo-0:1.6-2.el8.s390x", "8Base-RHOSE-4.7:jq-debuginfo-0:1.6-2.el8.x86_64", "8Base-RHOSE-4.7:jq-debugsource-0:1.6-2.el8.ppc64le", "8Base-RHOSE-4.7:jq-debugsource-0:1.6-2.el8.s390x", "8Base-RHOSE-4.7:jq-debugsource-0:1.6-2.el8.x86_64", "8Base-RHOSE-4.7:jq-devel-0:1.6-2.el8.ppc64le", "8Base-RHOSE-4.7:jq-devel-0:1.6-2.el8.s390x", "8Base-RHOSE-4.7:jq-devel-0:1.6-2.el8.x86_64", "8Base-RHOSE-4.7:kuryr-binding-scripts-0:1.1.1-0.20190923160834.41e6964.el8ost.noarch", "8Base-RHOSE-4.7:libnftnl-0:1.1.5-4.el8.ppc64le", "8Base-RHOSE-4.7:libnftnl-0:1.1.5-4.el8.s390x", "8Base-RHOSE-4.7:libnftnl-0:1.1.5-4.el8.src", "8Base-RHOSE-4.7:libnftnl-0:1.1.5-4.el8.x86_64", "8Base-RHOSE-4.7:libnftnl-debuginfo-0:1.1.5-4.el8.ppc64le", "8Base-RHOSE-4.7:libnftnl-debuginfo-0:1.1.5-4.el8.s390x", "8Base-RHOSE-4.7:libnftnl-debuginfo-0:1.1.5-4.el8.x86_64", "8Base-RHOSE-4.7:libnftnl-debugsource-0:1.1.5-4.el8.ppc64le", "8Base-RHOSE-4.7:libnftnl-debugsource-0:1.1.5-4.el8.s390x", "8Base-RHOSE-4.7:libnftnl-debugsource-0:1.1.5-4.el8.x86_64", "8Base-RHOSE-4.7:libnftnl-devel-0:1.1.5-4.el8.ppc64le", "8Base-RHOSE-4.7:libnftnl-devel-0:1.1.5-4.el8.s390x", "8Base-RHOSE-4.7:libnftnl-devel-0:1.1.5-4.el8.x86_64", "8Base-RHOSE-4.7:libsodium-0:1.0.16-4.5.el8ost.ppc64le", "8Base-RHOSE-4.7:libsodium-0:1.0.16-4.5.el8ost.s390x", "8Base-RHOSE-4.7:libsodium-0:1.0.16-4.5.el8ost.src", "8Base-RHOSE-4.7:libsodium-0:1.0.16-4.5.el8ost.x86_64", "8Base-RHOSE-4.7:libsodium-debuginfo-0:1.0.16-4.5.el8ost.ppc64le", "8Base-RHOSE-4.7:libsodium-debuginfo-0:1.0.16-4.5.el8ost.s390x", "8Base-RHOSE-4.7:libsodium-debuginfo-0:1.0.16-4.5.el8ost.x86_64", "8Base-RHOSE-4.7:libsodium-debugsource-0:1.0.16-4.5.el8ost.ppc64le", "8Base-RHOSE-4.7:libsodium-debugsource-0:1.0.16-4.5.el8ost.s390x", "8Base-RHOSE-4.7:libsodium-debugsource-0:1.0.16-4.5.el8ost.x86_64", "8Base-RHOSE-4.7:libsodium-devel-0:1.0.16-4.5.el8ost.ppc64le", "8Base-RHOSE-4.7:libsodium-devel-0:1.0.16-4.5.el8ost.s390x", "8Base-RHOSE-4.7:libsodium-devel-0:1.0.16-4.5.el8ost.x86_64", "8Base-RHOSE-4.7:libsodium-static-0:1.0.16-4.5.el8ost.ppc64le", "8Base-RHOSE-4.7:libsodium-static-0:1.0.16-4.5.el8ost.s390x", "8Base-RHOSE-4.7:libsodium-static-0:1.0.16-4.5.el8ost.x86_64", "8Base-RHOSE-4.7:libunwind-0:1.2.1-5.el8.ppc64le", "8Base-RHOSE-4.7:libunwind-0:1.2.1-5.el8.src", "8Base-RHOSE-4.7:libunwind-0:1.2.1-5.el8.x86_64", "8Base-RHOSE-4.7:libunwind-debuginfo-0:1.2.1-5.el8.ppc64le", "8Base-RHOSE-4.7:libunwind-debuginfo-0:1.2.1-5.el8.x86_64", "8Base-RHOSE-4.7:libunwind-debugsource-0:1.2.1-5.el8.ppc64le", "8Base-RHOSE-4.7:libunwind-debugsource-0:1.2.1-5.el8.x86_64", "8Base-RHOSE-4.7:libunwind-devel-0:1.2.1-5.el8.ppc64le", "8Base-RHOSE-4.7:libunwind-devel-0:1.2.1-5.el8.x86_64", "8Base-RHOSE-4.7:network-scripts-openvswitch2.13-0:2.13.0-79.el8fdp.ppc64le", "8Base-RHOSE-4.7:network-scripts-openvswitch2.13-0:2.13.0-79.el8fdp.s390x", "8Base-RHOSE-4.7:network-scripts-openvswitch2.13-0:2.13.0-79.el8fdp.x86_64", "8Base-RHOSE-4.7:octavia-amphora-image-x86_64-0:17.0-20200606.1.el8ost.noarch", "8Base-RHOSE-4.7:openshift-clients-0:4.7.0-202102032256.p0.git.3951.0e656ef.el8.ppc64le", "8Base-RHOSE-4.7:openshift-clients-0:4.7.0-202102032256.p0.git.3951.0e656ef.el8.s390x", "8Base-RHOSE-4.7:openshift-clients-0:4.7.0-202102032256.p0.git.3951.0e656ef.el8.src", "8Base-RHOSE-4.7:openshift-clients-0:4.7.0-202102032256.p0.git.3951.0e656ef.el8.x86_64", "8Base-RHOSE-4.7:openshift-clients-redistributable-0:4.7.0-202102032256.p0.git.3951.0e656ef.el8.x86_64", "8Base-RHOSE-4.7:openshift-eventrouter-0:0.2-4.git7c289cc.el8.ppc64le", "8Base-RHOSE-4.7:openshift-eventrouter-0:0.2-4.git7c289cc.el8.s390x", "8Base-RHOSE-4.7:openshift-eventrouter-0:0.2-4.git7c289cc.el8.src", "8Base-RHOSE-4.7:openshift-eventrouter-0:0.2-4.git7c289cc.el8.x86_64", "8Base-RHOSE-4.7:openshift-eventrouter-debuginfo-0:0.2-4.git7c289cc.el8.ppc64le", "8Base-RHOSE-4.7:openshift-eventrouter-debuginfo-0:0.2-4.git7c289cc.el8.s390x", "8Base-RHOSE-4.7:openshift-eventrouter-debuginfo-0:0.2-4.git7c289cc.el8.x86_64", "8Base-RHOSE-4.7:openshift-eventrouter-debugsource-0:0.2-4.git7c289cc.el8.ppc64le", "8Base-RHOSE-4.7:openshift-eventrouter-debugsource-0:0.2-4.git7c289cc.el8.s390x", "8Base-RHOSE-4.7:openshift-eventrouter-debugsource-0:0.2-4.git7c289cc.el8.x86_64", "8Base-RHOSE-4.7:openshift-kuryr-0:4.7.0-202101262230.p0.git.2494.cd95ce5.el8.src", "8Base-RHOSE-4.7:openshift-kuryr-cni-0:4.7.0-202101262230.p0.git.2494.cd95ce5.el8.noarch", "8Base-RHOSE-4.7:openshift-kuryr-common-0:4.7.0-202101262230.p0.git.2494.cd95ce5.el8.noarch", "8Base-RHOSE-4.7:openshift-kuryr-controller-0:4.7.0-202101262230.p0.git.2494.cd95ce5.el8.noarch", "8Base-RHOSE-4.7:openstack-ironic-1:16.0.4-0.20210203051223.7d74ea0.el8.src", "8Base-RHOSE-4.7:openstack-ironic-api-1:16.0.4-0.20210203051223.7d74ea0.el8.noarch", "8Base-RHOSE-4.7:openstack-ironic-common-1:16.0.4-0.20210203051223.7d74ea0.el8.noarch", "8Base-RHOSE-4.7:openstack-ironic-conductor-1:16.0.4-0.20210203051223.7d74ea0.el8.noarch", "8Base-RHOSE-4.7:openstack-ironic-inspector-0:10.4.1-0.20201123161216.70fccec.el8.noarch", "8Base-RHOSE-4.7:openstack-ironic-inspector-0:10.4.1-0.20201123161216.70fccec.el8.src", "8Base-RHOSE-4.7:openstack-ironic-inspector-api-0:10.4.1-0.20201123161216.70fccec.el8.noarch", "8Base-RHOSE-4.7:openstack-ironic-inspector-conductor-0:10.4.1-0.20201123161216.70fccec.el8.noarch", "8Base-RHOSE-4.7:openstack-ironic-inspector-dnsmasq-0:10.4.1-0.20201123161216.70fccec.el8.noarch", "8Base-RHOSE-4.7:openstack-ironic-python-agent-0:6.4.3-0.20201217171210.bd45db1.el8.noarch", "8Base-RHOSE-4.7:openstack-ironic-python-agent-0:6.4.3-0.20201217171210.bd45db1.el8.src", "8Base-RHOSE-4.7:openvswitch2.13-0:2.13.0-79.el8fdp.ppc64le", "8Base-RHOSE-4.7:openvswitch2.13-0:2.13.0-79.el8fdp.s390x", "8Base-RHOSE-4.7:openvswitch2.13-0:2.13.0-79.el8fdp.src", "8Base-RHOSE-4.7:openvswitch2.13-0:2.13.0-79.el8fdp.x86_64", "8Base-RHOSE-4.7:openvswitch2.13-debuginfo-0:2.13.0-79.el8fdp.ppc64le", "8Base-RHOSE-4.7:openvswitch2.13-debuginfo-0:2.13.0-79.el8fdp.s390x", "8Base-RHOSE-4.7:openvswitch2.13-debuginfo-0:2.13.0-79.el8fdp.x86_64", "8Base-RHOSE-4.7:openvswitch2.13-debugsource-0:2.13.0-79.el8fdp.ppc64le", "8Base-RHOSE-4.7:openvswitch2.13-debugsource-0:2.13.0-79.el8fdp.s390x", "8Base-RHOSE-4.7:openvswitch2.13-debugsource-0:2.13.0-79.el8fdp.x86_64", "8Base-RHOSE-4.7:openvswitch2.13-devel-0:2.13.0-79.el8fdp.ppc64le", "8Base-RHOSE-4.7:openvswitch2.13-devel-0:2.13.0-79.el8fdp.s390x", "8Base-RHOSE-4.7:openvswitch2.13-devel-0:2.13.0-79.el8fdp.x86_64", "8Base-RHOSE-4.7:openvswitch2.13-test-0:2.13.0-79.el8fdp.noarch", "8Base-RHOSE-4.7:ostree-0:2020.7-1.el8.ppc64le", "8Base-RHOSE-4.7:ostree-0:2020.7-1.el8.s390x", "8Base-RHOSE-4.7:ostree-0:2020.7-1.el8.src", "8Base-RHOSE-4.7:ostree-0:2020.7-1.el8.x86_64", "8Base-RHOSE-4.7:ostree-debuginfo-0:2020.7-1.el8.ppc64le", "8Base-RHOSE-4.7:ostree-debuginfo-0:2020.7-1.el8.s390x", "8Base-RHOSE-4.7:ostree-debuginfo-0:2020.7-1.el8.x86_64", "8Base-RHOSE-4.7:ostree-debugsource-0:2020.7-1.el8.ppc64le", "8Base-RHOSE-4.7:ostree-debugsource-0:2020.7-1.el8.s390x", "8Base-RHOSE-4.7:ostree-debugsource-0:2020.7-1.el8.x86_64", "8Base-RHOSE-4.7:ostree-devel-0:2020.7-1.el8.ppc64le", "8Base-RHOSE-4.7:ostree-devel-0:2020.7-1.el8.s390x", "8Base-RHOSE-4.7:ostree-devel-0:2020.7-1.el8.x86_64", "8Base-RHOSE-4.7:ostree-grub2-0:2020.7-1.el8.ppc64le", "8Base-RHOSE-4.7:ostree-grub2-0:2020.7-1.el8.x86_64", "8Base-RHOSE-4.7:ostree-libs-0:2020.7-1.el8.ppc64le", "8Base-RHOSE-4.7:ostree-libs-0:2020.7-1.el8.s390x", "8Base-RHOSE-4.7:ostree-libs-0:2020.7-1.el8.x86_64", "8Base-RHOSE-4.7:ostree-libs-debuginfo-0:2020.7-1.el8.ppc64le", "8Base-RHOSE-4.7:ostree-libs-debuginfo-0:2020.7-1.el8.s390x", "8Base-RHOSE-4.7:ostree-libs-debuginfo-0:2020.7-1.el8.x86_64", "8Base-RHOSE-4.7:ovn2.13-0:20.09.0-21.el8fdn.ppc64le", "8Base-RHOSE-4.7:ovn2.13-0:20.09.0-21.el8fdn.s390x", "8Base-RHOSE-4.7:ovn2.13-0:20.09.0-21.el8fdn.src", "8Base-RHOSE-4.7:ovn2.13-0:20.09.0-21.el8fdn.x86_64", "8Base-RHOSE-4.7:ovn2.13-central-0:20.09.0-21.el8fdn.ppc64le", "8Base-RHOSE-4.7:ovn2.13-central-0:20.09.0-21.el8fdn.s390x", "8Base-RHOSE-4.7:ovn2.13-central-0:20.09.0-21.el8fdn.x86_64", "8Base-RHOSE-4.7:ovn2.13-central-debuginfo-0:20.09.0-21.el8fdn.ppc64le", "8Base-RHOSE-4.7:ovn2.13-central-debuginfo-0:20.09.0-21.el8fdn.s390x", "8Base-RHOSE-4.7:ovn2.13-central-debuginfo-0:20.09.0-21.el8fdn.x86_64", "8Base-RHOSE-4.7:ovn2.13-debuginfo-0:20.09.0-21.el8fdn.ppc64le", "8Base-RHOSE-4.7:ovn2.13-debuginfo-0:20.09.0-21.el8fdn.s390x", "8Base-RHOSE-4.7:ovn2.13-debuginfo-0:20.09.0-21.el8fdn.x86_64", "8Base-RHOSE-4.7:ovn2.13-debugsource-0:20.09.0-21.el8fdn.ppc64le", "8Base-RHOSE-4.7:ovn2.13-debugsource-0:20.09.0-21.el8fdn.s390x", "8Base-RHOSE-4.7:ovn2.13-debugsource-0:20.09.0-21.el8fdn.x86_64", "8Base-RHOSE-4.7:ovn2.13-host-0:20.09.0-21.el8fdn.ppc64le", "8Base-RHOSE-4.7:ovn2.13-host-0:20.09.0-21.el8fdn.s390x", "8Base-RHOSE-4.7:ovn2.13-host-0:20.09.0-21.el8fdn.x86_64", "8Base-RHOSE-4.7:ovn2.13-host-debuginfo-0:20.09.0-21.el8fdn.ppc64le", "8Base-RHOSE-4.7:ovn2.13-host-debuginfo-0:20.09.0-21.el8fdn.s390x", "8Base-RHOSE-4.7:ovn2.13-host-debuginfo-0:20.09.0-21.el8fdn.x86_64", "8Base-RHOSE-4.7:ovn2.13-vtep-0:20.09.0-21.el8fdn.ppc64le", "8Base-RHOSE-4.7:ovn2.13-vtep-0:20.09.0-21.el8fdn.s390x", "8Base-RHOSE-4.7:ovn2.13-vtep-0:20.09.0-21.el8fdn.x86_64", "8Base-RHOSE-4.7:ovn2.13-vtep-debuginfo-0:20.09.0-21.el8fdn.ppc64le", "8Base-RHOSE-4.7:ovn2.13-vtep-debuginfo-0:20.09.0-21.el8fdn.s390x", "8Base-RHOSE-4.7:ovn2.13-vtep-debuginfo-0:20.09.0-21.el8fdn.x86_64", "8Base-RHOSE-4.7:powerpc-utils-0:1.3.6-12.el8_3.ppc64le", "8Base-RHOSE-4.7:powerpc-utils-0:1.3.6-12.el8_3.src", "8Base-RHOSE-4.7:powerpc-utils-core-0:1.3.6-12.el8_3.ppc64le", "8Base-RHOSE-4.7:powerpc-utils-core-debuginfo-0:1.3.6-12.el8_3.ppc64le", "8Base-RHOSE-4.7:powerpc-utils-debugsource-0:1.3.6-12.el8_3.ppc64le", "8Base-RHOSE-4.7:pprof-0:2.6.3-2.el8ost.noarch", "8Base-RHOSE-4.7:prometheus-promu-0:0.5.0-2.git642a960.el8.ppc64le", "8Base-RHOSE-4.7:prometheus-promu-0:0.5.0-2.git642a960.el8.s390x", "8Base-RHOSE-4.7:prometheus-promu-0:0.5.0-2.git642a960.el8.x86_64", "8Base-RHOSE-4.7:protobuf-0:3.6.1-4.el8ost.ppc64le", "8Base-RHOSE-4.7:protobuf-0:3.6.1-4.el8ost.s390x", "8Base-RHOSE-4.7:protobuf-0:3.6.1-4.el8ost.src", "8Base-RHOSE-4.7:protobuf-0:3.6.1-4.el8ost.x86_64", "8Base-RHOSE-4.7:protobuf-compiler-0:3.6.1-4.el8ost.ppc64le", "8Base-RHOSE-4.7:protobuf-compiler-0:3.6.1-4.el8ost.s390x", "8Base-RHOSE-4.7:protobuf-compiler-0:3.6.1-4.el8ost.x86_64", "8Base-RHOSE-4.7:protobuf-compiler-debuginfo-0:3.6.1-4.el8ost.ppc64le", "8Base-RHOSE-4.7:protobuf-compiler-debuginfo-0:3.6.1-4.el8ost.s390x", "8Base-RHOSE-4.7:protobuf-compiler-debuginfo-0:3.6.1-4.el8ost.x86_64", "8Base-RHOSE-4.7:protobuf-debuginfo-0:3.6.1-4.el8ost.ppc64le", "8Base-RHOSE-4.7:protobuf-debuginfo-0:3.6.1-4.el8ost.s390x", "8Base-RHOSE-4.7:protobuf-debuginfo-0:3.6.1-4.el8ost.x86_64", "8Base-RHOSE-4.7:protobuf-debugsource-0:3.6.1-4.el8ost.ppc64le", "8Base-RHOSE-4.7:protobuf-debugsource-0:3.6.1-4.el8ost.s390x", "8Base-RHOSE-4.7:protobuf-debugsource-0:3.6.1-4.el8ost.x86_64", "8Base-RHOSE-4.7:protobuf-devel-0:3.6.1-4.el8ost.ppc64le", "8Base-RHOSE-4.7:protobuf-devel-0:3.6.1-4.el8ost.s390x", "8Base-RHOSE-4.7:protobuf-devel-0:3.6.1-4.el8ost.x86_64", "8Base-RHOSE-4.7:protobuf-lite-0:3.6.1-4.el8ost.ppc64le", "8Base-RHOSE-4.7:protobuf-lite-0:3.6.1-4.el8ost.s390x", "8Base-RHOSE-4.7:protobuf-lite-0:3.6.1-4.el8ost.x86_64", "8Base-RHOSE-4.7:protobuf-lite-debuginfo-0:3.6.1-4.el8ost.ppc64le", "8Base-RHOSE-4.7:protobuf-lite-debuginfo-0:3.6.1-4.el8ost.s390x", "8Base-RHOSE-4.7:protobuf-lite-debuginfo-0:3.6.1-4.el8ost.x86_64", "8Base-RHOSE-4.7:protobuf-lite-devel-0:3.6.1-4.el8ost.ppc64le", "8Base-RHOSE-4.7:protobuf-lite-devel-0:3.6.1-4.el8ost.s390x", "8Base-RHOSE-4.7:protobuf-lite-devel-0:3.6.1-4.el8ost.x86_64", "8Base-RHOSE-4.7:protobuf-lite-static-0:3.6.1-4.el8ost.ppc64le", "8Base-RHOSE-4.7:protobuf-lite-static-0:3.6.1-4.el8ost.s390x", "8Base-RHOSE-4.7:protobuf-lite-static-0:3.6.1-4.el8ost.x86_64", "8Base-RHOSE-4.7:protobuf-static-0:3.6.1-4.el8ost.ppc64le", "8Base-RHOSE-4.7:protobuf-static-0:3.6.1-4.el8ost.s390x", "8Base-RHOSE-4.7:protobuf-static-0:3.6.1-4.el8ost.x86_64", "8Base-RHOSE-4.7:protobuf-vim-0:3.6.1-4.el8ost.noarch", "8Base-RHOSE-4.7:python-alembic-0:1.4.2-5.el8ost.src", "8Base-RHOSE-4.7:python-boto3-0:1.9.101-1.el8ost.src", "8Base-RHOSE-4.7:python-botocore-0:1.12.119-1.el8ost.src", "8Base-RHOSE-4.7:python-cachetools-0:3.1.0-1.el8ost.src", "8Base-RHOSE-4.7:python-certifi-0:2018.10.15-4.el8ost.src", "8Base-RHOSE-4.7:python-construct-0:2.10.56-1.el8ost.src", "8Base-RHOSE-4.7:python-daemon-0:2.1.2-9.el8ar.src", "8Base-RHOSE-4.7:python-debtcollector-0:2.2.0-0.20201008171245.649189d.el8.src", "8Base-RHOSE-4.7:python-dictdiffer-0:0.7.1-2.el8ost.src", "8Base-RHOSE-4.7:python-eventlet-0:0.25.2-3.el8ost.src", "8Base-RHOSE-4.7:python-flask-1:1.1.1-1.el8ost.src", "8Base-RHOSE-4.7:python-flask-doc-1:1.1.1-1.el8ost.noarch", "8Base-RHOSE-4.7:python-google-auth-0:1.3.0-1.el8ost.src", "8Base-RHOSE-4.7:python-hardware-0:0.23.0-0.20201031022149.59211cc.el8.src", "8Base-RHOSE-4.7:python-ifaddr-0:0.1.6-5.el8ost.src", "8Base-RHOSE-4.7:python-importlib-metadata-0:1.7.0-1.el8ost.src", "8Base-RHOSE-4.7:python-ironic-lib-0:4.4.1-0.20201218041209.aa7cfec.el8.src", "8Base-RHOSE-4.7:python-keystoneauth1-0:4.2.0-0.20200630234358.dab8e10.el8ost.src", "8Base-RHOSE-4.7:python-kubernetes-0:11.0.0-1.el8.src", "8Base-RHOSE-4.7:python-kuryr-lib-0:1.1.1-0.20190923160834.41e6964.el8ost.src", "8Base-RHOSE-4.7:python-lockfile-1:0.11.0-8.el8ar.src", "8Base-RHOSE-4.7:python-msgpack-0:0.6.2-1.el8ost.src", "8Base-RHOSE-4.7:python-msgpack-debugsource-0:0.6.2-1.el8ost.x86_64", "8Base-RHOSE-4.7:python-openshift-1:0.11.2-1.el8.src", "8Base-RHOSE-4.7:python-openstacksdk-0:0.48.0-0.20200708092906.3b693c2.el8ost.src", "8Base-RHOSE-4.7:python-oslo-concurrency-0:4.3.0-0.20201008180343.2f78803.el8.src", "8Base-RHOSE-4.7:python-oslo-concurrency-lang-0:4.3.0-0.20201008180343.2f78803.el8.noarch", "8Base-RHOSE-4.7:python-oslo-config-2:8.3.2-0.20201008180634.fcb8894.el8.src", "8Base-RHOSE-4.7:python-oslo-context-0:3.1.1-0.20201008190523.57dbded.el8.src", "8Base-RHOSE-4.7:python-oslo-db-0:8.4.0-0.20200918104110.e42c733.el8ost.src", "8Base-RHOSE-4.7:python-oslo-db-lang-0:8.4.0-0.20200918104110.e42c733.el8ost.noarch", "8Base-RHOSE-4.7:python-oslo-i18n-0:5.0.1-0.20201009131251.73187bd.el8.src", "8Base-RHOSE-4.7:python-oslo-i18n-lang-0:5.0.1-0.20201009131251.73187bd.el8.noarch", "8Base-RHOSE-4.7:python-oslo-log-0:4.3.1-0.20201207021200.1597f24.el8.src", "8Base-RHOSE-4.7:python-oslo-log-lang-0:4.3.1-0.20201207021200.1597f24.el8.noarch", "8Base-RHOSE-4.7:python-oslo-serialization-0:4.0.1-0.20201008182423.c7884b2.el8.src", "8Base-RHOSE-4.7:python-oslo-service-0:2.4.0-0.20201008184547.58466a6.el8.src", "8Base-RHOSE-4.7:python-oslo-utils-0:4.6.0-0.20201009175936.91497da.el8.src", "8Base-RHOSE-4.7:python-oslo-utils-lang-0:4.6.0-0.20201009175936.91497da.el8.noarch", "8Base-RHOSE-4.7:python-packaging-0:20.4-1.el8ost.src", "8Base-RHOSE-4.7:python-packaging-doc-0:20.4-1.el8ost.noarch", "8Base-RHOSE-4.7:python-paste-0:3.2.4-1.el8ost.src", "8Base-RHOSE-4.7:python-paste-deploy-0:2.0.1-4.el8ost.src", "8Base-RHOSE-4.7:python-pbr-0:5.4.3-2.el8ost.src", "8Base-RHOSE-4.7:python-pexpect-0:4.6-2.el8ar.src", "8Base-RHOSE-4.7:python-pint-0:0.10.1-1.el8ost.src", "8Base-RHOSE-4.7:python-psutil-0:5.6.6-1.el8ar.src", "8Base-RHOSE-4.7:python-psutil-debugsource-0:5.6.6-1.el8ar.ppc64le", "8Base-RHOSE-4.7:python-psutil-debugsource-0:5.6.6-1.el8ar.s390x", "8Base-RHOSE-4.7:python-psutil-debugsource-0:5.6.6-1.el8ar.x86_64", "8Base-RHOSE-4.7:python-pyghmi-0:1.5.14-2.1.el8ost.src", "8Base-RHOSE-4.7:python-pyroute2-0:0.5.13-1.el8ost.src", "8Base-RHOSE-4.7:python-requests-unixsocket-0:0.1.5-5.el8ar.src", "8Base-RHOSE-4.7:python-rsa-0:4.7-1.el8.src", "8Base-RHOSE-4.7:python-ruamel-yaml-0:0.15.41-4.el8ost.src", "8Base-RHOSE-4.7:python-ruamel-yaml-debugsource-0:0.15.41-4.el8ost.ppc64le", "8Base-RHOSE-4.7:python-ruamel-yaml-debugsource-0:0.15.41-4.el8ost.s390x", "8Base-RHOSE-4.7:python-ruamel-yaml-debugsource-0:0.15.41-4.el8ost.x86_64", "8Base-RHOSE-4.7:python-s3transfer-0:0.2.0-1.el8ost.src", "8Base-RHOSE-4.7:python-stevedore-0:3.2.2-0.20201009151242.274eaa6.el8.src", "8Base-RHOSE-4.7:python-string_utils-0:0.6.0-4.el8ost.src", "8Base-RHOSE-4.7:python-sushy-0:3.6.1-0.20210122201213.7ec0422.el8.src", "8Base-RHOSE-4.7:python-sushy-oem-idrac-0:0.0.3-0.20200922221223.1202372.el8ost.src", "8Base-RHOSE-4.7:python-tenacity-0:6.2.0-1.el8ost.src", "8Base-RHOSE-4.7:python-tooz-0:2.7.0-0.20200723133754.fca43df.el8ost.src", "8Base-RHOSE-4.7:python-websocket-client-0:0.54.0-1.el8ost.src", "8Base-RHOSE-4.7:python-werkzeug-0:1.0.1-3.el8ost.src", "8Base-RHOSE-4.7:python-zeroconf-0:0.24.4-1.el8ost.src", "8Base-RHOSE-4.7:python-zipp-0:0.5.1-2.el8ost.src", "8Base-RHOSE-4.7:python2-botocore-0:1.12.119-1.el8ost.noarch", "8Base-RHOSE-4.7:python2-cachetools-0:3.1.0-1.el8ost.noarch", "8Base-RHOSE-4.7:python3-alembic-0:1.4.2-5.el8ost.noarch", "8Base-RHOSE-4.7:python3-ansible-runner-0:1.4.6-2.el8ar.noarch", "8Base-RHOSE-4.7:python3-boto3-0:1.9.101-1.el8ost.noarch", "8Base-RHOSE-4.7:python3-botocore-0:1.12.119-1.el8ost.noarch", "8Base-RHOSE-4.7:python3-cachetools-0:3.1.0-1.el8ost.noarch", "8Base-RHOSE-4.7:python3-certifi-0:2018.10.15-4.el8ost.noarch", "8Base-RHOSE-4.7:python3-construct-0:2.10.56-1.el8ost.noarch", "8Base-RHOSE-4.7:python3-daemon-0:2.1.2-9.el8ar.noarch", "8Base-RHOSE-4.7:python3-debtcollector-0:2.2.0-0.20201008171245.649189d.el8.noarch", "8Base-RHOSE-4.7:python3-dictdiffer-0:0.7.1-2.el8ost.noarch", "8Base-RHOSE-4.7:python3-eventlet-0:0.25.2-3.el8ost.noarch", "8Base-RHOSE-4.7:python3-flask-1:1.1.1-1.el8ost.noarch", "8Base-RHOSE-4.7:python3-google-auth-0:1.3.0-1.el8ost.noarch", "8Base-RHOSE-4.7:python3-grpcio-0:1.18.0-4.el8ost.ppc64le", "8Base-RHOSE-4.7:python3-grpcio-0:1.18.0-4.el8ost.s390x", "8Base-RHOSE-4.7:python3-grpcio-0:1.18.0-4.el8ost.x86_64", "8Base-RHOSE-4.7:python3-grpcio-debuginfo-0:1.18.0-4.el8ost.ppc64le", "8Base-RHOSE-4.7:python3-grpcio-debuginfo-0:1.18.0-4.el8ost.s390x", "8Base-RHOSE-4.7:python3-grpcio-debuginfo-0:1.18.0-4.el8ost.x86_64", "8Base-RHOSE-4.7:python3-hardware-0:0.23.0-0.20201031022149.59211cc.el8.noarch", "8Base-RHOSE-4.7:python3-hardware-detect-0:0.23.0-0.20201031022149.59211cc.el8.noarch", "8Base-RHOSE-4.7:python3-ifaddr-0:0.1.6-5.el8ost.noarch", "8Base-RHOSE-4.7:python3-importlib-metadata-0:1.7.0-1.el8ost.noarch", "8Base-RHOSE-4.7:python3-ironic-inspector-tests-0:10.4.1-0.20201123161216.70fccec.el8.noarch", "8Base-RHOSE-4.7:python3-ironic-lib-0:4.4.1-0.20201218041209.aa7cfec.el8.noarch", "8Base-RHOSE-4.7:python3-ironic-python-agent-0:6.4.3-0.20201217171210.bd45db1.el8.noarch", "8Base-RHOSE-4.7:python3-ironic-tests-1:16.0.4-0.20210203051223.7d74ea0.el8.noarch", "8Base-RHOSE-4.7:python3-keystoneauth1-0:4.2.0-0.20200630234358.dab8e10.el8ost.noarch", "8Base-RHOSE-4.7:python3-kubernetes-0:11.0.0-1.el8.noarch", "8Base-RHOSE-4.7:python3-kubernetes-tests-0:11.0.0-1.el8.noarch", "8Base-RHOSE-4.7:python3-kuryr-kubernetes-0:4.7.0-202101262230.p0.git.2494.cd95ce5.el8.noarch", "8Base-RHOSE-4.7:python3-kuryr-lib-0:1.1.1-0.20190923160834.41e6964.el8ost.noarch", "8Base-RHOSE-4.7:python3-kuryr-lib-tests-0:1.1.1-0.20190923160834.41e6964.el8ost.noarch", "8Base-RHOSE-4.7:python3-lockfile-1:0.11.0-8.el8ar.noarch", "8Base-RHOSE-4.7:python3-msgpack-0:0.6.2-1.el8ost.x86_64", "8Base-RHOSE-4.7:python3-msgpack-debuginfo-0:0.6.2-1.el8ost.x86_64", "8Base-RHOSE-4.7:python3-openshift-1:0.11.2-1.el8.noarch", "8Base-RHOSE-4.7:python3-openstacksdk-0:0.48.0-0.20200708092906.3b693c2.el8ost.noarch", "8Base-RHOSE-4.7:python3-openstacksdk-tests-0:0.48.0-0.20200708092906.3b693c2.el8ost.noarch", "8Base-RHOSE-4.7:python3-openvswitch2.13-0:2.13.0-79.el8fdp.ppc64le", "8Base-RHOSE-4.7:python3-openvswitch2.13-0:2.13.0-79.el8fdp.s390x", "8Base-RHOSE-4.7:python3-openvswitch2.13-0:2.13.0-79.el8fdp.x86_64", "8Base-RHOSE-4.7:python3-openvswitch2.13-debuginfo-0:2.13.0-79.el8fdp.ppc64le", "8Base-RHOSE-4.7:python3-openvswitch2.13-debuginfo-0:2.13.0-79.el8fdp.s390x", "8Base-RHOSE-4.7:python3-openvswitch2.13-debuginfo-0:2.13.0-79.el8fdp.x86_64", "8Base-RHOSE-4.7:python3-oslo-concurrency-0:4.3.0-0.20201008180343.2f78803.el8.noarch", "8Base-RHOSE-4.7:python3-oslo-concurrency-tests-0:4.3.0-0.20201008180343.2f78803.el8.noarch", "8Base-RHOSE-4.7:python3-oslo-config-2:8.3.2-0.20201008180634.fcb8894.el8.noarch", "8Base-RHOSE-4.7:python3-oslo-context-0:3.1.1-0.20201008190523.57dbded.el8.noarch", "8Base-RHOSE-4.7:python3-oslo-context-tests-0:3.1.1-0.20201008190523.57dbded.el8.noarch", "8Base-RHOSE-4.7:python3-oslo-db-0:8.4.0-0.20200918104110.e42c733.el8ost.noarch", "8Base-RHOSE-4.7:python3-oslo-db-tests-0:8.4.0-0.20200918104110.e42c733.el8ost.noarch", "8Base-RHOSE-4.7:python3-oslo-i18n-0:5.0.1-0.20201009131251.73187bd.el8.noarch", "8Base-RHOSE-4.7:python3-oslo-log-0:4.3.1-0.20201207021200.1597f24.el8.noarch", "8Base-RHOSE-4.7:python3-oslo-log-tests-0:4.3.1-0.20201207021200.1597f24.el8.noarch", "8Base-RHOSE-4.7:python3-oslo-serialization-0:4.0.1-0.20201008182423.c7884b2.el8.noarch", "8Base-RHOSE-4.7:python3-oslo-serialization-tests-0:4.0.1-0.20201008182423.c7884b2.el8.noarch", "8Base-RHOSE-4.7:python3-oslo-service-0:2.4.0-0.20201008184547.58466a6.el8.noarch", "8Base-RHOSE-4.7:python3-oslo-service-tests-0:2.4.0-0.20201008184547.58466a6.el8.noarch", "8Base-RHOSE-4.7:python3-oslo-utils-0:4.6.0-0.20201009175936.91497da.el8.noarch", "8Base-RHOSE-4.7:python3-oslo-utils-tests-0:4.6.0-0.20201009175936.91497da.el8.noarch", "8Base-RHOSE-4.7:python3-packaging-0:20.4-1.el8ost.noarch", "8Base-RHOSE-4.7:python3-paste-0:3.2.4-1.el8ost.noarch", "8Base-RHOSE-4.7:python3-paste-deploy-0:2.0.1-4.el8ost.noarch", "8Base-RHOSE-4.7:python3-pbr-0:5.4.3-2.el8ost.noarch", "8Base-RHOSE-4.7:python3-pexpect-0:4.6-2.el8ar.noarch", "8Base-RHOSE-4.7:python3-pint-0:0.10.1-1.el8ost.noarch", "8Base-RHOSE-4.7:python3-protobuf-0:3.6.1-4.el8ost.noarch", "8Base-RHOSE-4.7:python3-psutil-0:5.6.6-1.el8ar.ppc64le", "8Base-RHOSE-4.7:python3-psutil-0:5.6.6-1.el8ar.s390x", "8Base-RHOSE-4.7:python3-psutil-0:5.6.6-1.el8ar.x86_64", "8Base-RHOSE-4.7:python3-psutil-debuginfo-0:5.6.6-1.el8ar.ppc64le", "8Base-RHOSE-4.7:python3-psutil-debuginfo-0:5.6.6-1.el8ar.s390x", "8Base-RHOSE-4.7:python3-psutil-debuginfo-0:5.6.6-1.el8ar.x86_64", "8Base-RHOSE-4.7:python3-pyghmi-0:1.5.14-2.1.el8ost.noarch", "8Base-RHOSE-4.7:python3-pyroute2-0:0.5.13-1.el8ost.noarch", "8Base-RHOSE-4.7:python3-requests-unixsocket-0:0.1.5-5.el8ar.noarch", "8Base-RHOSE-4.7:python3-rsa-0:4.7-1.el8.noarch", "8Base-RHOSE-4.7:python3-ruamel-yaml-0:0.15.41-4.el8ost.ppc64le", "8Base-RHOSE-4.7:python3-ruamel-yaml-0:0.15.41-4.el8ost.s390x", "8Base-RHOSE-4.7:python3-ruamel-yaml-0:0.15.41-4.el8ost.x86_64", "8Base-RHOSE-4.7:python3-ruamel-yaml-debuginfo-0:0.15.41-4.el8ost.ppc64le", "8Base-RHOSE-4.7:python3-ruamel-yaml-debuginfo-0:0.15.41-4.el8ost.s390x", "8Base-RHOSE-4.7:python3-ruamel-yaml-debuginfo-0:0.15.41-4.el8ost.x86_64", "8Base-RHOSE-4.7:python3-s3transfer-0:0.2.0-1.el8ost.noarch", "8Base-RHOSE-4.7:python3-stevedore-0:3.2.2-0.20201009151242.274eaa6.el8.noarch", "8Base-RHOSE-4.7:python3-string_utils-0:0.6.0-4.el8ost.noarch", "8Base-RHOSE-4.7:python3-sushy-0:3.6.1-0.20210122201213.7ec0422.el8.noarch", "8Base-RHOSE-4.7:python3-sushy-oem-idrac-0:0.0.3-0.20200922221223.1202372.el8ost.noarch", "8Base-RHOSE-4.7:python3-sushy-oem-idrac-tests-0:0.0.3-0.20200922221223.1202372.el8ost.noarch", "8Base-RHOSE-4.7:python3-sushy-tests-0:3.6.1-0.20210122201213.7ec0422.el8.noarch", "8Base-RHOSE-4.7:python3-tenacity-0:6.2.0-1.el8ost.noarch", "8Base-RHOSE-4.7:python3-tooz-0:2.7.0-0.20200723133754.fca43df.el8ost.noarch", "8Base-RHOSE-4.7:python3-websocket-client-0:0.54.0-1.el8ost.noarch", "8Base-RHOSE-4.7:python3-werkzeug-0:1.0.1-3.el8ost.noarch", "8Base-RHOSE-4.7:python3-zeroconf-0:0.24.4-1.el8ost.noarch", "8Base-RHOSE-4.7:python3-zipp-0:0.5.1-2.el8ost.noarch", "8Base-RHOSE-4.7:redhat-release-coreos-0:47.83-1.el8.ppc64le", "8Base-RHOSE-4.7:redhat-release-coreos-0:47.83-1.el8.s390x", "8Base-RHOSE-4.7:redhat-release-coreos-0:47.83-1.el8.src", "8Base-RHOSE-4.7:redhat-release-coreos-0:47.83-1.el8.x86_64", "8Base-RHOSE-4.7:rhcos-tools-0:0.0.0-1.rhaos4.2.el8.noarch", "8Base-RHOSE-4.7:rhcos-tools-0:0.0.0-1.rhaos4.2.el8.src", "8Base-RHOSE-4.7:rhosp-director-images-0:17.0-20200606.1.el8ost.noarch", "8Base-RHOSE-4.7:rhosp-director-images-0:17.0-20200606.1.el8ost.src", "8Base-RHOSE-4.7:rhosp-director-images-all-0:17.0-20200606.1.el8ost.noarch", "8Base-RHOSE-4.7:rhosp-director-images-ipa-0:17.0-20200606.1.el8ost.noarch", "8Base-RHOSE-4.7:rhosp-director-images-ipa-ppc64le-0:17.0-20200606.1.el8ost.noarch", "8Base-RHOSE-4.7:rhosp-director-images-ipa-x86_64-0:17.0-20200606.1.el8ost.noarch", "8Base-RHOSE-4.7:rhosp-director-images-minimal-0:17.0-20200606.1.el8ost.noarch", "8Base-RHOSE-4.7:rhosp-director-images-ppc64le-0:17.0-20200606.1.el8ost.noarch", "8Base-RHOSE-4.7:rhosp-director-images-x86_64-0:17.0-20200606.1.el8ost.noarch", "8Base-RHOSE-4.7:rpm-ostree-0:2020.7-1.el8_3.ppc64le", "8Base-RHOSE-4.7:rpm-ostree-0:2020.7-1.el8_3.s390x", "8Base-RHOSE-4.7:rpm-ostree-0:2020.7-1.el8_3.src", "8Base-RHOSE-4.7:rpm-ostree-0:2020.7-1.el8_3.x86_64", "8Base-RHOSE-4.7:rpm-ostree-debuginfo-0:2020.7-1.el8_3.ppc64le", "8Base-RHOSE-4.7:rpm-ostree-debuginfo-0:2020.7-1.el8_3.s390x", "8Base-RHOSE-4.7:rpm-ostree-debuginfo-0:2020.7-1.el8_3.x86_64", "8Base-RHOSE-4.7:rpm-ostree-debugsource-0:2020.7-1.el8_3.ppc64le", "8Base-RHOSE-4.7:rpm-ostree-debugsource-0:2020.7-1.el8_3.s390x", "8Base-RHOSE-4.7:rpm-ostree-debugsource-0:2020.7-1.el8_3.x86_64", "8Base-RHOSE-4.7:rpm-ostree-devel-0:2020.7-1.el8_3.ppc64le", "8Base-RHOSE-4.7:rpm-ostree-devel-0:2020.7-1.el8_3.s390x", "8Base-RHOSE-4.7:rpm-ostree-devel-0:2020.7-1.el8_3.x86_64", "8Base-RHOSE-4.7:rpm-ostree-libs-0:2020.7-1.el8_3.ppc64le", "8Base-RHOSE-4.7:rpm-ostree-libs-0:2020.7-1.el8_3.s390x", "8Base-RHOSE-4.7:rpm-ostree-libs-0:2020.7-1.el8_3.x86_64", "8Base-RHOSE-4.7:rpm-ostree-libs-debuginfo-0:2020.7-1.el8_3.ppc64le", "8Base-RHOSE-4.7:rpm-ostree-libs-debuginfo-0:2020.7-1.el8_3.s390x", "8Base-RHOSE-4.7:rpm-ostree-libs-debuginfo-0:2020.7-1.el8_3.x86_64", "8Base-RHOSE-4.7:runc-0:1.0.0-82.rhaos4.6.git086e841.el8.ppc64le", "8Base-RHOSE-4.7:runc-0:1.0.0-82.rhaos4.6.git086e841.el8.s390x", "8Base-RHOSE-4.7:runc-0:1.0.0-82.rhaos4.6.git086e841.el8.src", "8Base-RHOSE-4.7:runc-0:1.0.0-82.rhaos4.6.git086e841.el8.x86_64", "8Base-RHOSE-4.7:runc-debuginfo-0:1.0.0-82.rhaos4.6.git086e841.el8.ppc64le", "8Base-RHOSE-4.7:runc-debuginfo-0:1.0.0-82.rhaos4.6.git086e841.el8.s390x", "8Base-RHOSE-4.7:runc-debuginfo-0:1.0.0-82.rhaos4.6.git086e841.el8.x86_64", "8Base-RHOSE-4.7:runc-debugsource-0:1.0.0-82.rhaos4.6.git086e841.el8.ppc64le", "8Base-RHOSE-4.7:runc-debugsource-0:1.0.0-82.rhaos4.6.git086e841.el8.s390x", "8Base-RHOSE-4.7:runc-debugsource-0:1.0.0-82.rhaos4.6.git086e841.el8.x86_64", "8Base-RHOSE-4.7:rust-afterburn-0:4.6.0-1.rhaos4.7.el8.src", "8Base-RHOSE-4.7:rust-afterburn-debugsource-0:4.6.0-1.rhaos4.7.el8.ppc64le", "8Base-RHOSE-4.7:rust-afterburn-debugsource-0:4.6.0-1.rhaos4.7.el8.s390x", "8Base-RHOSE-4.7:rust-afterburn-debugsource-0:4.6.0-1.rhaos4.7.el8.x86_64", "8Base-RHOSE-4.7:rust-bootupd-0:0.2.5-2.el8.src", "8Base-RHOSE-4.7:rust-bootupd-debugsource-0:0.2.5-2.el8.x86_64", "8Base-RHOSE-4.7:tini-0:0.16.1-1.el8ar.ppc64le", "8Base-RHOSE-4.7:tini-0:0.16.1-1.el8ar.s390x", "8Base-RHOSE-4.7:tini-0:0.16.1-1.el8ar.src", "8Base-RHOSE-4.7:tini-0:0.16.1-1.el8ar.x86_64", "8Base-RHOSE-4.7:toolbox-0:0.0.8-3.rhaos4.7.el8.noarch", "8Base-RHOSE-4.7:toolbox-0:0.0.8-3.rhaos4.7.el8.src" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1886640" } ], "notes": [ { "category": "description", "text": "A flaw was found in kubernetes. If the logging level is to at least 4, and Ceph RBD is configured as a storage provisioner, then Ceph RBD admin secrets can be written to logs. This occurs in kube-controller-manager\u0027s logs during provisioning of Ceph RBD persistent claims.", "title": "Vulnerability description" }, { "category": "summary", "text": "kubernetes: Ceph RBD adminSecrets exposed in logs when loglevel \u003e= 4", "title": "Vulnerability summary" }, { "category": "other", "text": "OpenShift Container Platform 4 does not support Ceph RBD persistent volumes, however the vulnerable code is included.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RH7-RHOSE-4.7:openshift-0:4.7.0-202102060108.p0.git.97095.7271b90.el7.src", "7Server-RH7-RHOSE-4.7:openshift-hyperkube-0:4.7.0-202102060108.p0.git.97095.7271b90.el7.x86_64", "8Base-RHOSE-4.7:openshift-0:4.7.0-202102060108.p0.git.97095.7271b90.el8.src", "8Base-RHOSE-4.7:openshift-hyperkube-0:4.7.0-202102060108.p0.git.97095.7271b90.el8.ppc64le", "8Base-RHOSE-4.7:openshift-hyperkube-0:4.7.0-202102060108.p0.git.97095.7271b90.el8.s390x", "8Base-RHOSE-4.7:openshift-hyperkube-0:4.7.0-202102060108.p0.git.97095.7271b90.el8.x86_64" ], "known_not_affected": [ "7Server-RH7-RHOSE-4.7:conmon-2:2.0.21-2.rhaos4.6.el7.src", "7Server-RH7-RHOSE-4.7:conmon-2:2.0.21-2.rhaos4.6.el7.x86_64", "7Server-RH7-RHOSE-4.7:containernetworking-plugins-0:0.8.6-1.rhaos4.5.el7.src", "7Server-RH7-RHOSE-4.7:containernetworking-plugins-0:0.8.6-1.rhaos4.5.el7.x86_64", "7Server-RH7-RHOSE-4.7:containernetworking-plugins-debuginfo-0:0.8.6-1.rhaos4.5.el7.x86_64", "7Server-RH7-RHOSE-4.7:cri-o-0:1.20.0-0.rhaos4.7.git8921e00.el7.51.src", "7Server-RH7-RHOSE-4.7:cri-o-0:1.20.0-0.rhaos4.7.git8921e00.el7.51.x86_64", "7Server-RH7-RHOSE-4.7:cri-o-debuginfo-0:1.20.0-0.rhaos4.7.git8921e00.el7.51.x86_64", "7Server-RH7-RHOSE-4.7:cri-tools-0:1.18.0-3.el7.src", "7Server-RH7-RHOSE-4.7:cri-tools-0:1.18.0-3.el7.x86_64", "7Server-RH7-RHOSE-4.7:cri-tools-debuginfo-0:1.18.0-3.el7.x86_64", "7Server-RH7-RHOSE-4.7:haproxy-0:2.0.19-1.el7.src", "7Server-RH7-RHOSE-4.7:haproxy-debuginfo-0:2.0.19-1.el7.x86_64", "7Server-RH7-RHOSE-4.7:haproxy20-0:2.0.19-1.el7.x86_64", "7Server-RH7-RHOSE-4.7:jq-0:1.6-2.el7.src", "7Server-RH7-RHOSE-4.7:jq-0:1.6-2.el7.x86_64", "7Server-RH7-RHOSE-4.7:jq-debuginfo-0:1.6-2.el7.x86_64", "7Server-RH7-RHOSE-4.7:jq-devel-0:1.6-2.el7.x86_64", "7Server-RH7-RHOSE-4.7:oniguruma-0:5.9.2-5.el7.src", "7Server-RH7-RHOSE-4.7:oniguruma-0:5.9.2-5.el7.x86_64", "7Server-RH7-RHOSE-4.7:oniguruma-debuginfo-0:5.9.2-5.el7.x86_64", "7Server-RH7-RHOSE-4.7:oniguruma-devel-0:5.9.2-5.el7.x86_64", "7Server-RH7-RHOSE-4.7:openshift-ansible-0:4.7.0-202102032256.p0.git.0.bf7d9a7.el7.noarch", "7Server-RH7-RHOSE-4.7:openshift-ansible-0:4.7.0-202102032256.p0.git.0.bf7d9a7.el7.src", "7Server-RH7-RHOSE-4.7:openshift-ansible-test-0:4.7.0-202102032256.p0.git.0.bf7d9a7.el7.noarch", "7Server-RH7-RHOSE-4.7:openshift-clients-0:4.7.0-202102032256.p0.git.3951.0e656ef.el7.src", "7Server-RH7-RHOSE-4.7:openshift-clients-0:4.7.0-202102032256.p0.git.3951.0e656ef.el7.x86_64", "7Server-RH7-RHOSE-4.7:openshift-clients-redistributable-0:4.7.0-202102032256.p0.git.3951.0e656ef.el7.x86_64", "7Server-RH7-RHOSE-4.7:python-botocore-0:1.4.57-5.el7.src", "7Server-RH7-RHOSE-4.7:python2-botocore-0:1.4.57-5.el7.noarch", "7Server-RH7-RHOSE-4.7:runc-0:1.0.0-82.rhaos4.6.git086e841.el7.src", "7Server-RH7-RHOSE-4.7:runc-0:1.0.0-82.rhaos4.6.git086e841.el7.x86_64", "7Server-RH7-RHOSE-4.7:runc-debuginfo-0:1.0.0-82.rhaos4.6.git086e841.el7.x86_64", "8Base-RHOSE-4.7:NetworkManager-1:1.26.0-12.1.rhaos4.7.el8.ppc64le", "8Base-RHOSE-4.7:NetworkManager-1:1.26.0-12.1.rhaos4.7.el8.s390x", "8Base-RHOSE-4.7:NetworkManager-1:1.26.0-12.1.rhaos4.7.el8.src", "8Base-RHOSE-4.7:NetworkManager-1:1.26.0-12.1.rhaos4.7.el8.x86_64", "8Base-RHOSE-4.7:NetworkManager-adsl-1:1.26.0-12.1.rhaos4.7.el8.ppc64le", "8Base-RHOSE-4.7:NetworkManager-adsl-1:1.26.0-12.1.rhaos4.7.el8.s390x", "8Base-RHOSE-4.7:NetworkManager-adsl-1:1.26.0-12.1.rhaos4.7.el8.x86_64", "8Base-RHOSE-4.7:NetworkManager-adsl-debuginfo-1:1.26.0-12.1.rhaos4.7.el8.ppc64le", "8Base-RHOSE-4.7:NetworkManager-adsl-debuginfo-1:1.26.0-12.1.rhaos4.7.el8.s390x", "8Base-RHOSE-4.7:NetworkManager-adsl-debuginfo-1:1.26.0-12.1.rhaos4.7.el8.x86_64", "8Base-RHOSE-4.7:NetworkManager-bluetooth-1:1.26.0-12.1.rhaos4.7.el8.ppc64le", "8Base-RHOSE-4.7:NetworkManager-bluetooth-1:1.26.0-12.1.rhaos4.7.el8.s390x", "8Base-RHOSE-4.7:NetworkManager-bluetooth-1:1.26.0-12.1.rhaos4.7.el8.x86_64", "8Base-RHOSE-4.7:NetworkManager-bluetooth-debuginfo-1:1.26.0-12.1.rhaos4.7.el8.ppc64le", "8Base-RHOSE-4.7:NetworkManager-bluetooth-debuginfo-1:1.26.0-12.1.rhaos4.7.el8.s390x", "8Base-RHOSE-4.7:NetworkManager-bluetooth-debuginfo-1:1.26.0-12.1.rhaos4.7.el8.x86_64", "8Base-RHOSE-4.7:NetworkManager-cloud-setup-1:1.26.0-12.1.rhaos4.7.el8.ppc64le", "8Base-RHOSE-4.7:NetworkManager-cloud-setup-1:1.26.0-12.1.rhaos4.7.el8.s390x", "8Base-RHOSE-4.7:NetworkManager-cloud-setup-1:1.26.0-12.1.rhaos4.7.el8.x86_64", "8Base-RHOSE-4.7:NetworkManager-cloud-setup-debuginfo-1:1.26.0-12.1.rhaos4.7.el8.ppc64le", "8Base-RHOSE-4.7:NetworkManager-cloud-setup-debuginfo-1:1.26.0-12.1.rhaos4.7.el8.s390x", "8Base-RHOSE-4.7:NetworkManager-cloud-setup-debuginfo-1:1.26.0-12.1.rhaos4.7.el8.x86_64", "8Base-RHOSE-4.7:NetworkManager-config-connectivity-redhat-1:1.26.0-12.1.rhaos4.7.el8.noarch", "8Base-RHOSE-4.7:NetworkManager-config-server-1:1.26.0-12.1.rhaos4.7.el8.noarch", "8Base-RHOSE-4.7:NetworkManager-debuginfo-1:1.26.0-12.1.rhaos4.7.el8.ppc64le", "8Base-RHOSE-4.7:NetworkManager-debuginfo-1:1.26.0-12.1.rhaos4.7.el8.s390x", "8Base-RHOSE-4.7:NetworkManager-debuginfo-1:1.26.0-12.1.rhaos4.7.el8.x86_64", "8Base-RHOSE-4.7:NetworkManager-debugsource-1:1.26.0-12.1.rhaos4.7.el8.ppc64le", "8Base-RHOSE-4.7:NetworkManager-debugsource-1:1.26.0-12.1.rhaos4.7.el8.s390x", "8Base-RHOSE-4.7:NetworkManager-debugsource-1:1.26.0-12.1.rhaos4.7.el8.x86_64", "8Base-RHOSE-4.7:NetworkManager-dispatcher-routing-rules-1:1.26.0-12.1.rhaos4.7.el8.noarch", "8Base-RHOSE-4.7:NetworkManager-libnm-1:1.26.0-12.1.rhaos4.7.el8.ppc64le", "8Base-RHOSE-4.7:NetworkManager-libnm-1:1.26.0-12.1.rhaos4.7.el8.s390x", "8Base-RHOSE-4.7:NetworkManager-libnm-1:1.26.0-12.1.rhaos4.7.el8.x86_64", "8Base-RHOSE-4.7:NetworkManager-libnm-debuginfo-1:1.26.0-12.1.rhaos4.7.el8.ppc64le", "8Base-RHOSE-4.7:NetworkManager-libnm-debuginfo-1:1.26.0-12.1.rhaos4.7.el8.s390x", "8Base-RHOSE-4.7:NetworkManager-libnm-debuginfo-1:1.26.0-12.1.rhaos4.7.el8.x86_64", "8Base-RHOSE-4.7:NetworkManager-libnm-devel-1:1.26.0-12.1.rhaos4.7.el8.ppc64le", "8Base-RHOSE-4.7:NetworkManager-libnm-devel-1:1.26.0-12.1.rhaos4.7.el8.s390x", "8Base-RHOSE-4.7:NetworkManager-libnm-devel-1:1.26.0-12.1.rhaos4.7.el8.x86_64", "8Base-RHOSE-4.7:NetworkManager-ovs-1:1.26.0-12.1.rhaos4.7.el8.ppc64le", "8Base-RHOSE-4.7:NetworkManager-ovs-1:1.26.0-12.1.rhaos4.7.el8.s390x", "8Base-RHOSE-4.7:NetworkManager-ovs-1:1.26.0-12.1.rhaos4.7.el8.x86_64", "8Base-RHOSE-4.7:NetworkManager-ovs-debuginfo-1:1.26.0-12.1.rhaos4.7.el8.ppc64le", "8Base-RHOSE-4.7:NetworkManager-ovs-debuginfo-1:1.26.0-12.1.rhaos4.7.el8.s390x", "8Base-RHOSE-4.7:NetworkManager-ovs-debuginfo-1:1.26.0-12.1.rhaos4.7.el8.x86_64", "8Base-RHOSE-4.7:NetworkManager-ppp-1:1.26.0-12.1.rhaos4.7.el8.ppc64le", "8Base-RHOSE-4.7:NetworkManager-ppp-1:1.26.0-12.1.rhaos4.7.el8.s390x", "8Base-RHOSE-4.7:NetworkManager-ppp-1:1.26.0-12.1.rhaos4.7.el8.x86_64", "8Base-RHOSE-4.7:NetworkManager-ppp-debuginfo-1:1.26.0-12.1.rhaos4.7.el8.ppc64le", "8Base-RHOSE-4.7:NetworkManager-ppp-debuginfo-1:1.26.0-12.1.rhaos4.7.el8.s390x", "8Base-RHOSE-4.7:NetworkManager-ppp-debuginfo-1:1.26.0-12.1.rhaos4.7.el8.x86_64", "8Base-RHOSE-4.7:NetworkManager-team-1:1.26.0-12.1.rhaos4.7.el8.ppc64le", "8Base-RHOSE-4.7:NetworkManager-team-1:1.26.0-12.1.rhaos4.7.el8.s390x", "8Base-RHOSE-4.7:NetworkManager-team-1:1.26.0-12.1.rhaos4.7.el8.x86_64", "8Base-RHOSE-4.7:NetworkManager-team-debuginfo-1:1.26.0-12.1.rhaos4.7.el8.ppc64le", "8Base-RHOSE-4.7:NetworkManager-team-debuginfo-1:1.26.0-12.1.rhaos4.7.el8.s390x", "8Base-RHOSE-4.7:NetworkManager-team-debuginfo-1:1.26.0-12.1.rhaos4.7.el8.x86_64", "8Base-RHOSE-4.7:NetworkManager-tui-1:1.26.0-12.1.rhaos4.7.el8.ppc64le", "8Base-RHOSE-4.7:NetworkManager-tui-1:1.26.0-12.1.rhaos4.7.el8.s390x", "8Base-RHOSE-4.7:NetworkManager-tui-1:1.26.0-12.1.rhaos4.7.el8.x86_64", "8Base-RHOSE-4.7:NetworkManager-tui-debuginfo-1:1.26.0-12.1.rhaos4.7.el8.ppc64le", "8Base-RHOSE-4.7:NetworkManager-tui-debuginfo-1:1.26.0-12.1.rhaos4.7.el8.s390x", "8Base-RHOSE-4.7:NetworkManager-tui-debuginfo-1:1.26.0-12.1.rhaos4.7.el8.x86_64", "8Base-RHOSE-4.7:NetworkManager-wifi-1:1.26.0-12.1.rhaos4.7.el8.ppc64le", "8Base-RHOSE-4.7:NetworkManager-wifi-1:1.26.0-12.1.rhaos4.7.el8.s390x", "8Base-RHOSE-4.7:NetworkManager-wifi-1:1.26.0-12.1.rhaos4.7.el8.x86_64", "8Base-RHOSE-4.7:NetworkManager-wifi-debuginfo-1:1.26.0-12.1.rhaos4.7.el8.ppc64le", "8Base-RHOSE-4.7:NetworkManager-wifi-debuginfo-1:1.26.0-12.1.rhaos4.7.el8.s390x", "8Base-RHOSE-4.7:NetworkManager-wifi-debuginfo-1:1.26.0-12.1.rhaos4.7.el8.x86_64", "8Base-RHOSE-4.7:NetworkManager-wwan-1:1.26.0-12.1.rhaos4.7.el8.ppc64le", "8Base-RHOSE-4.7:NetworkManager-wwan-1:1.26.0-12.1.rhaos4.7.el8.s390x", "8Base-RHOSE-4.7:NetworkManager-wwan-1:1.26.0-12.1.rhaos4.7.el8.x86_64", "8Base-RHOSE-4.7:NetworkManager-wwan-debuginfo-1:1.26.0-12.1.rhaos4.7.el8.ppc64le", "8Base-RHOSE-4.7:NetworkManager-wwan-debuginfo-1:1.26.0-12.1.rhaos4.7.el8.s390x", "8Base-RHOSE-4.7:NetworkManager-wwan-debuginfo-1:1.26.0-12.1.rhaos4.7.el8.x86_64", "8Base-RHOSE-4.7:afterburn-0:4.6.0-1.rhaos4.7.el8.ppc64le", "8Base-RHOSE-4.7:afterburn-0:4.6.0-1.rhaos4.7.el8.s390x", "8Base-RHOSE-4.7:afterburn-0:4.6.0-1.rhaos4.7.el8.x86_64", "8Base-RHOSE-4.7:afterburn-debuginfo-0:4.6.0-1.rhaos4.7.el8.ppc64le", "8Base-RHOSE-4.7:afterburn-debuginfo-0:4.6.0-1.rhaos4.7.el8.s390x", "8Base-RHOSE-4.7:afterburn-debuginfo-0:4.6.0-1.rhaos4.7.el8.x86_64", "8Base-RHOSE-4.7:ansible-runner-0:1.4.6-2.el8ar.noarch", "8Base-RHOSE-4.7:ansible-runner-0:1.4.6-2.el8ar.src", "8Base-RHOSE-4.7:ansible-runner-http-0:1.0.0-2.el8ar.noarch", "8Base-RHOSE-4.7:ansible-runner-http-0:1.0.0-2.el8ar.src", "8Base-RHOSE-4.7:atomic-openshift-service-idler-0:4.7.0-202011171454.p0.git.15.675c1c8.el8.ppc64le", "8Base-RHOSE-4.7:atomic-openshift-service-idler-0:4.7.0-202011171454.p0.git.15.675c1c8.el8.s390x", "8Base-RHOSE-4.7:atomic-openshift-service-idler-0:4.7.0-202011171454.p0.git.15.675c1c8.el8.src", "8Base-RHOSE-4.7:atomic-openshift-service-idler-0:4.7.0-202011171454.p0.git.15.675c1c8.el8.x86_64", "8Base-RHOSE-4.7:bootupd-0:0.2.5-2.el8.x86_64", "8Base-RHOSE-4.7:bootupd-debuginfo-0:0.2.5-2.el8.x86_64", "8Base-RHOSE-4.7:clevis-0:15-1.el8.ppc64le", "8Base-RHOSE-4.7:clevis-0:15-1.el8.s390x", "8Base-RHOSE-4.7:clevis-0:15-1.el8.src", "8Base-RHOSE-4.7:clevis-0:15-1.el8.x86_64", "8Base-RHOSE-4.7:clevis-debuginfo-0:15-1.el8.ppc64le", "8Base-RHOSE-4.7:clevis-debuginfo-0:15-1.el8.s390x", "8Base-RHOSE-4.7:clevis-debuginfo-0:15-1.el8.x86_64", "8Base-RHOSE-4.7:clevis-debugsource-0:15-1.el8.ppc64le", "8Base-RHOSE-4.7:clevis-debugsource-0:15-1.el8.s390x", "8Base-RHOSE-4.7:clevis-debugsource-0:15-1.el8.x86_64", "8Base-RHOSE-4.7:clevis-dracut-0:15-1.el8.ppc64le", "8Base-RHOSE-4.7:clevis-dracut-0:15-1.el8.s390x", "8Base-RHOSE-4.7:clevis-dracut-0:15-1.el8.x86_64", "8Base-RHOSE-4.7:clevis-luks-0:15-1.el8.ppc64le", "8Base-RHOSE-4.7:clevis-luks-0:15-1.el8.s390x", "8Base-RHOSE-4.7:clevis-luks-0:15-1.el8.x86_64", "8Base-RHOSE-4.7:clevis-systemd-0:15-1.el8.ppc64le", "8Base-RHOSE-4.7:clevis-systemd-0:15-1.el8.s390x", "8Base-RHOSE-4.7:clevis-systemd-0:15-1.el8.x86_64", "8Base-RHOSE-4.7:clevis-udisks2-0:15-1.el8.ppc64le", "8Base-RHOSE-4.7:clevis-udisks2-0:15-1.el8.s390x", "8Base-RHOSE-4.7:clevis-udisks2-0:15-1.el8.x86_64", "8Base-RHOSE-4.7:clevis-udisks2-debuginfo-0:15-1.el8.ppc64le", "8Base-RHOSE-4.7:clevis-udisks2-debuginfo-0:15-1.el8.s390x", "8Base-RHOSE-4.7:clevis-udisks2-debuginfo-0:15-1.el8.x86_64", "8Base-RHOSE-4.7:conmon-2:2.0.21-2.rhaos4.6.el8.ppc64le", "8Base-RHOSE-4.7:conmon-2:2.0.21-2.rhaos4.6.el8.s390x", "8Base-RHOSE-4.7:conmon-2:2.0.21-2.rhaos4.6.el8.src", "8Base-RHOSE-4.7:conmon-2:2.0.21-2.rhaos4.6.el8.x86_64", "8Base-RHOSE-4.7:console-login-helper-messages-0:0.20.3-1.rhaos4.7.el8.noarch", "8Base-RHOSE-4.7:console-login-helper-messages-0:0.20.3-1.rhaos4.7.el8.src", "8Base-RHOSE-4.7:console-login-helper-messages-issuegen-0:0.20.3-1.rhaos4.7.el8.noarch", "8Base-RHOSE-4.7:console-login-helper-messages-profile-0:0.20.3-1.rhaos4.7.el8.noarch", "8Base-RHOSE-4.7:container-selinux-2:2.151.0-1.rhaos4.7.el8.noarch", "8Base-RHOSE-4.7:container-selinux-2:2.151.0-1.rhaos4.7.el8.src", "8Base-RHOSE-4.7:containernetworking-plugins-0:0.8.6-1.rhaos4.5.el8.ppc64le", "8Base-RHOSE-4.7:containernetworking-plugins-0:0.8.6-1.rhaos4.5.el8.s390x", "8Base-RHOSE-4.7:containernetworking-plugins-0:0.8.6-1.rhaos4.5.el8.src", "8Base-RHOSE-4.7:containernetworking-plugins-0:0.8.6-1.rhaos4.5.el8.x86_64", "8Base-RHOSE-4.7:containernetworking-plugins-debuginfo-0:0.8.6-1.rhaos4.5.el8.ppc64le", "8Base-RHOSE-4.7:containernetworking-plugins-debuginfo-0:0.8.6-1.rhaos4.5.el8.s390x", "8Base-RHOSE-4.7:containernetworking-plugins-debuginfo-0:0.8.6-1.rhaos4.5.el8.x86_64", "8Base-RHOSE-4.7:containernetworking-plugins-debugsource-0:0.8.6-1.rhaos4.5.el8.ppc64le", "8Base-RHOSE-4.7:containernetworking-plugins-debugsource-0:0.8.6-1.rhaos4.5.el8.s390x", "8Base-RHOSE-4.7:containernetworking-plugins-debugsource-0:0.8.6-1.rhaos4.5.el8.x86_64", "8Base-RHOSE-4.7:coreos-installer-0:0.8.0-3.rhaos4.7.el8.ppc64le", "8Base-RHOSE-4.7:coreos-installer-0:0.8.0-3.rhaos4.7.el8.s390x", "8Base-RHOSE-4.7:coreos-installer-0:0.8.0-3.rhaos4.7.el8.src", "8Base-RHOSE-4.7:coreos-installer-0:0.8.0-3.rhaos4.7.el8.x86_64", "8Base-RHOSE-4.7:coreos-installer-bootinfra-0:0.8.0-3.rhaos4.7.el8.ppc64le", "8Base-RHOSE-4.7:coreos-installer-bootinfra-0:0.8.0-3.rhaos4.7.el8.s390x", "8Base-RHOSE-4.7:coreos-installer-bootinfra-debuginfo-0:0.8.0-3.rhaos4.7.el8.ppc64le", "8Base-RHOSE-4.7:coreos-installer-bootinfra-debuginfo-0:0.8.0-3.rhaos4.7.el8.s390x", "8Base-RHOSE-4.7:coreos-installer-bootinfra-debuginfo-0:0.8.0-3.rhaos4.7.el8.x86_64", "8Base-RHOSE-4.7:coreos-installer-debuginfo-0:0.8.0-3.rhaos4.7.el8.ppc64le", "8Base-RHOSE-4.7:coreos-installer-debuginfo-0:0.8.0-3.rhaos4.7.el8.s390x", "8Base-RHOSE-4.7:coreos-installer-debuginfo-0:0.8.0-3.rhaos4.7.el8.x86_64", "8Base-RHOSE-4.7:coreos-installer-debugsource-0:0.8.0-3.rhaos4.7.el8.ppc64le", "8Base-RHOSE-4.7:coreos-installer-debugsource-0:0.8.0-3.rhaos4.7.el8.s390x", "8Base-RHOSE-4.7:coreos-installer-debugsource-0:0.8.0-3.rhaos4.7.el8.x86_64", "8Base-RHOSE-4.7:cri-o-0:1.20.0-0.rhaos4.7.git8921e00.el8.51.ppc64le", "8Base-RHOSE-4.7:cri-o-0:1.20.0-0.rhaos4.7.git8921e00.el8.51.s390x", "8Base-RHOSE-4.7:cri-o-0:1.20.0-0.rhaos4.7.git8921e00.el8.51.src", "8Base-RHOSE-4.7:cri-o-0:1.20.0-0.rhaos4.7.git8921e00.el8.51.x86_64", "8Base-RHOSE-4.7:cri-o-debuginfo-0:1.20.0-0.rhaos4.7.git8921e00.el8.51.ppc64le", "8Base-RHOSE-4.7:cri-o-debuginfo-0:1.20.0-0.rhaos4.7.git8921e00.el8.51.s390x", "8Base-RHOSE-4.7:cri-o-debuginfo-0:1.20.0-0.rhaos4.7.git8921e00.el8.51.x86_64", "8Base-RHOSE-4.7:cri-o-debugsource-0:1.20.0-0.rhaos4.7.git8921e00.el8.51.ppc64le", "8Base-RHOSE-4.7:cri-o-debugsource-0:1.20.0-0.rhaos4.7.git8921e00.el8.51.s390x", "8Base-RHOSE-4.7:cri-o-debugsource-0:1.20.0-0.rhaos4.7.git8921e00.el8.51.x86_64", "8Base-RHOSE-4.7:cri-tools-0:1.20.0-1.el8.ppc64le", "8Base-RHOSE-4.7:cri-tools-0:1.20.0-1.el8.s390x", "8Base-RHOSE-4.7:cri-tools-0:1.20.0-1.el8.src", "8Base-RHOSE-4.7:cri-tools-0:1.20.0-1.el8.x86_64", "8Base-RHOSE-4.7:cri-tools-debuginfo-0:1.20.0-1.el8.ppc64le", "8Base-RHOSE-4.7:cri-tools-debuginfo-0:1.20.0-1.el8.s390x", "8Base-RHOSE-4.7:cri-tools-debuginfo-0:1.20.0-1.el8.x86_64", "8Base-RHOSE-4.7:cri-tools-debugsource-0:1.20.0-1.el8.ppc64le", "8Base-RHOSE-4.7:cri-tools-debugsource-0:1.20.0-1.el8.s390x", "8Base-RHOSE-4.7:cri-tools-debugsource-0:1.20.0-1.el8.x86_64", "8Base-RHOSE-4.7:dracut-0:049-95.git20200804.el8_3.4.ppc64le", "8Base-RHOSE-4.7:dracut-0:049-95.git20200804.el8_3.4.s390x", "8Base-RHOSE-4.7:dracut-0:049-95.git20200804.el8_3.4.src", "8Base-RHOSE-4.7:dracut-0:049-95.git20200804.el8_3.4.x86_64", "8Base-RHOSE-4.7:dracut-caps-0:049-95.git20200804.el8_3.4.ppc64le", "8Base-RHOSE-4.7:dracut-caps-0:049-95.git20200804.el8_3.4.s390x", "8Base-RHOSE-4.7:dracut-caps-0:049-95.git20200804.el8_3.4.x86_64", "8Base-RHOSE-4.7:dracut-config-generic-0:049-95.git20200804.el8_3.4.ppc64le", "8Base-RHOSE-4.7:dracut-config-generic-0:049-95.git20200804.el8_3.4.s390x", "8Base-RHOSE-4.7:dracut-config-generic-0:049-95.git20200804.el8_3.4.x86_64", "8Base-RHOSE-4.7:dracut-config-rescue-0:049-95.git20200804.el8_3.4.ppc64le", "8Base-RHOSE-4.7:dracut-config-rescue-0:049-95.git20200804.el8_3.4.s390x", "8Base-RHOSE-4.7:dracut-config-rescue-0:049-95.git20200804.el8_3.4.x86_64", "8Base-RHOSE-4.7:dracut-debuginfo-0:049-95.git20200804.el8_3.4.ppc64le", "8Base-RHOSE-4.7:dracut-debuginfo-0:049-95.git20200804.el8_3.4.s390x", "8Base-RHOSE-4.7:dracut-debuginfo-0:049-95.git20200804.el8_3.4.x86_64", "8Base-RHOSE-4.7:dracut-debugsource-0:049-95.git20200804.el8_3.4.ppc64le", "8Base-RHOSE-4.7:dracut-debugsource-0:049-95.git20200804.el8_3.4.s390x", "8Base-RHOSE-4.7:dracut-debugsource-0:049-95.git20200804.el8_3.4.x86_64", "8Base-RHOSE-4.7:dracut-live-0:049-95.git20200804.el8_3.4.ppc64le", "8Base-RHOSE-4.7:dracut-live-0:049-95.git20200804.el8_3.4.s390x", "8Base-RHOSE-4.7:dracut-live-0:049-95.git20200804.el8_3.4.x86_64", "8Base-RHOSE-4.7:dracut-network-0:049-95.git20200804.el8_3.4.ppc64le", "8Base-RHOSE-4.7:dracut-network-0:049-95.git20200804.el8_3.4.s390x", "8Base-RHOSE-4.7:dracut-network-0:049-95.git20200804.el8_3.4.x86_64", "8Base-RHOSE-4.7:dracut-squash-0:049-95.git20200804.el8_3.4.ppc64le", "8Base-RHOSE-4.7:dracut-squash-0:049-95.git20200804.el8_3.4.s390x", "8Base-RHOSE-4.7:dracut-squash-0:049-95.git20200804.el8_3.4.x86_64", "8Base-RHOSE-4.7:dracut-tools-0:049-95.git20200804.el8_3.4.ppc64le", "8Base-RHOSE-4.7:dracut-tools-0:049-95.git20200804.el8_3.4.s390x", "8Base-RHOSE-4.7:dracut-tools-0:049-95.git20200804.el8_3.4.x86_64", "8Base-RHOSE-4.7:faq-0:0.0.6-5.el8.ppc64le", "8Base-RHOSE-4.7:faq-0:0.0.6-5.el8.s390x", "8Base-RHOSE-4.7:faq-0:0.0.6-5.el8.src", "8Base-RHOSE-4.7:faq-0:0.0.6-5.el8.x86_64", "8Base-RHOSE-4.7:golang-github-prometheus-promu-0:0.5.0-2.git642a960.el8.ppc64le", "8Base-RHOSE-4.7:golang-github-prometheus-promu-0:0.5.0-2.git642a960.el8.s390x", "8Base-RHOSE-4.7:golang-github-prometheus-promu-0:0.5.0-2.git642a960.el8.src", "8Base-RHOSE-4.7:golang-github-prometheus-promu-0:0.5.0-2.git642a960.el8.x86_64", "8Base-RHOSE-4.7:gperftools-0:2.6.3-2.el8ost.ppc64le", "8Base-RHOSE-4.7:gperftools-0:2.6.3-2.el8ost.s390x", "8Base-RHOSE-4.7:gperftools-0:2.6.3-2.el8ost.src", "8Base-RHOSE-4.7:gperftools-0:2.6.3-2.el8ost.x86_64", "8Base-RHOSE-4.7:gperftools-debugsource-0:2.6.3-2.el8ost.ppc64le", "8Base-RHOSE-4.7:gperftools-debugsource-0:2.6.3-2.el8ost.s390x", "8Base-RHOSE-4.7:gperftools-debugsource-0:2.6.3-2.el8ost.x86_64", "8Base-RHOSE-4.7:gperftools-devel-0:2.6.3-2.el8ost.ppc64le", "8Base-RHOSE-4.7:gperftools-devel-0:2.6.3-2.el8ost.s390x", "8Base-RHOSE-4.7:gperftools-devel-0:2.6.3-2.el8ost.x86_64", "8Base-RHOSE-4.7:gperftools-libs-0:2.6.3-2.el8ost.ppc64le", "8Base-RHOSE-4.7:gperftools-libs-0:2.6.3-2.el8ost.s390x", "8Base-RHOSE-4.7:gperftools-libs-0:2.6.3-2.el8ost.x86_64", "8Base-RHOSE-4.7:gperftools-libs-debuginfo-0:2.6.3-2.el8ost.ppc64le", "8Base-RHOSE-4.7:gperftools-libs-debuginfo-0:2.6.3-2.el8ost.s390x", "8Base-RHOSE-4.7:gperftools-libs-debuginfo-0:2.6.3-2.el8ost.x86_64", "8Base-RHOSE-4.7:grpc-0:1.18.0-4.el8ost.ppc64le", "8Base-RHOSE-4.7:grpc-0:1.18.0-4.el8ost.s390x", "8Base-RHOSE-4.7:grpc-0:1.18.0-4.el8ost.src", "8Base-RHOSE-4.7:grpc-0:1.18.0-4.el8ost.x86_64", "8Base-RHOSE-4.7:grpc-cli-0:1.18.0-4.el8ost.ppc64le", "8Base-RHOSE-4.7:grpc-cli-0:1.18.0-4.el8ost.s390x", "8Base-RHOSE-4.7:grpc-cli-0:1.18.0-4.el8ost.x86_64", "8Base-RHOSE-4.7:grpc-cli-debuginfo-0:1.18.0-4.el8ost.ppc64le", "8Base-RHOSE-4.7:grpc-cli-debuginfo-0:1.18.0-4.el8ost.s390x", "8Base-RHOSE-4.7:grpc-cli-debuginfo-0:1.18.0-4.el8ost.x86_64", "8Base-RHOSE-4.7:grpc-debuginfo-0:1.18.0-4.el8ost.ppc64le", "8Base-RHOSE-4.7:grpc-debuginfo-0:1.18.0-4.el8ost.s390x", "8Base-RHOSE-4.7:grpc-debuginfo-0:1.18.0-4.el8ost.x86_64", "8Base-RHOSE-4.7:grpc-debugsource-0:1.18.0-4.el8ost.ppc64le", "8Base-RHOSE-4.7:grpc-debugsource-0:1.18.0-4.el8ost.s390x", "8Base-RHOSE-4.7:grpc-debugsource-0:1.18.0-4.el8ost.x86_64", "8Base-RHOSE-4.7:grpc-devel-0:1.18.0-4.el8ost.ppc64le", "8Base-RHOSE-4.7:grpc-devel-0:1.18.0-4.el8ost.s390x", "8Base-RHOSE-4.7:grpc-devel-0:1.18.0-4.el8ost.x86_64", "8Base-RHOSE-4.7:grpc-plugins-0:1.18.0-4.el8ost.ppc64le", "8Base-RHOSE-4.7:grpc-plugins-0:1.18.0-4.el8ost.s390x", "8Base-RHOSE-4.7:grpc-plugins-0:1.18.0-4.el8ost.x86_64", "8Base-RHOSE-4.7:grpc-plugins-debuginfo-0:1.18.0-4.el8ost.ppc64le", "8Base-RHOSE-4.7:grpc-plugins-debuginfo-0:1.18.0-4.el8ost.s390x", "8Base-RHOSE-4.7:grpc-plugins-debuginfo-0:1.18.0-4.el8ost.x86_64", "8Base-RHOSE-4.7:haproxy-0:2.0.19-1.el8.src", "8Base-RHOSE-4.7:haproxy-debugsource-0:2.0.19-1.el8.ppc64le", "8Base-RHOSE-4.7:haproxy-debugsource-0:2.0.19-1.el8.s390x", "8Base-RHOSE-4.7:haproxy-debugsource-0:2.0.19-1.el8.x86_64", "8Base-RHOSE-4.7:haproxy20-0:2.0.19-1.el8.ppc64le", "8Base-RHOSE-4.7:haproxy20-0:2.0.19-1.el8.s390x", "8Base-RHOSE-4.7:haproxy20-0:2.0.19-1.el8.x86_64", "8Base-RHOSE-4.7:haproxy20-debuginfo-0:2.0.19-1.el8.ppc64le", "8Base-RHOSE-4.7:haproxy20-debuginfo-0:2.0.19-1.el8.s390x", "8Base-RHOSE-4.7:haproxy20-debuginfo-0:2.0.19-1.el8.x86_64", "8Base-RHOSE-4.7:ignition-0:2.9.0-2.rhaos4.7.git1d56dc8.el8.ppc64le", "8Base-RHOSE-4.7:ignition-0:2.9.0-2.rhaos4.7.git1d56dc8.el8.s390x", "8Base-RHOSE-4.7:ignition-0:2.9.0-2.rhaos4.7.git1d56dc8.el8.src", "8Base-RHOSE-4.7:ignition-0:2.9.0-2.rhaos4.7.git1d56dc8.el8.x86_64", "8Base-RHOSE-4.7:ignition-debuginfo-0:2.9.0-2.rhaos4.7.git1d56dc8.el8.ppc64le", "8Base-RHOSE-4.7:ignition-debuginfo-0:2.9.0-2.rhaos4.7.git1d56dc8.el8.s390x", "8Base-RHOSE-4.7:ignition-debuginfo-0:2.9.0-2.rhaos4.7.git1d56dc8.el8.x86_64", "8Base-RHOSE-4.7:ignition-debugsource-0:2.9.0-2.rhaos4.7.git1d56dc8.el8.ppc64le", "8Base-RHOSE-4.7:ignition-debugsource-0:2.9.0-2.rhaos4.7.git1d56dc8.el8.s390x", "8Base-RHOSE-4.7:ignition-debugsource-0:2.9.0-2.rhaos4.7.git1d56dc8.el8.x86_64", "8Base-RHOSE-4.7:ignition-validate-0:2.9.0-2.rhaos4.7.git1d56dc8.el8.ppc64le", "8Base-RHOSE-4.7:ignition-validate-0:2.9.0-2.rhaos4.7.git1d56dc8.el8.s390x", "8Base-RHOSE-4.7:ignition-validate-0:2.9.0-2.rhaos4.7.git1d56dc8.el8.x86_64", "8Base-RHOSE-4.7:ignition-validate-debuginfo-0:2.9.0-2.rhaos4.7.git1d56dc8.el8.ppc64le", "8Base-RHOSE-4.7:ignition-validate-debuginfo-0:2.9.0-2.rhaos4.7.git1d56dc8.el8.s390x", "8Base-RHOSE-4.7:ignition-validate-debuginfo-0:2.9.0-2.rhaos4.7.git1d56dc8.el8.x86_64", "8Base-RHOSE-4.7:inotify-tools-0:3.20.1-2.el8.ppc64le", "8Base-RHOSE-4.7:inotify-tools-0:3.20.1-2.el8.s390x", "8Base-RHOSE-4.7:inotify-tools-0:3.20.1-2.el8.src", "8Base-RHOSE-4.7:inotify-tools-0:3.20.1-2.el8.x86_64", "8Base-RHOSE-4.7:inotify-tools-debuginfo-0:3.20.1-2.el8.ppc64le", "8Base-RHOSE-4.7:inotify-tools-debuginfo-0:3.20.1-2.el8.s390x", "8Base-RHOSE-4.7:inotify-tools-debuginfo-0:3.20.1-2.el8.x86_64", "8Base-RHOSE-4.7:inotify-tools-debugsource-0:3.20.1-2.el8.ppc64le", "8Base-RHOSE-4.7:inotify-tools-debugsource-0:3.20.1-2.el8.s390x", "8Base-RHOSE-4.7:inotify-tools-debugsource-0:3.20.1-2.el8.x86_64", "8Base-RHOSE-4.7:inotify-tools-devel-0:3.20.1-2.el8.ppc64le", "8Base-RHOSE-4.7:inotify-tools-devel-0:3.20.1-2.el8.s390x", "8Base-RHOSE-4.7:inotify-tools-devel-0:3.20.1-2.el8.x86_64", "8Base-RHOSE-4.7:ironic-images-0:15.1-20210114.1.el8.noarch", "8Base-RHOSE-4.7:ironic-images-0:15.1-20210114.1.el8.src", "8Base-RHOSE-4.7:ironic-images-all-0:15.1-20210114.1.el8.noarch", "8Base-RHOSE-4.7:ironic-images-ipa-ppc64le-0:15.1-20210114.1.el8.noarch", "8Base-RHOSE-4.7:ironic-images-ipa-x86_64-0:15.1-20210114.1.el8.noarch", "8Base-RHOSE-4.7:jenkins-0:2.263.3.1612449007-1.el8.noarch", "8Base-RHOSE-4.7:jenkins-0:2.263.3.1612449007-1.el8.src", "8Base-RHOSE-4.7:jenkins-2-plugins-0:4.7.1611636915-1.el8.noarch", "8Base-RHOSE-4.7:jenkins-2-plugins-0:4.7.1611636915-1.el8.src", "8Base-RHOSE-4.7:jq-0:1.6-2.el8.ppc64le", "8Base-RHOSE-4.7:jq-0:1.6-2.el8.s390x", "8Base-RHOSE-4.7:jq-0:1.6-2.el8.src", "8Base-RHOSE-4.7:jq-0:1.6-2.el8.x86_64", "8Base-RHOSE-4.7:jq-debuginfo-0:1.6-2.el8.ppc64le", "8Base-RHOSE-4.7:jq-debuginfo-0:1.6-2.el8.s390x", "8Base-RHOSE-4.7:jq-debuginfo-0:1.6-2.el8.x86_64", "8Base-RHOSE-4.7:jq-debugsource-0:1.6-2.el8.ppc64le", "8Base-RHOSE-4.7:jq-debugsource-0:1.6-2.el8.s390x", "8Base-RHOSE-4.7:jq-debugsource-0:1.6-2.el8.x86_64", "8Base-RHOSE-4.7:jq-devel-0:1.6-2.el8.ppc64le", "8Base-RHOSE-4.7:jq-devel-0:1.6-2.el8.s390x", "8Base-RHOSE-4.7:jq-devel-0:1.6-2.el8.x86_64", "8Base-RHOSE-4.7:kuryr-binding-scripts-0:1.1.1-0.20190923160834.41e6964.el8ost.noarch", "8Base-RHOSE-4.7:libnftnl-0:1.1.5-4.el8.ppc64le", "8Base-RHOSE-4.7:libnftnl-0:1.1.5-4.el8.s390x", "8Base-RHOSE-4.7:libnftnl-0:1.1.5-4.el8.src", "8Base-RHOSE-4.7:libnftnl-0:1.1.5-4.el8.x86_64", "8Base-RHOSE-4.7:libnftnl-debuginfo-0:1.1.5-4.el8.ppc64le", "8Base-RHOSE-4.7:libnftnl-debuginfo-0:1.1.5-4.el8.s390x", "8Base-RHOSE-4.7:libnftnl-debuginfo-0:1.1.5-4.el8.x86_64", "8Base-RHOSE-4.7:libnftnl-debugsource-0:1.1.5-4.el8.ppc64le", "8Base-RHOSE-4.7:libnftnl-debugsource-0:1.1.5-4.el8.s390x", "8Base-RHOSE-4.7:libnftnl-debugsource-0:1.1.5-4.el8.x86_64", "8Base-RHOSE-4.7:libnftnl-devel-0:1.1.5-4.el8.ppc64le", "8Base-RHOSE-4.7:libnftnl-devel-0:1.1.5-4.el8.s390x", "8Base-RHOSE-4.7:libnftnl-devel-0:1.1.5-4.el8.x86_64", "8Base-RHOSE-4.7:libsodium-0:1.0.16-4.5.el8ost.ppc64le", "8Base-RHOSE-4.7:libsodium-0:1.0.16-4.5.el8ost.s390x", "8Base-RHOSE-4.7:libsodium-0:1.0.16-4.5.el8ost.src", "8Base-RHOSE-4.7:libsodium-0:1.0.16-4.5.el8ost.x86_64", "8Base-RHOSE-4.7:libsodium-debuginfo-0:1.0.16-4.5.el8ost.ppc64le", "8Base-RHOSE-4.7:libsodium-debuginfo-0:1.0.16-4.5.el8ost.s390x", "8Base-RHOSE-4.7:libsodium-debuginfo-0:1.0.16-4.5.el8ost.x86_64", "8Base-RHOSE-4.7:libsodium-debugsource-0:1.0.16-4.5.el8ost.ppc64le", "8Base-RHOSE-4.7:libsodium-debugsource-0:1.0.16-4.5.el8ost.s390x", "8Base-RHOSE-4.7:libsodium-debugsource-0:1.0.16-4.5.el8ost.x86_64", "8Base-RHOSE-4.7:libsodium-devel-0:1.0.16-4.5.el8ost.ppc64le", "8Base-RHOSE-4.7:libsodium-devel-0:1.0.16-4.5.el8ost.s390x", "8Base-RHOSE-4.7:libsodium-devel-0:1.0.16-4.5.el8ost.x86_64", "8Base-RHOSE-4.7:libsodium-static-0:1.0.16-4.5.el8ost.ppc64le", "8Base-RHOSE-4.7:libsodium-static-0:1.0.16-4.5.el8ost.s390x", "8Base-RHOSE-4.7:libsodium-static-0:1.0.16-4.5.el8ost.x86_64", "8Base-RHOSE-4.7:libunwind-0:1.2.1-5.el8.ppc64le", "8Base-RHOSE-4.7:libunwind-0:1.2.1-5.el8.src", "8Base-RHOSE-4.7:libunwind-0:1.2.1-5.el8.x86_64", "8Base-RHOSE-4.7:libunwind-debuginfo-0:1.2.1-5.el8.ppc64le", "8Base-RHOSE-4.7:libunwind-debuginfo-0:1.2.1-5.el8.x86_64", "8Base-RHOSE-4.7:libunwind-debugsource-0:1.2.1-5.el8.ppc64le", "8Base-RHOSE-4.7:libunwind-debugsource-0:1.2.1-5.el8.x86_64", "8Base-RHOSE-4.7:libunwind-devel-0:1.2.1-5.el8.ppc64le", "8Base-RHOSE-4.7:libunwind-devel-0:1.2.1-5.el8.x86_64", "8Base-RHOSE-4.7:network-scripts-openvswitch2.13-0:2.13.0-79.el8fdp.ppc64le", "8Base-RHOSE-4.7:network-scripts-openvswitch2.13-0:2.13.0-79.el8fdp.s390x", "8Base-RHOSE-4.7:network-scripts-openvswitch2.13-0:2.13.0-79.el8fdp.x86_64", "8Base-RHOSE-4.7:octavia-amphora-image-x86_64-0:17.0-20200606.1.el8ost.noarch", "8Base-RHOSE-4.7:openshift-clients-0:4.7.0-202102032256.p0.git.3951.0e656ef.el8.ppc64le", "8Base-RHOSE-4.7:openshift-clients-0:4.7.0-202102032256.p0.git.3951.0e656ef.el8.s390x", "8Base-RHOSE-4.7:openshift-clients-0:4.7.0-202102032256.p0.git.3951.0e656ef.el8.src", "8Base-RHOSE-4.7:openshift-clients-0:4.7.0-202102032256.p0.git.3951.0e656ef.el8.x86_64", "8Base-RHOSE-4.7:openshift-clients-redistributable-0:4.7.0-202102032256.p0.git.3951.0e656ef.el8.x86_64", "8Base-RHOSE-4.7:openshift-eventrouter-0:0.2-4.git7c289cc.el8.ppc64le", "8Base-RHOSE-4.7:openshift-eventrouter-0:0.2-4.git7c289cc.el8.s390x", "8Base-RHOSE-4.7:openshift-eventrouter-0:0.2-4.git7c289cc.el8.src", "8Base-RHOSE-4.7:openshift-eventrouter-0:0.2-4.git7c289cc.el8.x86_64", "8Base-RHOSE-4.7:openshift-eventrouter-debuginfo-0:0.2-4.git7c289cc.el8.ppc64le", "8Base-RHOSE-4.7:openshift-eventrouter-debuginfo-0:0.2-4.git7c289cc.el8.s390x", "8Base-RHOSE-4.7:openshift-eventrouter-debuginfo-0:0.2-4.git7c289cc.el8.x86_64", "8Base-RHOSE-4.7:openshift-eventrouter-debugsource-0:0.2-4.git7c289cc.el8.ppc64le", "8Base-RHOSE-4.7:openshift-eventrouter-debugsource-0:0.2-4.git7c289cc.el8.s390x", "8Base-RHOSE-4.7:openshift-eventrouter-debugsource-0:0.2-4.git7c289cc.el8.x86_64", "8Base-RHOSE-4.7:openshift-kuryr-0:4.7.0-202101262230.p0.git.2494.cd95ce5.el8.src", "8Base-RHOSE-4.7:openshift-kuryr-cni-0:4.7.0-202101262230.p0.git.2494.cd95ce5.el8.noarch", "8Base-RHOSE-4.7:openshift-kuryr-common-0:4.7.0-202101262230.p0.git.2494.cd95ce5.el8.noarch", "8Base-RHOSE-4.7:openshift-kuryr-controller-0:4.7.0-202101262230.p0.git.2494.cd95ce5.el8.noarch", "8Base-RHOSE-4.7:openstack-ironic-1:16.0.4-0.20210203051223.7d74ea0.el8.src", "8Base-RHOSE-4.7:openstack-ironic-api-1:16.0.4-0.20210203051223.7d74ea0.el8.noarch", "8Base-RHOSE-4.7:openstack-ironic-common-1:16.0.4-0.20210203051223.7d74ea0.el8.noarch", "8Base-RHOSE-4.7:openstack-ironic-conductor-1:16.0.4-0.20210203051223.7d74ea0.el8.noarch", "8Base-RHOSE-4.7:openstack-ironic-inspector-0:10.4.1-0.20201123161216.70fccec.el8.noarch", "8Base-RHOSE-4.7:openstack-ironic-inspector-0:10.4.1-0.20201123161216.70fccec.el8.src", "8Base-RHOSE-4.7:openstack-ironic-inspector-api-0:10.4.1-0.20201123161216.70fccec.el8.noarch", "8Base-RHOSE-4.7:openstack-ironic-inspector-conductor-0:10.4.1-0.20201123161216.70fccec.el8.noarch", "8Base-RHOSE-4.7:openstack-ironic-inspector-dnsmasq-0:10.4.1-0.20201123161216.70fccec.el8.noarch", "8Base-RHOSE-4.7:openstack-ironic-python-agent-0:6.4.3-0.20201217171210.bd45db1.el8.noarch", "8Base-RHOSE-4.7:openstack-ironic-python-agent-0:6.4.3-0.20201217171210.bd45db1.el8.src", "8Base-RHOSE-4.7:openvswitch2.13-0:2.13.0-79.el8fdp.ppc64le", "8Base-RHOSE-4.7:openvswitch2.13-0:2.13.0-79.el8fdp.s390x", "8Base-RHOSE-4.7:openvswitch2.13-0:2.13.0-79.el8fdp.src", "8Base-RHOSE-4.7:openvswitch2.13-0:2.13.0-79.el8fdp.x86_64", "8Base-RHOSE-4.7:openvswitch2.13-debuginfo-0:2.13.0-79.el8fdp.ppc64le", "8Base-RHOSE-4.7:openvswitch2.13-debuginfo-0:2.13.0-79.el8fdp.s390x", "8Base-RHOSE-4.7:openvswitch2.13-debuginfo-0:2.13.0-79.el8fdp.x86_64", "8Base-RHOSE-4.7:openvswitch2.13-debugsource-0:2.13.0-79.el8fdp.ppc64le", "8Base-RHOSE-4.7:openvswitch2.13-debugsource-0:2.13.0-79.el8fdp.s390x", "8Base-RHOSE-4.7:openvswitch2.13-debugsource-0:2.13.0-79.el8fdp.x86_64", "8Base-RHOSE-4.7:openvswitch2.13-devel-0:2.13.0-79.el8fdp.ppc64le", "8Base-RHOSE-4.7:openvswitch2.13-devel-0:2.13.0-79.el8fdp.s390x", "8Base-RHOSE-4.7:openvswitch2.13-devel-0:2.13.0-79.el8fdp.x86_64", "8Base-RHOSE-4.7:openvswitch2.13-test-0:2.13.0-79.el8fdp.noarch", "8Base-RHOSE-4.7:ostree-0:2020.7-1.el8.ppc64le", "8Base-RHOSE-4.7:ostree-0:2020.7-1.el8.s390x", "8Base-RHOSE-4.7:ostree-0:2020.7-1.el8.src", "8Base-RHOSE-4.7:ostree-0:2020.7-1.el8.x86_64", "8Base-RHOSE-4.7:ostree-debuginfo-0:2020.7-1.el8.ppc64le", "8Base-RHOSE-4.7:ostree-debuginfo-0:2020.7-1.el8.s390x", "8Base-RHOSE-4.7:ostree-debuginfo-0:2020.7-1.el8.x86_64", "8Base-RHOSE-4.7:ostree-debugsource-0:2020.7-1.el8.ppc64le", "8Base-RHOSE-4.7:ostree-debugsource-0:2020.7-1.el8.s390x", "8Base-RHOSE-4.7:ostree-debugsource-0:2020.7-1.el8.x86_64", "8Base-RHOSE-4.7:ostree-devel-0:2020.7-1.el8.ppc64le", "8Base-RHOSE-4.7:ostree-devel-0:2020.7-1.el8.s390x", "8Base-RHOSE-4.7:ostree-devel-0:2020.7-1.el8.x86_64", "8Base-RHOSE-4.7:ostree-grub2-0:2020.7-1.el8.ppc64le", "8Base-RHOSE-4.7:ostree-grub2-0:2020.7-1.el8.x86_64", "8Base-RHOSE-4.7:ostree-libs-0:2020.7-1.el8.ppc64le", "8Base-RHOSE-4.7:ostree-libs-0:2020.7-1.el8.s390x", "8Base-RHOSE-4.7:ostree-libs-0:2020.7-1.el8.x86_64", "8Base-RHOSE-4.7:ostree-libs-debuginfo-0:2020.7-1.el8.ppc64le", "8Base-RHOSE-4.7:ostree-libs-debuginfo-0:2020.7-1.el8.s390x", "8Base-RHOSE-4.7:ostree-libs-debuginfo-0:2020.7-1.el8.x86_64", "8Base-RHOSE-4.7:ovn2.13-0:20.09.0-21.el8fdn.ppc64le", "8Base-RHOSE-4.7:ovn2.13-0:20.09.0-21.el8fdn.s390x", "8Base-RHOSE-4.7:ovn2.13-0:20.09.0-21.el8fdn.src", "8Base-RHOSE-4.7:ovn2.13-0:20.09.0-21.el8fdn.x86_64", "8Base-RHOSE-4.7:ovn2.13-central-0:20.09.0-21.el8fdn.ppc64le", "8Base-RHOSE-4.7:ovn2.13-central-0:20.09.0-21.el8fdn.s390x", "8Base-RHOSE-4.7:ovn2.13-central-0:20.09.0-21.el8fdn.x86_64", "8Base-RHOSE-4.7:ovn2.13-central-debuginfo-0:20.09.0-21.el8fdn.ppc64le", "8Base-RHOSE-4.7:ovn2.13-central-debuginfo-0:20.09.0-21.el8fdn.s390x", "8Base-RHOSE-4.7:ovn2.13-central-debuginfo-0:20.09.0-21.el8fdn.x86_64", "8Base-RHOSE-4.7:ovn2.13-debuginfo-0:20.09.0-21.el8fdn.ppc64le", "8Base-RHOSE-4.7:ovn2.13-debuginfo-0:20.09.0-21.el8fdn.s390x", "8Base-RHOSE-4.7:ovn2.13-debuginfo-0:20.09.0-21.el8fdn.x86_64", "8Base-RHOSE-4.7:ovn2.13-debugsource-0:20.09.0-21.el8fdn.ppc64le", "8Base-RHOSE-4.7:ovn2.13-debugsource-0:20.09.0-21.el8fdn.s390x", "8Base-RHOSE-4.7:ovn2.13-debugsource-0:20.09.0-21.el8fdn.x86_64", "8Base-RHOSE-4.7:ovn2.13-host-0:20.09.0-21.el8fdn.ppc64le", "8Base-RHOSE-4.7:ovn2.13-host-0:20.09.0-21.el8fdn.s390x", "8Base-RHOSE-4.7:ovn2.13-host-0:20.09.0-21.el8fdn.x86_64", "8Base-RHOSE-4.7:ovn2.13-host-debuginfo-0:20.09.0-21.el8fdn.ppc64le", "8Base-RHOSE-4.7:ovn2.13-host-debuginfo-0:20.09.0-21.el8fdn.s390x", "8Base-RHOSE-4.7:ovn2.13-host-debuginfo-0:20.09.0-21.el8fdn.x86_64", "8Base-RHOSE-4.7:ovn2.13-vtep-0:20.09.0-21.el8fdn.ppc64le", "8Base-RHOSE-4.7:ovn2.13-vtep-0:20.09.0-21.el8fdn.s390x", "8Base-RHOSE-4.7:ovn2.13-vtep-0:20.09.0-21.el8fdn.x86_64", "8Base-RHOSE-4.7:ovn2.13-vtep-debuginfo-0:20.09.0-21.el8fdn.ppc64le", "8Base-RHOSE-4.7:ovn2.13-vtep-debuginfo-0:20.09.0-21.el8fdn.s390x", "8Base-RHOSE-4.7:ovn2.13-vtep-debuginfo-0:20.09.0-21.el8fdn.x86_64", "8Base-RHOSE-4.7:powerpc-utils-0:1.3.6-12.el8_3.ppc64le", "8Base-RHOSE-4.7:powerpc-utils-0:1.3.6-12.el8_3.src", "8Base-RHOSE-4.7:powerpc-utils-core-0:1.3.6-12.el8_3.ppc64le", "8Base-RHOSE-4.7:powerpc-utils-core-debuginfo-0:1.3.6-12.el8_3.ppc64le", "8Base-RHOSE-4.7:powerpc-utils-debugsource-0:1.3.6-12.el8_3.ppc64le", "8Base-RHOSE-4.7:pprof-0:2.6.3-2.el8ost.noarch", "8Base-RHOSE-4.7:prometheus-promu-0:0.5.0-2.git642a960.el8.ppc64le", "8Base-RHOSE-4.7:prometheus-promu-0:0.5.0-2.git642a960.el8.s390x", "8Base-RHOSE-4.7:prometheus-promu-0:0.5.0-2.git642a960.el8.x86_64", "8Base-RHOSE-4.7:protobuf-0:3.6.1-4.el8ost.ppc64le", "8Base-RHOSE-4.7:protobuf-0:3.6.1-4.el8ost.s390x", "8Base-RHOSE-4.7:protobuf-0:3.6.1-4.el8ost.src", "8Base-RHOSE-4.7:protobuf-0:3.6.1-4.el8ost.x86_64", "8Base-RHOSE-4.7:protobuf-compiler-0:3.6.1-4.el8ost.ppc64le", "8Base-RHOSE-4.7:protobuf-compiler-0:3.6.1-4.el8ost.s390x", "8Base-RHOSE-4.7:protobuf-compiler-0:3.6.1-4.el8ost.x86_64", "8Base-RHOSE-4.7:protobuf-compiler-debuginfo-0:3.6.1-4.el8ost.ppc64le", "8Base-RHOSE-4.7:protobuf-compiler-debuginfo-0:3.6.1-4.el8ost.s390x", "8Base-RHOSE-4.7:protobuf-compiler-debuginfo-0:3.6.1-4.el8ost.x86_64", "8Base-RHOSE-4.7:protobuf-debuginfo-0:3.6.1-4.el8ost.ppc64le", "8Base-RHOSE-4.7:protobuf-debuginfo-0:3.6.1-4.el8ost.s390x", "8Base-RHOSE-4.7:protobuf-debuginfo-0:3.6.1-4.el8ost.x86_64", "8Base-RHOSE-4.7:protobuf-debugsource-0:3.6.1-4.el8ost.ppc64le", "8Base-RHOSE-4.7:protobuf-debugsource-0:3.6.1-4.el8ost.s390x", "8Base-RHOSE-4.7:protobuf-debugsource-0:3.6.1-4.el8ost.x86_64", "8Base-RHOSE-4.7:protobuf-devel-0:3.6.1-4.el8ost.ppc64le", "8Base-RHOSE-4.7:protobuf-devel-0:3.6.1-4.el8ost.s390x", "8Base-RHOSE-4.7:protobuf-devel-0:3.6.1-4.el8ost.x86_64", "8Base-RHOSE-4.7:protobuf-lite-0:3.6.1-4.el8ost.ppc64le", "8Base-RHOSE-4.7:protobuf-lite-0:3.6.1-4.el8ost.s390x", "8Base-RHOSE-4.7:protobuf-lite-0:3.6.1-4.el8ost.x86_64", "8Base-RHOSE-4.7:protobuf-lite-debuginfo-0:3.6.1-4.el8ost.ppc64le", "8Base-RHOSE-4.7:protobuf-lite-debuginfo-0:3.6.1-4.el8ost.s390x", "8Base-RHOSE-4.7:protobuf-lite-debuginfo-0:3.6.1-4.el8ost.x86_64", "8Base-RHOSE-4.7:protobuf-lite-devel-0:3.6.1-4.el8ost.ppc64le", "8Base-RHOSE-4.7:protobuf-lite-devel-0:3.6.1-4.el8ost.s390x", "8Base-RHOSE-4.7:protobuf-lite-devel-0:3.6.1-4.el8ost.x86_64", "8Base-RHOSE-4.7:protobuf-lite-static-0:3.6.1-4.el8ost.ppc64le", "8Base-RHOSE-4.7:protobuf-lite-static-0:3.6.1-4.el8ost.s390x", "8Base-RHOSE-4.7:protobuf-lite-static-0:3.6.1-4.el8ost.x86_64", "8Base-RHOSE-4.7:protobuf-static-0:3.6.1-4.el8ost.ppc64le", "8Base-RHOSE-4.7:protobuf-static-0:3.6.1-4.el8ost.s390x", "8Base-RHOSE-4.7:protobuf-static-0:3.6.1-4.el8ost.x86_64", "8Base-RHOSE-4.7:protobuf-vim-0:3.6.1-4.el8ost.noarch", "8Base-RHOSE-4.7:python-alembic-0:1.4.2-5.el8ost.src", "8Base-RHOSE-4.7:python-boto3-0:1.9.101-1.el8ost.src", "8Base-RHOSE-4.7:python-botocore-0:1.12.119-1.el8ost.src", "8Base-RHOSE-4.7:python-cachetools-0:3.1.0-1.el8ost.src", "8Base-RHOSE-4.7:python-certifi-0:2018.10.15-4.el8ost.src", "8Base-RHOSE-4.7:python-construct-0:2.10.56-1.el8ost.src", "8Base-RHOSE-4.7:python-daemon-0:2.1.2-9.el8ar.src", "8Base-RHOSE-4.7:python-debtcollector-0:2.2.0-0.20201008171245.649189d.el8.src", "8Base-RHOSE-4.7:python-dictdiffer-0:0.7.1-2.el8ost.src", "8Base-RHOSE-4.7:python-eventlet-0:0.25.2-3.el8ost.src", "8Base-RHOSE-4.7:python-flask-1:1.1.1-1.el8ost.src", "8Base-RHOSE-4.7:python-flask-doc-1:1.1.1-1.el8ost.noarch", "8Base-RHOSE-4.7:python-google-auth-0:1.3.0-1.el8ost.src", "8Base-RHOSE-4.7:python-hardware-0:0.23.0-0.20201031022149.59211cc.el8.src", "8Base-RHOSE-4.7:python-ifaddr-0:0.1.6-5.el8ost.src", "8Base-RHOSE-4.7:python-importlib-metadata-0:1.7.0-1.el8ost.src", "8Base-RHOSE-4.7:python-ironic-lib-0:4.4.1-0.20201218041209.aa7cfec.el8.src", "8Base-RHOSE-4.7:python-keystoneauth1-0:4.2.0-0.20200630234358.dab8e10.el8ost.src", "8Base-RHOSE-4.7:python-kubernetes-0:11.0.0-1.el8.src", "8Base-RHOSE-4.7:python-kuryr-lib-0:1.1.1-0.20190923160834.41e6964.el8ost.src", "8Base-RHOSE-4.7:python-lockfile-1:0.11.0-8.el8ar.src", "8Base-RHOSE-4.7:python-msgpack-0:0.6.2-1.el8ost.src", "8Base-RHOSE-4.7:python-msgpack-debugsource-0:0.6.2-1.el8ost.x86_64", "8Base-RHOSE-4.7:python-openshift-1:0.11.2-1.el8.src", "8Base-RHOSE-4.7:python-openstacksdk-0:0.48.0-0.20200708092906.3b693c2.el8ost.src", "8Base-RHOSE-4.7:python-oslo-concurrency-0:4.3.0-0.20201008180343.2f78803.el8.src", "8Base-RHOSE-4.7:python-oslo-concurrency-lang-0:4.3.0-0.20201008180343.2f78803.el8.noarch", "8Base-RHOSE-4.7:python-oslo-config-2:8.3.2-0.20201008180634.fcb8894.el8.src", "8Base-RHOSE-4.7:python-oslo-context-0:3.1.1-0.20201008190523.57dbded.el8.src", "8Base-RHOSE-4.7:python-oslo-db-0:8.4.0-0.20200918104110.e42c733.el8ost.src", "8Base-RHOSE-4.7:python-oslo-db-lang-0:8.4.0-0.20200918104110.e42c733.el8ost.noarch", "8Base-RHOSE-4.7:python-oslo-i18n-0:5.0.1-0.20201009131251.73187bd.el8.src", "8Base-RHOSE-4.7:python-oslo-i18n-lang-0:5.0.1-0.20201009131251.73187bd.el8.noarch", "8Base-RHOSE-4.7:python-oslo-log-0:4.3.1-0.20201207021200.1597f24.el8.src", "8Base-RHOSE-4.7:python-oslo-log-lang-0:4.3.1-0.20201207021200.1597f24.el8.noarch", "8Base-RHOSE-4.7:python-oslo-serialization-0:4.0.1-0.20201008182423.c7884b2.el8.src", "8Base-RHOSE-4.7:python-oslo-service-0:2.4.0-0.20201008184547.58466a6.el8.src", "8Base-RHOSE-4.7:python-oslo-utils-0:4.6.0-0.20201009175936.91497da.el8.src", "8Base-RHOSE-4.7:python-oslo-utils-lang-0:4.6.0-0.20201009175936.91497da.el8.noarch", "8Base-RHOSE-4.7:python-packaging-0:20.4-1.el8ost.src", "8Base-RHOSE-4.7:python-packaging-doc-0:20.4-1.el8ost.noarch", "8Base-RHOSE-4.7:python-paste-0:3.2.4-1.el8ost.src", "8Base-RHOSE-4.7:python-paste-deploy-0:2.0.1-4.el8ost.src", "8Base-RHOSE-4.7:python-pbr-0:5.4.3-2.el8ost.src", "8Base-RHOSE-4.7:python-pexpect-0:4.6-2.el8ar.src", "8Base-RHOSE-4.7:python-pint-0:0.10.1-1.el8ost.src", "8Base-RHOSE-4.7:python-psutil-0:5.6.6-1.el8ar.src", "8Base-RHOSE-4.7:python-psutil-debugsource-0:5.6.6-1.el8ar.ppc64le", "8Base-RHOSE-4.7:python-psutil-debugsource-0:5.6.6-1.el8ar.s390x", "8Base-RHOSE-4.7:python-psutil-debugsource-0:5.6.6-1.el8ar.x86_64", "8Base-RHOSE-4.7:python-pyghmi-0:1.5.14-2.1.el8ost.src", "8Base-RHOSE-4.7:python-pyroute2-0:0.5.13-1.el8ost.src", "8Base-RHOSE-4.7:python-requests-unixsocket-0:0.1.5-5.el8ar.src", "8Base-RHOSE-4.7:python-rsa-0:4.7-1.el8.src", "8Base-RHOSE-4.7:python-ruamel-yaml-0:0.15.41-4.el8ost.src", "8Base-RHOSE-4.7:python-ruamel-yaml-debugsource-0:0.15.41-4.el8ost.ppc64le", "8Base-RHOSE-4.7:python-ruamel-yaml-debugsource-0:0.15.41-4.el8ost.s390x", "8Base-RHOSE-4.7:python-ruamel-yaml-debugsource-0:0.15.41-4.el8ost.x86_64", "8Base-RHOSE-4.7:python-s3transfer-0:0.2.0-1.el8ost.src", "8Base-RHOSE-4.7:python-stevedore-0:3.2.2-0.20201009151242.274eaa6.el8.src", "8Base-RHOSE-4.7:python-string_utils-0:0.6.0-4.el8ost.src", "8Base-RHOSE-4.7:python-sushy-0:3.6.1-0.20210122201213.7ec0422.el8.src", "8Base-RHOSE-4.7:python-sushy-oem-idrac-0:0.0.3-0.20200922221223.1202372.el8ost.src", "8Base-RHOSE-4.7:python-tenacity-0:6.2.0-1.el8ost.src", "8Base-RHOSE-4.7:python-tooz-0:2.7.0-0.20200723133754.fca43df.el8ost.src", "8Base-RHOSE-4.7:python-websocket-client-0:0.54.0-1.el8ost.src", "8Base-RHOSE-4.7:python-werkzeug-0:1.0.1-3.el8ost.src", "8Base-RHOSE-4.7:python-zeroconf-0:0.24.4-1.el8ost.src", "8Base-RHOSE-4.7:python-zipp-0:0.5.1-2.el8ost.src", "8Base-RHOSE-4.7:python2-botocore-0:1.12.119-1.el8ost.noarch", "8Base-RHOSE-4.7:python2-cachetools-0:3.1.0-1.el8ost.noarch", "8Base-RHOSE-4.7:python3-alembic-0:1.4.2-5.el8ost.noarch", "8Base-RHOSE-4.7:python3-ansible-runner-0:1.4.6-2.el8ar.noarch", "8Base-RHOSE-4.7:python3-boto3-0:1.9.101-1.el8ost.noarch", "8Base-RHOSE-4.7:python3-botocore-0:1.12.119-1.el8ost.noarch", "8Base-RHOSE-4.7:python3-cachetools-0:3.1.0-1.el8ost.noarch", "8Base-RHOSE-4.7:python3-certifi-0:2018.10.15-4.el8ost.noarch", "8Base-RHOSE-4.7:python3-construct-0:2.10.56-1.el8ost.noarch", "8Base-RHOSE-4.7:python3-daemon-0:2.1.2-9.el8ar.noarch", "8Base-RHOSE-4.7:python3-debtcollector-0:2.2.0-0.20201008171245.649189d.el8.noarch", "8Base-RHOSE-4.7:python3-dictdiffer-0:0.7.1-2.el8ost.noarch", "8Base-RHOSE-4.7:python3-eventlet-0:0.25.2-3.el8ost.noarch", "8Base-RHOSE-4.7:python3-flask-1:1.1.1-1.el8ost.noarch", "8Base-RHOSE-4.7:python3-google-auth-0:1.3.0-1.el8ost.noarch", "8Base-RHOSE-4.7:python3-grpcio-0:1.18.0-4.el8ost.ppc64le", "8Base-RHOSE-4.7:python3-grpcio-0:1.18.0-4.el8ost.s390x", "8Base-RHOSE-4.7:python3-grpcio-0:1.18.0-4.el8ost.x86_64", "8Base-RHOSE-4.7:python3-grpcio-debuginfo-0:1.18.0-4.el8ost.ppc64le", "8Base-RHOSE-4.7:python3-grpcio-debuginfo-0:1.18.0-4.el8ost.s390x", "8Base-RHOSE-4.7:python3-grpcio-debuginfo-0:1.18.0-4.el8ost.x86_64", "8Base-RHOSE-4.7:python3-hardware-0:0.23.0-0.20201031022149.59211cc.el8.noarch", "8Base-RHOSE-4.7:python3-hardware-detect-0:0.23.0-0.20201031022149.59211cc.el8.noarch", "8Base-RHOSE-4.7:python3-ifaddr-0:0.1.6-5.el8ost.noarch", "8Base-RHOSE-4.7:python3-importlib-metadata-0:1.7.0-1.el8ost.noarch", "8Base-RHOSE-4.7:python3-ironic-inspector-tests-0:10.4.1-0.20201123161216.70fccec.el8.noarch", "8Base-RHOSE-4.7:python3-ironic-lib-0:4.4.1-0.20201218041209.aa7cfec.el8.noarch", "8Base-RHOSE-4.7:python3-ironic-python-agent-0:6.4.3-0.20201217171210.bd45db1.el8.noarch", "8Base-RHOSE-4.7:python3-ironic-tests-1:16.0.4-0.20210203051223.7d74ea0.el8.noarch", "8Base-RHOSE-4.7:python3-keystoneauth1-0:4.2.0-0.20200630234358.dab8e10.el8ost.noarch", "8Base-RHOSE-4.7:python3-kubernetes-0:11.0.0-1.el8.noarch", "8Base-RHOSE-4.7:python3-kubernetes-tests-0:11.0.0-1.el8.noarch", "8Base-RHOSE-4.7:python3-kuryr-kubernetes-0:4.7.0-202101262230.p0.git.2494.cd95ce5.el8.noarch", "8Base-RHOSE-4.7:python3-kuryr-lib-0:1.1.1-0.20190923160834.41e6964.el8ost.noarch", "8Base-RHOSE-4.7:python3-kuryr-lib-tests-0:1.1.1-0.20190923160834.41e6964.el8ost.noarch", "8Base-RHOSE-4.7:python3-lockfile-1:0.11.0-8.el8ar.noarch", "8Base-RHOSE-4.7:python3-msgpack-0:0.6.2-1.el8ost.x86_64", "8Base-RHOSE-4.7:python3-msgpack-debuginfo-0:0.6.2-1.el8ost.x86_64", "8Base-RHOSE-4.7:python3-openshift-1:0.11.2-1.el8.noarch", "8Base-RHOSE-4.7:python3-openstacksdk-0:0.48.0-0.20200708092906.3b693c2.el8ost.noarch", "8Base-RHOSE-4.7:python3-openstacksdk-tests-0:0.48.0-0.20200708092906.3b693c2.el8ost.noarch", "8Base-RHOSE-4.7:python3-openvswitch2.13-0:2.13.0-79.el8fdp.ppc64le", "8Base-RHOSE-4.7:python3-openvswitch2.13-0:2.13.0-79.el8fdp.s390x", "8Base-RHOSE-4.7:python3-openvswitch2.13-0:2.13.0-79.el8fdp.x86_64", "8Base-RHOSE-4.7:python3-openvswitch2.13-debuginfo-0:2.13.0-79.el8fdp.ppc64le", "8Base-RHOSE-4.7:python3-openvswitch2.13-debuginfo-0:2.13.0-79.el8fdp.s390x", "8Base-RHOSE-4.7:python3-openvswitch2.13-debuginfo-0:2.13.0-79.el8fdp.x86_64", "8Base-RHOSE-4.7:python3-oslo-concurrency-0:4.3.0-0.20201008180343.2f78803.el8.noarch", "8Base-RHOSE-4.7:python3-oslo-concurrency-tests-0:4.3.0-0.20201008180343.2f78803.el8.noarch", "8Base-RHOSE-4.7:python3-oslo-config-2:8.3.2-0.20201008180634.fcb8894.el8.noarch", "8Base-RHOSE-4.7:python3-oslo-context-0:3.1.1-0.20201008190523.57dbded.el8.noarch", "8Base-RHOSE-4.7:python3-oslo-context-tests-0:3.1.1-0.20201008190523.57dbded.el8.noarch", "8Base-RHOSE-4.7:python3-oslo-db-0:8.4.0-0.20200918104110.e42c733.el8ost.noarch", "8Base-RHOSE-4.7:python3-oslo-db-tests-0:8.4.0-0.20200918104110.e42c733.el8ost.noarch", "8Base-RHOSE-4.7:python3-oslo-i18n-0:5.0.1-0.20201009131251.73187bd.el8.noarch", "8Base-RHOSE-4.7:python3-oslo-log-0:4.3.1-0.20201207021200.1597f24.el8.noarch", "8Base-RHOSE-4.7:python3-oslo-log-tests-0:4.3.1-0.20201207021200.1597f24.el8.noarch", "8Base-RHOSE-4.7:python3-oslo-serialization-0:4.0.1-0.20201008182423.c7884b2.el8.noarch", "8Base-RHOSE-4.7:python3-oslo-serialization-tests-0:4.0.1-0.20201008182423.c7884b2.el8.noarch", "8Base-RHOSE-4.7:python3-oslo-service-0:2.4.0-0.20201008184547.58466a6.el8.noarch", "8Base-RHOSE-4.7:python3-oslo-service-tests-0:2.4.0-0.20201008184547.58466a6.el8.noarch", "8Base-RHOSE-4.7:python3-oslo-utils-0:4.6.0-0.20201009175936.91497da.el8.noarch", "8Base-RHOSE-4.7:python3-oslo-utils-tests-0:4.6.0-0.20201009175936.91497da.el8.noarch", "8Base-RHOSE-4.7:python3-packaging-0:20.4-1.el8ost.noarch", "8Base-RHOSE-4.7:python3-paste-0:3.2.4-1.el8ost.noarch", "8Base-RHOSE-4.7:python3-paste-deploy-0:2.0.1-4.el8ost.noarch", "8Base-RHOSE-4.7:python3-pbr-0:5.4.3-2.el8ost.noarch", "8Base-RHOSE-4.7:python3-pexpect-0:4.6-2.el8ar.noarch", "8Base-RHOSE-4.7:python3-pint-0:0.10.1-1.el8ost.noarch", "8Base-RHOSE-4.7:python3-protobuf-0:3.6.1-4.el8ost.noarch", "8Base-RHOSE-4.7:python3-psutil-0:5.6.6-1.el8ar.ppc64le", "8Base-RHOSE-4.7:python3-psutil-0:5.6.6-1.el8ar.s390x", "8Base-RHOSE-4.7:python3-psutil-0:5.6.6-1.el8ar.x86_64", "8Base-RHOSE-4.7:python3-psutil-debuginfo-0:5.6.6-1.el8ar.ppc64le", "8Base-RHOSE-4.7:python3-psutil-debuginfo-0:5.6.6-1.el8ar.s390x", "8Base-RHOSE-4.7:python3-psutil-debuginfo-0:5.6.6-1.el8ar.x86_64", "8Base-RHOSE-4.7:python3-pyghmi-0:1.5.14-2.1.el8ost.noarch", "8Base-RHOSE-4.7:python3-pyroute2-0:0.5.13-1.el8ost.noarch", "8Base-RHOSE-4.7:python3-requests-unixsocket-0:0.1.5-5.el8ar.noarch", "8Base-RHOSE-4.7:python3-rsa-0:4.7-1.el8.noarch", "8Base-RHOSE-4.7:python3-ruamel-yaml-0:0.15.41-4.el8ost.ppc64le", "8Base-RHOSE-4.7:python3-ruamel-yaml-0:0.15.41-4.el8ost.s390x", "8Base-RHOSE-4.7:python3-ruamel-yaml-0:0.15.41-4.el8ost.x86_64", "8Base-RHOSE-4.7:python3-ruamel-yaml-debuginfo-0:0.15.41-4.el8ost.ppc64le", "8Base-RHOSE-4.7:python3-ruamel-yaml-debuginfo-0:0.15.41-4.el8ost.s390x", "8Base-RHOSE-4.7:python3-ruamel-yaml-debuginfo-0:0.15.41-4.el8ost.x86_64", "8Base-RHOSE-4.7:python3-s3transfer-0:0.2.0-1.el8ost.noarch", "8Base-RHOSE-4.7:python3-stevedore-0:3.2.2-0.20201009151242.274eaa6.el8.noarch", "8Base-RHOSE-4.7:python3-string_utils-0:0.6.0-4.el8ost.noarch", "8Base-RHOSE-4.7:python3-sushy-0:3.6.1-0.20210122201213.7ec0422.el8.noarch", "8Base-RHOSE-4.7:python3-sushy-oem-idrac-0:0.0.3-0.20200922221223.1202372.el8ost.noarch", "8Base-RHOSE-4.7:python3-sushy-oem-idrac-tests-0:0.0.3-0.20200922221223.1202372.el8ost.noarch", "8Base-RHOSE-4.7:python3-sushy-tests-0:3.6.1-0.20210122201213.7ec0422.el8.noarch", "8Base-RHOSE-4.7:python3-tenacity-0:6.2.0-1.el8ost.noarch", "8Base-RHOSE-4.7:python3-tooz-0:2.7.0-0.20200723133754.fca43df.el8ost.noarch", "8Base-RHOSE-4.7:python3-websocket-client-0:0.54.0-1.el8ost.noarch", "8Base-RHOSE-4.7:python3-werkzeug-0:1.0.1-3.el8ost.noarch", "8Base-RHOSE-4.7:python3-zeroconf-0:0.24.4-1.el8ost.noarch", "8Base-RHOSE-4.7:python3-zipp-0:0.5.1-2.el8ost.noarch", "8Base-RHOSE-4.7:redhat-release-coreos-0:47.83-1.el8.ppc64le", "8Base-RHOSE-4.7:redhat-release-coreos-0:47.83-1.el8.s390x", "8Base-RHOSE-4.7:redhat-release-coreos-0:47.83-1.el8.src", "8Base-RHOSE-4.7:redhat-release-coreos-0:47.83-1.el8.x86_64", "8Base-RHOSE-4.7:rhcos-tools-0:0.0.0-1.rhaos4.2.el8.noarch", "8Base-RHOSE-4.7:rhcos-tools-0:0.0.0-1.rhaos4.2.el8.src", "8Base-RHOSE-4.7:rhosp-director-images-0:17.0-20200606.1.el8ost.noarch", "8Base-RHOSE-4.7:rhosp-director-images-0:17.0-20200606.1.el8ost.src", "8Base-RHOSE-4.7:rhosp-director-images-all-0:17.0-20200606.1.el8ost.noarch", "8Base-RHOSE-4.7:rhosp-director-images-ipa-0:17.0-20200606.1.el8ost.noarch", "8Base-RHOSE-4.7:rhosp-director-images-ipa-ppc64le-0:17.0-20200606.1.el8ost.noarch", "8Base-RHOSE-4.7:rhosp-director-images-ipa-x86_64-0:17.0-20200606.1.el8ost.noarch", "8Base-RHOSE-4.7:rhosp-director-images-minimal-0:17.0-20200606.1.el8ost.noarch", "8Base-RHOSE-4.7:rhosp-director-images-ppc64le-0:17.0-20200606.1.el8ost.noarch", "8Base-RHOSE-4.7:rhosp-director-images-x86_64-0:17.0-20200606.1.el8ost.noarch", "8Base-RHOSE-4.7:rpm-ostree-0:2020.7-1.el8_3.ppc64le", "8Base-RHOSE-4.7:rpm-ostree-0:2020.7-1.el8_3.s390x", "8Base-RHOSE-4.7:rpm-ostree-0:2020.7-1.el8_3.src", "8Base-RHOSE-4.7:rpm-ostree-0:2020.7-1.el8_3.x86_64", "8Base-RHOSE-4.7:rpm-ostree-debuginfo-0:2020.7-1.el8_3.ppc64le", "8Base-RHOSE-4.7:rpm-ostree-debuginfo-0:2020.7-1.el8_3.s390x", "8Base-RHOSE-4.7:rpm-ostree-debuginfo-0:2020.7-1.el8_3.x86_64", "8Base-RHOSE-4.7:rpm-ostree-debugsource-0:2020.7-1.el8_3.ppc64le", "8Base-RHOSE-4.7:rpm-ostree-debugsource-0:2020.7-1.el8_3.s390x", "8Base-RHOSE-4.7:rpm-ostree-debugsource-0:2020.7-1.el8_3.x86_64", "8Base-RHOSE-4.7:rpm-ostree-devel-0:2020.7-1.el8_3.ppc64le", "8Base-RHOSE-4.7:rpm-ostree-devel-0:2020.7-1.el8_3.s390x", "8Base-RHOSE-4.7:rpm-ostree-devel-0:2020.7-1.el8_3.x86_64", "8Base-RHOSE-4.7:rpm-ostree-libs-0:2020.7-1.el8_3.ppc64le", "8Base-RHOSE-4.7:rpm-ostree-libs-0:2020.7-1.el8_3.s390x", "8Base-RHOSE-4.7:rpm-ostree-libs-0:2020.7-1.el8_3.x86_64", "8Base-RHOSE-4.7:rpm-ostree-libs-debuginfo-0:2020.7-1.el8_3.ppc64le", "8Base-RHOSE-4.7:rpm-ostree-libs-debuginfo-0:2020.7-1.el8_3.s390x", "8Base-RHOSE-4.7:rpm-ostree-libs-debuginfo-0:2020.7-1.el8_3.x86_64", "8Base-RHOSE-4.7:runc-0:1.0.0-82.rhaos4.6.git086e841.el8.ppc64le", "8Base-RHOSE-4.7:runc-0:1.0.0-82.rhaos4.6.git086e841.el8.s390x", "8Base-RHOSE-4.7:runc-0:1.0.0-82.rhaos4.6.git086e841.el8.src", "8Base-RHOSE-4.7:runc-0:1.0.0-82.rhaos4.6.git086e841.el8.x86_64", "8Base-RHOSE-4.7:runc-debuginfo-0:1.0.0-82.rhaos4.6.git086e841.el8.ppc64le", "8Base-RHOSE-4.7:runc-debuginfo-0:1.0.0-82.rhaos4.6.git086e841.el8.s390x", "8Base-RHOSE-4.7:runc-debuginfo-0:1.0.0-82.rhaos4.6.git086e841.el8.x86_64", "8Base-RHOSE-4.7:runc-debugsource-0:1.0.0-82.rhaos4.6.git086e841.el8.ppc64le", "8Base-RHOSE-4.7:runc-debugsource-0:1.0.0-82.rhaos4.6.git086e841.el8.s390x", "8Base-RHOSE-4.7:runc-debugsource-0:1.0.0-82.rhaos4.6.git086e841.el8.x86_64", "8Base-RHOSE-4.7:rust-afterburn-0:4.6.0-1.rhaos4.7.el8.src", "8Base-RHOSE-4.7:rust-afterburn-debugsource-0:4.6.0-1.rhaos4.7.el8.ppc64le", "8Base-RHOSE-4.7:rust-afterburn-debugsource-0:4.6.0-1.rhaos4.7.el8.s390x", "8Base-RHOSE-4.7:rust-afterburn-debugsource-0:4.6.0-1.rhaos4.7.el8.x86_64", "8Base-RHOSE-4.7:rust-bootupd-0:0.2.5-2.el8.src", "8Base-RHOSE-4.7:rust-bootupd-debugsource-0:0.2.5-2.el8.x86_64", "8Base-RHOSE-4.7:tini-0:0.16.1-1.el8ar.ppc64le", "8Base-RHOSE-4.7:tini-0:0.16.1-1.el8ar.s390x", "8Base-RHOSE-4.7:tini-0:0.16.1-1.el8ar.src", "8Base-RHOSE-4.7:tini-0:0.16.1-1.el8ar.x86_64", "8Base-RHOSE-4.7:toolbox-0:0.0.8-3.rhaos4.7.el8.noarch", "8Base-RHOSE-4.7:toolbox-0:0.0.8-3.rhaos4.7.el8.src" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-8566" }, { "category": "external", "summary": "RHBZ#1886640", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1886640" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-8566", "url": "https://www.cve.org/CVERecord?id=CVE-2020-8566" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-8566", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-8566" }, { "category": "external", "summary": "https://github.com/kubernetes/kubernetes/issues/95624", "url": "https://github.com/kubernetes/kubernetes/issues/95624" }, { "category": "external", "summary": "https://groups.google.com/g/kubernetes-announce/c/ScdmyORnPDk", "url": "https://groups.google.com/g/kubernetes-announce/c/ScdmyORnPDk" } ], "release_date": "2020-10-14T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-02-24T14:45:13+00:00", "details": "For OpenShift Container Platform 4.7 see the following documentation, which\nwill be updated shortly for this release, for important instructions on how\nto upgrade your cluster and fully apply this asynchronous errata update:\n\nhttps://docs.openshift.com/container-platform/4.7/release_notes/ocp-4-7-release-notes.html\n\nDetails on how to access this content are available at\nhttps://docs.openshift.com/container-platform/4.7/updating/updating-cluster-cli.html.", "product_ids": [ "7Server-RH7-RHOSE-4.7:openshift-0:4.7.0-202102060108.p0.git.97095.7271b90.el7.src", "7Server-RH7-RHOSE-4.7:openshift-hyperkube-0:4.7.0-202102060108.p0.git.97095.7271b90.el7.x86_64", "8Base-RHOSE-4.7:openshift-0:4.7.0-202102060108.p0.git.97095.7271b90.el8.src", "8Base-RHOSE-4.7:openshift-hyperkube-0:4.7.0-202102060108.p0.git.97095.7271b90.el8.ppc64le", "8Base-RHOSE-4.7:openshift-hyperkube-0:4.7.0-202102060108.p0.git.97095.7271b90.el8.s390x", "8Base-RHOSE-4.7:openshift-hyperkube-0:4.7.0-202102060108.p0.git.97095.7271b90.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:5634" }, { "category": "workaround", "details": "OCP Clusters not using Ceph RBD volumes are not vulnerable to this issue. For clusters using Ceph RBD volumes, this can be mitigated by ensuring the logging level is below 4 and protecting unauthorized access to cluster logs.\n\nFor OCP, the logging level for core components can be configured using operators, e.g. for kube-controller-manager:\nhttps://docs.openshift.com/container-platform/latest/rest_api/operator_apis/kubecontrollermanager-operator-openshift-io-v1.html#specification\n\nIn OCP, a logging level of \"Debug\" is equivalent to 4: \nhttps://github.com/openshift/api/blob/master/operator/v1/types.go#L96\n\nThe default logging level is \"Normal\", which is equivalent to 2. Clusters running with the default level are not vulnerable to this issue.", "product_ids": [ "7Server-RH7-RHOSE-4.7:conmon-2:2.0.21-2.rhaos4.6.el7.src", "7Server-RH7-RHOSE-4.7:conmon-2:2.0.21-2.rhaos4.6.el7.x86_64", "7Server-RH7-RHOSE-4.7:containernetworking-plugins-0:0.8.6-1.rhaos4.5.el7.src", "7Server-RH7-RHOSE-4.7:containernetworking-plugins-0:0.8.6-1.rhaos4.5.el7.x86_64", "7Server-RH7-RHOSE-4.7:containernetworking-plugins-debuginfo-0:0.8.6-1.rhaos4.5.el7.x86_64", "7Server-RH7-RHOSE-4.7:cri-o-0:1.20.0-0.rhaos4.7.git8921e00.el7.51.src", "7Server-RH7-RHOSE-4.7:cri-o-0:1.20.0-0.rhaos4.7.git8921e00.el7.51.x86_64", "7Server-RH7-RHOSE-4.7:cri-o-debuginfo-0:1.20.0-0.rhaos4.7.git8921e00.el7.51.x86_64", "7Server-RH7-RHOSE-4.7:cri-tools-0:1.18.0-3.el7.src", "7Server-RH7-RHOSE-4.7:cri-tools-0:1.18.0-3.el7.x86_64", "7Server-RH7-RHOSE-4.7:cri-tools-debuginfo-0:1.18.0-3.el7.x86_64", "7Server-RH7-RHOSE-4.7:haproxy-0:2.0.19-1.el7.src", "7Server-RH7-RHOSE-4.7:haproxy-debuginfo-0:2.0.19-1.el7.x86_64", "7Server-RH7-RHOSE-4.7:haproxy20-0:2.0.19-1.el7.x86_64", "7Server-RH7-RHOSE-4.7:jq-0:1.6-2.el7.src", "7Server-RH7-RHOSE-4.7:jq-0:1.6-2.el7.x86_64", "7Server-RH7-RHOSE-4.7:jq-debuginfo-0:1.6-2.el7.x86_64", "7Server-RH7-RHOSE-4.7:jq-devel-0:1.6-2.el7.x86_64", "7Server-RH7-RHOSE-4.7:oniguruma-0:5.9.2-5.el7.src", "7Server-RH7-RHOSE-4.7:oniguruma-0:5.9.2-5.el7.x86_64", "7Server-RH7-RHOSE-4.7:oniguruma-debuginfo-0:5.9.2-5.el7.x86_64", "7Server-RH7-RHOSE-4.7:oniguruma-devel-0:5.9.2-5.el7.x86_64", "7Server-RH7-RHOSE-4.7:openshift-0:4.7.0-202102060108.p0.git.97095.7271b90.el7.src", "7Server-RH7-RHOSE-4.7:openshift-ansible-0:4.7.0-202102032256.p0.git.0.bf7d9a7.el7.noarch", "7Server-RH7-RHOSE-4.7:openshift-ansible-0:4.7.0-202102032256.p0.git.0.bf7d9a7.el7.src", "7Server-RH7-RHOSE-4.7:openshift-ansible-test-0:4.7.0-202102032256.p0.git.0.bf7d9a7.el7.noarch", "7Server-RH7-RHOSE-4.7:openshift-clients-0:4.7.0-202102032256.p0.git.3951.0e656ef.el7.src", "7Server-RH7-RHOSE-4.7:openshift-clients-0:4.7.0-202102032256.p0.git.3951.0e656ef.el7.x86_64", "7Server-RH7-RHOSE-4.7:openshift-clients-redistributable-0:4.7.0-202102032256.p0.git.3951.0e656ef.el7.x86_64", "7Server-RH7-RHOSE-4.7:openshift-hyperkube-0:4.7.0-202102060108.p0.git.97095.7271b90.el7.x86_64", "7Server-RH7-RHOSE-4.7:python-botocore-0:1.4.57-5.el7.src", "7Server-RH7-RHOSE-4.7:python2-botocore-0:1.4.57-5.el7.noarch", "7Server-RH7-RHOSE-4.7:runc-0:1.0.0-82.rhaos4.6.git086e841.el7.src", "7Server-RH7-RHOSE-4.7:runc-0:1.0.0-82.rhaos4.6.git086e841.el7.x86_64", "7Server-RH7-RHOSE-4.7:runc-debuginfo-0:1.0.0-82.rhaos4.6.git086e841.el7.x86_64", "8Base-RHOSE-4.7:NetworkManager-1:1.26.0-12.1.rhaos4.7.el8.ppc64le", "8Base-RHOSE-4.7:NetworkManager-1:1.26.0-12.1.rhaos4.7.el8.s390x", "8Base-RHOSE-4.7:NetworkManager-1:1.26.0-12.1.rhaos4.7.el8.src", "8Base-RHOSE-4.7:NetworkManager-1:1.26.0-12.1.rhaos4.7.el8.x86_64", "8Base-RHOSE-4.7:NetworkManager-adsl-1:1.26.0-12.1.rhaos4.7.el8.ppc64le", "8Base-RHOSE-4.7:NetworkManager-adsl-1:1.26.0-12.1.rhaos4.7.el8.s390x", "8Base-RHOSE-4.7:NetworkManager-adsl-1:1.26.0-12.1.rhaos4.7.el8.x86_64", "8Base-RHOSE-4.7:NetworkManager-adsl-debuginfo-1:1.26.0-12.1.rhaos4.7.el8.ppc64le", "8Base-RHOSE-4.7:NetworkManager-adsl-debuginfo-1:1.26.0-12.1.rhaos4.7.el8.s390x", "8Base-RHOSE-4.7:NetworkManager-adsl-debuginfo-1:1.26.0-12.1.rhaos4.7.el8.x86_64", "8Base-RHOSE-4.7:NetworkManager-bluetooth-1:1.26.0-12.1.rhaos4.7.el8.ppc64le", "8Base-RHOSE-4.7:NetworkManager-bluetooth-1:1.26.0-12.1.rhaos4.7.el8.s390x", "8Base-RHOSE-4.7:NetworkManager-bluetooth-1:1.26.0-12.1.rhaos4.7.el8.x86_64", "8Base-RHOSE-4.7:NetworkManager-bluetooth-debuginfo-1:1.26.0-12.1.rhaos4.7.el8.ppc64le", "8Base-RHOSE-4.7:NetworkManager-bluetooth-debuginfo-1:1.26.0-12.1.rhaos4.7.el8.s390x", "8Base-RHOSE-4.7:NetworkManager-bluetooth-debuginfo-1:1.26.0-12.1.rhaos4.7.el8.x86_64", "8Base-RHOSE-4.7:NetworkManager-cloud-setup-1:1.26.0-12.1.rhaos4.7.el8.ppc64le", "8Base-RHOSE-4.7:NetworkManager-cloud-setup-1:1.26.0-12.1.rhaos4.7.el8.s390x", "8Base-RHOSE-4.7:NetworkManager-cloud-setup-1:1.26.0-12.1.rhaos4.7.el8.x86_64", "8Base-RHOSE-4.7:NetworkManager-cloud-setup-debuginfo-1:1.26.0-12.1.rhaos4.7.el8.ppc64le", "8Base-RHOSE-4.7:NetworkManager-cloud-setup-debuginfo-1:1.26.0-12.1.rhaos4.7.el8.s390x", "8Base-RHOSE-4.7:NetworkManager-cloud-setup-debuginfo-1:1.26.0-12.1.rhaos4.7.el8.x86_64", "8Base-RHOSE-4.7:NetworkManager-config-connectivity-redhat-1:1.26.0-12.1.rhaos4.7.el8.noarch", "8Base-RHOSE-4.7:NetworkManager-config-server-1:1.26.0-12.1.rhaos4.7.el8.noarch", "8Base-RHOSE-4.7:NetworkManager-debuginfo-1:1.26.0-12.1.rhaos4.7.el8.ppc64le", "8Base-RHOSE-4.7:NetworkManager-debuginfo-1:1.26.0-12.1.rhaos4.7.el8.s390x", "8Base-RHOSE-4.7:NetworkManager-debuginfo-1:1.26.0-12.1.rhaos4.7.el8.x86_64", "8Base-RHOSE-4.7:NetworkManager-debugsource-1:1.26.0-12.1.rhaos4.7.el8.ppc64le", "8Base-RHOSE-4.7:NetworkManager-debugsource-1:1.26.0-12.1.rhaos4.7.el8.s390x", "8Base-RHOSE-4.7:NetworkManager-debugsource-1:1.26.0-12.1.rhaos4.7.el8.x86_64", "8Base-RHOSE-4.7:NetworkManager-dispatcher-routing-rules-1:1.26.0-12.1.rhaos4.7.el8.noarch", "8Base-RHOSE-4.7:NetworkManager-libnm-1:1.26.0-12.1.rhaos4.7.el8.ppc64le", "8Base-RHOSE-4.7:NetworkManager-libnm-1:1.26.0-12.1.rhaos4.7.el8.s390x", "8Base-RHOSE-4.7:NetworkManager-libnm-1:1.26.0-12.1.rhaos4.7.el8.x86_64", "8Base-RHOSE-4.7:NetworkManager-libnm-debuginfo-1:1.26.0-12.1.rhaos4.7.el8.ppc64le", "8Base-RHOSE-4.7:NetworkManager-libnm-debuginfo-1:1.26.0-12.1.rhaos4.7.el8.s390x", "8Base-RHOSE-4.7:NetworkManager-libnm-debuginfo-1:1.26.0-12.1.rhaos4.7.el8.x86_64", "8Base-RHOSE-4.7:NetworkManager-libnm-devel-1:1.26.0-12.1.rhaos4.7.el8.ppc64le", "8Base-RHOSE-4.7:NetworkManager-libnm-devel-1:1.26.0-12.1.rhaos4.7.el8.s390x", "8Base-RHOSE-4.7:NetworkManager-libnm-devel-1:1.26.0-12.1.rhaos4.7.el8.x86_64", "8Base-RHOSE-4.7:NetworkManager-ovs-1:1.26.0-12.1.rhaos4.7.el8.ppc64le", "8Base-RHOSE-4.7:NetworkManager-ovs-1:1.26.0-12.1.rhaos4.7.el8.s390x", "8Base-RHOSE-4.7:NetworkManager-ovs-1:1.26.0-12.1.rhaos4.7.el8.x86_64", "8Base-RHOSE-4.7:NetworkManager-ovs-debuginfo-1:1.26.0-12.1.rhaos4.7.el8.ppc64le", "8Base-RHOSE-4.7:NetworkManager-ovs-debuginfo-1:1.26.0-12.1.rhaos4.7.el8.s390x", "8Base-RHOSE-4.7:NetworkManager-ovs-debuginfo-1:1.26.0-12.1.rhaos4.7.el8.x86_64", "8Base-RHOSE-4.7:NetworkManager-ppp-1:1.26.0-12.1.rhaos4.7.el8.ppc64le", "8Base-RHOSE-4.7:NetworkManager-ppp-1:1.26.0-12.1.rhaos4.7.el8.s390x", "8Base-RHOSE-4.7:NetworkManager-ppp-1:1.26.0-12.1.rhaos4.7.el8.x86_64", "8Base-RHOSE-4.7:NetworkManager-ppp-debuginfo-1:1.26.0-12.1.rhaos4.7.el8.ppc64le", "8Base-RHOSE-4.7:NetworkManager-ppp-debuginfo-1:1.26.0-12.1.rhaos4.7.el8.s390x", "8Base-RHOSE-4.7:NetworkManager-ppp-debuginfo-1:1.26.0-12.1.rhaos4.7.el8.x86_64", "8Base-RHOSE-4.7:NetworkManager-team-1:1.26.0-12.1.rhaos4.7.el8.ppc64le", "8Base-RHOSE-4.7:NetworkManager-team-1:1.26.0-12.1.rhaos4.7.el8.s390x", "8Base-RHOSE-4.7:NetworkManager-team-1:1.26.0-12.1.rhaos4.7.el8.x86_64", "8Base-RHOSE-4.7:NetworkManager-team-debuginfo-1:1.26.0-12.1.rhaos4.7.el8.ppc64le", "8Base-RHOSE-4.7:NetworkManager-team-debuginfo-1:1.26.0-12.1.rhaos4.7.el8.s390x", "8Base-RHOSE-4.7:NetworkManager-team-debuginfo-1:1.26.0-12.1.rhaos4.7.el8.x86_64", "8Base-RHOSE-4.7:NetworkManager-tui-1:1.26.0-12.1.rhaos4.7.el8.ppc64le", "8Base-RHOSE-4.7:NetworkManager-tui-1:1.26.0-12.1.rhaos4.7.el8.s390x", "8Base-RHOSE-4.7:NetworkManager-tui-1:1.26.0-12.1.rhaos4.7.el8.x86_64", "8Base-RHOSE-4.7:NetworkManager-tui-debuginfo-1:1.26.0-12.1.rhaos4.7.el8.ppc64le", "8Base-RHOSE-4.7:NetworkManager-tui-debuginfo-1:1.26.0-12.1.rhaos4.7.el8.s390x", "8Base-RHOSE-4.7:NetworkManager-tui-debuginfo-1:1.26.0-12.1.rhaos4.7.el8.x86_64", "8Base-RHOSE-4.7:NetworkManager-wifi-1:1.26.0-12.1.rhaos4.7.el8.ppc64le", "8Base-RHOSE-4.7:NetworkManager-wifi-1:1.26.0-12.1.rhaos4.7.el8.s390x", "8Base-RHOSE-4.7:NetworkManager-wifi-1:1.26.0-12.1.rhaos4.7.el8.x86_64", "8Base-RHOSE-4.7:NetworkManager-wifi-debuginfo-1:1.26.0-12.1.rhaos4.7.el8.ppc64le", "8Base-RHOSE-4.7:NetworkManager-wifi-debuginfo-1:1.26.0-12.1.rhaos4.7.el8.s390x", "8Base-RHOSE-4.7:NetworkManager-wifi-debuginfo-1:1.26.0-12.1.rhaos4.7.el8.x86_64", "8Base-RHOSE-4.7:NetworkManager-wwan-1:1.26.0-12.1.rhaos4.7.el8.ppc64le", "8Base-RHOSE-4.7:NetworkManager-wwan-1:1.26.0-12.1.rhaos4.7.el8.s390x", "8Base-RHOSE-4.7:NetworkManager-wwan-1:1.26.0-12.1.rhaos4.7.el8.x86_64", "8Base-RHOSE-4.7:NetworkManager-wwan-debuginfo-1:1.26.0-12.1.rhaos4.7.el8.ppc64le", "8Base-RHOSE-4.7:NetworkManager-wwan-debuginfo-1:1.26.0-12.1.rhaos4.7.el8.s390x", "8Base-RHOSE-4.7:NetworkManager-wwan-debuginfo-1:1.26.0-12.1.rhaos4.7.el8.x86_64", "8Base-RHOSE-4.7:afterburn-0:4.6.0-1.rhaos4.7.el8.ppc64le", "8Base-RHOSE-4.7:afterburn-0:4.6.0-1.rhaos4.7.el8.s390x", "8Base-RHOSE-4.7:afterburn-0:4.6.0-1.rhaos4.7.el8.x86_64", "8Base-RHOSE-4.7:afterburn-debuginfo-0:4.6.0-1.rhaos4.7.el8.ppc64le", "8Base-RHOSE-4.7:afterburn-debuginfo-0:4.6.0-1.rhaos4.7.el8.s390x", "8Base-RHOSE-4.7:afterburn-debuginfo-0:4.6.0-1.rhaos4.7.el8.x86_64", "8Base-RHOSE-4.7:ansible-runner-0:1.4.6-2.el8ar.noarch", "8Base-RHOSE-4.7:ansible-runner-0:1.4.6-2.el8ar.src", "8Base-RHOSE-4.7:ansible-runner-http-0:1.0.0-2.el8ar.noarch", "8Base-RHOSE-4.7:ansible-runner-http-0:1.0.0-2.el8ar.src", "8Base-RHOSE-4.7:atomic-openshift-service-idler-0:4.7.0-202011171454.p0.git.15.675c1c8.el8.ppc64le", "8Base-RHOSE-4.7:atomic-openshift-service-idler-0:4.7.0-202011171454.p0.git.15.675c1c8.el8.s390x", "8Base-RHOSE-4.7:atomic-openshift-service-idler-0:4.7.0-202011171454.p0.git.15.675c1c8.el8.src", "8Base-RHOSE-4.7:atomic-openshift-service-idler-0:4.7.0-202011171454.p0.git.15.675c1c8.el8.x86_64", "8Base-RHOSE-4.7:bootupd-0:0.2.5-2.el8.x86_64", "8Base-RHOSE-4.7:bootupd-debuginfo-0:0.2.5-2.el8.x86_64", "8Base-RHOSE-4.7:clevis-0:15-1.el8.ppc64le", "8Base-RHOSE-4.7:clevis-0:15-1.el8.s390x", "8Base-RHOSE-4.7:clevis-0:15-1.el8.src", "8Base-RHOSE-4.7:clevis-0:15-1.el8.x86_64", "8Base-RHOSE-4.7:clevis-debuginfo-0:15-1.el8.ppc64le", "8Base-RHOSE-4.7:clevis-debuginfo-0:15-1.el8.s390x", "8Base-RHOSE-4.7:clevis-debuginfo-0:15-1.el8.x86_64", "8Base-RHOSE-4.7:clevis-debugsource-0:15-1.el8.ppc64le", "8Base-RHOSE-4.7:clevis-debugsource-0:15-1.el8.s390x", "8Base-RHOSE-4.7:clevis-debugsource-0:15-1.el8.x86_64", "8Base-RHOSE-4.7:clevis-dracut-0:15-1.el8.ppc64le", "8Base-RHOSE-4.7:clevis-dracut-0:15-1.el8.s390x", "8Base-RHOSE-4.7:clevis-dracut-0:15-1.el8.x86_64", "8Base-RHOSE-4.7:clevis-luks-0:15-1.el8.ppc64le", "8Base-RHOSE-4.7:clevis-luks-0:15-1.el8.s390x", "8Base-RHOSE-4.7:clevis-luks-0:15-1.el8.x86_64", "8Base-RHOSE-4.7:clevis-systemd-0:15-1.el8.ppc64le", "8Base-RHOSE-4.7:clevis-systemd-0:15-1.el8.s390x", "8Base-RHOSE-4.7:clevis-systemd-0:15-1.el8.x86_64", "8Base-RHOSE-4.7:clevis-udisks2-0:15-1.el8.ppc64le", "8Base-RHOSE-4.7:clevis-udisks2-0:15-1.el8.s390x", "8Base-RHOSE-4.7:clevis-udisks2-0:15-1.el8.x86_64", "8Base-RHOSE-4.7:clevis-udisks2-debuginfo-0:15-1.el8.ppc64le", "8Base-RHOSE-4.7:clevis-udisks2-debuginfo-0:15-1.el8.s390x", "8Base-RHOSE-4.7:clevis-udisks2-debuginfo-0:15-1.el8.x86_64", "8Base-RHOSE-4.7:conmon-2:2.0.21-2.rhaos4.6.el8.ppc64le", "8Base-RHOSE-4.7:conmon-2:2.0.21-2.rhaos4.6.el8.s390x", "8Base-RHOSE-4.7:conmon-2:2.0.21-2.rhaos4.6.el8.src", "8Base-RHOSE-4.7:conmon-2:2.0.21-2.rhaos4.6.el8.x86_64", "8Base-RHOSE-4.7:console-login-helper-messages-0:0.20.3-1.rhaos4.7.el8.noarch", "8Base-RHOSE-4.7:console-login-helper-messages-0:0.20.3-1.rhaos4.7.el8.src", "8Base-RHOSE-4.7:console-login-helper-messages-issuegen-0:0.20.3-1.rhaos4.7.el8.noarch", "8Base-RHOSE-4.7:console-login-helper-messages-profile-0:0.20.3-1.rhaos4.7.el8.noarch", "8Base-RHOSE-4.7:container-selinux-2:2.151.0-1.rhaos4.7.el8.noarch", "8Base-RHOSE-4.7:container-selinux-2:2.151.0-1.rhaos4.7.el8.src", "8Base-RHOSE-4.7:containernetworking-plugins-0:0.8.6-1.rhaos4.5.el8.ppc64le", "8Base-RHOSE-4.7:containernetworking-plugins-0:0.8.6-1.rhaos4.5.el8.s390x", "8Base-RHOSE-4.7:containernetworking-plugins-0:0.8.6-1.rhaos4.5.el8.src", "8Base-RHOSE-4.7:containernetworking-plugins-0:0.8.6-1.rhaos4.5.el8.x86_64", "8Base-RHOSE-4.7:containernetworking-plugins-debuginfo-0:0.8.6-1.rhaos4.5.el8.ppc64le", "8Base-RHOSE-4.7:containernetworking-plugins-debuginfo-0:0.8.6-1.rhaos4.5.el8.s390x", "8Base-RHOSE-4.7:containernetworking-plugins-debuginfo-0:0.8.6-1.rhaos4.5.el8.x86_64", "8Base-RHOSE-4.7:containernetworking-plugins-debugsource-0:0.8.6-1.rhaos4.5.el8.ppc64le", "8Base-RHOSE-4.7:containernetworking-plugins-debugsource-0:0.8.6-1.rhaos4.5.el8.s390x", "8Base-RHOSE-4.7:containernetworking-plugins-debugsource-0:0.8.6-1.rhaos4.5.el8.x86_64", "8Base-RHOSE-4.7:coreos-installer-0:0.8.0-3.rhaos4.7.el8.ppc64le", "8Base-RHOSE-4.7:coreos-installer-0:0.8.0-3.rhaos4.7.el8.s390x", "8Base-RHOSE-4.7:coreos-installer-0:0.8.0-3.rhaos4.7.el8.src", "8Base-RHOSE-4.7:coreos-installer-0:0.8.0-3.rhaos4.7.el8.x86_64", "8Base-RHOSE-4.7:coreos-installer-bootinfra-0:0.8.0-3.rhaos4.7.el8.ppc64le", "8Base-RHOSE-4.7:coreos-installer-bootinfra-0:0.8.0-3.rhaos4.7.el8.s390x", "8Base-RHOSE-4.7:coreos-installer-bootinfra-debuginfo-0:0.8.0-3.rhaos4.7.el8.ppc64le", "8Base-RHOSE-4.7:coreos-installer-bootinfra-debuginfo-0:0.8.0-3.rhaos4.7.el8.s390x", "8Base-RHOSE-4.7:coreos-installer-bootinfra-debuginfo-0:0.8.0-3.rhaos4.7.el8.x86_64", "8Base-RHOSE-4.7:coreos-installer-debuginfo-0:0.8.0-3.rhaos4.7.el8.ppc64le", "8Base-RHOSE-4.7:coreos-installer-debuginfo-0:0.8.0-3.rhaos4.7.el8.s390x", "8Base-RHOSE-4.7:coreos-installer-debuginfo-0:0.8.0-3.rhaos4.7.el8.x86_64", "8Base-RHOSE-4.7:coreos-installer-debugsource-0:0.8.0-3.rhaos4.7.el8.ppc64le", "8Base-RHOSE-4.7:coreos-installer-debugsource-0:0.8.0-3.rhaos4.7.el8.s390x", "8Base-RHOSE-4.7:coreos-installer-debugsource-0:0.8.0-3.rhaos4.7.el8.x86_64", "8Base-RHOSE-4.7:cri-o-0:1.20.0-0.rhaos4.7.git8921e00.el8.51.ppc64le", "8Base-RHOSE-4.7:cri-o-0:1.20.0-0.rhaos4.7.git8921e00.el8.51.s390x", "8Base-RHOSE-4.7:cri-o-0:1.20.0-0.rhaos4.7.git8921e00.el8.51.src", "8Base-RHOSE-4.7:cri-o-0:1.20.0-0.rhaos4.7.git8921e00.el8.51.x86_64", "8Base-RHOSE-4.7:cri-o-debuginfo-0:1.20.0-0.rhaos4.7.git8921e00.el8.51.ppc64le", "8Base-RHOSE-4.7:cri-o-debuginfo-0:1.20.0-0.rhaos4.7.git8921e00.el8.51.s390x", "8Base-RHOSE-4.7:cri-o-debuginfo-0:1.20.0-0.rhaos4.7.git8921e00.el8.51.x86_64", "8Base-RHOSE-4.7:cri-o-debugsource-0:1.20.0-0.rhaos4.7.git8921e00.el8.51.ppc64le", "8Base-RHOSE-4.7:cri-o-debugsource-0:1.20.0-0.rhaos4.7.git8921e00.el8.51.s390x", "8Base-RHOSE-4.7:cri-o-debugsource-0:1.20.0-0.rhaos4.7.git8921e00.el8.51.x86_64", "8Base-RHOSE-4.7:cri-tools-0:1.20.0-1.el8.ppc64le", "8Base-RHOSE-4.7:cri-tools-0:1.20.0-1.el8.s390x", "8Base-RHOSE-4.7:cri-tools-0:1.20.0-1.el8.src", "8Base-RHOSE-4.7:cri-tools-0:1.20.0-1.el8.x86_64", "8Base-RHOSE-4.7:cri-tools-debuginfo-0:1.20.0-1.el8.ppc64le", "8Base-RHOSE-4.7:cri-tools-debuginfo-0:1.20.0-1.el8.s390x", "8Base-RHOSE-4.7:cri-tools-debuginfo-0:1.20.0-1.el8.x86_64", "8Base-RHOSE-4.7:cri-tools-debugsource-0:1.20.0-1.el8.ppc64le", "8Base-RHOSE-4.7:cri-tools-debugsource-0:1.20.0-1.el8.s390x", "8Base-RHOSE-4.7:cri-tools-debugsource-0:1.20.0-1.el8.x86_64", "8Base-RHOSE-4.7:dracut-0:049-95.git20200804.el8_3.4.ppc64le", "8Base-RHOSE-4.7:dracut-0:049-95.git20200804.el8_3.4.s390x", "8Base-RHOSE-4.7:dracut-0:049-95.git20200804.el8_3.4.src", "8Base-RHOSE-4.7:dracut-0:049-95.git20200804.el8_3.4.x86_64", "8Base-RHOSE-4.7:dracut-caps-0:049-95.git20200804.el8_3.4.ppc64le", "8Base-RHOSE-4.7:dracut-caps-0:049-95.git20200804.el8_3.4.s390x", "8Base-RHOSE-4.7:dracut-caps-0:049-95.git20200804.el8_3.4.x86_64", "8Base-RHOSE-4.7:dracut-config-generic-0:049-95.git20200804.el8_3.4.ppc64le", "8Base-RHOSE-4.7:dracut-config-generic-0:049-95.git20200804.el8_3.4.s390x", "8Base-RHOSE-4.7:dracut-config-generic-0:049-95.git20200804.el8_3.4.x86_64", "8Base-RHOSE-4.7:dracut-config-rescue-0:049-95.git20200804.el8_3.4.ppc64le", "8Base-RHOSE-4.7:dracut-config-rescue-0:049-95.git20200804.el8_3.4.s390x", "8Base-RHOSE-4.7:dracut-config-rescue-0:049-95.git20200804.el8_3.4.x86_64", "8Base-RHOSE-4.7:dracut-debuginfo-0:049-95.git20200804.el8_3.4.ppc64le", "8Base-RHOSE-4.7:dracut-debuginfo-0:049-95.git20200804.el8_3.4.s390x", "8Base-RHOSE-4.7:dracut-debuginfo-0:049-95.git20200804.el8_3.4.x86_64", "8Base-RHOSE-4.7:dracut-debugsource-0:049-95.git20200804.el8_3.4.ppc64le", "8Base-RHOSE-4.7:dracut-debugsource-0:049-95.git20200804.el8_3.4.s390x", "8Base-RHOSE-4.7:dracut-debugsource-0:049-95.git20200804.el8_3.4.x86_64", "8Base-RHOSE-4.7:dracut-live-0:049-95.git20200804.el8_3.4.ppc64le", "8Base-RHOSE-4.7:dracut-live-0:049-95.git20200804.el8_3.4.s390x", "8Base-RHOSE-4.7:dracut-live-0:049-95.git20200804.el8_3.4.x86_64", "8Base-RHOSE-4.7:dracut-network-0:049-95.git20200804.el8_3.4.ppc64le", "8Base-RHOSE-4.7:dracut-network-0:049-95.git20200804.el8_3.4.s390x", "8Base-RHOSE-4.7:dracut-network-0:049-95.git20200804.el8_3.4.x86_64", "8Base-RHOSE-4.7:dracut-squash-0:049-95.git20200804.el8_3.4.ppc64le", "8Base-RHOSE-4.7:dracut-squash-0:049-95.git20200804.el8_3.4.s390x", "8Base-RHOSE-4.7:dracut-squash-0:049-95.git20200804.el8_3.4.x86_64", "8Base-RHOSE-4.7:dracut-tools-0:049-95.git20200804.el8_3.4.ppc64le", "8Base-RHOSE-4.7:dracut-tools-0:049-95.git20200804.el8_3.4.s390x", "8Base-RHOSE-4.7:dracut-tools-0:049-95.git20200804.el8_3.4.x86_64", "8Base-RHOSE-4.7:faq-0:0.0.6-5.el8.ppc64le", "8Base-RHOSE-4.7:faq-0:0.0.6-5.el8.s390x", "8Base-RHOSE-4.7:faq-0:0.0.6-5.el8.src", "8Base-RHOSE-4.7:faq-0:0.0.6-5.el8.x86_64", "8Base-RHOSE-4.7:golang-github-prometheus-promu-0:0.5.0-2.git642a960.el8.ppc64le", "8Base-RHOSE-4.7:golang-github-prometheus-promu-0:0.5.0-2.git642a960.el8.s390x", "8Base-RHOSE-4.7:golang-github-prometheus-promu-0:0.5.0-2.git642a960.el8.src", "8Base-RHOSE-4.7:golang-github-prometheus-promu-0:0.5.0-2.git642a960.el8.x86_64", "8Base-RHOSE-4.7:gperftools-0:2.6.3-2.el8ost.ppc64le", "8Base-RHOSE-4.7:gperftools-0:2.6.3-2.el8ost.s390x", "8Base-RHOSE-4.7:gperftools-0:2.6.3-2.el8ost.src", "8Base-RHOSE-4.7:gperftools-0:2.6.3-2.el8ost.x86_64", "8Base-RHOSE-4.7:gperftools-debugsource-0:2.6.3-2.el8ost.ppc64le", "8Base-RHOSE-4.7:gperftools-debugsource-0:2.6.3-2.el8ost.s390x", "8Base-RHOSE-4.7:gperftools-debugsource-0:2.6.3-2.el8ost.x86_64", "8Base-RHOSE-4.7:gperftools-devel-0:2.6.3-2.el8ost.ppc64le", "8Base-RHOSE-4.7:gperftools-devel-0:2.6.3-2.el8ost.s390x", "8Base-RHOSE-4.7:gperftools-devel-0:2.6.3-2.el8ost.x86_64", "8Base-RHOSE-4.7:gperftools-libs-0:2.6.3-2.el8ost.ppc64le", "8Base-RHOSE-4.7:gperftools-libs-0:2.6.3-2.el8ost.s390x", "8Base-RHOSE-4.7:gperftools-libs-0:2.6.3-2.el8ost.x86_64", "8Base-RHOSE-4.7:gperftools-libs-debuginfo-0:2.6.3-2.el8ost.ppc64le", "8Base-RHOSE-4.7:gperftools-libs-debuginfo-0:2.6.3-2.el8ost.s390x", "8Base-RHOSE-4.7:gperftools-libs-debuginfo-0:2.6.3-2.el8ost.x86_64", "8Base-RHOSE-4.7:grpc-0:1.18.0-4.el8ost.ppc64le", "8Base-RHOSE-4.7:grpc-0:1.18.0-4.el8ost.s390x", "8Base-RHOSE-4.7:grpc-0:1.18.0-4.el8ost.src", "8Base-RHOSE-4.7:grpc-0:1.18.0-4.el8ost.x86_64", "8Base-RHOSE-4.7:grpc-cli-0:1.18.0-4.el8ost.ppc64le", "8Base-RHOSE-4.7:grpc-cli-0:1.18.0-4.el8ost.s390x", "8Base-RHOSE-4.7:grpc-cli-0:1.18.0-4.el8ost.x86_64", "8Base-RHOSE-4.7:grpc-cli-debuginfo-0:1.18.0-4.el8ost.ppc64le", "8Base-RHOSE-4.7:grpc-cli-debuginfo-0:1.18.0-4.el8ost.s390x", "8Base-RHOSE-4.7:grpc-cli-debuginfo-0:1.18.0-4.el8ost.x86_64", "8Base-RHOSE-4.7:grpc-debuginfo-0:1.18.0-4.el8ost.ppc64le", "8Base-RHOSE-4.7:grpc-debuginfo-0:1.18.0-4.el8ost.s390x", "8Base-RHOSE-4.7:grpc-debuginfo-0:1.18.0-4.el8ost.x86_64", "8Base-RHOSE-4.7:grpc-debugsource-0:1.18.0-4.el8ost.ppc64le", "8Base-RHOSE-4.7:grpc-debugsource-0:1.18.0-4.el8ost.s390x", "8Base-RHOSE-4.7:grpc-debugsource-0:1.18.0-4.el8ost.x86_64", "8Base-RHOSE-4.7:grpc-devel-0:1.18.0-4.el8ost.ppc64le", "8Base-RHOSE-4.7:grpc-devel-0:1.18.0-4.el8ost.s390x", "8Base-RHOSE-4.7:grpc-devel-0:1.18.0-4.el8ost.x86_64", "8Base-RHOSE-4.7:grpc-plugins-0:1.18.0-4.el8ost.ppc64le", "8Base-RHOSE-4.7:grpc-plugins-0:1.18.0-4.el8ost.s390x", "8Base-RHOSE-4.7:grpc-plugins-0:1.18.0-4.el8ost.x86_64", "8Base-RHOSE-4.7:grpc-plugins-debuginfo-0:1.18.0-4.el8ost.ppc64le", "8Base-RHOSE-4.7:grpc-plugins-debuginfo-0:1.18.0-4.el8ost.s390x", "8Base-RHOSE-4.7:grpc-plugins-debuginfo-0:1.18.0-4.el8ost.x86_64", "8Base-RHOSE-4.7:haproxy-0:2.0.19-1.el8.src", "8Base-RHOSE-4.7:haproxy-debugsource-0:2.0.19-1.el8.ppc64le", "8Base-RHOSE-4.7:haproxy-debugsource-0:2.0.19-1.el8.s390x", "8Base-RHOSE-4.7:haproxy-debugsource-0:2.0.19-1.el8.x86_64", "8Base-RHOSE-4.7:haproxy20-0:2.0.19-1.el8.ppc64le", "8Base-RHOSE-4.7:haproxy20-0:2.0.19-1.el8.s390x", "8Base-RHOSE-4.7:haproxy20-0:2.0.19-1.el8.x86_64", "8Base-RHOSE-4.7:haproxy20-debuginfo-0:2.0.19-1.el8.ppc64le", "8Base-RHOSE-4.7:haproxy20-debuginfo-0:2.0.19-1.el8.s390x", "8Base-RHOSE-4.7:haproxy20-debuginfo-0:2.0.19-1.el8.x86_64", "8Base-RHOSE-4.7:ignition-0:2.9.0-2.rhaos4.7.git1d56dc8.el8.ppc64le", "8Base-RHOSE-4.7:ignition-0:2.9.0-2.rhaos4.7.git1d56dc8.el8.s390x", "8Base-RHOSE-4.7:ignition-0:2.9.0-2.rhaos4.7.git1d56dc8.el8.src", "8Base-RHOSE-4.7:ignition-0:2.9.0-2.rhaos4.7.git1d56dc8.el8.x86_64", "8Base-RHOSE-4.7:ignition-debuginfo-0:2.9.0-2.rhaos4.7.git1d56dc8.el8.ppc64le", "8Base-RHOSE-4.7:ignition-debuginfo-0:2.9.0-2.rhaos4.7.git1d56dc8.el8.s390x", "8Base-RHOSE-4.7:ignition-debuginfo-0:2.9.0-2.rhaos4.7.git1d56dc8.el8.x86_64", "8Base-RHOSE-4.7:ignition-debugsource-0:2.9.0-2.rhaos4.7.git1d56dc8.el8.ppc64le", "8Base-RHOSE-4.7:ignition-debugsource-0:2.9.0-2.rhaos4.7.git1d56dc8.el8.s390x", "8Base-RHOSE-4.7:ignition-debugsource-0:2.9.0-2.rhaos4.7.git1d56dc8.el8.x86_64", "8Base-RHOSE-4.7:ignition-validate-0:2.9.0-2.rhaos4.7.git1d56dc8.el8.ppc64le", "8Base-RHOSE-4.7:ignition-validate-0:2.9.0-2.rhaos4.7.git1d56dc8.el8.s390x", "8Base-RHOSE-4.7:ignition-validate-0:2.9.0-2.rhaos4.7.git1d56dc8.el8.x86_64", "8Base-RHOSE-4.7:ignition-validate-debuginfo-0:2.9.0-2.rhaos4.7.git1d56dc8.el8.ppc64le", "8Base-RHOSE-4.7:ignition-validate-debuginfo-0:2.9.0-2.rhaos4.7.git1d56dc8.el8.s390x", "8Base-RHOSE-4.7:ignition-validate-debuginfo-0:2.9.0-2.rhaos4.7.git1d56dc8.el8.x86_64", "8Base-RHOSE-4.7:inotify-tools-0:3.20.1-2.el8.ppc64le", "8Base-RHOSE-4.7:inotify-tools-0:3.20.1-2.el8.s390x", "8Base-RHOSE-4.7:inotify-tools-0:3.20.1-2.el8.src", "8Base-RHOSE-4.7:inotify-tools-0:3.20.1-2.el8.x86_64", "8Base-RHOSE-4.7:inotify-tools-debuginfo-0:3.20.1-2.el8.ppc64le", "8Base-RHOSE-4.7:inotify-tools-debuginfo-0:3.20.1-2.el8.s390x", "8Base-RHOSE-4.7:inotify-tools-debuginfo-0:3.20.1-2.el8.x86_64", "8Base-RHOSE-4.7:inotify-tools-debugsource-0:3.20.1-2.el8.ppc64le", "8Base-RHOSE-4.7:inotify-tools-debugsource-0:3.20.1-2.el8.s390x", "8Base-RHOSE-4.7:inotify-tools-debugsource-0:3.20.1-2.el8.x86_64", "8Base-RHOSE-4.7:inotify-tools-devel-0:3.20.1-2.el8.ppc64le", "8Base-RHOSE-4.7:inotify-tools-devel-0:3.20.1-2.el8.s390x", "8Base-RHOSE-4.7:inotify-tools-devel-0:3.20.1-2.el8.x86_64", "8Base-RHOSE-4.7:ironic-images-0:15.1-20210114.1.el8.noarch", "8Base-RHOSE-4.7:ironic-images-0:15.1-20210114.1.el8.src", "8Base-RHOSE-4.7:ironic-images-all-0:15.1-20210114.1.el8.noarch", "8Base-RHOSE-4.7:ironic-images-ipa-ppc64le-0:15.1-20210114.1.el8.noarch", "8Base-RHOSE-4.7:ironic-images-ipa-x86_64-0:15.1-20210114.1.el8.noarch", "8Base-RHOSE-4.7:jenkins-0:2.263.3.1612449007-1.el8.noarch", "8Base-RHOSE-4.7:jenkins-0:2.263.3.1612449007-1.el8.src", "8Base-RHOSE-4.7:jenkins-2-plugins-0:4.7.1611636915-1.el8.noarch", "8Base-RHOSE-4.7:jenkins-2-plugins-0:4.7.1611636915-1.el8.src", "8Base-RHOSE-4.7:jq-0:1.6-2.el8.ppc64le", "8Base-RHOSE-4.7:jq-0:1.6-2.el8.s390x", "8Base-RHOSE-4.7:jq-0:1.6-2.el8.src", "8Base-RHOSE-4.7:jq-0:1.6-2.el8.x86_64", "8Base-RHOSE-4.7:jq-debuginfo-0:1.6-2.el8.ppc64le", "8Base-RHOSE-4.7:jq-debuginfo-0:1.6-2.el8.s390x", "8Base-RHOSE-4.7:jq-debuginfo-0:1.6-2.el8.x86_64", "8Base-RHOSE-4.7:jq-debugsource-0:1.6-2.el8.ppc64le", "8Base-RHOSE-4.7:jq-debugsource-0:1.6-2.el8.s390x", "8Base-RHOSE-4.7:jq-debugsource-0:1.6-2.el8.x86_64", "8Base-RHOSE-4.7:jq-devel-0:1.6-2.el8.ppc64le", "8Base-RHOSE-4.7:jq-devel-0:1.6-2.el8.s390x", "8Base-RHOSE-4.7:jq-devel-0:1.6-2.el8.x86_64", "8Base-RHOSE-4.7:kuryr-binding-scripts-0:1.1.1-0.20190923160834.41e6964.el8ost.noarch", "8Base-RHOSE-4.7:libnftnl-0:1.1.5-4.el8.ppc64le", "8Base-RHOSE-4.7:libnftnl-0:1.1.5-4.el8.s390x", "8Base-RHOSE-4.7:libnftnl-0:1.1.5-4.el8.src", "8Base-RHOSE-4.7:libnftnl-0:1.1.5-4.el8.x86_64", "8Base-RHOSE-4.7:libnftnl-debuginfo-0:1.1.5-4.el8.ppc64le", "8Base-RHOSE-4.7:libnftnl-debuginfo-0:1.1.5-4.el8.s390x", "8Base-RHOSE-4.7:libnftnl-debuginfo-0:1.1.5-4.el8.x86_64", "8Base-RHOSE-4.7:libnftnl-debugsource-0:1.1.5-4.el8.ppc64le", "8Base-RHOSE-4.7:libnftnl-debugsource-0:1.1.5-4.el8.s390x", "8Base-RHOSE-4.7:libnftnl-debugsource-0:1.1.5-4.el8.x86_64", "8Base-RHOSE-4.7:libnftnl-devel-0:1.1.5-4.el8.ppc64le", "8Base-RHOSE-4.7:libnftnl-devel-0:1.1.5-4.el8.s390x", "8Base-RHOSE-4.7:libnftnl-devel-0:1.1.5-4.el8.x86_64", "8Base-RHOSE-4.7:libsodium-0:1.0.16-4.5.el8ost.ppc64le", "8Base-RHOSE-4.7:libsodium-0:1.0.16-4.5.el8ost.s390x", "8Base-RHOSE-4.7:libsodium-0:1.0.16-4.5.el8ost.src", "8Base-RHOSE-4.7:libsodium-0:1.0.16-4.5.el8ost.x86_64", "8Base-RHOSE-4.7:libsodium-debuginfo-0:1.0.16-4.5.el8ost.ppc64le", "8Base-RHOSE-4.7:libsodium-debuginfo-0:1.0.16-4.5.el8ost.s390x", "8Base-RHOSE-4.7:libsodium-debuginfo-0:1.0.16-4.5.el8ost.x86_64", "8Base-RHOSE-4.7:libsodium-debugsource-0:1.0.16-4.5.el8ost.ppc64le", "8Base-RHOSE-4.7:libsodium-debugsource-0:1.0.16-4.5.el8ost.s390x", "8Base-RHOSE-4.7:libsodium-debugsource-0:1.0.16-4.5.el8ost.x86_64", "8Base-RHOSE-4.7:libsodium-devel-0:1.0.16-4.5.el8ost.ppc64le", "8Base-RHOSE-4.7:libsodium-devel-0:1.0.16-4.5.el8ost.s390x", "8Base-RHOSE-4.7:libsodium-devel-0:1.0.16-4.5.el8ost.x86_64", "8Base-RHOSE-4.7:libsodium-static-0:1.0.16-4.5.el8ost.ppc64le", "8Base-RHOSE-4.7:libsodium-static-0:1.0.16-4.5.el8ost.s390x", "8Base-RHOSE-4.7:libsodium-static-0:1.0.16-4.5.el8ost.x86_64", "8Base-RHOSE-4.7:libunwind-0:1.2.1-5.el8.ppc64le", "8Base-RHOSE-4.7:libunwind-0:1.2.1-5.el8.src", "8Base-RHOSE-4.7:libunwind-0:1.2.1-5.el8.x86_64", "8Base-RHOSE-4.7:libunwind-debuginfo-0:1.2.1-5.el8.ppc64le", "8Base-RHOSE-4.7:libunwind-debuginfo-0:1.2.1-5.el8.x86_64", "8Base-RHOSE-4.7:libunwind-debugsource-0:1.2.1-5.el8.ppc64le", "8Base-RHOSE-4.7:libunwind-debugsource-0:1.2.1-5.el8.x86_64", "8Base-RHOSE-4.7:libunwind-devel-0:1.2.1-5.el8.ppc64le", "8Base-RHOSE-4.7:libunwind-devel-0:1.2.1-5.el8.x86_64", "8Base-RHOSE-4.7:network-scripts-openvswitch2.13-0:2.13.0-79.el8fdp.ppc64le", "8Base-RHOSE-4.7:network-scripts-openvswitch2.13-0:2.13.0-79.el8fdp.s390x", "8Base-RHOSE-4.7:network-scripts-openvswitch2.13-0:2.13.0-79.el8fdp.x86_64", "8Base-RHOSE-4.7:octavia-amphora-image-x86_64-0:17.0-20200606.1.el8ost.noarch", "8Base-RHOSE-4.7:openshift-0:4.7.0-202102060108.p0.git.97095.7271b90.el8.src", "8Base-RHOSE-4.7:openshift-clients-0:4.7.0-202102032256.p0.git.3951.0e656ef.el8.ppc64le", "8Base-RHOSE-4.7:openshift-clients-0:4.7.0-202102032256.p0.git.3951.0e656ef.el8.s390x", "8Base-RHOSE-4.7:openshift-clients-0:4.7.0-202102032256.p0.git.3951.0e656ef.el8.src", "8Base-RHOSE-4.7:openshift-clients-0:4.7.0-202102032256.p0.git.3951.0e656ef.el8.x86_64", "8Base-RHOSE-4.7:openshift-clients-redistributable-0:4.7.0-202102032256.p0.git.3951.0e656ef.el8.x86_64", "8Base-RHOSE-4.7:openshift-eventrouter-0:0.2-4.git7c289cc.el8.ppc64le", "8Base-RHOSE-4.7:openshift-eventrouter-0:0.2-4.git7c289cc.el8.s390x", "8Base-RHOSE-4.7:openshift-eventrouter-0:0.2-4.git7c289cc.el8.src", "8Base-RHOSE-4.7:openshift-eventrouter-0:0.2-4.git7c289cc.el8.x86_64", "8Base-RHOSE-4.7:openshift-eventrouter-debuginfo-0:0.2-4.git7c289cc.el8.ppc64le", "8Base-RHOSE-4.7:openshift-eventrouter-debuginfo-0:0.2-4.git7c289cc.el8.s390x", "8Base-RHOSE-4.7:openshift-eventrouter-debuginfo-0:0.2-4.git7c289cc.el8.x86_64", "8Base-RHOSE-4.7:openshift-eventrouter-debugsource-0:0.2-4.git7c289cc.el8.ppc64le", "8Base-RHOSE-4.7:openshift-eventrouter-debugsource-0:0.2-4.git7c289cc.el8.s390x", "8Base-RHOSE-4.7:openshift-eventrouter-debugsource-0:0.2-4.git7c289cc.el8.x86_64", "8Base-RHOSE-4.7:openshift-hyperkube-0:4.7.0-202102060108.p0.git.97095.7271b90.el8.ppc64le", "8Base-RHOSE-4.7:openshift-hyperkube-0:4.7.0-202102060108.p0.git.97095.7271b90.el8.s390x", "8Base-RHOSE-4.7:openshift-hyperkube-0:4.7.0-202102060108.p0.git.97095.7271b90.el8.x86_64", "8Base-RHOSE-4.7:openshift-kuryr-0:4.7.0-202101262230.p0.git.2494.cd95ce5.el8.src", "8Base-RHOSE-4.7:openshift-kuryr-cni-0:4.7.0-202101262230.p0.git.2494.cd95ce5.el8.noarch", "8Base-RHOSE-4.7:openshift-kuryr-common-0:4.7.0-202101262230.p0.git.2494.cd95ce5.el8.noarch", "8Base-RHOSE-4.7:openshift-kuryr-controller-0:4.7.0-202101262230.p0.git.2494.cd95ce5.el8.noarch", "8Base-RHOSE-4.7:openstack-ironic-1:16.0.4-0.20210203051223.7d74ea0.el8.src", "8Base-RHOSE-4.7:openstack-ironic-api-1:16.0.4-0.20210203051223.7d74ea0.el8.noarch", "8Base-RHOSE-4.7:openstack-ironic-common-1:16.0.4-0.20210203051223.7d74ea0.el8.noarch", "8Base-RHOSE-4.7:openstack-ironic-conductor-1:16.0.4-0.20210203051223.7d74ea0.el8.noarch", "8Base-RHOSE-4.7:openstack-ironic-inspector-0:10.4.1-0.20201123161216.70fccec.el8.noarch", "8Base-RHOSE-4.7:openstack-ironic-inspector-0:10.4.1-0.20201123161216.70fccec.el8.src", "8Base-RHOSE-4.7:openstack-ironic-inspector-api-0:10.4.1-0.20201123161216.70fccec.el8.noarch", "8Base-RHOSE-4.7:openstack-ironic-inspector-conductor-0:10.4.1-0.20201123161216.70fccec.el8.noarch", "8Base-RHOSE-4.7:openstack-ironic-inspector-dnsmasq-0:10.4.1-0.20201123161216.70fccec.el8.noarch", "8Base-RHOSE-4.7:openstack-ironic-python-agent-0:6.4.3-0.20201217171210.bd45db1.el8.noarch", "8Base-RHOSE-4.7:openstack-ironic-python-agent-0:6.4.3-0.20201217171210.bd45db1.el8.src", "8Base-RHOSE-4.7:openvswitch2.13-0:2.13.0-79.el8fdp.ppc64le", "8Base-RHOSE-4.7:openvswitch2.13-0:2.13.0-79.el8fdp.s390x", "8Base-RHOSE-4.7:openvswitch2.13-0:2.13.0-79.el8fdp.src", "8Base-RHOSE-4.7:openvswitch2.13-0:2.13.0-79.el8fdp.x86_64", "8Base-RHOSE-4.7:openvswitch2.13-debuginfo-0:2.13.0-79.el8fdp.ppc64le", "8Base-RHOSE-4.7:openvswitch2.13-debuginfo-0:2.13.0-79.el8fdp.s390x", "8Base-RHOSE-4.7:openvswitch2.13-debuginfo-0:2.13.0-79.el8fdp.x86_64", "8Base-RHOSE-4.7:openvswitch2.13-debugsource-0:2.13.0-79.el8fdp.ppc64le", "8Base-RHOSE-4.7:openvswitch2.13-debugsource-0:2.13.0-79.el8fdp.s390x", "8Base-RHOSE-4.7:openvswitch2.13-debugsource-0:2.13.0-79.el8fdp.x86_64", "8Base-RHOSE-4.7:openvswitch2.13-devel-0:2.13.0-79.el8fdp.ppc64le", "8Base-RHOSE-4.7:openvswitch2.13-devel-0:2.13.0-79.el8fdp.s390x", "8Base-RHOSE-4.7:openvswitch2.13-devel-0:2.13.0-79.el8fdp.x86_64", "8Base-RHOSE-4.7:openvswitch2.13-test-0:2.13.0-79.el8fdp.noarch", "8Base-RHOSE-4.7:ostree-0:2020.7-1.el8.ppc64le", "8Base-RHOSE-4.7:ostree-0:2020.7-1.el8.s390x", "8Base-RHOSE-4.7:ostree-0:2020.7-1.el8.src", "8Base-RHOSE-4.7:ostree-0:2020.7-1.el8.x86_64", "8Base-RHOSE-4.7:ostree-debuginfo-0:2020.7-1.el8.ppc64le", "8Base-RHOSE-4.7:ostree-debuginfo-0:2020.7-1.el8.s390x", "8Base-RHOSE-4.7:ostree-debuginfo-0:2020.7-1.el8.x86_64", "8Base-RHOSE-4.7:ostree-debugsource-0:2020.7-1.el8.ppc64le", "8Base-RHOSE-4.7:ostree-debugsource-0:2020.7-1.el8.s390x", "8Base-RHOSE-4.7:ostree-debugsource-0:2020.7-1.el8.x86_64", "8Base-RHOSE-4.7:ostree-devel-0:2020.7-1.el8.ppc64le", "8Base-RHOSE-4.7:ostree-devel-0:2020.7-1.el8.s390x", "8Base-RHOSE-4.7:ostree-devel-0:2020.7-1.el8.x86_64", "8Base-RHOSE-4.7:ostree-grub2-0:2020.7-1.el8.ppc64le", "8Base-RHOSE-4.7:ostree-grub2-0:2020.7-1.el8.x86_64", "8Base-RHOSE-4.7:ostree-libs-0:2020.7-1.el8.ppc64le", "8Base-RHOSE-4.7:ostree-libs-0:2020.7-1.el8.s390x", "8Base-RHOSE-4.7:ostree-libs-0:2020.7-1.el8.x86_64", "8Base-RHOSE-4.7:ostree-libs-debuginfo-0:2020.7-1.el8.ppc64le", "8Base-RHOSE-4.7:ostree-libs-debuginfo-0:2020.7-1.el8.s390x", "8Base-RHOSE-4.7:ostree-libs-debuginfo-0:2020.7-1.el8.x86_64", "8Base-RHOSE-4.7:ovn2.13-0:20.09.0-21.el8fdn.ppc64le", "8Base-RHOSE-4.7:ovn2.13-0:20.09.0-21.el8fdn.s390x", "8Base-RHOSE-4.7:ovn2.13-0:20.09.0-21.el8fdn.src", "8Base-RHOSE-4.7:ovn2.13-0:20.09.0-21.el8fdn.x86_64", "8Base-RHOSE-4.7:ovn2.13-central-0:20.09.0-21.el8fdn.ppc64le", "8Base-RHOSE-4.7:ovn2.13-central-0:20.09.0-21.el8fdn.s390x", "8Base-RHOSE-4.7:ovn2.13-central-0:20.09.0-21.el8fdn.x86_64", "8Base-RHOSE-4.7:ovn2.13-central-debuginfo-0:20.09.0-21.el8fdn.ppc64le", "8Base-RHOSE-4.7:ovn2.13-central-debuginfo-0:20.09.0-21.el8fdn.s390x", "8Base-RHOSE-4.7:ovn2.13-central-debuginfo-0:20.09.0-21.el8fdn.x86_64", "8Base-RHOSE-4.7:ovn2.13-debuginfo-0:20.09.0-21.el8fdn.ppc64le", "8Base-RHOSE-4.7:ovn2.13-debuginfo-0:20.09.0-21.el8fdn.s390x", "8Base-RHOSE-4.7:ovn2.13-debuginfo-0:20.09.0-21.el8fdn.x86_64", "8Base-RHOSE-4.7:ovn2.13-debugsource-0:20.09.0-21.el8fdn.ppc64le", "8Base-RHOSE-4.7:ovn2.13-debugsource-0:20.09.0-21.el8fdn.s390x", "8Base-RHOSE-4.7:ovn2.13-debugsource-0:20.09.0-21.el8fdn.x86_64", "8Base-RHOSE-4.7:ovn2.13-host-0:20.09.0-21.el8fdn.ppc64le", "8Base-RHOSE-4.7:ovn2.13-host-0:20.09.0-21.el8fdn.s390x", "8Base-RHOSE-4.7:ovn2.13-host-0:20.09.0-21.el8fdn.x86_64", "8Base-RHOSE-4.7:ovn2.13-host-debuginfo-0:20.09.0-21.el8fdn.ppc64le", "8Base-RHOSE-4.7:ovn2.13-host-debuginfo-0:20.09.0-21.el8fdn.s390x", "8Base-RHOSE-4.7:ovn2.13-host-debuginfo-0:20.09.0-21.el8fdn.x86_64", "8Base-RHOSE-4.7:ovn2.13-vtep-0:20.09.0-21.el8fdn.ppc64le", "8Base-RHOSE-4.7:ovn2.13-vtep-0:20.09.0-21.el8fdn.s390x", "8Base-RHOSE-4.7:ovn2.13-vtep-0:20.09.0-21.el8fdn.x86_64", "8Base-RHOSE-4.7:ovn2.13-vtep-debuginfo-0:20.09.0-21.el8fdn.ppc64le", "8Base-RHOSE-4.7:ovn2.13-vtep-debuginfo-0:20.09.0-21.el8fdn.s390x", "8Base-RHOSE-4.7:ovn2.13-vtep-debuginfo-0:20.09.0-21.el8fdn.x86_64", "8Base-RHOSE-4.7:powerpc-utils-0:1.3.6-12.el8_3.ppc64le", "8Base-RHOSE-4.7:powerpc-utils-0:1.3.6-12.el8_3.src", "8Base-RHOSE-4.7:powerpc-utils-core-0:1.3.6-12.el8_3.ppc64le", "8Base-RHOSE-4.7:powerpc-utils-core-debuginfo-0:1.3.6-12.el8_3.ppc64le", "8Base-RHOSE-4.7:powerpc-utils-debugsource-0:1.3.6-12.el8_3.ppc64le", "8Base-RHOSE-4.7:pprof-0:2.6.3-2.el8ost.noarch", "8Base-RHOSE-4.7:prometheus-promu-0:0.5.0-2.git642a960.el8.ppc64le", "8Base-RHOSE-4.7:prometheus-promu-0:0.5.0-2.git642a960.el8.s390x", "8Base-RHOSE-4.7:prometheus-promu-0:0.5.0-2.git642a960.el8.x86_64", "8Base-RHOSE-4.7:protobuf-0:3.6.1-4.el8ost.ppc64le", "8Base-RHOSE-4.7:protobuf-0:3.6.1-4.el8ost.s390x", "8Base-RHOSE-4.7:protobuf-0:3.6.1-4.el8ost.src", "8Base-RHOSE-4.7:protobuf-0:3.6.1-4.el8ost.x86_64", "8Base-RHOSE-4.7:protobuf-compiler-0:3.6.1-4.el8ost.ppc64le", "8Base-RHOSE-4.7:protobuf-compiler-0:3.6.1-4.el8ost.s390x", "8Base-RHOSE-4.7:protobuf-compiler-0:3.6.1-4.el8ost.x86_64", "8Base-RHOSE-4.7:protobuf-compiler-debuginfo-0:3.6.1-4.el8ost.ppc64le", "8Base-RHOSE-4.7:protobuf-compiler-debuginfo-0:3.6.1-4.el8ost.s390x", "8Base-RHOSE-4.7:protobuf-compiler-debuginfo-0:3.6.1-4.el8ost.x86_64", "8Base-RHOSE-4.7:protobuf-debuginfo-0:3.6.1-4.el8ost.ppc64le", "8Base-RHOSE-4.7:protobuf-debuginfo-0:3.6.1-4.el8ost.s390x", "8Base-RHOSE-4.7:protobuf-debuginfo-0:3.6.1-4.el8ost.x86_64", "8Base-RHOSE-4.7:protobuf-debugsource-0:3.6.1-4.el8ost.ppc64le", "8Base-RHOSE-4.7:protobuf-debugsource-0:3.6.1-4.el8ost.s390x", "8Base-RHOSE-4.7:protobuf-debugsource-0:3.6.1-4.el8ost.x86_64", "8Base-RHOSE-4.7:protobuf-devel-0:3.6.1-4.el8ost.ppc64le", "8Base-RHOSE-4.7:protobuf-devel-0:3.6.1-4.el8ost.s390x", "8Base-RHOSE-4.7:protobuf-devel-0:3.6.1-4.el8ost.x86_64", "8Base-RHOSE-4.7:protobuf-lite-0:3.6.1-4.el8ost.ppc64le", "8Base-RHOSE-4.7:protobuf-lite-0:3.6.1-4.el8ost.s390x", "8Base-RHOSE-4.7:protobuf-lite-0:3.6.1-4.el8ost.x86_64", "8Base-RHOSE-4.7:protobuf-lite-debuginfo-0:3.6.1-4.el8ost.ppc64le", "8Base-RHOSE-4.7:protobuf-lite-debuginfo-0:3.6.1-4.el8ost.s390x", "8Base-RHOSE-4.7:protobuf-lite-debuginfo-0:3.6.1-4.el8ost.x86_64", "8Base-RHOSE-4.7:protobuf-lite-devel-0:3.6.1-4.el8ost.ppc64le", "8Base-RHOSE-4.7:protobuf-lite-devel-0:3.6.1-4.el8ost.s390x", "8Base-RHOSE-4.7:protobuf-lite-devel-0:3.6.1-4.el8ost.x86_64", "8Base-RHOSE-4.7:protobuf-lite-static-0:3.6.1-4.el8ost.ppc64le", "8Base-RHOSE-4.7:protobuf-lite-static-0:3.6.1-4.el8ost.s390x", "8Base-RHOSE-4.7:protobuf-lite-static-0:3.6.1-4.el8ost.x86_64", "8Base-RHOSE-4.7:protobuf-static-0:3.6.1-4.el8ost.ppc64le", "8Base-RHOSE-4.7:protobuf-static-0:3.6.1-4.el8ost.s390x", "8Base-RHOSE-4.7:protobuf-static-0:3.6.1-4.el8ost.x86_64", "8Base-RHOSE-4.7:protobuf-vim-0:3.6.1-4.el8ost.noarch", "8Base-RHOSE-4.7:python-alembic-0:1.4.2-5.el8ost.src", "8Base-RHOSE-4.7:python-boto3-0:1.9.101-1.el8ost.src", "8Base-RHOSE-4.7:python-botocore-0:1.12.119-1.el8ost.src", "8Base-RHOSE-4.7:python-cachetools-0:3.1.0-1.el8ost.src", "8Base-RHOSE-4.7:python-certifi-0:2018.10.15-4.el8ost.src", "8Base-RHOSE-4.7:python-construct-0:2.10.56-1.el8ost.src", "8Base-RHOSE-4.7:python-daemon-0:2.1.2-9.el8ar.src", "8Base-RHOSE-4.7:python-debtcollector-0:2.2.0-0.20201008171245.649189d.el8.src", "8Base-RHOSE-4.7:python-dictdiffer-0:0.7.1-2.el8ost.src", "8Base-RHOSE-4.7:python-eventlet-0:0.25.2-3.el8ost.src", "8Base-RHOSE-4.7:python-flask-1:1.1.1-1.el8ost.src", "8Base-RHOSE-4.7:python-flask-doc-1:1.1.1-1.el8ost.noarch", "8Base-RHOSE-4.7:python-google-auth-0:1.3.0-1.el8ost.src", "8Base-RHOSE-4.7:python-hardware-0:0.23.0-0.20201031022149.59211cc.el8.src", "8Base-RHOSE-4.7:python-ifaddr-0:0.1.6-5.el8ost.src", "8Base-RHOSE-4.7:python-importlib-metadata-0:1.7.0-1.el8ost.src", "8Base-RHOSE-4.7:python-ironic-lib-0:4.4.1-0.20201218041209.aa7cfec.el8.src", "8Base-RHOSE-4.7:python-keystoneauth1-0:4.2.0-0.20200630234358.dab8e10.el8ost.src", "8Base-RHOSE-4.7:python-kubernetes-0:11.0.0-1.el8.src", "8Base-RHOSE-4.7:python-kuryr-lib-0:1.1.1-0.20190923160834.41e6964.el8ost.src", "8Base-RHOSE-4.7:python-lockfile-1:0.11.0-8.el8ar.src", "8Base-RHOSE-4.7:python-msgpack-0:0.6.2-1.el8ost.src", "8Base-RHOSE-4.7:python-msgpack-debugsource-0:0.6.2-1.el8ost.x86_64", "8Base-RHOSE-4.7:python-openshift-1:0.11.2-1.el8.src", "8Base-RHOSE-4.7:python-openstacksdk-0:0.48.0-0.20200708092906.3b693c2.el8ost.src", "8Base-RHOSE-4.7:python-oslo-concurrency-0:4.3.0-0.20201008180343.2f78803.el8.src", "8Base-RHOSE-4.7:python-oslo-concurrency-lang-0:4.3.0-0.20201008180343.2f78803.el8.noarch", "8Base-RHOSE-4.7:python-oslo-config-2:8.3.2-0.20201008180634.fcb8894.el8.src", "8Base-RHOSE-4.7:python-oslo-context-0:3.1.1-0.20201008190523.57dbded.el8.src", "8Base-RHOSE-4.7:python-oslo-db-0:8.4.0-0.20200918104110.e42c733.el8ost.src", "8Base-RHOSE-4.7:python-oslo-db-lang-0:8.4.0-0.20200918104110.e42c733.el8ost.noarch", "8Base-RHOSE-4.7:python-oslo-i18n-0:5.0.1-0.20201009131251.73187bd.el8.src", "8Base-RHOSE-4.7:python-oslo-i18n-lang-0:5.0.1-0.20201009131251.73187bd.el8.noarch", "8Base-RHOSE-4.7:python-oslo-log-0:4.3.1-0.20201207021200.1597f24.el8.src", "8Base-RHOSE-4.7:python-oslo-log-lang-0:4.3.1-0.20201207021200.1597f24.el8.noarch", "8Base-RHOSE-4.7:python-oslo-serialization-0:4.0.1-0.20201008182423.c7884b2.el8.src", "8Base-RHOSE-4.7:python-oslo-service-0:2.4.0-0.20201008184547.58466a6.el8.src", "8Base-RHOSE-4.7:python-oslo-utils-0:4.6.0-0.20201009175936.91497da.el8.src", "8Base-RHOSE-4.7:python-oslo-utils-lang-0:4.6.0-0.20201009175936.91497da.el8.noarch", "8Base-RHOSE-4.7:python-packaging-0:20.4-1.el8ost.src", "8Base-RHOSE-4.7:python-packaging-doc-0:20.4-1.el8ost.noarch", "8Base-RHOSE-4.7:python-paste-0:3.2.4-1.el8ost.src", "8Base-RHOSE-4.7:python-paste-deploy-0:2.0.1-4.el8ost.src", "8Base-RHOSE-4.7:python-pbr-0:5.4.3-2.el8ost.src", "8Base-RHOSE-4.7:python-pexpect-0:4.6-2.el8ar.src", "8Base-RHOSE-4.7:python-pint-0:0.10.1-1.el8ost.src", "8Base-RHOSE-4.7:python-psutil-0:5.6.6-1.el8ar.src", "8Base-RHOSE-4.7:python-psutil-debugsource-0:5.6.6-1.el8ar.ppc64le", "8Base-RHOSE-4.7:python-psutil-debugsource-0:5.6.6-1.el8ar.s390x", "8Base-RHOSE-4.7:python-psutil-debugsource-0:5.6.6-1.el8ar.x86_64", "8Base-RHOSE-4.7:python-pyghmi-0:1.5.14-2.1.el8ost.src", "8Base-RHOSE-4.7:python-pyroute2-0:0.5.13-1.el8ost.src", "8Base-RHOSE-4.7:python-requests-unixsocket-0:0.1.5-5.el8ar.src", "8Base-RHOSE-4.7:python-rsa-0:4.7-1.el8.src", "8Base-RHOSE-4.7:python-ruamel-yaml-0:0.15.41-4.el8ost.src", "8Base-RHOSE-4.7:python-ruamel-yaml-debugsource-0:0.15.41-4.el8ost.ppc64le", "8Base-RHOSE-4.7:python-ruamel-yaml-debugsource-0:0.15.41-4.el8ost.s390x", "8Base-RHOSE-4.7:python-ruamel-yaml-debugsource-0:0.15.41-4.el8ost.x86_64", "8Base-RHOSE-4.7:python-s3transfer-0:0.2.0-1.el8ost.src", "8Base-RHOSE-4.7:python-stevedore-0:3.2.2-0.20201009151242.274eaa6.el8.src", "8Base-RHOSE-4.7:python-string_utils-0:0.6.0-4.el8ost.src", "8Base-RHOSE-4.7:python-sushy-0:3.6.1-0.20210122201213.7ec0422.el8.src", "8Base-RHOSE-4.7:python-sushy-oem-idrac-0:0.0.3-0.20200922221223.1202372.el8ost.src", "8Base-RHOSE-4.7:python-tenacity-0:6.2.0-1.el8ost.src", "8Base-RHOSE-4.7:python-tooz-0:2.7.0-0.20200723133754.fca43df.el8ost.src", "8Base-RHOSE-4.7:python-websocket-client-0:0.54.0-1.el8ost.src", "8Base-RHOSE-4.7:python-werkzeug-0:1.0.1-3.el8ost.src", "8Base-RHOSE-4.7:python-zeroconf-0:0.24.4-1.el8ost.src", "8Base-RHOSE-4.7:python-zipp-0:0.5.1-2.el8ost.src", "8Base-RHOSE-4.7:python2-botocore-0:1.12.119-1.el8ost.noarch", "8Base-RHOSE-4.7:python2-cachetools-0:3.1.0-1.el8ost.noarch", "8Base-RHOSE-4.7:python3-alembic-0:1.4.2-5.el8ost.noarch", "8Base-RHOSE-4.7:python3-ansible-runner-0:1.4.6-2.el8ar.noarch", "8Base-RHOSE-4.7:python3-boto3-0:1.9.101-1.el8ost.noarch", "8Base-RHOSE-4.7:python3-botocore-0:1.12.119-1.el8ost.noarch", "8Base-RHOSE-4.7:python3-cachetools-0:3.1.0-1.el8ost.noarch", "8Base-RHOSE-4.7:python3-certifi-0:2018.10.15-4.el8ost.noarch", "8Base-RHOSE-4.7:python3-construct-0:2.10.56-1.el8ost.noarch", "8Base-RHOSE-4.7:python3-daemon-0:2.1.2-9.el8ar.noarch", "8Base-RHOSE-4.7:python3-debtcollector-0:2.2.0-0.20201008171245.649189d.el8.noarch", "8Base-RHOSE-4.7:python3-dictdiffer-0:0.7.1-2.el8ost.noarch", "8Base-RHOSE-4.7:python3-eventlet-0:0.25.2-3.el8ost.noarch", "8Base-RHOSE-4.7:python3-flask-1:1.1.1-1.el8ost.noarch", "8Base-RHOSE-4.7:python3-google-auth-0:1.3.0-1.el8ost.noarch", "8Base-RHOSE-4.7:python3-grpcio-0:1.18.0-4.el8ost.ppc64le", "8Base-RHOSE-4.7:python3-grpcio-0:1.18.0-4.el8ost.s390x", "8Base-RHOSE-4.7:python3-grpcio-0:1.18.0-4.el8ost.x86_64", "8Base-RHOSE-4.7:python3-grpcio-debuginfo-0:1.18.0-4.el8ost.ppc64le", "8Base-RHOSE-4.7:python3-grpcio-debuginfo-0:1.18.0-4.el8ost.s390x", "8Base-RHOSE-4.7:python3-grpcio-debuginfo-0:1.18.0-4.el8ost.x86_64", "8Base-RHOSE-4.7:python3-hardware-0:0.23.0-0.20201031022149.59211cc.el8.noarch", "8Base-RHOSE-4.7:python3-hardware-detect-0:0.23.0-0.20201031022149.59211cc.el8.noarch", "8Base-RHOSE-4.7:python3-ifaddr-0:0.1.6-5.el8ost.noarch", "8Base-RHOSE-4.7:python3-importlib-metadata-0:1.7.0-1.el8ost.noarch", "8Base-RHOSE-4.7:python3-ironic-inspector-tests-0:10.4.1-0.20201123161216.70fccec.el8.noarch", "8Base-RHOSE-4.7:python3-ironic-lib-0:4.4.1-0.20201218041209.aa7cfec.el8.noarch", "8Base-RHOSE-4.7:python3-ironic-python-agent-0:6.4.3-0.20201217171210.bd45db1.el8.noarch", "8Base-RHOSE-4.7:python3-ironic-tests-1:16.0.4-0.20210203051223.7d74ea0.el8.noarch", "8Base-RHOSE-4.7:python3-keystoneauth1-0:4.2.0-0.20200630234358.dab8e10.el8ost.noarch", "8Base-RHOSE-4.7:python3-kubernetes-0:11.0.0-1.el8.noarch", "8Base-RHOSE-4.7:python3-kubernetes-tests-0:11.0.0-1.el8.noarch", "8Base-RHOSE-4.7:python3-kuryr-kubernetes-0:4.7.0-202101262230.p0.git.2494.cd95ce5.el8.noarch", "8Base-RHOSE-4.7:python3-kuryr-lib-0:1.1.1-0.20190923160834.41e6964.el8ost.noarch", "8Base-RHOSE-4.7:python3-kuryr-lib-tests-0:1.1.1-0.20190923160834.41e6964.el8ost.noarch", "8Base-RHOSE-4.7:python3-lockfile-1:0.11.0-8.el8ar.noarch", "8Base-RHOSE-4.7:python3-msgpack-0:0.6.2-1.el8ost.x86_64", "8Base-RHOSE-4.7:python3-msgpack-debuginfo-0:0.6.2-1.el8ost.x86_64", "8Base-RHOSE-4.7:python3-openshift-1:0.11.2-1.el8.noarch", "8Base-RHOSE-4.7:python3-openstacksdk-0:0.48.0-0.20200708092906.3b693c2.el8ost.noarch", "8Base-RHOSE-4.7:python3-openstacksdk-tests-0:0.48.0-0.20200708092906.3b693c2.el8ost.noarch", "8Base-RHOSE-4.7:python3-openvswitch2.13-0:2.13.0-79.el8fdp.ppc64le", "8Base-RHOSE-4.7:python3-openvswitch2.13-0:2.13.0-79.el8fdp.s390x", "8Base-RHOSE-4.7:python3-openvswitch2.13-0:2.13.0-79.el8fdp.x86_64", "8Base-RHOSE-4.7:python3-openvswitch2.13-debuginfo-0:2.13.0-79.el8fdp.ppc64le", "8Base-RHOSE-4.7:python3-openvswitch2.13-debuginfo-0:2.13.0-79.el8fdp.s390x", "8Base-RHOSE-4.7:python3-openvswitch2.13-debuginfo-0:2.13.0-79.el8fdp.x86_64", "8Base-RHOSE-4.7:python3-oslo-concurrency-0:4.3.0-0.20201008180343.2f78803.el8.noarch", "8Base-RHOSE-4.7:python3-oslo-concurrency-tests-0:4.3.0-0.20201008180343.2f78803.el8.noarch", "8Base-RHOSE-4.7:python3-oslo-config-2:8.3.2-0.20201008180634.fcb8894.el8.noarch", "8Base-RHOSE-4.7:python3-oslo-context-0:3.1.1-0.20201008190523.57dbded.el8.noarch", "8Base-RHOSE-4.7:python3-oslo-context-tests-0:3.1.1-0.20201008190523.57dbded.el8.noarch", "8Base-RHOSE-4.7:python3-oslo-db-0:8.4.0-0.20200918104110.e42c733.el8ost.noarch", "8Base-RHOSE-4.7:python3-oslo-db-tests-0:8.4.0-0.20200918104110.e42c733.el8ost.noarch", "8Base-RHOSE-4.7:python3-oslo-i18n-0:5.0.1-0.20201009131251.73187bd.el8.noarch", "8Base-RHOSE-4.7:python3-oslo-log-0:4.3.1-0.20201207021200.1597f24.el8.noarch", "8Base-RHOSE-4.7:python3-oslo-log-tests-0:4.3.1-0.20201207021200.1597f24.el8.noarch", "8Base-RHOSE-4.7:python3-oslo-serialization-0:4.0.1-0.20201008182423.c7884b2.el8.noarch", "8Base-RHOSE-4.7:python3-oslo-serialization-tests-0:4.0.1-0.20201008182423.c7884b2.el8.noarch", "8Base-RHOSE-4.7:python3-oslo-service-0:2.4.0-0.20201008184547.58466a6.el8.noarch", "8Base-RHOSE-4.7:python3-oslo-service-tests-0:2.4.0-0.20201008184547.58466a6.el8.noarch", "8Base-RHOSE-4.7:python3-oslo-utils-0:4.6.0-0.20201009175936.91497da.el8.noarch", "8Base-RHOSE-4.7:python3-oslo-utils-tests-0:4.6.0-0.20201009175936.91497da.el8.noarch", "8Base-RHOSE-4.7:python3-packaging-0:20.4-1.el8ost.noarch", "8Base-RHOSE-4.7:python3-paste-0:3.2.4-1.el8ost.noarch", "8Base-RHOSE-4.7:python3-paste-deploy-0:2.0.1-4.el8ost.noarch", "8Base-RHOSE-4.7:python3-pbr-0:5.4.3-2.el8ost.noarch", "8Base-RHOSE-4.7:python3-pexpect-0:4.6-2.el8ar.noarch", "8Base-RHOSE-4.7:python3-pint-0:0.10.1-1.el8ost.noarch", "8Base-RHOSE-4.7:python3-protobuf-0:3.6.1-4.el8ost.noarch", "8Base-RHOSE-4.7:python3-psutil-0:5.6.6-1.el8ar.ppc64le", "8Base-RHOSE-4.7:python3-psutil-0:5.6.6-1.el8ar.s390x", "8Base-RHOSE-4.7:python3-psutil-0:5.6.6-1.el8ar.x86_64", "8Base-RHOSE-4.7:python3-psutil-debuginfo-0:5.6.6-1.el8ar.ppc64le", "8Base-RHOSE-4.7:python3-psutil-debuginfo-0:5.6.6-1.el8ar.s390x", "8Base-RHOSE-4.7:python3-psutil-debuginfo-0:5.6.6-1.el8ar.x86_64", "8Base-RHOSE-4.7:python3-pyghmi-0:1.5.14-2.1.el8ost.noarch", "8Base-RHOSE-4.7:python3-pyroute2-0:0.5.13-1.el8ost.noarch", "8Base-RHOSE-4.7:python3-requests-unixsocket-0:0.1.5-5.el8ar.noarch", "8Base-RHOSE-4.7:python3-rsa-0:4.7-1.el8.noarch", "8Base-RHOSE-4.7:python3-ruamel-yaml-0:0.15.41-4.el8ost.ppc64le", "8Base-RHOSE-4.7:python3-ruamel-yaml-0:0.15.41-4.el8ost.s390x", "8Base-RHOSE-4.7:python3-ruamel-yaml-0:0.15.41-4.el8ost.x86_64", "8Base-RHOSE-4.7:python3-ruamel-yaml-debuginfo-0:0.15.41-4.el8ost.ppc64le", "8Base-RHOSE-4.7:python3-ruamel-yaml-debuginfo-0:0.15.41-4.el8ost.s390x", "8Base-RHOSE-4.7:python3-ruamel-yaml-debuginfo-0:0.15.41-4.el8ost.x86_64", "8Base-RHOSE-4.7:python3-s3transfer-0:0.2.0-1.el8ost.noarch", "8Base-RHOSE-4.7:python3-stevedore-0:3.2.2-0.20201009151242.274eaa6.el8.noarch", "8Base-RHOSE-4.7:python3-string_utils-0:0.6.0-4.el8ost.noarch", "8Base-RHOSE-4.7:python3-sushy-0:3.6.1-0.20210122201213.7ec0422.el8.noarch", "8Base-RHOSE-4.7:python3-sushy-oem-idrac-0:0.0.3-0.20200922221223.1202372.el8ost.noarch", "8Base-RHOSE-4.7:python3-sushy-oem-idrac-tests-0:0.0.3-0.20200922221223.1202372.el8ost.noarch", "8Base-RHOSE-4.7:python3-sushy-tests-0:3.6.1-0.20210122201213.7ec0422.el8.noarch", "8Base-RHOSE-4.7:python3-tenacity-0:6.2.0-1.el8ost.noarch", "8Base-RHOSE-4.7:python3-tooz-0:2.7.0-0.20200723133754.fca43df.el8ost.noarch", "8Base-RHOSE-4.7:python3-websocket-client-0:0.54.0-1.el8ost.noarch", "8Base-RHOSE-4.7:python3-werkzeug-0:1.0.1-3.el8ost.noarch", "8Base-RHOSE-4.7:python3-zeroconf-0:0.24.4-1.el8ost.noarch", "8Base-RHOSE-4.7:python3-zipp-0:0.5.1-2.el8ost.noarch", "8Base-RHOSE-4.7:redhat-release-coreos-0:47.83-1.el8.ppc64le", "8Base-RHOSE-4.7:redhat-release-coreos-0:47.83-1.el8.s390x", "8Base-RHOSE-4.7:redhat-release-coreos-0:47.83-1.el8.src", "8Base-RHOSE-4.7:redhat-release-coreos-0:47.83-1.el8.x86_64", "8Base-RHOSE-4.7:rhcos-tools-0:0.0.0-1.rhaos4.2.el8.noarch", "8Base-RHOSE-4.7:rhcos-tools-0:0.0.0-1.rhaos4.2.el8.src", "8Base-RHOSE-4.7:rhosp-director-images-0:17.0-20200606.1.el8ost.noarch", "8Base-RHOSE-4.7:rhosp-director-images-0:17.0-20200606.1.el8ost.src", "8Base-RHOSE-4.7:rhosp-director-images-all-0:17.0-20200606.1.el8ost.noarch", "8Base-RHOSE-4.7:rhosp-director-images-ipa-0:17.0-20200606.1.el8ost.noarch", "8Base-RHOSE-4.7:rhosp-director-images-ipa-ppc64le-0:17.0-20200606.1.el8ost.noarch", "8Base-RHOSE-4.7:rhosp-director-images-ipa-x86_64-0:17.0-20200606.1.el8ost.noarch", "8Base-RHOSE-4.7:rhosp-director-images-minimal-0:17.0-20200606.1.el8ost.noarch", "8Base-RHOSE-4.7:rhosp-director-images-ppc64le-0:17.0-20200606.1.el8ost.noarch", "8Base-RHOSE-4.7:rhosp-director-images-x86_64-0:17.0-20200606.1.el8ost.noarch", "8Base-RHOSE-4.7:rpm-ostree-0:2020.7-1.el8_3.ppc64le", "8Base-RHOSE-4.7:rpm-ostree-0:2020.7-1.el8_3.s390x", "8Base-RHOSE-4.7:rpm-ostree-0:2020.7-1.el8_3.src", "8Base-RHOSE-4.7:rpm-ostree-0:2020.7-1.el8_3.x86_64", "8Base-RHOSE-4.7:rpm-ostree-debuginfo-0:2020.7-1.el8_3.ppc64le", "8Base-RHOSE-4.7:rpm-ostree-debuginfo-0:2020.7-1.el8_3.s390x", "8Base-RHOSE-4.7:rpm-ostree-debuginfo-0:2020.7-1.el8_3.x86_64", "8Base-RHOSE-4.7:rpm-ostree-debugsource-0:2020.7-1.el8_3.ppc64le", "8Base-RHOSE-4.7:rpm-ostree-debugsource-0:2020.7-1.el8_3.s390x", "8Base-RHOSE-4.7:rpm-ostree-debugsource-0:2020.7-1.el8_3.x86_64", "8Base-RHOSE-4.7:rpm-ostree-devel-0:2020.7-1.el8_3.ppc64le", "8Base-RHOSE-4.7:rpm-ostree-devel-0:2020.7-1.el8_3.s390x", "8Base-RHOSE-4.7:rpm-ostree-devel-0:2020.7-1.el8_3.x86_64", "8Base-RHOSE-4.7:rpm-ostree-libs-0:2020.7-1.el8_3.ppc64le", "8Base-RHOSE-4.7:rpm-ostree-libs-0:2020.7-1.el8_3.s390x", "8Base-RHOSE-4.7:rpm-ostree-libs-0:2020.7-1.el8_3.x86_64", "8Base-RHOSE-4.7:rpm-ostree-libs-debuginfo-0:2020.7-1.el8_3.ppc64le", "8Base-RHOSE-4.7:rpm-ostree-libs-debuginfo-0:2020.7-1.el8_3.s390x", "8Base-RHOSE-4.7:rpm-ostree-libs-debuginfo-0:2020.7-1.el8_3.x86_64", "8Base-RHOSE-4.7:runc-0:1.0.0-82.rhaos4.6.git086e841.el8.ppc64le", "8Base-RHOSE-4.7:runc-0:1.0.0-82.rhaos4.6.git086e841.el8.s390x", "8Base-RHOSE-4.7:runc-0:1.0.0-82.rhaos4.6.git086e841.el8.src", "8Base-RHOSE-4.7:runc-0:1.0.0-82.rhaos4.6.git086e841.el8.x86_64", "8Base-RHOSE-4.7:runc-debuginfo-0:1.0.0-82.rhaos4.6.git086e841.el8.ppc64le", "8Base-RHOSE-4.7:runc-debuginfo-0:1.0.0-82.rhaos4.6.git086e841.el8.s390x", "8Base-RHOSE-4.7:runc-debuginfo-0:1.0.0-82.rhaos4.6.git086e841.el8.x86_64", "8Base-RHOSE-4.7:runc-debugsource-0:1.0.0-82.rhaos4.6.git086e841.el8.ppc64le", "8Base-RHOSE-4.7:runc-debugsource-0:1.0.0-82.rhaos4.6.git086e841.el8.s390x", "8Base-RHOSE-4.7:runc-debugsource-0:1.0.0-82.rhaos4.6.git086e841.el8.x86_64", "8Base-RHOSE-4.7:rust-afterburn-0:4.6.0-1.rhaos4.7.el8.src", "8Base-RHOSE-4.7:rust-afterburn-debugsource-0:4.6.0-1.rhaos4.7.el8.ppc64le", "8Base-RHOSE-4.7:rust-afterburn-debugsource-0:4.6.0-1.rhaos4.7.el8.s390x", "8Base-RHOSE-4.7:rust-afterburn-debugsource-0:4.6.0-1.rhaos4.7.el8.x86_64", "8Base-RHOSE-4.7:rust-bootupd-0:0.2.5-2.el8.src", "8Base-RHOSE-4.7:rust-bootupd-debugsource-0:0.2.5-2.el8.x86_64", "8Base-RHOSE-4.7:tini-0:0.16.1-1.el8ar.ppc64le", "8Base-RHOSE-4.7:tini-0:0.16.1-1.el8ar.s390x", "8Base-RHOSE-4.7:tini-0:0.16.1-1.el8ar.src", "8Base-RHOSE-4.7:tini-0:0.16.1-1.el8ar.x86_64", "8Base-RHOSE-4.7:toolbox-0:0.0.8-3.rhaos4.7.el8.noarch", "8Base-RHOSE-4.7:toolbox-0:0.0.8-3.rhaos4.7.el8.src" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "7Server-RH7-RHOSE-4.7:openshift-0:4.7.0-202102060108.p0.git.97095.7271b90.el7.src", "7Server-RH7-RHOSE-4.7:openshift-hyperkube-0:4.7.0-202102060108.p0.git.97095.7271b90.el7.x86_64", "8Base-RHOSE-4.7:openshift-0:4.7.0-202102060108.p0.git.97095.7271b90.el8.src", "8Base-RHOSE-4.7:openshift-hyperkube-0:4.7.0-202102060108.p0.git.97095.7271b90.el8.ppc64le", "8Base-RHOSE-4.7:openshift-hyperkube-0:4.7.0-202102060108.p0.git.97095.7271b90.el8.s390x", "8Base-RHOSE-4.7:openshift-hyperkube-0:4.7.0-202102060108.p0.git.97095.7271b90.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "kubernetes: Ceph RBD adminSecrets exposed in logs when loglevel \u003e= 4" }, { "acknowledgments": [ { "names": [ "The containerd project" ] }, { "names": [ "Ian Coldwater", "Duffie Cooley", "Rory McCune", "Brad Geesaman", "Josh Larsen" ], "summary": "Acknowledged by upstream." } ], "cve": "CVE-2020-15157", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "discovery_date": "2020-10-12T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "7Server-RH7-RHOSE-4.7:conmon-2:2.0.21-2.rhaos4.6.el7.src", "7Server-RH7-RHOSE-4.7:conmon-2:2.0.21-2.rhaos4.6.el7.x86_64", "7Server-RH7-RHOSE-4.7:containernetworking-plugins-0:0.8.6-1.rhaos4.5.el7.src", "7Server-RH7-RHOSE-4.7:containernetworking-plugins-0:0.8.6-1.rhaos4.5.el7.x86_64", "7Server-RH7-RHOSE-4.7:containernetworking-plugins-debuginfo-0:0.8.6-1.rhaos4.5.el7.x86_64", "7Server-RH7-RHOSE-4.7:cri-o-0:1.20.0-0.rhaos4.7.git8921e00.el7.51.src", "7Server-RH7-RHOSE-4.7:cri-o-0:1.20.0-0.rhaos4.7.git8921e00.el7.51.x86_64", "7Server-RH7-RHOSE-4.7:cri-o-debuginfo-0:1.20.0-0.rhaos4.7.git8921e00.el7.51.x86_64", "7Server-RH7-RHOSE-4.7:cri-tools-0:1.18.0-3.el7.src", "7Server-RH7-RHOSE-4.7:cri-tools-0:1.18.0-3.el7.x86_64", "7Server-RH7-RHOSE-4.7:cri-tools-debuginfo-0:1.18.0-3.el7.x86_64", "7Server-RH7-RHOSE-4.7:haproxy-0:2.0.19-1.el7.src", "7Server-RH7-RHOSE-4.7:haproxy-debuginfo-0:2.0.19-1.el7.x86_64", "7Server-RH7-RHOSE-4.7:haproxy20-0:2.0.19-1.el7.x86_64", "7Server-RH7-RHOSE-4.7:jq-0:1.6-2.el7.src", "7Server-RH7-RHOSE-4.7:jq-0:1.6-2.el7.x86_64", "7Server-RH7-RHOSE-4.7:jq-debuginfo-0:1.6-2.el7.x86_64", "7Server-RH7-RHOSE-4.7:jq-devel-0:1.6-2.el7.x86_64", "7Server-RH7-RHOSE-4.7:oniguruma-0:5.9.2-5.el7.src", "7Server-RH7-RHOSE-4.7:oniguruma-0:5.9.2-5.el7.x86_64", "7Server-RH7-RHOSE-4.7:oniguruma-debuginfo-0:5.9.2-5.el7.x86_64", "7Server-RH7-RHOSE-4.7:oniguruma-devel-0:5.9.2-5.el7.x86_64", "7Server-RH7-RHOSE-4.7:openshift-ansible-0:4.7.0-202102032256.p0.git.0.bf7d9a7.el7.noarch", "7Server-RH7-RHOSE-4.7:openshift-ansible-0:4.7.0-202102032256.p0.git.0.bf7d9a7.el7.src", "7Server-RH7-RHOSE-4.7:openshift-ansible-test-0:4.7.0-202102032256.p0.git.0.bf7d9a7.el7.noarch", "7Server-RH7-RHOSE-4.7:openshift-clients-0:4.7.0-202102032256.p0.git.3951.0e656ef.el7.src", "7Server-RH7-RHOSE-4.7:openshift-clients-0:4.7.0-202102032256.p0.git.3951.0e656ef.el7.x86_64", "7Server-RH7-RHOSE-4.7:openshift-clients-redistributable-0:4.7.0-202102032256.p0.git.3951.0e656ef.el7.x86_64", "7Server-RH7-RHOSE-4.7:python-botocore-0:1.4.57-5.el7.src", "7Server-RH7-RHOSE-4.7:python2-botocore-0:1.4.57-5.el7.noarch", "7Server-RH7-RHOSE-4.7:runc-0:1.0.0-82.rhaos4.6.git086e841.el7.src", "7Server-RH7-RHOSE-4.7:runc-0:1.0.0-82.rhaos4.6.git086e841.el7.x86_64", "7Server-RH7-RHOSE-4.7:runc-debuginfo-0:1.0.0-82.rhaos4.6.git086e841.el7.x86_64", "8Base-RHOSE-4.7:NetworkManager-1:1.26.0-12.1.rhaos4.7.el8.ppc64le", "8Base-RHOSE-4.7:NetworkManager-1:1.26.0-12.1.rhaos4.7.el8.s390x", "8Base-RHOSE-4.7:NetworkManager-1:1.26.0-12.1.rhaos4.7.el8.src", "8Base-RHOSE-4.7:NetworkManager-1:1.26.0-12.1.rhaos4.7.el8.x86_64", "8Base-RHOSE-4.7:NetworkManager-adsl-1:1.26.0-12.1.rhaos4.7.el8.ppc64le", "8Base-RHOSE-4.7:NetworkManager-adsl-1:1.26.0-12.1.rhaos4.7.el8.s390x", "8Base-RHOSE-4.7:NetworkManager-adsl-1:1.26.0-12.1.rhaos4.7.el8.x86_64", "8Base-RHOSE-4.7:NetworkManager-adsl-debuginfo-1:1.26.0-12.1.rhaos4.7.el8.ppc64le", "8Base-RHOSE-4.7:NetworkManager-adsl-debuginfo-1:1.26.0-12.1.rhaos4.7.el8.s390x", "8Base-RHOSE-4.7:NetworkManager-adsl-debuginfo-1:1.26.0-12.1.rhaos4.7.el8.x86_64", "8Base-RHOSE-4.7:NetworkManager-bluetooth-1:1.26.0-12.1.rhaos4.7.el8.ppc64le", "8Base-RHOSE-4.7:NetworkManager-bluetooth-1:1.26.0-12.1.rhaos4.7.el8.s390x", "8Base-RHOSE-4.7:NetworkManager-bluetooth-1:1.26.0-12.1.rhaos4.7.el8.x86_64", "8Base-RHOSE-4.7:NetworkManager-bluetooth-debuginfo-1:1.26.0-12.1.rhaos4.7.el8.ppc64le", "8Base-RHOSE-4.7:NetworkManager-bluetooth-debuginfo-1:1.26.0-12.1.rhaos4.7.el8.s390x", "8Base-RHOSE-4.7:NetworkManager-bluetooth-debuginfo-1:1.26.0-12.1.rhaos4.7.el8.x86_64", "8Base-RHOSE-4.7:NetworkManager-cloud-setup-1:1.26.0-12.1.rhaos4.7.el8.ppc64le", "8Base-RHOSE-4.7:NetworkManager-cloud-setup-1:1.26.0-12.1.rhaos4.7.el8.s390x", "8Base-RHOSE-4.7:NetworkManager-cloud-setup-1:1.26.0-12.1.rhaos4.7.el8.x86_64", "8Base-RHOSE-4.7:NetworkManager-cloud-setup-debuginfo-1:1.26.0-12.1.rhaos4.7.el8.ppc64le", "8Base-RHOSE-4.7:NetworkManager-cloud-setup-debuginfo-1:1.26.0-12.1.rhaos4.7.el8.s390x", "8Base-RHOSE-4.7:NetworkManager-cloud-setup-debuginfo-1:1.26.0-12.1.rhaos4.7.el8.x86_64", "8Base-RHOSE-4.7:NetworkManager-config-connectivity-redhat-1:1.26.0-12.1.rhaos4.7.el8.noarch", "8Base-RHOSE-4.7:NetworkManager-config-server-1:1.26.0-12.1.rhaos4.7.el8.noarch", "8Base-RHOSE-4.7:NetworkManager-debuginfo-1:1.26.0-12.1.rhaos4.7.el8.ppc64le", "8Base-RHOSE-4.7:NetworkManager-debuginfo-1:1.26.0-12.1.rhaos4.7.el8.s390x", "8Base-RHOSE-4.7:NetworkManager-debuginfo-1:1.26.0-12.1.rhaos4.7.el8.x86_64", "8Base-RHOSE-4.7:NetworkManager-debugsource-1:1.26.0-12.1.rhaos4.7.el8.ppc64le", "8Base-RHOSE-4.7:NetworkManager-debugsource-1:1.26.0-12.1.rhaos4.7.el8.s390x", "8Base-RHOSE-4.7:NetworkManager-debugsource-1:1.26.0-12.1.rhaos4.7.el8.x86_64", "8Base-RHOSE-4.7:NetworkManager-dispatcher-routing-rules-1:1.26.0-12.1.rhaos4.7.el8.noarch", "8Base-RHOSE-4.7:NetworkManager-libnm-1:1.26.0-12.1.rhaos4.7.el8.ppc64le", "8Base-RHOSE-4.7:NetworkManager-libnm-1:1.26.0-12.1.rhaos4.7.el8.s390x", "8Base-RHOSE-4.7:NetworkManager-libnm-1:1.26.0-12.1.rhaos4.7.el8.x86_64", "8Base-RHOSE-4.7:NetworkManager-libnm-debuginfo-1:1.26.0-12.1.rhaos4.7.el8.ppc64le", "8Base-RHOSE-4.7:NetworkManager-libnm-debuginfo-1:1.26.0-12.1.rhaos4.7.el8.s390x", "8Base-RHOSE-4.7:NetworkManager-libnm-debuginfo-1:1.26.0-12.1.rhaos4.7.el8.x86_64", "8Base-RHOSE-4.7:NetworkManager-libnm-devel-1:1.26.0-12.1.rhaos4.7.el8.ppc64le", "8Base-RHOSE-4.7:NetworkManager-libnm-devel-1:1.26.0-12.1.rhaos4.7.el8.s390x", "8Base-RHOSE-4.7:NetworkManager-libnm-devel-1:1.26.0-12.1.rhaos4.7.el8.x86_64", "8Base-RHOSE-4.7:NetworkManager-ovs-1:1.26.0-12.1.rhaos4.7.el8.ppc64le", "8Base-RHOSE-4.7:NetworkManager-ovs-1:1.26.0-12.1.rhaos4.7.el8.s390x", "8Base-RHOSE-4.7:NetworkManager-ovs-1:1.26.0-12.1.rhaos4.7.el8.x86_64", "8Base-RHOSE-4.7:NetworkManager-ovs-debuginfo-1:1.26.0-12.1.rhaos4.7.el8.ppc64le", "8Base-RHOSE-4.7:NetworkManager-ovs-debuginfo-1:1.26.0-12.1.rhaos4.7.el8.s390x", "8Base-RHOSE-4.7:NetworkManager-ovs-debuginfo-1:1.26.0-12.1.rhaos4.7.el8.x86_64", "8Base-RHOSE-4.7:NetworkManager-ppp-1:1.26.0-12.1.rhaos4.7.el8.ppc64le", "8Base-RHOSE-4.7:NetworkManager-ppp-1:1.26.0-12.1.rhaos4.7.el8.s390x", "8Base-RHOSE-4.7:NetworkManager-ppp-1:1.26.0-12.1.rhaos4.7.el8.x86_64", "8Base-RHOSE-4.7:NetworkManager-ppp-debuginfo-1:1.26.0-12.1.rhaos4.7.el8.ppc64le", "8Base-RHOSE-4.7:NetworkManager-ppp-debuginfo-1:1.26.0-12.1.rhaos4.7.el8.s390x", "8Base-RHOSE-4.7:NetworkManager-ppp-debuginfo-1:1.26.0-12.1.rhaos4.7.el8.x86_64", "8Base-RHOSE-4.7:NetworkManager-team-1:1.26.0-12.1.rhaos4.7.el8.ppc64le", "8Base-RHOSE-4.7:NetworkManager-team-1:1.26.0-12.1.rhaos4.7.el8.s390x", "8Base-RHOSE-4.7:NetworkManager-team-1:1.26.0-12.1.rhaos4.7.el8.x86_64", "8Base-RHOSE-4.7:NetworkManager-team-debuginfo-1:1.26.0-12.1.rhaos4.7.el8.ppc64le", "8Base-RHOSE-4.7:NetworkManager-team-debuginfo-1:1.26.0-12.1.rhaos4.7.el8.s390x", "8Base-RHOSE-4.7:NetworkManager-team-debuginfo-1:1.26.0-12.1.rhaos4.7.el8.x86_64", "8Base-RHOSE-4.7:NetworkManager-tui-1:1.26.0-12.1.rhaos4.7.el8.ppc64le", "8Base-RHOSE-4.7:NetworkManager-tui-1:1.26.0-12.1.rhaos4.7.el8.s390x", "8Base-RHOSE-4.7:NetworkManager-tui-1:1.26.0-12.1.rhaos4.7.el8.x86_64", "8Base-RHOSE-4.7:NetworkManager-tui-debuginfo-1:1.26.0-12.1.rhaos4.7.el8.ppc64le", "8Base-RHOSE-4.7:NetworkManager-tui-debuginfo-1:1.26.0-12.1.rhaos4.7.el8.s390x", "8Base-RHOSE-4.7:NetworkManager-tui-debuginfo-1:1.26.0-12.1.rhaos4.7.el8.x86_64", "8Base-RHOSE-4.7:NetworkManager-wifi-1:1.26.0-12.1.rhaos4.7.el8.ppc64le", "8Base-RHOSE-4.7:NetworkManager-wifi-1:1.26.0-12.1.rhaos4.7.el8.s390x", "8Base-RHOSE-4.7:NetworkManager-wifi-1:1.26.0-12.1.rhaos4.7.el8.x86_64", "8Base-RHOSE-4.7:NetworkManager-wifi-debuginfo-1:1.26.0-12.1.rhaos4.7.el8.ppc64le", "8Base-RHOSE-4.7:NetworkManager-wifi-debuginfo-1:1.26.0-12.1.rhaos4.7.el8.s390x", "8Base-RHOSE-4.7:NetworkManager-wifi-debuginfo-1:1.26.0-12.1.rhaos4.7.el8.x86_64", "8Base-RHOSE-4.7:NetworkManager-wwan-1:1.26.0-12.1.rhaos4.7.el8.ppc64le", "8Base-RHOSE-4.7:NetworkManager-wwan-1:1.26.0-12.1.rhaos4.7.el8.s390x", "8Base-RHOSE-4.7:NetworkManager-wwan-1:1.26.0-12.1.rhaos4.7.el8.x86_64", "8Base-RHOSE-4.7:NetworkManager-wwan-debuginfo-1:1.26.0-12.1.rhaos4.7.el8.ppc64le", "8Base-RHOSE-4.7:NetworkManager-wwan-debuginfo-1:1.26.0-12.1.rhaos4.7.el8.s390x", "8Base-RHOSE-4.7:NetworkManager-wwan-debuginfo-1:1.26.0-12.1.rhaos4.7.el8.x86_64", "8Base-RHOSE-4.7:afterburn-0:4.6.0-1.rhaos4.7.el8.ppc64le", "8Base-RHOSE-4.7:afterburn-0:4.6.0-1.rhaos4.7.el8.s390x", "8Base-RHOSE-4.7:afterburn-0:4.6.0-1.rhaos4.7.el8.x86_64", "8Base-RHOSE-4.7:afterburn-debuginfo-0:4.6.0-1.rhaos4.7.el8.ppc64le", "8Base-RHOSE-4.7:afterburn-debuginfo-0:4.6.0-1.rhaos4.7.el8.s390x", "8Base-RHOSE-4.7:afterburn-debuginfo-0:4.6.0-1.rhaos4.7.el8.x86_64", "8Base-RHOSE-4.7:ansible-runner-0:1.4.6-2.el8ar.noarch", "8Base-RHOSE-4.7:ansible-runner-0:1.4.6-2.el8ar.src", "8Base-RHOSE-4.7:ansible-runner-http-0:1.0.0-2.el8ar.noarch", "8Base-RHOSE-4.7:ansible-runner-http-0:1.0.0-2.el8ar.src", "8Base-RHOSE-4.7:atomic-openshift-service-idler-0:4.7.0-202011171454.p0.git.15.675c1c8.el8.ppc64le", "8Base-RHOSE-4.7:atomic-openshift-service-idler-0:4.7.0-202011171454.p0.git.15.675c1c8.el8.s390x", "8Base-RHOSE-4.7:atomic-openshift-service-idler-0:4.7.0-202011171454.p0.git.15.675c1c8.el8.src", "8Base-RHOSE-4.7:atomic-openshift-service-idler-0:4.7.0-202011171454.p0.git.15.675c1c8.el8.x86_64", "8Base-RHOSE-4.7:bootupd-0:0.2.5-2.el8.x86_64", "8Base-RHOSE-4.7:bootupd-debuginfo-0:0.2.5-2.el8.x86_64", "8Base-RHOSE-4.7:clevis-0:15-1.el8.ppc64le", "8Base-RHOSE-4.7:clevis-0:15-1.el8.s390x", "8Base-RHOSE-4.7:clevis-0:15-1.el8.src", "8Base-RHOSE-4.7:clevis-0:15-1.el8.x86_64", "8Base-RHOSE-4.7:clevis-debuginfo-0:15-1.el8.ppc64le", "8Base-RHOSE-4.7:clevis-debuginfo-0:15-1.el8.s390x", "8Base-RHOSE-4.7:clevis-debuginfo-0:15-1.el8.x86_64", "8Base-RHOSE-4.7:clevis-debugsource-0:15-1.el8.ppc64le", "8Base-RHOSE-4.7:clevis-debugsource-0:15-1.el8.s390x", "8Base-RHOSE-4.7:clevis-debugsource-0:15-1.el8.x86_64", "8Base-RHOSE-4.7:clevis-dracut-0:15-1.el8.ppc64le", "8Base-RHOSE-4.7:clevis-dracut-0:15-1.el8.s390x", "8Base-RHOSE-4.7:clevis-dracut-0:15-1.el8.x86_64", "8Base-RHOSE-4.7:clevis-luks-0:15-1.el8.ppc64le", "8Base-RHOSE-4.7:clevis-luks-0:15-1.el8.s390x", "8Base-RHOSE-4.7:clevis-luks-0:15-1.el8.x86_64", "8Base-RHOSE-4.7:clevis-systemd-0:15-1.el8.ppc64le", "8Base-RHOSE-4.7:clevis-systemd-0:15-1.el8.s390x", "8Base-RHOSE-4.7:clevis-systemd-0:15-1.el8.x86_64", "8Base-RHOSE-4.7:clevis-udisks2-0:15-1.el8.ppc64le", "8Base-RHOSE-4.7:clevis-udisks2-0:15-1.el8.s390x", "8Base-RHOSE-4.7:clevis-udisks2-0:15-1.el8.x86_64", "8Base-RHOSE-4.7:clevis-udisks2-debuginfo-0:15-1.el8.ppc64le", "8Base-RHOSE-4.7:clevis-udisks2-debuginfo-0:15-1.el8.s390x", "8Base-RHOSE-4.7:clevis-udisks2-debuginfo-0:15-1.el8.x86_64", "8Base-RHOSE-4.7:conmon-2:2.0.21-2.rhaos4.6.el8.ppc64le", "8Base-RHOSE-4.7:conmon-2:2.0.21-2.rhaos4.6.el8.s390x", "8Base-RHOSE-4.7:conmon-2:2.0.21-2.rhaos4.6.el8.src", "8Base-RHOSE-4.7:conmon-2:2.0.21-2.rhaos4.6.el8.x86_64", "8Base-RHOSE-4.7:console-login-helper-messages-0:0.20.3-1.rhaos4.7.el8.noarch", "8Base-RHOSE-4.7:console-login-helper-messages-0:0.20.3-1.rhaos4.7.el8.src", "8Base-RHOSE-4.7:console-login-helper-messages-issuegen-0:0.20.3-1.rhaos4.7.el8.noarch", "8Base-RHOSE-4.7:console-login-helper-messages-profile-0:0.20.3-1.rhaos4.7.el8.noarch", "8Base-RHOSE-4.7:container-selinux-2:2.151.0-1.rhaos4.7.el8.noarch", "8Base-RHOSE-4.7:container-selinux-2:2.151.0-1.rhaos4.7.el8.src", "8Base-RHOSE-4.7:containernetworking-plugins-0:0.8.6-1.rhaos4.5.el8.ppc64le", "8Base-RHOSE-4.7:containernetworking-plugins-0:0.8.6-1.rhaos4.5.el8.s390x", "8Base-RHOSE-4.7:containernetworking-plugins-0:0.8.6-1.rhaos4.5.el8.src", "8Base-RHOSE-4.7:containernetworking-plugins-0:0.8.6-1.rhaos4.5.el8.x86_64", "8Base-RHOSE-4.7:containernetworking-plugins-debuginfo-0:0.8.6-1.rhaos4.5.el8.ppc64le", "8Base-RHOSE-4.7:containernetworking-plugins-debuginfo-0:0.8.6-1.rhaos4.5.el8.s390x", "8Base-RHOSE-4.7:containernetworking-plugins-debuginfo-0:0.8.6-1.rhaos4.5.el8.x86_64", "8Base-RHOSE-4.7:containernetworking-plugins-debugsource-0:0.8.6-1.rhaos4.5.el8.ppc64le", "8Base-RHOSE-4.7:containernetworking-plugins-debugsource-0:0.8.6-1.rhaos4.5.el8.s390x", "8Base-RHOSE-4.7:containernetworking-plugins-debugsource-0:0.8.6-1.rhaos4.5.el8.x86_64", "8Base-RHOSE-4.7:coreos-installer-0:0.8.0-3.rhaos4.7.el8.ppc64le", "8Base-RHOSE-4.7:coreos-installer-0:0.8.0-3.rhaos4.7.el8.s390x", "8Base-RHOSE-4.7:coreos-installer-0:0.8.0-3.rhaos4.7.el8.src", "8Base-RHOSE-4.7:coreos-installer-0:0.8.0-3.rhaos4.7.el8.x86_64", "8Base-RHOSE-4.7:coreos-installer-bootinfra-0:0.8.0-3.rhaos4.7.el8.ppc64le", "8Base-RHOSE-4.7:coreos-installer-bootinfra-0:0.8.0-3.rhaos4.7.el8.s390x", "8Base-RHOSE-4.7:coreos-installer-bootinfra-debuginfo-0:0.8.0-3.rhaos4.7.el8.ppc64le", "8Base-RHOSE-4.7:coreos-installer-bootinfra-debuginfo-0:0.8.0-3.rhaos4.7.el8.s390x", "8Base-RHOSE-4.7:coreos-installer-bootinfra-debuginfo-0:0.8.0-3.rhaos4.7.el8.x86_64", "8Base-RHOSE-4.7:coreos-installer-debuginfo-0:0.8.0-3.rhaos4.7.el8.ppc64le", "8Base-RHOSE-4.7:coreos-installer-debuginfo-0:0.8.0-3.rhaos4.7.el8.s390x", "8Base-RHOSE-4.7:coreos-installer-debuginfo-0:0.8.0-3.rhaos4.7.el8.x86_64", "8Base-RHOSE-4.7:coreos-installer-debugsource-0:0.8.0-3.rhaos4.7.el8.ppc64le", "8Base-RHOSE-4.7:coreos-installer-debugsource-0:0.8.0-3.rhaos4.7.el8.s390x", "8Base-RHOSE-4.7:coreos-installer-debugsource-0:0.8.0-3.rhaos4.7.el8.x86_64", "8Base-RHOSE-4.7:cri-o-0:1.20.0-0.rhaos4.7.git8921e00.el8.51.ppc64le", "8Base-RHOSE-4.7:cri-o-0:1.20.0-0.rhaos4.7.git8921e00.el8.51.s390x", "8Base-RHOSE-4.7:cri-o-0:1.20.0-0.rhaos4.7.git8921e00.el8.51.src", "8Base-RHOSE-4.7:cri-o-0:1.20.0-0.rhaos4.7.git8921e00.el8.51.x86_64", "8Base-RHOSE-4.7:cri-o-debuginfo-0:1.20.0-0.rhaos4.7.git8921e00.el8.51.ppc64le", "8Base-RHOSE-4.7:cri-o-debuginfo-0:1.20.0-0.rhaos4.7.git8921e00.el8.51.s390x", "8Base-RHOSE-4.7:cri-o-debuginfo-0:1.20.0-0.rhaos4.7.git8921e00.el8.51.x86_64", "8Base-RHOSE-4.7:cri-o-debugsource-0:1.20.0-0.rhaos4.7.git8921e00.el8.51.ppc64le", "8Base-RHOSE-4.7:cri-o-debugsource-0:1.20.0-0.rhaos4.7.git8921e00.el8.51.s390x", "8Base-RHOSE-4.7:cri-o-debugsource-0:1.20.0-0.rhaos4.7.git8921e00.el8.51.x86_64", "8Base-RHOSE-4.7:cri-tools-0:1.20.0-1.el8.ppc64le", "8Base-RHOSE-4.7:cri-tools-0:1.20.0-1.el8.s390x", "8Base-RHOSE-4.7:cri-tools-0:1.20.0-1.el8.src", "8Base-RHOSE-4.7:cri-tools-0:1.20.0-1.el8.x86_64", "8Base-RHOSE-4.7:cri-tools-debuginfo-0:1.20.0-1.el8.ppc64le", "8Base-RHOSE-4.7:cri-tools-debuginfo-0:1.20.0-1.el8.s390x", "8Base-RHOSE-4.7:cri-tools-debuginfo-0:1.20.0-1.el8.x86_64", "8Base-RHOSE-4.7:cri-tools-debugsource-0:1.20.0-1.el8.ppc64le", "8Base-RHOSE-4.7:cri-tools-debugsource-0:1.20.0-1.el8.s390x", "8Base-RHOSE-4.7:cri-tools-debugsource-0:1.20.0-1.el8.x86_64", "8Base-RHOSE-4.7:dracut-0:049-95.git20200804.el8_3.4.ppc64le", "8Base-RHOSE-4.7:dracut-0:049-95.git20200804.el8_3.4.s390x", "8Base-RHOSE-4.7:dracut-0:049-95.git20200804.el8_3.4.src", "8Base-RHOSE-4.7:dracut-0:049-95.git20200804.el8_3.4.x86_64", "8Base-RHOSE-4.7:dracut-caps-0:049-95.git20200804.el8_3.4.ppc64le", "8Base-RHOSE-4.7:dracut-caps-0:049-95.git20200804.el8_3.4.s390x", "8Base-RHOSE-4.7:dracut-caps-0:049-95.git20200804.el8_3.4.x86_64", "8Base-RHOSE-4.7:dracut-config-generic-0:049-95.git20200804.el8_3.4.ppc64le", "8Base-RHOSE-4.7:dracut-config-generic-0:049-95.git20200804.el8_3.4.s390x", "8Base-RHOSE-4.7:dracut-config-generic-0:049-95.git20200804.el8_3.4.x86_64", "8Base-RHOSE-4.7:dracut-config-rescue-0:049-95.git20200804.el8_3.4.ppc64le", "8Base-RHOSE-4.7:dracut-config-rescue-0:049-95.git20200804.el8_3.4.s390x", "8Base-RHOSE-4.7:dracut-config-rescue-0:049-95.git20200804.el8_3.4.x86_64", "8Base-RHOSE-4.7:dracut-debuginfo-0:049-95.git20200804.el8_3.4.ppc64le", "8Base-RHOSE-4.7:dracut-debuginfo-0:049-95.git20200804.el8_3.4.s390x", "8Base-RHOSE-4.7:dracut-debuginfo-0:049-95.git20200804.el8_3.4.x86_64", "8Base-RHOSE-4.7:dracut-debugsource-0:049-95.git20200804.el8_3.4.ppc64le", "8Base-RHOSE-4.7:dracut-debugsource-0:049-95.git20200804.el8_3.4.s390x", "8Base-RHOSE-4.7:dracut-debugsource-0:049-95.git20200804.el8_3.4.x86_64", "8Base-RHOSE-4.7:dracut-live-0:049-95.git20200804.el8_3.4.ppc64le", "8Base-RHOSE-4.7:dracut-live-0:049-95.git20200804.el8_3.4.s390x", "8Base-RHOSE-4.7:dracut-live-0:049-95.git20200804.el8_3.4.x86_64", "8Base-RHOSE-4.7:dracut-network-0:049-95.git20200804.el8_3.4.ppc64le", "8Base-RHOSE-4.7:dracut-network-0:049-95.git20200804.el8_3.4.s390x", "8Base-RHOSE-4.7:dracut-network-0:049-95.git20200804.el8_3.4.x86_64", "8Base-RHOSE-4.7:dracut-squash-0:049-95.git20200804.el8_3.4.ppc64le", "8Base-RHOSE-4.7:dracut-squash-0:049-95.git20200804.el8_3.4.s390x", "8Base-RHOSE-4.7:dracut-squash-0:049-95.git20200804.el8_3.4.x86_64", "8Base-RHOSE-4.7:dracut-tools-0:049-95.git20200804.el8_3.4.ppc64le", "8Base-RHOSE-4.7:dracut-tools-0:049-95.git20200804.el8_3.4.s390x", "8Base-RHOSE-4.7:dracut-tools-0:049-95.git20200804.el8_3.4.x86_64", "8Base-RHOSE-4.7:faq-0:0.0.6-5.el8.ppc64le", "8Base-RHOSE-4.7:faq-0:0.0.6-5.el8.s390x", "8Base-RHOSE-4.7:faq-0:0.0.6-5.el8.src", "8Base-RHOSE-4.7:faq-0:0.0.6-5.el8.x86_64", "8Base-RHOSE-4.7:golang-github-prometheus-promu-0:0.5.0-2.git642a960.el8.ppc64le", "8Base-RHOSE-4.7:golang-github-prometheus-promu-0:0.5.0-2.git642a960.el8.s390x", "8Base-RHOSE-4.7:golang-github-prometheus-promu-0:0.5.0-2.git642a960.el8.src", "8Base-RHOSE-4.7:golang-github-prometheus-promu-0:0.5.0-2.git642a960.el8.x86_64", "8Base-RHOSE-4.7:gperftools-0:2.6.3-2.el8ost.ppc64le", "8Base-RHOSE-4.7:gperftools-0:2.6.3-2.el8ost.s390x", "8Base-RHOSE-4.7:gperftools-0:2.6.3-2.el8ost.src", "8Base-RHOSE-4.7:gperftools-0:2.6.3-2.el8ost.x86_64", "8Base-RHOSE-4.7:gperftools-debugsource-0:2.6.3-2.el8ost.ppc64le", "8Base-RHOSE-4.7:gperftools-debugsource-0:2.6.3-2.el8ost.s390x", "8Base-RHOSE-4.7:gperftools-debugsource-0:2.6.3-2.el8ost.x86_64", "8Base-RHOSE-4.7:gperftools-devel-0:2.6.3-2.el8ost.ppc64le", "8Base-RHOSE-4.7:gperftools-devel-0:2.6.3-2.el8ost.s390x", "8Base-RHOSE-4.7:gperftools-devel-0:2.6.3-2.el8ost.x86_64", "8Base-RHOSE-4.7:gperftools-libs-0:2.6.3-2.el8ost.ppc64le", "8Base-RHOSE-4.7:gperftools-libs-0:2.6.3-2.el8ost.s390x", "8Base-RHOSE-4.7:gperftools-libs-0:2.6.3-2.el8ost.x86_64", "8Base-RHOSE-4.7:gperftools-libs-debuginfo-0:2.6.3-2.el8ost.ppc64le", "8Base-RHOSE-4.7:gperftools-libs-debuginfo-0:2.6.3-2.el8ost.s390x", "8Base-RHOSE-4.7:gperftools-libs-debuginfo-0:2.6.3-2.el8ost.x86_64", "8Base-RHOSE-4.7:grpc-0:1.18.0-4.el8ost.ppc64le", "8Base-RHOSE-4.7:grpc-0:1.18.0-4.el8ost.s390x", "8Base-RHOSE-4.7:grpc-0:1.18.0-4.el8ost.src", "8Base-RHOSE-4.7:grpc-0:1.18.0-4.el8ost.x86_64", "8Base-RHOSE-4.7:grpc-cli-0:1.18.0-4.el8ost.ppc64le", "8Base-RHOSE-4.7:grpc-cli-0:1.18.0-4.el8ost.s390x", "8Base-RHOSE-4.7:grpc-cli-0:1.18.0-4.el8ost.x86_64", "8Base-RHOSE-4.7:grpc-cli-debuginfo-0:1.18.0-4.el8ost.ppc64le", "8Base-RHOSE-4.7:grpc-cli-debuginfo-0:1.18.0-4.el8ost.s390x", "8Base-RHOSE-4.7:grpc-cli-debuginfo-0:1.18.0-4.el8ost.x86_64", "8Base-RHOSE-4.7:grpc-debuginfo-0:1.18.0-4.el8ost.ppc64le", "8Base-RHOSE-4.7:grpc-debuginfo-0:1.18.0-4.el8ost.s390x", "8Base-RHOSE-4.7:grpc-debuginfo-0:1.18.0-4.el8ost.x86_64", "8Base-RHOSE-4.7:grpc-debugsource-0:1.18.0-4.el8ost.ppc64le", "8Base-RHOSE-4.7:grpc-debugsource-0:1.18.0-4.el8ost.s390x", "8Base-RHOSE-4.7:grpc-debugsource-0:1.18.0-4.el8ost.x86_64", "8Base-RHOSE-4.7:grpc-devel-0:1.18.0-4.el8ost.ppc64le", "8Base-RHOSE-4.7:grpc-devel-0:1.18.0-4.el8ost.s390x", "8Base-RHOSE-4.7:grpc-devel-0:1.18.0-4.el8ost.x86_64", "8Base-RHOSE-4.7:grpc-plugins-0:1.18.0-4.el8ost.ppc64le", "8Base-RHOSE-4.7:grpc-plugins-0:1.18.0-4.el8ost.s390x", "8Base-RHOSE-4.7:grpc-plugins-0:1.18.0-4.el8ost.x86_64", "8Base-RHOSE-4.7:grpc-plugins-debuginfo-0:1.18.0-4.el8ost.ppc64le", "8Base-RHOSE-4.7:grpc-plugins-debuginfo-0:1.18.0-4.el8ost.s390x", "8Base-RHOSE-4.7:grpc-plugins-debuginfo-0:1.18.0-4.el8ost.x86_64", "8Base-RHOSE-4.7:haproxy-0:2.0.19-1.el8.src", "8Base-RHOSE-4.7:haproxy-debugsource-0:2.0.19-1.el8.ppc64le", "8Base-RHOSE-4.7:haproxy-debugsource-0:2.0.19-1.el8.s390x", "8Base-RHOSE-4.7:haproxy-debugsource-0:2.0.19-1.el8.x86_64", "8Base-RHOSE-4.7:haproxy20-0:2.0.19-1.el8.ppc64le", "8Base-RHOSE-4.7:haproxy20-0:2.0.19-1.el8.s390x", "8Base-RHOSE-4.7:haproxy20-0:2.0.19-1.el8.x86_64", "8Base-RHOSE-4.7:haproxy20-debuginfo-0:2.0.19-1.el8.ppc64le", "8Base-RHOSE-4.7:haproxy20-debuginfo-0:2.0.19-1.el8.s390x", "8Base-RHOSE-4.7:haproxy20-debuginfo-0:2.0.19-1.el8.x86_64", "8Base-RHOSE-4.7:ignition-0:2.9.0-2.rhaos4.7.git1d56dc8.el8.ppc64le", "8Base-RHOSE-4.7:ignition-0:2.9.0-2.rhaos4.7.git1d56dc8.el8.s390x", "8Base-RHOSE-4.7:ignition-0:2.9.0-2.rhaos4.7.git1d56dc8.el8.src", "8Base-RHOSE-4.7:ignition-0:2.9.0-2.rhaos4.7.git1d56dc8.el8.x86_64", "8Base-RHOSE-4.7:ignition-debuginfo-0:2.9.0-2.rhaos4.7.git1d56dc8.el8.ppc64le", "8Base-RHOSE-4.7:ignition-debuginfo-0:2.9.0-2.rhaos4.7.git1d56dc8.el8.s390x", "8Base-RHOSE-4.7:ignition-debuginfo-0:2.9.0-2.rhaos4.7.git1d56dc8.el8.x86_64", "8Base-RHOSE-4.7:ignition-debugsource-0:2.9.0-2.rhaos4.7.git1d56dc8.el8.ppc64le", "8Base-RHOSE-4.7:ignition-debugsource-0:2.9.0-2.rhaos4.7.git1d56dc8.el8.s390x", "8Base-RHOSE-4.7:ignition-debugsource-0:2.9.0-2.rhaos4.7.git1d56dc8.el8.x86_64", "8Base-RHOSE-4.7:ignition-validate-0:2.9.0-2.rhaos4.7.git1d56dc8.el8.ppc64le", "8Base-RHOSE-4.7:ignition-validate-0:2.9.0-2.rhaos4.7.git1d56dc8.el8.s390x", "8Base-RHOSE-4.7:ignition-validate-0:2.9.0-2.rhaos4.7.git1d56dc8.el8.x86_64", "8Base-RHOSE-4.7:ignition-validate-debuginfo-0:2.9.0-2.rhaos4.7.git1d56dc8.el8.ppc64le", "8Base-RHOSE-4.7:ignition-validate-debuginfo-0:2.9.0-2.rhaos4.7.git1d56dc8.el8.s390x", "8Base-RHOSE-4.7:ignition-validate-debuginfo-0:2.9.0-2.rhaos4.7.git1d56dc8.el8.x86_64", "8Base-RHOSE-4.7:inotify-tools-0:3.20.1-2.el8.ppc64le", "8Base-RHOSE-4.7:inotify-tools-0:3.20.1-2.el8.s390x", "8Base-RHOSE-4.7:inotify-tools-0:3.20.1-2.el8.src", "8Base-RHOSE-4.7:inotify-tools-0:3.20.1-2.el8.x86_64", "8Base-RHOSE-4.7:inotify-tools-debuginfo-0:3.20.1-2.el8.ppc64le", "8Base-RHOSE-4.7:inotify-tools-debuginfo-0:3.20.1-2.el8.s390x", "8Base-RHOSE-4.7:inotify-tools-debuginfo-0:3.20.1-2.el8.x86_64", "8Base-RHOSE-4.7:inotify-tools-debugsource-0:3.20.1-2.el8.ppc64le", "8Base-RHOSE-4.7:inotify-tools-debugsource-0:3.20.1-2.el8.s390x", "8Base-RHOSE-4.7:inotify-tools-debugsource-0:3.20.1-2.el8.x86_64", "8Base-RHOSE-4.7:inotify-tools-devel-0:3.20.1-2.el8.ppc64le", "8Base-RHOSE-4.7:inotify-tools-devel-0:3.20.1-2.el8.s390x", "8Base-RHOSE-4.7:inotify-tools-devel-0:3.20.1-2.el8.x86_64", "8Base-RHOSE-4.7:ironic-images-0:15.1-20210114.1.el8.noarch", "8Base-RHOSE-4.7:ironic-images-0:15.1-20210114.1.el8.src", "8Base-RHOSE-4.7:ironic-images-all-0:15.1-20210114.1.el8.noarch", "8Base-RHOSE-4.7:ironic-images-ipa-ppc64le-0:15.1-20210114.1.el8.noarch", "8Base-RHOSE-4.7:ironic-images-ipa-x86_64-0:15.1-20210114.1.el8.noarch", "8Base-RHOSE-4.7:jenkins-0:2.263.3.1612449007-1.el8.noarch", "8Base-RHOSE-4.7:jenkins-0:2.263.3.1612449007-1.el8.src", "8Base-RHOSE-4.7:jenkins-2-plugins-0:4.7.1611636915-1.el8.noarch", "8Base-RHOSE-4.7:jenkins-2-plugins-0:4.7.1611636915-1.el8.src", "8Base-RHOSE-4.7:jq-0:1.6-2.el8.ppc64le", "8Base-RHOSE-4.7:jq-0:1.6-2.el8.s390x", "8Base-RHOSE-4.7:jq-0:1.6-2.el8.src", "8Base-RHOSE-4.7:jq-0:1.6-2.el8.x86_64", "8Base-RHOSE-4.7:jq-debuginfo-0:1.6-2.el8.ppc64le", "8Base-RHOSE-4.7:jq-debuginfo-0:1.6-2.el8.s390x", "8Base-RHOSE-4.7:jq-debuginfo-0:1.6-2.el8.x86_64", "8Base-RHOSE-4.7:jq-debugsource-0:1.6-2.el8.ppc64le", "8Base-RHOSE-4.7:jq-debugsource-0:1.6-2.el8.s390x", "8Base-RHOSE-4.7:jq-debugsource-0:1.6-2.el8.x86_64", "8Base-RHOSE-4.7:jq-devel-0:1.6-2.el8.ppc64le", "8Base-RHOSE-4.7:jq-devel-0:1.6-2.el8.s390x", "8Base-RHOSE-4.7:jq-devel-0:1.6-2.el8.x86_64", "8Base-RHOSE-4.7:kuryr-binding-scripts-0:1.1.1-0.20190923160834.41e6964.el8ost.noarch", "8Base-RHOSE-4.7:libnftnl-0:1.1.5-4.el8.ppc64le", "8Base-RHOSE-4.7:libnftnl-0:1.1.5-4.el8.s390x", "8Base-RHOSE-4.7:libnftnl-0:1.1.5-4.el8.src", "8Base-RHOSE-4.7:libnftnl-0:1.1.5-4.el8.x86_64", "8Base-RHOSE-4.7:libnftnl-debuginfo-0:1.1.5-4.el8.ppc64le", "8Base-RHOSE-4.7:libnftnl-debuginfo-0:1.1.5-4.el8.s390x", "8Base-RHOSE-4.7:libnftnl-debuginfo-0:1.1.5-4.el8.x86_64", "8Base-RHOSE-4.7:libnftnl-debugsource-0:1.1.5-4.el8.ppc64le", "8Base-RHOSE-4.7:libnftnl-debugsource-0:1.1.5-4.el8.s390x", "8Base-RHOSE-4.7:libnftnl-debugsource-0:1.1.5-4.el8.x86_64", "8Base-RHOSE-4.7:libnftnl-devel-0:1.1.5-4.el8.ppc64le", "8Base-RHOSE-4.7:libnftnl-devel-0:1.1.5-4.el8.s390x", "8Base-RHOSE-4.7:libnftnl-devel-0:1.1.5-4.el8.x86_64", "8Base-RHOSE-4.7:libsodium-0:1.0.16-4.5.el8ost.ppc64le", "8Base-RHOSE-4.7:libsodium-0:1.0.16-4.5.el8ost.s390x", "8Base-RHOSE-4.7:libsodium-0:1.0.16-4.5.el8ost.src", "8Base-RHOSE-4.7:libsodium-0:1.0.16-4.5.el8ost.x86_64", "8Base-RHOSE-4.7:libsodium-debuginfo-0:1.0.16-4.5.el8ost.ppc64le", "8Base-RHOSE-4.7:libsodium-debuginfo-0:1.0.16-4.5.el8ost.s390x", "8Base-RHOSE-4.7:libsodium-debuginfo-0:1.0.16-4.5.el8ost.x86_64", "8Base-RHOSE-4.7:libsodium-debugsource-0:1.0.16-4.5.el8ost.ppc64le", "8Base-RHOSE-4.7:libsodium-debugsource-0:1.0.16-4.5.el8ost.s390x", "8Base-RHOSE-4.7:libsodium-debugsource-0:1.0.16-4.5.el8ost.x86_64", "8Base-RHOSE-4.7:libsodium-devel-0:1.0.16-4.5.el8ost.ppc64le", "8Base-RHOSE-4.7:libsodium-devel-0:1.0.16-4.5.el8ost.s390x", "8Base-RHOSE-4.7:libsodium-devel-0:1.0.16-4.5.el8ost.x86_64", "8Base-RHOSE-4.7:libsodium-static-0:1.0.16-4.5.el8ost.ppc64le", "8Base-RHOSE-4.7:libsodium-static-0:1.0.16-4.5.el8ost.s390x", "8Base-RHOSE-4.7:libsodium-static-0:1.0.16-4.5.el8ost.x86_64", "8Base-RHOSE-4.7:libunwind-0:1.2.1-5.el8.ppc64le", "8Base-RHOSE-4.7:libunwind-0:1.2.1-5.el8.src", "8Base-RHOSE-4.7:libunwind-0:1.2.1-5.el8.x86_64", "8Base-RHOSE-4.7:libunwind-debuginfo-0:1.2.1-5.el8.ppc64le", "8Base-RHOSE-4.7:libunwind-debuginfo-0:1.2.1-5.el8.x86_64", "8Base-RHOSE-4.7:libunwind-debugsource-0:1.2.1-5.el8.ppc64le", "8Base-RHOSE-4.7:libunwind-debugsource-0:1.2.1-5.el8.x86_64", "8Base-RHOSE-4.7:libunwind-devel-0:1.2.1-5.el8.ppc64le", "8Base-RHOSE-4.7:libunwind-devel-0:1.2.1-5.el8.x86_64", "8Base-RHOSE-4.7:network-scripts-openvswitch2.13-0:2.13.0-79.el8fdp.ppc64le", "8Base-RHOSE-4.7:network-scripts-openvswitch2.13-0:2.13.0-79.el8fdp.s390x", "8Base-RHOSE-4.7:network-scripts-openvswitch2.13-0:2.13.0-79.el8fdp.x86_64", "8Base-RHOSE-4.7:octavia-amphora-image-x86_64-0:17.0-20200606.1.el8ost.noarch", "8Base-RHOSE-4.7:openshift-clients-0:4.7.0-202102032256.p0.git.3951.0e656ef.el8.ppc64le", "8Base-RHOSE-4.7:openshift-clients-0:4.7.0-202102032256.p0.git.3951.0e656ef.el8.s390x", "8Base-RHOSE-4.7:openshift-clients-0:4.7.0-202102032256.p0.git.3951.0e656ef.el8.src", "8Base-RHOSE-4.7:openshift-clients-0:4.7.0-202102032256.p0.git.3951.0e656ef.el8.x86_64", "8Base-RHOSE-4.7:openshift-clients-redistributable-0:4.7.0-202102032256.p0.git.3951.0e656ef.el8.x86_64", "8Base-RHOSE-4.7:openshift-eventrouter-0:0.2-4.git7c289cc.el8.ppc64le", "8Base-RHOSE-4.7:openshift-eventrouter-0:0.2-4.git7c289cc.el8.s390x", "8Base-RHOSE-4.7:openshift-eventrouter-0:0.2-4.git7c289cc.el8.src", "8Base-RHOSE-4.7:openshift-eventrouter-0:0.2-4.git7c289cc.el8.x86_64", "8Base-RHOSE-4.7:openshift-eventrouter-debuginfo-0:0.2-4.git7c289cc.el8.ppc64le", "8Base-RHOSE-4.7:openshift-eventrouter-debuginfo-0:0.2-4.git7c289cc.el8.s390x", "8Base-RHOSE-4.7:openshift-eventrouter-debuginfo-0:0.2-4.git7c289cc.el8.x86_64", "8Base-RHOSE-4.7:openshift-eventrouter-debugsource-0:0.2-4.git7c289cc.el8.ppc64le", "8Base-RHOSE-4.7:openshift-eventrouter-debugsource-0:0.2-4.git7c289cc.el8.s390x", "8Base-RHOSE-4.7:openshift-eventrouter-debugsource-0:0.2-4.git7c289cc.el8.x86_64", "8Base-RHOSE-4.7:openshift-kuryr-0:4.7.0-202101262230.p0.git.2494.cd95ce5.el8.src", "8Base-RHOSE-4.7:openshift-kuryr-cni-0:4.7.0-202101262230.p0.git.2494.cd95ce5.el8.noarch", "8Base-RHOSE-4.7:openshift-kuryr-common-0:4.7.0-202101262230.p0.git.2494.cd95ce5.el8.noarch", "8Base-RHOSE-4.7:openshift-kuryr-controller-0:4.7.0-202101262230.p0.git.2494.cd95ce5.el8.noarch", "8Base-RHOSE-4.7:openstack-ironic-1:16.0.4-0.20210203051223.7d74ea0.el8.src", "8Base-RHOSE-4.7:openstack-ironic-api-1:16.0.4-0.20210203051223.7d74ea0.el8.noarch", "8Base-RHOSE-4.7:openstack-ironic-common-1:16.0.4-0.20210203051223.7d74ea0.el8.noarch", "8Base-RHOSE-4.7:openstack-ironic-conductor-1:16.0.4-0.20210203051223.7d74ea0.el8.noarch", "8Base-RHOSE-4.7:openstack-ironic-inspector-0:10.4.1-0.20201123161216.70fccec.el8.noarch", "8Base-RHOSE-4.7:openstack-ironic-inspector-0:10.4.1-0.20201123161216.70fccec.el8.src", "8Base-RHOSE-4.7:openstack-ironic-inspector-api-0:10.4.1-0.20201123161216.70fccec.el8.noarch", "8Base-RHOSE-4.7:openstack-ironic-inspector-conductor-0:10.4.1-0.20201123161216.70fccec.el8.noarch", "8Base-RHOSE-4.7:openstack-ironic-inspector-dnsmasq-0:10.4.1-0.20201123161216.70fccec.el8.noarch", "8Base-RHOSE-4.7:openstack-ironic-python-agent-0:6.4.3-0.20201217171210.bd45db1.el8.noarch", "8Base-RHOSE-4.7:openstack-ironic-python-agent-0:6.4.3-0.20201217171210.bd45db1.el8.src", "8Base-RHOSE-4.7:openvswitch2.13-0:2.13.0-79.el8fdp.ppc64le", "8Base-RHOSE-4.7:openvswitch2.13-0:2.13.0-79.el8fdp.s390x", "8Base-RHOSE-4.7:openvswitch2.13-0:2.13.0-79.el8fdp.src", "8Base-RHOSE-4.7:openvswitch2.13-0:2.13.0-79.el8fdp.x86_64", "8Base-RHOSE-4.7:openvswitch2.13-debuginfo-0:2.13.0-79.el8fdp.ppc64le", "8Base-RHOSE-4.7:openvswitch2.13-debuginfo-0:2.13.0-79.el8fdp.s390x", "8Base-RHOSE-4.7:openvswitch2.13-debuginfo-0:2.13.0-79.el8fdp.x86_64", "8Base-RHOSE-4.7:openvswitch2.13-debugsource-0:2.13.0-79.el8fdp.ppc64le", "8Base-RHOSE-4.7:openvswitch2.13-debugsource-0:2.13.0-79.el8fdp.s390x", "8Base-RHOSE-4.7:openvswitch2.13-debugsource-0:2.13.0-79.el8fdp.x86_64", "8Base-RHOSE-4.7:openvswitch2.13-devel-0:2.13.0-79.el8fdp.ppc64le", "8Base-RHOSE-4.7:openvswitch2.13-devel-0:2.13.0-79.el8fdp.s390x", "8Base-RHOSE-4.7:openvswitch2.13-devel-0:2.13.0-79.el8fdp.x86_64", "8Base-RHOSE-4.7:openvswitch2.13-test-0:2.13.0-79.el8fdp.noarch", "8Base-RHOSE-4.7:ostree-0:2020.7-1.el8.ppc64le", "8Base-RHOSE-4.7:ostree-0:2020.7-1.el8.s390x", "8Base-RHOSE-4.7:ostree-0:2020.7-1.el8.src", "8Base-RHOSE-4.7:ostree-0:2020.7-1.el8.x86_64", "8Base-RHOSE-4.7:ostree-debuginfo-0:2020.7-1.el8.ppc64le", "8Base-RHOSE-4.7:ostree-debuginfo-0:2020.7-1.el8.s390x", "8Base-RHOSE-4.7:ostree-debuginfo-0:2020.7-1.el8.x86_64", "8Base-RHOSE-4.7:ostree-debugsource-0:2020.7-1.el8.ppc64le", "8Base-RHOSE-4.7:ostree-debugsource-0:2020.7-1.el8.s390x", "8Base-RHOSE-4.7:ostree-debugsource-0:2020.7-1.el8.x86_64", "8Base-RHOSE-4.7:ostree-devel-0:2020.7-1.el8.ppc64le", "8Base-RHOSE-4.7:ostree-devel-0:2020.7-1.el8.s390x", "8Base-RHOSE-4.7:ostree-devel-0:2020.7-1.el8.x86_64", "8Base-RHOSE-4.7:ostree-grub2-0:2020.7-1.el8.ppc64le", "8Base-RHOSE-4.7:ostree-grub2-0:2020.7-1.el8.x86_64", "8Base-RHOSE-4.7:ostree-libs-0:2020.7-1.el8.ppc64le", "8Base-RHOSE-4.7:ostree-libs-0:2020.7-1.el8.s390x", "8Base-RHOSE-4.7:ostree-libs-0:2020.7-1.el8.x86_64", "8Base-RHOSE-4.7:ostree-libs-debuginfo-0:2020.7-1.el8.ppc64le", "8Base-RHOSE-4.7:ostree-libs-debuginfo-0:2020.7-1.el8.s390x", "8Base-RHOSE-4.7:ostree-libs-debuginfo-0:2020.7-1.el8.x86_64", "8Base-RHOSE-4.7:ovn2.13-0:20.09.0-21.el8fdn.ppc64le", "8Base-RHOSE-4.7:ovn2.13-0:20.09.0-21.el8fdn.s390x", "8Base-RHOSE-4.7:ovn2.13-0:20.09.0-21.el8fdn.src", "8Base-RHOSE-4.7:ovn2.13-0:20.09.0-21.el8fdn.x86_64", "8Base-RHOSE-4.7:ovn2.13-central-0:20.09.0-21.el8fdn.ppc64le", "8Base-RHOSE-4.7:ovn2.13-central-0:20.09.0-21.el8fdn.s390x", "8Base-RHOSE-4.7:ovn2.13-central-0:20.09.0-21.el8fdn.x86_64", "8Base-RHOSE-4.7:ovn2.13-central-debuginfo-0:20.09.0-21.el8fdn.ppc64le", "8Base-RHOSE-4.7:ovn2.13-central-debuginfo-0:20.09.0-21.el8fdn.s390x", "8Base-RHOSE-4.7:ovn2.13-central-debuginfo-0:20.09.0-21.el8fdn.x86_64", "8Base-RHOSE-4.7:ovn2.13-debuginfo-0:20.09.0-21.el8fdn.ppc64le", "8Base-RHOSE-4.7:ovn2.13-debuginfo-0:20.09.0-21.el8fdn.s390x", "8Base-RHOSE-4.7:ovn2.13-debuginfo-0:20.09.0-21.el8fdn.x86_64", "8Base-RHOSE-4.7:ovn2.13-debugsource-0:20.09.0-21.el8fdn.ppc64le", "8Base-RHOSE-4.7:ovn2.13-debugsource-0:20.09.0-21.el8fdn.s390x", "8Base-RHOSE-4.7:ovn2.13-debugsource-0:20.09.0-21.el8fdn.x86_64", "8Base-RHOSE-4.7:ovn2.13-host-0:20.09.0-21.el8fdn.ppc64le", "8Base-RHOSE-4.7:ovn2.13-host-0:20.09.0-21.el8fdn.s390x", "8Base-RHOSE-4.7:ovn2.13-host-0:20.09.0-21.el8fdn.x86_64", "8Base-RHOSE-4.7:ovn2.13-host-debuginfo-0:20.09.0-21.el8fdn.ppc64le", "8Base-RHOSE-4.7:ovn2.13-host-debuginfo-0:20.09.0-21.el8fdn.s390x", "8Base-RHOSE-4.7:ovn2.13-host-debuginfo-0:20.09.0-21.el8fdn.x86_64", "8Base-RHOSE-4.7:ovn2.13-vtep-0:20.09.0-21.el8fdn.ppc64le", "8Base-RHOSE-4.7:ovn2.13-vtep-0:20.09.0-21.el8fdn.s390x", "8Base-RHOSE-4.7:ovn2.13-vtep-0:20.09.0-21.el8fdn.x86_64", "8Base-RHOSE-4.7:ovn2.13-vtep-debuginfo-0:20.09.0-21.el8fdn.ppc64le", "8Base-RHOSE-4.7:ovn2.13-vtep-debuginfo-0:20.09.0-21.el8fdn.s390x", "8Base-RHOSE-4.7:ovn2.13-vtep-debuginfo-0:20.09.0-21.el8fdn.x86_64", "8Base-RHOSE-4.7:powerpc-utils-0:1.3.6-12.el8_3.ppc64le", "8Base-RHOSE-4.7:powerpc-utils-0:1.3.6-12.el8_3.src", "8Base-RHOSE-4.7:powerpc-utils-core-0:1.3.6-12.el8_3.ppc64le", "8Base-RHOSE-4.7:powerpc-utils-core-debuginfo-0:1.3.6-12.el8_3.ppc64le", "8Base-RHOSE-4.7:powerpc-utils-debugsource-0:1.3.6-12.el8_3.ppc64le", "8Base-RHOSE-4.7:pprof-0:2.6.3-2.el8ost.noarch", "8Base-RHOSE-4.7:prometheus-promu-0:0.5.0-2.git642a960.el8.ppc64le", "8Base-RHOSE-4.7:prometheus-promu-0:0.5.0-2.git642a960.el8.s390x", "8Base-RHOSE-4.7:prometheus-promu-0:0.5.0-2.git642a960.el8.x86_64", "8Base-RHOSE-4.7:protobuf-0:3.6.1-4.el8ost.ppc64le", "8Base-RHOSE-4.7:protobuf-0:3.6.1-4.el8ost.s390x", "8Base-RHOSE-4.7:protobuf-0:3.6.1-4.el8ost.src", "8Base-RHOSE-4.7:protobuf-0:3.6.1-4.el8ost.x86_64", "8Base-RHOSE-4.7:protobuf-compiler-0:3.6.1-4.el8ost.ppc64le", "8Base-RHOSE-4.7:protobuf-compiler-0:3.6.1-4.el8ost.s390x", "8Base-RHOSE-4.7:protobuf-compiler-0:3.6.1-4.el8ost.x86_64", "8Base-RHOSE-4.7:protobuf-compiler-debuginfo-0:3.6.1-4.el8ost.ppc64le", "8Base-RHOSE-4.7:protobuf-compiler-debuginfo-0:3.6.1-4.el8ost.s390x", "8Base-RHOSE-4.7:protobuf-compiler-debuginfo-0:3.6.1-4.el8ost.x86_64", "8Base-RHOSE-4.7:protobuf-debuginfo-0:3.6.1-4.el8ost.ppc64le", "8Base-RHOSE-4.7:protobuf-debuginfo-0:3.6.1-4.el8ost.s390x", "8Base-RHOSE-4.7:protobuf-debuginfo-0:3.6.1-4.el8ost.x86_64", "8Base-RHOSE-4.7:protobuf-debugsource-0:3.6.1-4.el8ost.ppc64le", "8Base-RHOSE-4.7:protobuf-debugsource-0:3.6.1-4.el8ost.s390x", "8Base-RHOSE-4.7:protobuf-debugsource-0:3.6.1-4.el8ost.x86_64", "8Base-RHOSE-4.7:protobuf-devel-0:3.6.1-4.el8ost.ppc64le", "8Base-RHOSE-4.7:protobuf-devel-0:3.6.1-4.el8ost.s390x", "8Base-RHOSE-4.7:protobuf-devel-0:3.6.1-4.el8ost.x86_64", "8Base-RHOSE-4.7:protobuf-lite-0:3.6.1-4.el8ost.ppc64le", "8Base-RHOSE-4.7:protobuf-lite-0:3.6.1-4.el8ost.s390x", "8Base-RHOSE-4.7:protobuf-lite-0:3.6.1-4.el8ost.x86_64", "8Base-RHOSE-4.7:protobuf-lite-debuginfo-0:3.6.1-4.el8ost.ppc64le", "8Base-RHOSE-4.7:protobuf-lite-debuginfo-0:3.6.1-4.el8ost.s390x", "8Base-RHOSE-4.7:protobuf-lite-debuginfo-0:3.6.1-4.el8ost.x86_64", "8Base-RHOSE-4.7:protobuf-lite-devel-0:3.6.1-4.el8ost.ppc64le", "8Base-RHOSE-4.7:protobuf-lite-devel-0:3.6.1-4.el8ost.s390x", "8Base-RHOSE-4.7:protobuf-lite-devel-0:3.6.1-4.el8ost.x86_64", "8Base-RHOSE-4.7:protobuf-lite-static-0:3.6.1-4.el8ost.ppc64le", "8Base-RHOSE-4.7:protobuf-lite-static-0:3.6.1-4.el8ost.s390x", "8Base-RHOSE-4.7:protobuf-lite-static-0:3.6.1-4.el8ost.x86_64", "8Base-RHOSE-4.7:protobuf-static-0:3.6.1-4.el8ost.ppc64le", "8Base-RHOSE-4.7:protobuf-static-0:3.6.1-4.el8ost.s390x", "8Base-RHOSE-4.7:protobuf-static-0:3.6.1-4.el8ost.x86_64", "8Base-RHOSE-4.7:protobuf-vim-0:3.6.1-4.el8ost.noarch", "8Base-RHOSE-4.7:python-alembic-0:1.4.2-5.el8ost.src", "8Base-RHOSE-4.7:python-boto3-0:1.9.101-1.el8ost.src", "8Base-RHOSE-4.7:python-botocore-0:1.12.119-1.el8ost.src", "8Base-RHOSE-4.7:python-cachetools-0:3.1.0-1.el8ost.src", "8Base-RHOSE-4.7:python-certifi-0:2018.10.15-4.el8ost.src", "8Base-RHOSE-4.7:python-construct-0:2.10.56-1.el8ost.src", "8Base-RHOSE-4.7:python-daemon-0:2.1.2-9.el8ar.src", "8Base-RHOSE-4.7:python-debtcollector-0:2.2.0-0.20201008171245.649189d.el8.src", "8Base-RHOSE-4.7:python-dictdiffer-0:0.7.1-2.el8ost.src", "8Base-RHOSE-4.7:python-eventlet-0:0.25.2-3.el8ost.src", "8Base-RHOSE-4.7:python-flask-1:1.1.1-1.el8ost.src", "8Base-RHOSE-4.7:python-flask-doc-1:1.1.1-1.el8ost.noarch", "8Base-RHOSE-4.7:python-google-auth-0:1.3.0-1.el8ost.src", "8Base-RHOSE-4.7:python-hardware-0:0.23.0-0.20201031022149.59211cc.el8.src", "8Base-RHOSE-4.7:python-ifaddr-0:0.1.6-5.el8ost.src", "8Base-RHOSE-4.7:python-importlib-metadata-0:1.7.0-1.el8ost.src", "8Base-RHOSE-4.7:python-ironic-lib-0:4.4.1-0.20201218041209.aa7cfec.el8.src", "8Base-RHOSE-4.7:python-keystoneauth1-0:4.2.0-0.20200630234358.dab8e10.el8ost.src", "8Base-RHOSE-4.7:python-kubernetes-0:11.0.0-1.el8.src", "8Base-RHOSE-4.7:python-kuryr-lib-0:1.1.1-0.20190923160834.41e6964.el8ost.src", "8Base-RHOSE-4.7:python-lockfile-1:0.11.0-8.el8ar.src", "8Base-RHOSE-4.7:python-msgpack-0:0.6.2-1.el8ost.src", "8Base-RHOSE-4.7:python-msgpack-debugsource-0:0.6.2-1.el8ost.x86_64", "8Base-RHOSE-4.7:python-openshift-1:0.11.2-1.el8.src", "8Base-RHOSE-4.7:python-openstacksdk-0:0.48.0-0.20200708092906.3b693c2.el8ost.src", "8Base-RHOSE-4.7:python-oslo-concurrency-0:4.3.0-0.20201008180343.2f78803.el8.src", "8Base-RHOSE-4.7:python-oslo-concurrency-lang-0:4.3.0-0.20201008180343.2f78803.el8.noarch", "8Base-RHOSE-4.7:python-oslo-config-2:8.3.2-0.20201008180634.fcb8894.el8.src", "8Base-RHOSE-4.7:python-oslo-context-0:3.1.1-0.20201008190523.57dbded.el8.src", "8Base-RHOSE-4.7:python-oslo-db-0:8.4.0-0.20200918104110.e42c733.el8ost.src", "8Base-RHOSE-4.7:python-oslo-db-lang-0:8.4.0-0.20200918104110.e42c733.el8ost.noarch", "8Base-RHOSE-4.7:python-oslo-i18n-0:5.0.1-0.20201009131251.73187bd.el8.src", "8Base-RHOSE-4.7:python-oslo-i18n-lang-0:5.0.1-0.20201009131251.73187bd.el8.noarch", "8Base-RHOSE-4.7:python-oslo-log-0:4.3.1-0.20201207021200.1597f24.el8.src", "8Base-RHOSE-4.7:python-oslo-log-lang-0:4.3.1-0.20201207021200.1597f24.el8.noarch", "8Base-RHOSE-4.7:python-oslo-serialization-0:4.0.1-0.20201008182423.c7884b2.el8.src", "8Base-RHOSE-4.7:python-oslo-service-0:2.4.0-0.20201008184547.58466a6.el8.src", "8Base-RHOSE-4.7:python-oslo-utils-0:4.6.0-0.20201009175936.91497da.el8.src", "8Base-RHOSE-4.7:python-oslo-utils-lang-0:4.6.0-0.20201009175936.91497da.el8.noarch", "8Base-RHOSE-4.7:python-packaging-0:20.4-1.el8ost.src", "8Base-RHOSE-4.7:python-packaging-doc-0:20.4-1.el8ost.noarch", "8Base-RHOSE-4.7:python-paste-0:3.2.4-1.el8ost.src", "8Base-RHOSE-4.7:python-paste-deploy-0:2.0.1-4.el8ost.src", "8Base-RHOSE-4.7:python-pbr-0:5.4.3-2.el8ost.src", "8Base-RHOSE-4.7:python-pexpect-0:4.6-2.el8ar.src", "8Base-RHOSE-4.7:python-pint-0:0.10.1-1.el8ost.src", "8Base-RHOSE-4.7:python-psutil-0:5.6.6-1.el8ar.src", "8Base-RHOSE-4.7:python-psutil-debugsource-0:5.6.6-1.el8ar.ppc64le", "8Base-RHOSE-4.7:python-psutil-debugsource-0:5.6.6-1.el8ar.s390x", "8Base-RHOSE-4.7:python-psutil-debugsource-0:5.6.6-1.el8ar.x86_64", "8Base-RHOSE-4.7:python-pyghmi-0:1.5.14-2.1.el8ost.src", "8Base-RHOSE-4.7:python-pyroute2-0:0.5.13-1.el8ost.src", "8Base-RHOSE-4.7:python-requests-unixsocket-0:0.1.5-5.el8ar.src", "8Base-RHOSE-4.7:python-rsa-0:4.7-1.el8.src", "8Base-RHOSE-4.7:python-ruamel-yaml-0:0.15.41-4.el8ost.src", "8Base-RHOSE-4.7:python-ruamel-yaml-debugsource-0:0.15.41-4.el8ost.ppc64le", "8Base-RHOSE-4.7:python-ruamel-yaml-debugsource-0:0.15.41-4.el8ost.s390x", "8Base-RHOSE-4.7:python-ruamel-yaml-debugsource-0:0.15.41-4.el8ost.x86_64", "8Base-RHOSE-4.7:python-s3transfer-0:0.2.0-1.el8ost.src", "8Base-RHOSE-4.7:python-stevedore-0:3.2.2-0.20201009151242.274eaa6.el8.src", "8Base-RHOSE-4.7:python-string_utils-0:0.6.0-4.el8ost.src", "8Base-RHOSE-4.7:python-sushy-0:3.6.1-0.20210122201213.7ec0422.el8.src", "8Base-RHOSE-4.7:python-sushy-oem-idrac-0:0.0.3-0.20200922221223.1202372.el8ost.src", "8Base-RHOSE-4.7:python-tenacity-0:6.2.0-1.el8ost.src", "8Base-RHOSE-4.7:python-tooz-0:2.7.0-0.20200723133754.fca43df.el8ost.src", "8Base-RHOSE-4.7:python-websocket-client-0:0.54.0-1.el8ost.src", "8Base-RHOSE-4.7:python-werkzeug-0:1.0.1-3.el8ost.src", "8Base-RHOSE-4.7:python-zeroconf-0:0.24.4-1.el8ost.src", "8Base-RHOSE-4.7:python-zipp-0:0.5.1-2.el8ost.src", "8Base-RHOSE-4.7:python2-botocore-0:1.12.119-1.el8ost.noarch", "8Base-RHOSE-4.7:python2-cachetools-0:3.1.0-1.el8ost.noarch", "8Base-RHOSE-4.7:python3-alembic-0:1.4.2-5.el8ost.noarch", "8Base-RHOSE-4.7:python3-ansible-runner-0:1.4.6-2.el8ar.noarch", "8Base-RHOSE-4.7:python3-boto3-0:1.9.101-1.el8ost.noarch", "8Base-RHOSE-4.7:python3-botocore-0:1.12.119-1.el8ost.noarch", "8Base-RHOSE-4.7:python3-cachetools-0:3.1.0-1.el8ost.noarch", "8Base-RHOSE-4.7:python3-certifi-0:2018.10.15-4.el8ost.noarch", "8Base-RHOSE-4.7:python3-construct-0:2.10.56-1.el8ost.noarch", "8Base-RHOSE-4.7:python3-daemon-0:2.1.2-9.el8ar.noarch", "8Base-RHOSE-4.7:python3-debtcollector-0:2.2.0-0.20201008171245.649189d.el8.noarch", "8Base-RHOSE-4.7:python3-dictdiffer-0:0.7.1-2.el8ost.noarch", "8Base-RHOSE-4.7:python3-eventlet-0:0.25.2-3.el8ost.noarch", "8Base-RHOSE-4.7:python3-flask-1:1.1.1-1.el8ost.noarch", "8Base-RHOSE-4.7:python3-google-auth-0:1.3.0-1.el8ost.noarch", "8Base-RHOSE-4.7:python3-grpcio-0:1.18.0-4.el8ost.ppc64le", "8Base-RHOSE-4.7:python3-grpcio-0:1.18.0-4.el8ost.s390x", "8Base-RHOSE-4.7:python3-grpcio-0:1.18.0-4.el8ost.x86_64", "8Base-RHOSE-4.7:python3-grpcio-debuginfo-0:1.18.0-4.el8ost.ppc64le", "8Base-RHOSE-4.7:python3-grpcio-debuginfo-0:1.18.0-4.el8ost.s390x", "8Base-RHOSE-4.7:python3-grpcio-debuginfo-0:1.18.0-4.el8ost.x86_64", "8Base-RHOSE-4.7:python3-hardware-0:0.23.0-0.20201031022149.59211cc.el8.noarch", "8Base-RHOSE-4.7:python3-hardware-detect-0:0.23.0-0.20201031022149.59211cc.el8.noarch", "8Base-RHOSE-4.7:python3-ifaddr-0:0.1.6-5.el8ost.noarch", "8Base-RHOSE-4.7:python3-importlib-metadata-0:1.7.0-1.el8ost.noarch", "8Base-RHOSE-4.7:python3-ironic-inspector-tests-0:10.4.1-0.20201123161216.70fccec.el8.noarch", "8Base-RHOSE-4.7:python3-ironic-lib-0:4.4.1-0.20201218041209.aa7cfec.el8.noarch", "8Base-RHOSE-4.7:python3-ironic-python-agent-0:6.4.3-0.20201217171210.bd45db1.el8.noarch", "8Base-RHOSE-4.7:python3-ironic-tests-1:16.0.4-0.20210203051223.7d74ea0.el8.noarch", "8Base-RHOSE-4.7:python3-keystoneauth1-0:4.2.0-0.20200630234358.dab8e10.el8ost.noarch", "8Base-RHOSE-4.7:python3-kubernetes-0:11.0.0-1.el8.noarch", "8Base-RHOSE-4.7:python3-kubernetes-tests-0:11.0.0-1.el8.noarch", "8Base-RHOSE-4.7:python3-kuryr-kubernetes-0:4.7.0-202101262230.p0.git.2494.cd95ce5.el8.noarch", "8Base-RHOSE-4.7:python3-kuryr-lib-0:1.1.1-0.20190923160834.41e6964.el8ost.noarch", "8Base-RHOSE-4.7:python3-kuryr-lib-tests-0:1.1.1-0.20190923160834.41e6964.el8ost.noarch", "8Base-RHOSE-4.7:python3-lockfile-1:0.11.0-8.el8ar.noarch", "8Base-RHOSE-4.7:python3-msgpack-0:0.6.2-1.el8ost.x86_64", "8Base-RHOSE-4.7:python3-msgpack-debuginfo-0:0.6.2-1.el8ost.x86_64", "8Base-RHOSE-4.7:python3-openshift-1:0.11.2-1.el8.noarch", "8Base-RHOSE-4.7:python3-openstacksdk-0:0.48.0-0.20200708092906.3b693c2.el8ost.noarch", "8Base-RHOSE-4.7:python3-openstacksdk-tests-0:0.48.0-0.20200708092906.3b693c2.el8ost.noarch", "8Base-RHOSE-4.7:python3-openvswitch2.13-0:2.13.0-79.el8fdp.ppc64le", "8Base-RHOSE-4.7:python3-openvswitch2.13-0:2.13.0-79.el8fdp.s390x", "8Base-RHOSE-4.7:python3-openvswitch2.13-0:2.13.0-79.el8fdp.x86_64", "8Base-RHOSE-4.7:python3-openvswitch2.13-debuginfo-0:2.13.0-79.el8fdp.ppc64le", "8Base-RHOSE-4.7:python3-openvswitch2.13-debuginfo-0:2.13.0-79.el8fdp.s390x", "8Base-RHOSE-4.7:python3-openvswitch2.13-debuginfo-0:2.13.0-79.el8fdp.x86_64", "8Base-RHOSE-4.7:python3-oslo-concurrency-0:4.3.0-0.20201008180343.2f78803.el8.noarch", "8Base-RHOSE-4.7:python3-oslo-concurrency-tests-0:4.3.0-0.20201008180343.2f78803.el8.noarch", "8Base-RHOSE-4.7:python3-oslo-config-2:8.3.2-0.20201008180634.fcb8894.el8.noarch", "8Base-RHOSE-4.7:python3-oslo-context-0:3.1.1-0.20201008190523.57dbded.el8.noarch", "8Base-RHOSE-4.7:python3-oslo-context-tests-0:3.1.1-0.20201008190523.57dbded.el8.noarch", "8Base-RHOSE-4.7:python3-oslo-db-0:8.4.0-0.20200918104110.e42c733.el8ost.noarch", "8Base-RHOSE-4.7:python3-oslo-db-tests-0:8.4.0-0.20200918104110.e42c733.el8ost.noarch", "8Base-RHOSE-4.7:python3-oslo-i18n-0:5.0.1-0.20201009131251.73187bd.el8.noarch", "8Base-RHOSE-4.7:python3-oslo-log-0:4.3.1-0.20201207021200.1597f24.el8.noarch", "8Base-RHOSE-4.7:python3-oslo-log-tests-0:4.3.1-0.20201207021200.1597f24.el8.noarch", "8Base-RHOSE-4.7:python3-oslo-serialization-0:4.0.1-0.20201008182423.c7884b2.el8.noarch", "8Base-RHOSE-4.7:python3-oslo-serialization-tests-0:4.0.1-0.20201008182423.c7884b2.el8.noarch", "8Base-RHOSE-4.7:python3-oslo-service-0:2.4.0-0.20201008184547.58466a6.el8.noarch", "8Base-RHOSE-4.7:python3-oslo-service-tests-0:2.4.0-0.20201008184547.58466a6.el8.noarch", "8Base-RHOSE-4.7:python3-oslo-utils-0:4.6.0-0.20201009175936.91497da.el8.noarch", "8Base-RHOSE-4.7:python3-oslo-utils-tests-0:4.6.0-0.20201009175936.91497da.el8.noarch", "8Base-RHOSE-4.7:python3-packaging-0:20.4-1.el8ost.noarch", "8Base-RHOSE-4.7:python3-paste-0:3.2.4-1.el8ost.noarch", "8Base-RHOSE-4.7:python3-paste-deploy-0:2.0.1-4.el8ost.noarch", "8Base-RHOSE-4.7:python3-pbr-0:5.4.3-2.el8ost.noarch", "8Base-RHOSE-4.7:python3-pexpect-0:4.6-2.el8ar.noarch", "8Base-RHOSE-4.7:python3-pint-0:0.10.1-1.el8ost.noarch", "8Base-RHOSE-4.7:python3-protobuf-0:3.6.1-4.el8ost.noarch", "8Base-RHOSE-4.7:python3-psutil-0:5.6.6-1.el8ar.ppc64le", "8Base-RHOSE-4.7:python3-psutil-0:5.6.6-1.el8ar.s390x", "8Base-RHOSE-4.7:python3-psutil-0:5.6.6-1.el8ar.x86_64", "8Base-RHOSE-4.7:python3-psutil-debuginfo-0:5.6.6-1.el8ar.ppc64le", "8Base-RHOSE-4.7:python3-psutil-debuginfo-0:5.6.6-1.el8ar.s390x", "8Base-RHOSE-4.7:python3-psutil-debuginfo-0:5.6.6-1.el8ar.x86_64", "8Base-RHOSE-4.7:python3-pyghmi-0:1.5.14-2.1.el8ost.noarch", "8Base-RHOSE-4.7:python3-pyroute2-0:0.5.13-1.el8ost.noarch", "8Base-RHOSE-4.7:python3-requests-unixsocket-0:0.1.5-5.el8ar.noarch", "8Base-RHOSE-4.7:python3-rsa-0:4.7-1.el8.noarch", "8Base-RHOSE-4.7:python3-ruamel-yaml-0:0.15.41-4.el8ost.ppc64le", "8Base-RHOSE-4.7:python3-ruamel-yaml-0:0.15.41-4.el8ost.s390x", "8Base-RHOSE-4.7:python3-ruamel-yaml-0:0.15.41-4.el8ost.x86_64", "8Base-RHOSE-4.7:python3-ruamel-yaml-debuginfo-0:0.15.41-4.el8ost.ppc64le", "8Base-RHOSE-4.7:python3-ruamel-yaml-debuginfo-0:0.15.41-4.el8ost.s390x", "8Base-RHOSE-4.7:python3-ruamel-yaml-debuginfo-0:0.15.41-4.el8ost.x86_64", "8Base-RHOSE-4.7:python3-s3transfer-0:0.2.0-1.el8ost.noarch", "8Base-RHOSE-4.7:python3-stevedore-0:3.2.2-0.20201009151242.274eaa6.el8.noarch", "8Base-RHOSE-4.7:python3-string_utils-0:0.6.0-4.el8ost.noarch", "8Base-RHOSE-4.7:python3-sushy-0:3.6.1-0.20210122201213.7ec0422.el8.noarch", "8Base-RHOSE-4.7:python3-sushy-oem-idrac-0:0.0.3-0.20200922221223.1202372.el8ost.noarch", "8Base-RHOSE-4.7:python3-sushy-oem-idrac-tests-0:0.0.3-0.20200922221223.1202372.el8ost.noarch", "8Base-RHOSE-4.7:python3-sushy-tests-0:3.6.1-0.20210122201213.7ec0422.el8.noarch", "8Base-RHOSE-4.7:python3-tenacity-0:6.2.0-1.el8ost.noarch", "8Base-RHOSE-4.7:python3-tooz-0:2.7.0-0.20200723133754.fca43df.el8ost.noarch", "8Base-RHOSE-4.7:python3-websocket-client-0:0.54.0-1.el8ost.noarch", "8Base-RHOSE-4.7:python3-werkzeug-0:1.0.1-3.el8ost.noarch", "8Base-RHOSE-4.7:python3-zeroconf-0:0.24.4-1.el8ost.noarch", "8Base-RHOSE-4.7:python3-zipp-0:0.5.1-2.el8ost.noarch", "8Base-RHOSE-4.7:redhat-release-coreos-0:47.83-1.el8.ppc64le", "8Base-RHOSE-4.7:redhat-release-coreos-0:47.83-1.el8.s390x", "8Base-RHOSE-4.7:redhat-release-coreos-0:47.83-1.el8.src", "8Base-RHOSE-4.7:redhat-release-coreos-0:47.83-1.el8.x86_64", "8Base-RHOSE-4.7:rhcos-tools-0:0.0.0-1.rhaos4.2.el8.noarch", "8Base-RHOSE-4.7:rhcos-tools-0:0.0.0-1.rhaos4.2.el8.src", "8Base-RHOSE-4.7:rhosp-director-images-0:17.0-20200606.1.el8ost.noarch", "8Base-RHOSE-4.7:rhosp-director-images-0:17.0-20200606.1.el8ost.src", "8Base-RHOSE-4.7:rhosp-director-images-all-0:17.0-20200606.1.el8ost.noarch", "8Base-RHOSE-4.7:rhosp-director-images-ipa-0:17.0-20200606.1.el8ost.noarch", "8Base-RHOSE-4.7:rhosp-director-images-ipa-ppc64le-0:17.0-20200606.1.el8ost.noarch", "8Base-RHOSE-4.7:rhosp-director-images-ipa-x86_64-0:17.0-20200606.1.el8ost.noarch", "8Base-RHOSE-4.7:rhosp-director-images-minimal-0:17.0-20200606.1.el8ost.noarch", "8Base-RHOSE-4.7:rhosp-director-images-ppc64le-0:17.0-20200606.1.el8ost.noarch", "8Base-RHOSE-4.7:rhosp-director-images-x86_64-0:17.0-20200606.1.el8ost.noarch", "8Base-RHOSE-4.7:rpm-ostree-0:2020.7-1.el8_3.ppc64le", "8Base-RHOSE-4.7:rpm-ostree-0:2020.7-1.el8_3.s390x", "8Base-RHOSE-4.7:rpm-ostree-0:2020.7-1.el8_3.src", "8Base-RHOSE-4.7:rpm-ostree-0:2020.7-1.el8_3.x86_64", "8Base-RHOSE-4.7:rpm-ostree-debuginfo-0:2020.7-1.el8_3.ppc64le", "8Base-RHOSE-4.7:rpm-ostree-debuginfo-0:2020.7-1.el8_3.s390x", "8Base-RHOSE-4.7:rpm-ostree-debuginfo-0:2020.7-1.el8_3.x86_64", "8Base-RHOSE-4.7:rpm-ostree-debugsource-0:2020.7-1.el8_3.ppc64le", "8Base-RHOSE-4.7:rpm-ostree-debugsource-0:2020.7-1.el8_3.s390x", "8Base-RHOSE-4.7:rpm-ostree-debugsource-0:2020.7-1.el8_3.x86_64", "8Base-RHOSE-4.7:rpm-ostree-devel-0:2020.7-1.el8_3.ppc64le", "8Base-RHOSE-4.7:rpm-ostree-devel-0:2020.7-1.el8_3.s390x", "8Base-RHOSE-4.7:rpm-ostree-devel-0:2020.7-1.el8_3.x86_64", "8Base-RHOSE-4.7:rpm-ostree-libs-0:2020.7-1.el8_3.ppc64le", "8Base-RHOSE-4.7:rpm-ostree-libs-0:2020.7-1.el8_3.s390x", "8Base-RHOSE-4.7:rpm-ostree-libs-0:2020.7-1.el8_3.x86_64", "8Base-RHOSE-4.7:rpm-ostree-libs-debuginfo-0:2020.7-1.el8_3.ppc64le", "8Base-RHOSE-4.7:rpm-ostree-libs-debuginfo-0:2020.7-1.el8_3.s390x", "8Base-RHOSE-4.7:rpm-ostree-libs-debuginfo-0:2020.7-1.el8_3.x86_64", "8Base-RHOSE-4.7:runc-0:1.0.0-82.rhaos4.6.git086e841.el8.ppc64le", "8Base-RHOSE-4.7:runc-0:1.0.0-82.rhaos4.6.git086e841.el8.s390x", "8Base-RHOSE-4.7:runc-0:1.0.0-82.rhaos4.6.git086e841.el8.src", "8Base-RHOSE-4.7:runc-0:1.0.0-82.rhaos4.6.git086e841.el8.x86_64", "8Base-RHOSE-4.7:runc-debuginfo-0:1.0.0-82.rhaos4.6.git086e841.el8.ppc64le", "8Base-RHOSE-4.7:runc-debuginfo-0:1.0.0-82.rhaos4.6.git086e841.el8.s390x", "8Base-RHOSE-4.7:runc-debuginfo-0:1.0.0-82.rhaos4.6.git086e841.el8.x86_64", "8Base-RHOSE-4.7:runc-debugsource-0:1.0.0-82.rhaos4.6.git086e841.el8.ppc64le", "8Base-RHOSE-4.7:runc-debugsource-0:1.0.0-82.rhaos4.6.git086e841.el8.s390x", "8Base-RHOSE-4.7:runc-debugsource-0:1.0.0-82.rhaos4.6.git086e841.el8.x86_64", "8Base-RHOSE-4.7:rust-afterburn-0:4.6.0-1.rhaos4.7.el8.src", "8Base-RHOSE-4.7:rust-afterburn-debugsource-0:4.6.0-1.rhaos4.7.el8.ppc64le", "8Base-RHOSE-4.7:rust-afterburn-debugsource-0:4.6.0-1.rhaos4.7.el8.s390x", "8Base-RHOSE-4.7:rust-afterburn-debugsource-0:4.6.0-1.rhaos4.7.el8.x86_64", "8Base-RHOSE-4.7:rust-bootupd-0:0.2.5-2.el8.src", "8Base-RHOSE-4.7:rust-bootupd-debugsource-0:0.2.5-2.el8.x86_64", "8Base-RHOSE-4.7:tini-0:0.16.1-1.el8ar.ppc64le", "8Base-RHOSE-4.7:tini-0:0.16.1-1.el8ar.s390x", "8Base-RHOSE-4.7:tini-0:0.16.1-1.el8ar.src", "8Base-RHOSE-4.7:tini-0:0.16.1-1.el8ar.x86_64", "8Base-RHOSE-4.7:toolbox-0:0.0.8-3.rhaos4.7.el8.noarch", "8Base-RHOSE-4.7:toolbox-0:0.0.8-3.rhaos4.7.el8.src" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1888248" } ], "notes": [ { "category": "description", "text": "A flaw was found in containerd. Credentials may be leaked during an image pull.", "title": "Vulnerability description" }, { "category": "summary", "text": "containerd: credentials leak during image pull", "title": "Vulnerability summary" }, { "category": "other", "text": "In OpenShift Container Platform (OCP) the ose-cluster-autoscaler container ships vulnerable version of the containerd package, but only containerd api is used by the container. The vulnerable code is not delivered, hence marked as wontfix.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RH7-RHOSE-4.7:openshift-0:4.7.0-202102060108.p0.git.97095.7271b90.el7.src", "7Server-RH7-RHOSE-4.7:openshift-hyperkube-0:4.7.0-202102060108.p0.git.97095.7271b90.el7.x86_64", "8Base-RHOSE-4.7:openshift-0:4.7.0-202102060108.p0.git.97095.7271b90.el8.src", "8Base-RHOSE-4.7:openshift-hyperkube-0:4.7.0-202102060108.p0.git.97095.7271b90.el8.ppc64le", "8Base-RHOSE-4.7:openshift-hyperkube-0:4.7.0-202102060108.p0.git.97095.7271b90.el8.s390x", "8Base-RHOSE-4.7:openshift-hyperkube-0:4.7.0-202102060108.p0.git.97095.7271b90.el8.x86_64" ], "known_not_affected": [ "7Server-RH7-RHOSE-4.7:conmon-2:2.0.21-2.rhaos4.6.el7.src", "7Server-RH7-RHOSE-4.7:conmon-2:2.0.21-2.rhaos4.6.el7.x86_64", "7Server-RH7-RHOSE-4.7:containernetworking-plugins-0:0.8.6-1.rhaos4.5.el7.src", "7Server-RH7-RHOSE-4.7:containernetworking-plugins-0:0.8.6-1.rhaos4.5.el7.x86_64", "7Server-RH7-RHOSE-4.7:containernetworking-plugins-debuginfo-0:0.8.6-1.rhaos4.5.el7.x86_64", "7Server-RH7-RHOSE-4.7:cri-o-0:1.20.0-0.rhaos4.7.git8921e00.el7.51.src", "7Server-RH7-RHOSE-4.7:cri-o-0:1.20.0-0.rhaos4.7.git8921e00.el7.51.x86_64", "7Server-RH7-RHOSE-4.7:cri-o-debuginfo-0:1.20.0-0.rhaos4.7.git8921e00.el7.51.x86_64", "7Server-RH7-RHOSE-4.7:cri-tools-0:1.18.0-3.el7.src", "7Server-RH7-RHOSE-4.7:cri-tools-0:1.18.0-3.el7.x86_64", "7Server-RH7-RHOSE-4.7:cri-tools-debuginfo-0:1.18.0-3.el7.x86_64", "7Server-RH7-RHOSE-4.7:haproxy-0:2.0.19-1.el7.src", "7Server-RH7-RHOSE-4.7:haproxy-debuginfo-0:2.0.19-1.el7.x86_64", "7Server-RH7-RHOSE-4.7:haproxy20-0:2.0.19-1.el7.x86_64", "7Server-RH7-RHOSE-4.7:jq-0:1.6-2.el7.src", "7Server-RH7-RHOSE-4.7:jq-0:1.6-2.el7.x86_64", "7Server-RH7-RHOSE-4.7:jq-debuginfo-0:1.6-2.el7.x86_64", "7Server-RH7-RHOSE-4.7:jq-devel-0:1.6-2.el7.x86_64", "7Server-RH7-RHOSE-4.7:oniguruma-0:5.9.2-5.el7.src", "7Server-RH7-RHOSE-4.7:oniguruma-0:5.9.2-5.el7.x86_64", "7Server-RH7-RHOSE-4.7:oniguruma-debuginfo-0:5.9.2-5.el7.x86_64", "7Server-RH7-RHOSE-4.7:oniguruma-devel-0:5.9.2-5.el7.x86_64", "7Server-RH7-RHOSE-4.7:openshift-ansible-0:4.7.0-202102032256.p0.git.0.bf7d9a7.el7.noarch", "7Server-RH7-RHOSE-4.7:openshift-ansible-0:4.7.0-202102032256.p0.git.0.bf7d9a7.el7.src", "7Server-RH7-RHOSE-4.7:openshift-ansible-test-0:4.7.0-202102032256.p0.git.0.bf7d9a7.el7.noarch", "7Server-RH7-RHOSE-4.7:openshift-clients-0:4.7.0-202102032256.p0.git.3951.0e656ef.el7.src", "7Server-RH7-RHOSE-4.7:openshift-clients-0:4.7.0-202102032256.p0.git.3951.0e656ef.el7.x86_64", "7Server-RH7-RHOSE-4.7:openshift-clients-redistributable-0:4.7.0-202102032256.p0.git.3951.0e656ef.el7.x86_64", "7Server-RH7-RHOSE-4.7:python-botocore-0:1.4.57-5.el7.src", "7Server-RH7-RHOSE-4.7:python2-botocore-0:1.4.57-5.el7.noarch", "7Server-RH7-RHOSE-4.7:runc-0:1.0.0-82.rhaos4.6.git086e841.el7.src", "7Server-RH7-RHOSE-4.7:runc-0:1.0.0-82.rhaos4.6.git086e841.el7.x86_64", "7Server-RH7-RHOSE-4.7:runc-debuginfo-0:1.0.0-82.rhaos4.6.git086e841.el7.x86_64", "8Base-RHOSE-4.7:NetworkManager-1:1.26.0-12.1.rhaos4.7.el8.ppc64le", "8Base-RHOSE-4.7:NetworkManager-1:1.26.0-12.1.rhaos4.7.el8.s390x", "8Base-RHOSE-4.7:NetworkManager-1:1.26.0-12.1.rhaos4.7.el8.src", "8Base-RHOSE-4.7:NetworkManager-1:1.26.0-12.1.rhaos4.7.el8.x86_64", "8Base-RHOSE-4.7:NetworkManager-adsl-1:1.26.0-12.1.rhaos4.7.el8.ppc64le", "8Base-RHOSE-4.7:NetworkManager-adsl-1:1.26.0-12.1.rhaos4.7.el8.s390x", "8Base-RHOSE-4.7:NetworkManager-adsl-1:1.26.0-12.1.rhaos4.7.el8.x86_64", "8Base-RHOSE-4.7:NetworkManager-adsl-debuginfo-1:1.26.0-12.1.rhaos4.7.el8.ppc64le", "8Base-RHOSE-4.7:NetworkManager-adsl-debuginfo-1:1.26.0-12.1.rhaos4.7.el8.s390x", "8Base-RHOSE-4.7:NetworkManager-adsl-debuginfo-1:1.26.0-12.1.rhaos4.7.el8.x86_64", "8Base-RHOSE-4.7:NetworkManager-bluetooth-1:1.26.0-12.1.rhaos4.7.el8.ppc64le", "8Base-RHOSE-4.7:NetworkManager-bluetooth-1:1.26.0-12.1.rhaos4.7.el8.s390x", "8Base-RHOSE-4.7:NetworkManager-bluetooth-1:1.26.0-12.1.rhaos4.7.el8.x86_64", "8Base-RHOSE-4.7:NetworkManager-bluetooth-debuginfo-1:1.26.0-12.1.rhaos4.7.el8.ppc64le", "8Base-RHOSE-4.7:NetworkManager-bluetooth-debuginfo-1:1.26.0-12.1.rhaos4.7.el8.s390x", "8Base-RHOSE-4.7:NetworkManager-bluetooth-debuginfo-1:1.26.0-12.1.rhaos4.7.el8.x86_64", "8Base-RHOSE-4.7:NetworkManager-cloud-setup-1:1.26.0-12.1.rhaos4.7.el8.ppc64le", "8Base-RHOSE-4.7:NetworkManager-cloud-setup-1:1.26.0-12.1.rhaos4.7.el8.s390x", "8Base-RHOSE-4.7:NetworkManager-cloud-setup-1:1.26.0-12.1.rhaos4.7.el8.x86_64", "8Base-RHOSE-4.7:NetworkManager-cloud-setup-debuginfo-1:1.26.0-12.1.rhaos4.7.el8.ppc64le", "8Base-RHOSE-4.7:NetworkManager-cloud-setup-debuginfo-1:1.26.0-12.1.rhaos4.7.el8.s390x", "8Base-RHOSE-4.7:NetworkManager-cloud-setup-debuginfo-1:1.26.0-12.1.rhaos4.7.el8.x86_64", "8Base-RHOSE-4.7:NetworkManager-config-connectivity-redhat-1:1.26.0-12.1.rhaos4.7.el8.noarch", "8Base-RHOSE-4.7:NetworkManager-config-server-1:1.26.0-12.1.rhaos4.7.el8.noarch", "8Base-RHOSE-4.7:NetworkManager-debuginfo-1:1.26.0-12.1.rhaos4.7.el8.ppc64le", "8Base-RHOSE-4.7:NetworkManager-debuginfo-1:1.26.0-12.1.rhaos4.7.el8.s390x", "8Base-RHOSE-4.7:NetworkManager-debuginfo-1:1.26.0-12.1.rhaos4.7.el8.x86_64", "8Base-RHOSE-4.7:NetworkManager-debugsource-1:1.26.0-12.1.rhaos4.7.el8.ppc64le", "8Base-RHOSE-4.7:NetworkManager-debugsource-1:1.26.0-12.1.rhaos4.7.el8.s390x", "8Base-RHOSE-4.7:NetworkManager-debugsource-1:1.26.0-12.1.rhaos4.7.el8.x86_64", "8Base-RHOSE-4.7:NetworkManager-dispatcher-routing-rules-1:1.26.0-12.1.rhaos4.7.el8.noarch", "8Base-RHOSE-4.7:NetworkManager-libnm-1:1.26.0-12.1.rhaos4.7.el8.ppc64le", "8Base-RHOSE-4.7:NetworkManager-libnm-1:1.26.0-12.1.rhaos4.7.el8.s390x", "8Base-RHOSE-4.7:NetworkManager-libnm-1:1.26.0-12.1.rhaos4.7.el8.x86_64", "8Base-RHOSE-4.7:NetworkManager-libnm-debuginfo-1:1.26.0-12.1.rhaos4.7.el8.ppc64le", "8Base-RHOSE-4.7:NetworkManager-libnm-debuginfo-1:1.26.0-12.1.rhaos4.7.el8.s390x", "8Base-RHOSE-4.7:NetworkManager-libnm-debuginfo-1:1.26.0-12.1.rhaos4.7.el8.x86_64", "8Base-RHOSE-4.7:NetworkManager-libnm-devel-1:1.26.0-12.1.rhaos4.7.el8.ppc64le", "8Base-RHOSE-4.7:NetworkManager-libnm-devel-1:1.26.0-12.1.rhaos4.7.el8.s390x", "8Base-RHOSE-4.7:NetworkManager-libnm-devel-1:1.26.0-12.1.rhaos4.7.el8.x86_64", "8Base-RHOSE-4.7:NetworkManager-ovs-1:1.26.0-12.1.rhaos4.7.el8.ppc64le", "8Base-RHOSE-4.7:NetworkManager-ovs-1:1.26.0-12.1.rhaos4.7.el8.s390x", "8Base-RHOSE-4.7:NetworkManager-ovs-1:1.26.0-12.1.rhaos4.7.el8.x86_64", "8Base-RHOSE-4.7:NetworkManager-ovs-debuginfo-1:1.26.0-12.1.rhaos4.7.el8.ppc64le", "8Base-RHOSE-4.7:NetworkManager-ovs-debuginfo-1:1.26.0-12.1.rhaos4.7.el8.s390x", "8Base-RHOSE-4.7:NetworkManager-ovs-debuginfo-1:1.26.0-12.1.rhaos4.7.el8.x86_64", "8Base-RHOSE-4.7:NetworkManager-ppp-1:1.26.0-12.1.rhaos4.7.el8.ppc64le", "8Base-RHOSE-4.7:NetworkManager-ppp-1:1.26.0-12.1.rhaos4.7.el8.s390x", "8Base-RHOSE-4.7:NetworkManager-ppp-1:1.26.0-12.1.rhaos4.7.el8.x86_64", "8Base-RHOSE-4.7:NetworkManager-ppp-debuginfo-1:1.26.0-12.1.rhaos4.7.el8.ppc64le", "8Base-RHOSE-4.7:NetworkManager-ppp-debuginfo-1:1.26.0-12.1.rhaos4.7.el8.s390x", "8Base-RHOSE-4.7:NetworkManager-ppp-debuginfo-1:1.26.0-12.1.rhaos4.7.el8.x86_64", "8Base-RHOSE-4.7:NetworkManager-team-1:1.26.0-12.1.rhaos4.7.el8.ppc64le", "8Base-RHOSE-4.7:NetworkManager-team-1:1.26.0-12.1.rhaos4.7.el8.s390x", "8Base-RHOSE-4.7:NetworkManager-team-1:1.26.0-12.1.rhaos4.7.el8.x86_64", "8Base-RHOSE-4.7:NetworkManager-team-debuginfo-1:1.26.0-12.1.rhaos4.7.el8.ppc64le", "8Base-RHOSE-4.7:NetworkManager-team-debuginfo-1:1.26.0-12.1.rhaos4.7.el8.s390x", "8Base-RHOSE-4.7:NetworkManager-team-debuginfo-1:1.26.0-12.1.rhaos4.7.el8.x86_64", "8Base-RHOSE-4.7:NetworkManager-tui-1:1.26.0-12.1.rhaos4.7.el8.ppc64le", "8Base-RHOSE-4.7:NetworkManager-tui-1:1.26.0-12.1.rhaos4.7.el8.s390x", "8Base-RHOSE-4.7:NetworkManager-tui-1:1.26.0-12.1.rhaos4.7.el8.x86_64", "8Base-RHOSE-4.7:NetworkManager-tui-debuginfo-1:1.26.0-12.1.rhaos4.7.el8.ppc64le", "8Base-RHOSE-4.7:NetworkManager-tui-debuginfo-1:1.26.0-12.1.rhaos4.7.el8.s390x", "8Base-RHOSE-4.7:NetworkManager-tui-debuginfo-1:1.26.0-12.1.rhaos4.7.el8.x86_64", "8Base-RHOSE-4.7:NetworkManager-wifi-1:1.26.0-12.1.rhaos4.7.el8.ppc64le", "8Base-RHOSE-4.7:NetworkManager-wifi-1:1.26.0-12.1.rhaos4.7.el8.s390x", "8Base-RHOSE-4.7:NetworkManager-wifi-1:1.26.0-12.1.rhaos4.7.el8.x86_64", "8Base-RHOSE-4.7:NetworkManager-wifi-debuginfo-1:1.26.0-12.1.rhaos4.7.el8.ppc64le", "8Base-RHOSE-4.7:NetworkManager-wifi-debuginfo-1:1.26.0-12.1.rhaos4.7.el8.s390x", "8Base-RHOSE-4.7:NetworkManager-wifi-debuginfo-1:1.26.0-12.1.rhaos4.7.el8.x86_64", "8Base-RHOSE-4.7:NetworkManager-wwan-1:1.26.0-12.1.rhaos4.7.el8.ppc64le", "8Base-RHOSE-4.7:NetworkManager-wwan-1:1.26.0-12.1.rhaos4.7.el8.s390x", "8Base-RHOSE-4.7:NetworkManager-wwan-1:1.26.0-12.1.rhaos4.7.el8.x86_64", "8Base-RHOSE-4.7:NetworkManager-wwan-debuginfo-1:1.26.0-12.1.rhaos4.7.el8.ppc64le", "8Base-RHOSE-4.7:NetworkManager-wwan-debuginfo-1:1.26.0-12.1.rhaos4.7.el8.s390x", "8Base-RHOSE-4.7:NetworkManager-wwan-debuginfo-1:1.26.0-12.1.rhaos4.7.el8.x86_64", "8Base-RHOSE-4.7:afterburn-0:4.6.0-1.rhaos4.7.el8.ppc64le", "8Base-RHOSE-4.7:afterburn-0:4.6.0-1.rhaos4.7.el8.s390x", "8Base-RHOSE-4.7:afterburn-0:4.6.0-1.rhaos4.7.el8.x86_64", "8Base-RHOSE-4.7:afterburn-debuginfo-0:4.6.0-1.rhaos4.7.el8.ppc64le", "8Base-RHOSE-4.7:afterburn-debuginfo-0:4.6.0-1.rhaos4.7.el8.s390x", "8Base-RHOSE-4.7:afterburn-debuginfo-0:4.6.0-1.rhaos4.7.el8.x86_64", "8Base-RHOSE-4.7:ansible-runner-0:1.4.6-2.el8ar.noarch", "8Base-RHOSE-4.7:ansible-runner-0:1.4.6-2.el8ar.src", "8Base-RHOSE-4.7:ansible-runner-http-0:1.0.0-2.el8ar.noarch", "8Base-RHOSE-4.7:ansible-runner-http-0:1.0.0-2.el8ar.src", "8Base-RHOSE-4.7:atomic-openshift-service-idler-0:4.7.0-202011171454.p0.git.15.675c1c8.el8.ppc64le", "8Base-RHOSE-4.7:atomic-openshift-service-idler-0:4.7.0-202011171454.p0.git.15.675c1c8.el8.s390x", "8Base-RHOSE-4.7:atomic-openshift-service-idler-0:4.7.0-202011171454.p0.git.15.675c1c8.el8.src", "8Base-RHOSE-4.7:atomic-openshift-service-idler-0:4.7.0-202011171454.p0.git.15.675c1c8.el8.x86_64", "8Base-RHOSE-4.7:bootupd-0:0.2.5-2.el8.x86_64", "8Base-RHOSE-4.7:bootupd-debuginfo-0:0.2.5-2.el8.x86_64", "8Base-RHOSE-4.7:clevis-0:15-1.el8.ppc64le", "8Base-RHOSE-4.7:clevis-0:15-1.el8.s390x", "8Base-RHOSE-4.7:clevis-0:15-1.el8.src", "8Base-RHOSE-4.7:clevis-0:15-1.el8.x86_64", "8Base-RHOSE-4.7:clevis-debuginfo-0:15-1.el8.ppc64le", "8Base-RHOSE-4.7:clevis-debuginfo-0:15-1.el8.s390x", "8Base-RHOSE-4.7:clevis-debuginfo-0:15-1.el8.x86_64", "8Base-RHOSE-4.7:clevis-debugsource-0:15-1.el8.ppc64le", "8Base-RHOSE-4.7:clevis-debugsource-0:15-1.el8.s390x", "8Base-RHOSE-4.7:clevis-debugsource-0:15-1.el8.x86_64", "8Base-RHOSE-4.7:clevis-dracut-0:15-1.el8.ppc64le", "8Base-RHOSE-4.7:clevis-dracut-0:15-1.el8.s390x", "8Base-RHOSE-4.7:clevis-dracut-0:15-1.el8.x86_64", "8Base-RHOSE-4.7:clevis-luks-0:15-1.el8.ppc64le", "8Base-RHOSE-4.7:clevis-luks-0:15-1.el8.s390x", "8Base-RHOSE-4.7:clevis-luks-0:15-1.el8.x86_64", "8Base-RHOSE-4.7:clevis-systemd-0:15-1.el8.ppc64le", "8Base-RHOSE-4.7:clevis-systemd-0:15-1.el8.s390x", "8Base-RHOSE-4.7:clevis-systemd-0:15-1.el8.x86_64", "8Base-RHOSE-4.7:clevis-udisks2-0:15-1.el8.ppc64le", "8Base-RHOSE-4.7:clevis-udisks2-0:15-1.el8.s390x", "8Base-RHOSE-4.7:clevis-udisks2-0:15-1.el8.x86_64", "8Base-RHOSE-4.7:clevis-udisks2-debuginfo-0:15-1.el8.ppc64le", "8Base-RHOSE-4.7:clevis-udisks2-debuginfo-0:15-1.el8.s390x", "8Base-RHOSE-4.7:clevis-udisks2-debuginfo-0:15-1.el8.x86_64", "8Base-RHOSE-4.7:conmon-2:2.0.21-2.rhaos4.6.el8.ppc64le", "8Base-RHOSE-4.7:conmon-2:2.0.21-2.rhaos4.6.el8.s390x", "8Base-RHOSE-4.7:conmon-2:2.0.21-2.rhaos4.6.el8.src", "8Base-RHOSE-4.7:conmon-2:2.0.21-2.rhaos4.6.el8.x86_64", "8Base-RHOSE-4.7:console-login-helper-messages-0:0.20.3-1.rhaos4.7.el8.noarch", "8Base-RHOSE-4.7:console-login-helper-messages-0:0.20.3-1.rhaos4.7.el8.src", "8Base-RHOSE-4.7:console-login-helper-messages-issuegen-0:0.20.3-1.rhaos4.7.el8.noarch", "8Base-RHOSE-4.7:console-login-helper-messages-profile-0:0.20.3-1.rhaos4.7.el8.noarch", "8Base-RHOSE-4.7:container-selinux-2:2.151.0-1.rhaos4.7.el8.noarch", "8Base-RHOSE-4.7:container-selinux-2:2.151.0-1.rhaos4.7.el8.src", "8Base-RHOSE-4.7:containernetworking-plugins-0:0.8.6-1.rhaos4.5.el8.ppc64le", "8Base-RHOSE-4.7:containernetworking-plugins-0:0.8.6-1.rhaos4.5.el8.s390x", "8Base-RHOSE-4.7:containernetworking-plugins-0:0.8.6-1.rhaos4.5.el8.src", "8Base-RHOSE-4.7:containernetworking-plugins-0:0.8.6-1.rhaos4.5.el8.x86_64", "8Base-RHOSE-4.7:containernetworking-plugins-debuginfo-0:0.8.6-1.rhaos4.5.el8.ppc64le", "8Base-RHOSE-4.7:containernetworking-plugins-debuginfo-0:0.8.6-1.rhaos4.5.el8.s390x", "8Base-RHOSE-4.7:containernetworking-plugins-debuginfo-0:0.8.6-1.rhaos4.5.el8.x86_64", "8Base-RHOSE-4.7:containernetworking-plugins-debugsource-0:0.8.6-1.rhaos4.5.el8.ppc64le", "8Base-RHOSE-4.7:containernetworking-plugins-debugsource-0:0.8.6-1.rhaos4.5.el8.s390x", "8Base-RHOSE-4.7:containernetworking-plugins-debugsource-0:0.8.6-1.rhaos4.5.el8.x86_64", "8Base-RHOSE-4.7:coreos-installer-0:0.8.0-3.rhaos4.7.el8.ppc64le", "8Base-RHOSE-4.7:coreos-installer-0:0.8.0-3.rhaos4.7.el8.s390x", "8Base-RHOSE-4.7:coreos-installer-0:0.8.0-3.rhaos4.7.el8.src", "8Base-RHOSE-4.7:coreos-installer-0:0.8.0-3.rhaos4.7.el8.x86_64", "8Base-RHOSE-4.7:coreos-installer-bootinfra-0:0.8.0-3.rhaos4.7.el8.ppc64le", "8Base-RHOSE-4.7:coreos-installer-bootinfra-0:0.8.0-3.rhaos4.7.el8.s390x", "8Base-RHOSE-4.7:coreos-installer-bootinfra-debuginfo-0:0.8.0-3.rhaos4.7.el8.ppc64le", "8Base-RHOSE-4.7:coreos-installer-bootinfra-debuginfo-0:0.8.0-3.rhaos4.7.el8.s390x", "8Base-RHOSE-4.7:coreos-installer-bootinfra-debuginfo-0:0.8.0-3.rhaos4.7.el8.x86_64", "8Base-RHOSE-4.7:coreos-installer-debuginfo-0:0.8.0-3.rhaos4.7.el8.ppc64le", "8Base-RHOSE-4.7:coreos-installer-debuginfo-0:0.8.0-3.rhaos4.7.el8.s390x", "8Base-RHOSE-4.7:coreos-installer-debuginfo-0:0.8.0-3.rhaos4.7.el8.x86_64", "8Base-RHOSE-4.7:coreos-installer-debugsource-0:0.8.0-3.rhaos4.7.el8.ppc64le", "8Base-RHOSE-4.7:coreos-installer-debugsource-0:0.8.0-3.rhaos4.7.el8.s390x", "8Base-RHOSE-4.7:coreos-installer-debugsource-0:0.8.0-3.rhaos4.7.el8.x86_64", "8Base-RHOSE-4.7:cri-o-0:1.20.0-0.rhaos4.7.git8921e00.el8.51.ppc64le", "8Base-RHOSE-4.7:cri-o-0:1.20.0-0.rhaos4.7.git8921e00.el8.51.s390x", "8Base-RHOSE-4.7:cri-o-0:1.20.0-0.rhaos4.7.git8921e00.el8.51.src", "8Base-RHOSE-4.7:cri-o-0:1.20.0-0.rhaos4.7.git8921e00.el8.51.x86_64", "8Base-RHOSE-4.7:cri-o-debuginfo-0:1.20.0-0.rhaos4.7.git8921e00.el8.51.ppc64le", "8Base-RHOSE-4.7:cri-o-debuginfo-0:1.20.0-0.rhaos4.7.git8921e00.el8.51.s390x", "8Base-RHOSE-4.7:cri-o-debuginfo-0:1.20.0-0.rhaos4.7.git8921e00.el8.51.x86_64", "8Base-RHOSE-4.7:cri-o-debugsource-0:1.20.0-0.rhaos4.7.git8921e00.el8.51.ppc64le", "8Base-RHOSE-4.7:cri-o-debugsource-0:1.20.0-0.rhaos4.7.git8921e00.el8.51.s390x", "8Base-RHOSE-4.7:cri-o-debugsource-0:1.20.0-0.rhaos4.7.git8921e00.el8.51.x86_64", "8Base-RHOSE-4.7:cri-tools-0:1.20.0-1.el8.ppc64le", "8Base-RHOSE-4.7:cri-tools-0:1.20.0-1.el8.s390x", "8Base-RHOSE-4.7:cri-tools-0:1.20.0-1.el8.src", "8Base-RHOSE-4.7:cri-tools-0:1.20.0-1.el8.x86_64", "8Base-RHOSE-4.7:cri-tools-debuginfo-0:1.20.0-1.el8.ppc64le", "8Base-RHOSE-4.7:cri-tools-debuginfo-0:1.20.0-1.el8.s390x", "8Base-RHOSE-4.7:cri-tools-debuginfo-0:1.20.0-1.el8.x86_64", "8Base-RHOSE-4.7:cri-tools-debugsource-0:1.20.0-1.el8.ppc64le", "8Base-RHOSE-4.7:cri-tools-debugsource-0:1.20.0-1.el8.s390x", "8Base-RHOSE-4.7:cri-tools-debugsource-0:1.20.0-1.el8.x86_64", "8Base-RHOSE-4.7:dracut-0:049-95.git20200804.el8_3.4.ppc64le", "8Base-RHOSE-4.7:dracut-0:049-95.git20200804.el8_3.4.s390x", "8Base-RHOSE-4.7:dracut-0:049-95.git20200804.el8_3.4.src", "8Base-RHOSE-4.7:dracut-0:049-95.git20200804.el8_3.4.x86_64", "8Base-RHOSE-4.7:dracut-caps-0:049-95.git20200804.el8_3.4.ppc64le", "8Base-RHOSE-4.7:dracut-caps-0:049-95.git20200804.el8_3.4.s390x", "8Base-RHOSE-4.7:dracut-caps-0:049-95.git20200804.el8_3.4.x86_64", "8Base-RHOSE-4.7:dracut-config-generic-0:049-95.git20200804.el8_3.4.ppc64le", "8Base-RHOSE-4.7:dracut-config-generic-0:049-95.git20200804.el8_3.4.s390x", "8Base-RHOSE-4.7:dracut-config-generic-0:049-95.git20200804.el8_3.4.x86_64", "8Base-RHOSE-4.7:dracut-config-rescue-0:049-95.git20200804.el8_3.4.ppc64le", "8Base-RHOSE-4.7:dracut-config-rescue-0:049-95.git20200804.el8_3.4.s390x", "8Base-RHOSE-4.7:dracut-config-rescue-0:049-95.git20200804.el8_3.4.x86_64", "8Base-RHOSE-4.7:dracut-debuginfo-0:049-95.git20200804.el8_3.4.ppc64le", "8Base-RHOSE-4.7:dracut-debuginfo-0:049-95.git20200804.el8_3.4.s390x", "8Base-RHOSE-4.7:dracut-debuginfo-0:049-95.git20200804.el8_3.4.x86_64", "8Base-RHOSE-4.7:dracut-debugsource-0:049-95.git20200804.el8_3.4.ppc64le", "8Base-RHOSE-4.7:dracut-debugsource-0:049-95.git20200804.el8_3.4.s390x", "8Base-RHOSE-4.7:dracut-debugsource-0:049-95.git20200804.el8_3.4.x86_64", "8Base-RHOSE-4.7:dracut-live-0:049-95.git20200804.el8_3.4.ppc64le", "8Base-RHOSE-4.7:dracut-live-0:049-95.git20200804.el8_3.4.s390x", "8Base-RHOSE-4.7:dracut-live-0:049-95.git20200804.el8_3.4.x86_64", "8Base-RHOSE-4.7:dracut-network-0:049-95.git20200804.el8_3.4.ppc64le", "8Base-RHOSE-4.7:dracut-network-0:049-95.git20200804.el8_3.4.s390x", "8Base-RHOSE-4.7:dracut-network-0:049-95.git20200804.el8_3.4.x86_64", "8Base-RHOSE-4.7:dracut-squash-0:049-95.git20200804.el8_3.4.ppc64le", "8Base-RHOSE-4.7:dracut-squash-0:049-95.git20200804.el8_3.4.s390x", "8Base-RHOSE-4.7:dracut-squash-0:049-95.git20200804.el8_3.4.x86_64", "8Base-RHOSE-4.7:dracut-tools-0:049-95.git20200804.el8_3.4.ppc64le", "8Base-RHOSE-4.7:dracut-tools-0:049-95.git20200804.el8_3.4.s390x", "8Base-RHOSE-4.7:dracut-tools-0:049-95.git20200804.el8_3.4.x86_64", "8Base-RHOSE-4.7:faq-0:0.0.6-5.el8.ppc64le", "8Base-RHOSE-4.7:faq-0:0.0.6-5.el8.s390x", "8Base-RHOSE-4.7:faq-0:0.0.6-5.el8.src", "8Base-RHOSE-4.7:faq-0:0.0.6-5.el8.x86_64", "8Base-RHOSE-4.7:golang-github-prometheus-promu-0:0.5.0-2.git642a960.el8.ppc64le", "8Base-RHOSE-4.7:golang-github-prometheus-promu-0:0.5.0-2.git642a960.el8.s390x", "8Base-RHOSE-4.7:golang-github-prometheus-promu-0:0.5.0-2.git642a960.el8.src", "8Base-RHOSE-4.7:golang-github-prometheus-promu-0:0.5.0-2.git642a960.el8.x86_64", "8Base-RHOSE-4.7:gperftools-0:2.6.3-2.el8ost.ppc64le", "8Base-RHOSE-4.7:gperftools-0:2.6.3-2.el8ost.s390x", "8Base-RHOSE-4.7:gperftools-0:2.6.3-2.el8ost.src", "8Base-RHOSE-4.7:gperftools-0:2.6.3-2.el8ost.x86_64", "8Base-RHOSE-4.7:gperftools-debugsource-0:2.6.3-2.el8ost.ppc64le", "8Base-RHOSE-4.7:gperftools-debugsource-0:2.6.3-2.el8ost.s390x", "8Base-RHOSE-4.7:gperftools-debugsource-0:2.6.3-2.el8ost.x86_64", "8Base-RHOSE-4.7:gperftools-devel-0:2.6.3-2.el8ost.ppc64le", "8Base-RHOSE-4.7:gperftools-devel-0:2.6.3-2.el8ost.s390x", "8Base-RHOSE-4.7:gperftools-devel-0:2.6.3-2.el8ost.x86_64", "8Base-RHOSE-4.7:gperftools-libs-0:2.6.3-2.el8ost.ppc64le", "8Base-RHOSE-4.7:gperftools-libs-0:2.6.3-2.el8ost.s390x", "8Base-RHOSE-4.7:gperftools-libs-0:2.6.3-2.el8ost.x86_64", "8Base-RHOSE-4.7:gperftools-libs-debuginfo-0:2.6.3-2.el8ost.ppc64le", "8Base-RHOSE-4.7:gperftools-libs-debuginfo-0:2.6.3-2.el8ost.s390x", "8Base-RHOSE-4.7:gperftools-libs-debuginfo-0:2.6.3-2.el8ost.x86_64", "8Base-RHOSE-4.7:grpc-0:1.18.0-4.el8ost.ppc64le", "8Base-RHOSE-4.7:grpc-0:1.18.0-4.el8ost.s390x", "8Base-RHOSE-4.7:grpc-0:1.18.0-4.el8ost.src", "8Base-RHOSE-4.7:grpc-0:1.18.0-4.el8ost.x86_64", "8Base-RHOSE-4.7:grpc-cli-0:1.18.0-4.el8ost.ppc64le", "8Base-RHOSE-4.7:grpc-cli-0:1.18.0-4.el8ost.s390x", "8Base-RHOSE-4.7:grpc-cli-0:1.18.0-4.el8ost.x86_64", "8Base-RHOSE-4.7:grpc-cli-debuginfo-0:1.18.0-4.el8ost.ppc64le", "8Base-RHOSE-4.7:grpc-cli-debuginfo-0:1.18.0-4.el8ost.s390x", "8Base-RHOSE-4.7:grpc-cli-debuginfo-0:1.18.0-4.el8ost.x86_64", "8Base-RHOSE-4.7:grpc-debuginfo-0:1.18.0-4.el8ost.ppc64le", "8Base-RHOSE-4.7:grpc-debuginfo-0:1.18.0-4.el8ost.s390x", "8Base-RHOSE-4.7:grpc-debuginfo-0:1.18.0-4.el8ost.x86_64", "8Base-RHOSE-4.7:grpc-debugsource-0:1.18.0-4.el8ost.ppc64le", "8Base-RHOSE-4.7:grpc-debugsource-0:1.18.0-4.el8ost.s390x", "8Base-RHOSE-4.7:grpc-debugsource-0:1.18.0-4.el8ost.x86_64", "8Base-RHOSE-4.7:grpc-devel-0:1.18.0-4.el8ost.ppc64le", "8Base-RHOSE-4.7:grpc-devel-0:1.18.0-4.el8ost.s390x", "8Base-RHOSE-4.7:grpc-devel-0:1.18.0-4.el8ost.x86_64", "8Base-RHOSE-4.7:grpc-plugins-0:1.18.0-4.el8ost.ppc64le", "8Base-RHOSE-4.7:grpc-plugins-0:1.18.0-4.el8ost.s390x", "8Base-RHOSE-4.7:grpc-plugins-0:1.18.0-4.el8ost.x86_64", "8Base-RHOSE-4.7:grpc-plugins-debuginfo-0:1.18.0-4.el8ost.ppc64le", "8Base-RHOSE-4.7:grpc-plugins-debuginfo-0:1.18.0-4.el8ost.s390x", "8Base-RHOSE-4.7:grpc-plugins-debuginfo-0:1.18.0-4.el8ost.x86_64", "8Base-RHOSE-4.7:haproxy-0:2.0.19-1.el8.src", "8Base-RHOSE-4.7:haproxy-debugsource-0:2.0.19-1.el8.ppc64le", "8Base-RHOSE-4.7:haproxy-debugsource-0:2.0.19-1.el8.s390x", "8Base-RHOSE-4.7:haproxy-debugsource-0:2.0.19-1.el8.x86_64", "8Base-RHOSE-4.7:haproxy20-0:2.0.19-1.el8.ppc64le", "8Base-RHOSE-4.7:haproxy20-0:2.0.19-1.el8.s390x", "8Base-RHOSE-4.7:haproxy20-0:2.0.19-1.el8.x86_64", "8Base-RHOSE-4.7:haproxy20-debuginfo-0:2.0.19-1.el8.ppc64le", "8Base-RHOSE-4.7:haproxy20-debuginfo-0:2.0.19-1.el8.s390x", "8Base-RHOSE-4.7:haproxy20-debuginfo-0:2.0.19-1.el8.x86_64", "8Base-RHOSE-4.7:ignition-0:2.9.0-2.rhaos4.7.git1d56dc8.el8.ppc64le", "8Base-RHOSE-4.7:ignition-0:2.9.0-2.rhaos4.7.git1d56dc8.el8.s390x", "8Base-RHOSE-4.7:ignition-0:2.9.0-2.rhaos4.7.git1d56dc8.el8.src", "8Base-RHOSE-4.7:ignition-0:2.9.0-2.rhaos4.7.git1d56dc8.el8.x86_64", "8Base-RHOSE-4.7:ignition-debuginfo-0:2.9.0-2.rhaos4.7.git1d56dc8.el8.ppc64le", "8Base-RHOSE-4.7:ignition-debuginfo-0:2.9.0-2.rhaos4.7.git1d56dc8.el8.s390x", "8Base-RHOSE-4.7:ignition-debuginfo-0:2.9.0-2.rhaos4.7.git1d56dc8.el8.x86_64", "8Base-RHOSE-4.7:ignition-debugsource-0:2.9.0-2.rhaos4.7.git1d56dc8.el8.ppc64le", "8Base-RHOSE-4.7:ignition-debugsource-0:2.9.0-2.rhaos4.7.git1d56dc8.el8.s390x", "8Base-RHOSE-4.7:ignition-debugsource-0:2.9.0-2.rhaos4.7.git1d56dc8.el8.x86_64", "8Base-RHOSE-4.7:ignition-validate-0:2.9.0-2.rhaos4.7.git1d56dc8.el8.ppc64le", "8Base-RHOSE-4.7:ignition-validate-0:2.9.0-2.rhaos4.7.git1d56dc8.el8.s390x", "8Base-RHOSE-4.7:ignition-validate-0:2.9.0-2.rhaos4.7.git1d56dc8.el8.x86_64", "8Base-RHOSE-4.7:ignition-validate-debuginfo-0:2.9.0-2.rhaos4.7.git1d56dc8.el8.ppc64le", "8Base-RHOSE-4.7:ignition-validate-debuginfo-0:2.9.0-2.rhaos4.7.git1d56dc8.el8.s390x", "8Base-RHOSE-4.7:ignition-validate-debuginfo-0:2.9.0-2.rhaos4.7.git1d56dc8.el8.x86_64", "8Base-RHOSE-4.7:inotify-tools-0:3.20.1-2.el8.ppc64le", "8Base-RHOSE-4.7:inotify-tools-0:3.20.1-2.el8.s390x", "8Base-RHOSE-4.7:inotify-tools-0:3.20.1-2.el8.src", "8Base-RHOSE-4.7:inotify-tools-0:3.20.1-2.el8.x86_64", "8Base-RHOSE-4.7:inotify-tools-debuginfo-0:3.20.1-2.el8.ppc64le", "8Base-RHOSE-4.7:inotify-tools-debuginfo-0:3.20.1-2.el8.s390x", "8Base-RHOSE-4.7:inotify-tools-debuginfo-0:3.20.1-2.el8.x86_64", "8Base-RHOSE-4.7:inotify-tools-debugsource-0:3.20.1-2.el8.ppc64le", "8Base-RHOSE-4.7:inotify-tools-debugsource-0:3.20.1-2.el8.s390x", "8Base-RHOSE-4.7:inotify-tools-debugsource-0:3.20.1-2.el8.x86_64", "8Base-RHOSE-4.7:inotify-tools-devel-0:3.20.1-2.el8.ppc64le", "8Base-RHOSE-4.7:inotify-tools-devel-0:3.20.1-2.el8.s390x", "8Base-RHOSE-4.7:inotify-tools-devel-0:3.20.1-2.el8.x86_64", "8Base-RHOSE-4.7:ironic-images-0:15.1-20210114.1.el8.noarch", "8Base-RHOSE-4.7:ironic-images-0:15.1-20210114.1.el8.src", "8Base-RHOSE-4.7:ironic-images-all-0:15.1-20210114.1.el8.noarch", "8Base-RHOSE-4.7:ironic-images-ipa-ppc64le-0:15.1-20210114.1.el8.noarch", "8Base-RHOSE-4.7:ironic-images-ipa-x86_64-0:15.1-20210114.1.el8.noarch", "8Base-RHOSE-4.7:jenkins-0:2.263.3.1612449007-1.el8.noarch", "8Base-RHOSE-4.7:jenkins-0:2.263.3.1612449007-1.el8.src", "8Base-RHOSE-4.7:jenkins-2-plugins-0:4.7.1611636915-1.el8.noarch", "8Base-RHOSE-4.7:jenkins-2-plugins-0:4.7.1611636915-1.el8.src", "8Base-RHOSE-4.7:jq-0:1.6-2.el8.ppc64le", "8Base-RHOSE-4.7:jq-0:1.6-2.el8.s390x", "8Base-RHOSE-4.7:jq-0:1.6-2.el8.src", "8Base-RHOSE-4.7:jq-0:1.6-2.el8.x86_64", "8Base-RHOSE-4.7:jq-debuginfo-0:1.6-2.el8.ppc64le", "8Base-RHOSE-4.7:jq-debuginfo-0:1.6-2.el8.s390x", "8Base-RHOSE-4.7:jq-debuginfo-0:1.6-2.el8.x86_64", "8Base-RHOSE-4.7:jq-debugsource-0:1.6-2.el8.ppc64le", "8Base-RHOSE-4.7:jq-debugsource-0:1.6-2.el8.s390x", "8Base-RHOSE-4.7:jq-debugsource-0:1.6-2.el8.x86_64", "8Base-RHOSE-4.7:jq-devel-0:1.6-2.el8.ppc64le", "8Base-RHOSE-4.7:jq-devel-0:1.6-2.el8.s390x", "8Base-RHOSE-4.7:jq-devel-0:1.6-2.el8.x86_64", "8Base-RHOSE-4.7:kuryr-binding-scripts-0:1.1.1-0.20190923160834.41e6964.el8ost.noarch", "8Base-RHOSE-4.7:libnftnl-0:1.1.5-4.el8.ppc64le", "8Base-RHOSE-4.7:libnftnl-0:1.1.5-4.el8.s390x", "8Base-RHOSE-4.7:libnftnl-0:1.1.5-4.el8.src", "8Base-RHOSE-4.7:libnftnl-0:1.1.5-4.el8.x86_64", "8Base-RHOSE-4.7:libnftnl-debuginfo-0:1.1.5-4.el8.ppc64le", "8Base-RHOSE-4.7:libnftnl-debuginfo-0:1.1.5-4.el8.s390x", "8Base-RHOSE-4.7:libnftnl-debuginfo-0:1.1.5-4.el8.x86_64", "8Base-RHOSE-4.7:libnftnl-debugsource-0:1.1.5-4.el8.ppc64le", "8Base-RHOSE-4.7:libnftnl-debugsource-0:1.1.5-4.el8.s390x", "8Base-RHOSE-4.7:libnftnl-debugsource-0:1.1.5-4.el8.x86_64", "8Base-RHOSE-4.7:libnftnl-devel-0:1.1.5-4.el8.ppc64le", "8Base-RHOSE-4.7:libnftnl-devel-0:1.1.5-4.el8.s390x", "8Base-RHOSE-4.7:libnftnl-devel-0:1.1.5-4.el8.x86_64", "8Base-RHOSE-4.7:libsodium-0:1.0.16-4.5.el8ost.ppc64le", "8Base-RHOSE-4.7:libsodium-0:1.0.16-4.5.el8ost.s390x", "8Base-RHOSE-4.7:libsodium-0:1.0.16-4.5.el8ost.src", "8Base-RHOSE-4.7:libsodium-0:1.0.16-4.5.el8ost.x86_64", "8Base-RHOSE-4.7:libsodium-debuginfo-0:1.0.16-4.5.el8ost.ppc64le", "8Base-RHOSE-4.7:libsodium-debuginfo-0:1.0.16-4.5.el8ost.s390x", "8Base-RHOSE-4.7:libsodium-debuginfo-0:1.0.16-4.5.el8ost.x86_64", "8Base-RHOSE-4.7:libsodium-debugsource-0:1.0.16-4.5.el8ost.ppc64le", "8Base-RHOSE-4.7:libsodium-debugsource-0:1.0.16-4.5.el8ost.s390x", "8Base-RHOSE-4.7:libsodium-debugsource-0:1.0.16-4.5.el8ost.x86_64", "8Base-RHOSE-4.7:libsodium-devel-0:1.0.16-4.5.el8ost.ppc64le", "8Base-RHOSE-4.7:libsodium-devel-0:1.0.16-4.5.el8ost.s390x", "8Base-RHOSE-4.7:libsodium-devel-0:1.0.16-4.5.el8ost.x86_64", "8Base-RHOSE-4.7:libsodium-static-0:1.0.16-4.5.el8ost.ppc64le", "8Base-RHOSE-4.7:libsodium-static-0:1.0.16-4.5.el8ost.s390x", "8Base-RHOSE-4.7:libsodium-static-0:1.0.16-4.5.el8ost.x86_64", "8Base-RHOSE-4.7:libunwind-0:1.2.1-5.el8.ppc64le", "8Base-RHOSE-4.7:libunwind-0:1.2.1-5.el8.src", "8Base-RHOSE-4.7:libunwind-0:1.2.1-5.el8.x86_64", "8Base-RHOSE-4.7:libunwind-debuginfo-0:1.2.1-5.el8.ppc64le", "8Base-RHOSE-4.7:libunwind-debuginfo-0:1.2.1-5.el8.x86_64", "8Base-RHOSE-4.7:libunwind-debugsource-0:1.2.1-5.el8.ppc64le", "8Base-RHOSE-4.7:libunwind-debugsource-0:1.2.1-5.el8.x86_64", "8Base-RHOSE-4.7:libunwind-devel-0:1.2.1-5.el8.ppc64le", "8Base-RHOSE-4.7:libunwind-devel-0:1.2.1-5.el8.x86_64", "8Base-RHOSE-4.7:network-scripts-openvswitch2.13-0:2.13.0-79.el8fdp.ppc64le", "8Base-RHOSE-4.7:network-scripts-openvswitch2.13-0:2.13.0-79.el8fdp.s390x", "8Base-RHOSE-4.7:network-scripts-openvswitch2.13-0:2.13.0-79.el8fdp.x86_64", "8Base-RHOSE-4.7:octavia-amphora-image-x86_64-0:17.0-20200606.1.el8ost.noarch", "8Base-RHOSE-4.7:openshift-clients-0:4.7.0-202102032256.p0.git.3951.0e656ef.el8.ppc64le", "8Base-RHOSE-4.7:openshift-clients-0:4.7.0-202102032256.p0.git.3951.0e656ef.el8.s390x", "8Base-RHOSE-4.7:openshift-clients-0:4.7.0-202102032256.p0.git.3951.0e656ef.el8.src", "8Base-RHOSE-4.7:openshift-clients-0:4.7.0-202102032256.p0.git.3951.0e656ef.el8.x86_64", "8Base-RHOSE-4.7:openshift-clients-redistributable-0:4.7.0-202102032256.p0.git.3951.0e656ef.el8.x86_64", "8Base-RHOSE-4.7:openshift-eventrouter-0:0.2-4.git7c289cc.el8.ppc64le", "8Base-RHOSE-4.7:openshift-eventrouter-0:0.2-4.git7c289cc.el8.s390x", "8Base-RHOSE-4.7:openshift-eventrouter-0:0.2-4.git7c289cc.el8.src", "8Base-RHOSE-4.7:openshift-eventrouter-0:0.2-4.git7c289cc.el8.x86_64", "8Base-RHOSE-4.7:openshift-eventrouter-debuginfo-0:0.2-4.git7c289cc.el8.ppc64le", "8Base-RHOSE-4.7:openshift-eventrouter-debuginfo-0:0.2-4.git7c289cc.el8.s390x", "8Base-RHOSE-4.7:openshift-eventrouter-debuginfo-0:0.2-4.git7c289cc.el8.x86_64", "8Base-RHOSE-4.7:openshift-eventrouter-debugsource-0:0.2-4.git7c289cc.el8.ppc64le", "8Base-RHOSE-4.7:openshift-eventrouter-debugsource-0:0.2-4.git7c289cc.el8.s390x", "8Base-RHOSE-4.7:openshift-eventrouter-debugsource-0:0.2-4.git7c289cc.el8.x86_64", "8Base-RHOSE-4.7:openshift-kuryr-0:4.7.0-202101262230.p0.git.2494.cd95ce5.el8.src", "8Base-RHOSE-4.7:openshift-kuryr-cni-0:4.7.0-202101262230.p0.git.2494.cd95ce5.el8.noarch", "8Base-RHOSE-4.7:openshift-kuryr-common-0:4.7.0-202101262230.p0.git.2494.cd95ce5.el8.noarch", "8Base-RHOSE-4.7:openshift-kuryr-controller-0:4.7.0-202101262230.p0.git.2494.cd95ce5.el8.noarch", "8Base-RHOSE-4.7:openstack-ironic-1:16.0.4-0.20210203051223.7d74ea0.el8.src", "8Base-RHOSE-4.7:openstack-ironic-api-1:16.0.4-0.20210203051223.7d74ea0.el8.noarch", "8Base-RHOSE-4.7:openstack-ironic-common-1:16.0.4-0.20210203051223.7d74ea0.el8.noarch", "8Base-RHOSE-4.7:openstack-ironic-conductor-1:16.0.4-0.20210203051223.7d74ea0.el8.noarch", "8Base-RHOSE-4.7:openstack-ironic-inspector-0:10.4.1-0.20201123161216.70fccec.el8.noarch", "8Base-RHOSE-4.7:openstack-ironic-inspector-0:10.4.1-0.20201123161216.70fccec.el8.src", "8Base-RHOSE-4.7:openstack-ironic-inspector-api-0:10.4.1-0.20201123161216.70fccec.el8.noarch", "8Base-RHOSE-4.7:openstack-ironic-inspector-conductor-0:10.4.1-0.20201123161216.70fccec.el8.noarch", "8Base-RHOSE-4.7:openstack-ironic-inspector-dnsmasq-0:10.4.1-0.20201123161216.70fccec.el8.noarch", "8Base-RHOSE-4.7:openstack-ironic-python-agent-0:6.4.3-0.20201217171210.bd45db1.el8.noarch", "8Base-RHOSE-4.7:openstack-ironic-python-agent-0:6.4.3-0.20201217171210.bd45db1.el8.src", "8Base-RHOSE-4.7:openvswitch2.13-0:2.13.0-79.el8fdp.ppc64le", "8Base-RHOSE-4.7:openvswitch2.13-0:2.13.0-79.el8fdp.s390x", "8Base-RHOSE-4.7:openvswitch2.13-0:2.13.0-79.el8fdp.src", "8Base-RHOSE-4.7:openvswitch2.13-0:2.13.0-79.el8fdp.x86_64", "8Base-RHOSE-4.7:openvswitch2.13-debuginfo-0:2.13.0-79.el8fdp.ppc64le", "8Base-RHOSE-4.7:openvswitch2.13-debuginfo-0:2.13.0-79.el8fdp.s390x", "8Base-RHOSE-4.7:openvswitch2.13-debuginfo-0:2.13.0-79.el8fdp.x86_64", "8Base-RHOSE-4.7:openvswitch2.13-debugsource-0:2.13.0-79.el8fdp.ppc64le", "8Base-RHOSE-4.7:openvswitch2.13-debugsource-0:2.13.0-79.el8fdp.s390x", "8Base-RHOSE-4.7:openvswitch2.13-debugsource-0:2.13.0-79.el8fdp.x86_64", "8Base-RHOSE-4.7:openvswitch2.13-devel-0:2.13.0-79.el8fdp.ppc64le", "8Base-RHOSE-4.7:openvswitch2.13-devel-0:2.13.0-79.el8fdp.s390x", "8Base-RHOSE-4.7:openvswitch2.13-devel-0:2.13.0-79.el8fdp.x86_64", "8Base-RHOSE-4.7:openvswitch2.13-test-0:2.13.0-79.el8fdp.noarch", "8Base-RHOSE-4.7:ostree-0:2020.7-1.el8.ppc64le", "8Base-RHOSE-4.7:ostree-0:2020.7-1.el8.s390x", "8Base-RHOSE-4.7:ostree-0:2020.7-1.el8.src", "8Base-RHOSE-4.7:ostree-0:2020.7-1.el8.x86_64", "8Base-RHOSE-4.7:ostree-debuginfo-0:2020.7-1.el8.ppc64le", "8Base-RHOSE-4.7:ostree-debuginfo-0:2020.7-1.el8.s390x", "8Base-RHOSE-4.7:ostree-debuginfo-0:2020.7-1.el8.x86_64", "8Base-RHOSE-4.7:ostree-debugsource-0:2020.7-1.el8.ppc64le", "8Base-RHOSE-4.7:ostree-debugsource-0:2020.7-1.el8.s390x", "8Base-RHOSE-4.7:ostree-debugsource-0:2020.7-1.el8.x86_64", "8Base-RHOSE-4.7:ostree-devel-0:2020.7-1.el8.ppc64le", "8Base-RHOSE-4.7:ostree-devel-0:2020.7-1.el8.s390x", "8Base-RHOSE-4.7:ostree-devel-0:2020.7-1.el8.x86_64", "8Base-RHOSE-4.7:ostree-grub2-0:2020.7-1.el8.ppc64le", "8Base-RHOSE-4.7:ostree-grub2-0:2020.7-1.el8.x86_64", "8Base-RHOSE-4.7:ostree-libs-0:2020.7-1.el8.ppc64le", "8Base-RHOSE-4.7:ostree-libs-0:2020.7-1.el8.s390x", "8Base-RHOSE-4.7:ostree-libs-0:2020.7-1.el8.x86_64", "8Base-RHOSE-4.7:ostree-libs-debuginfo-0:2020.7-1.el8.ppc64le", "8Base-RHOSE-4.7:ostree-libs-debuginfo-0:2020.7-1.el8.s390x", "8Base-RHOSE-4.7:ostree-libs-debuginfo-0:2020.7-1.el8.x86_64", "8Base-RHOSE-4.7:ovn2.13-0:20.09.0-21.el8fdn.ppc64le", "8Base-RHOSE-4.7:ovn2.13-0:20.09.0-21.el8fdn.s390x", "8Base-RHOSE-4.7:ovn2.13-0:20.09.0-21.el8fdn.src", "8Base-RHOSE-4.7:ovn2.13-0:20.09.0-21.el8fdn.x86_64", "8Base-RHOSE-4.7:ovn2.13-central-0:20.09.0-21.el8fdn.ppc64le", "8Base-RHOSE-4.7:ovn2.13-central-0:20.09.0-21.el8fdn.s390x", "8Base-RHOSE-4.7:ovn2.13-central-0:20.09.0-21.el8fdn.x86_64", "8Base-RHOSE-4.7:ovn2.13-central-debuginfo-0:20.09.0-21.el8fdn.ppc64le", "8Base-RHOSE-4.7:ovn2.13-central-debuginfo-0:20.09.0-21.el8fdn.s390x", "8Base-RHOSE-4.7:ovn2.13-central-debuginfo-0:20.09.0-21.el8fdn.x86_64", "8Base-RHOSE-4.7:ovn2.13-debuginfo-0:20.09.0-21.el8fdn.ppc64le", "8Base-RHOSE-4.7:ovn2.13-debuginfo-0:20.09.0-21.el8fdn.s390x", "8Base-RHOSE-4.7:ovn2.13-debuginfo-0:20.09.0-21.el8fdn.x86_64", "8Base-RHOSE-4.7:ovn2.13-debugsource-0:20.09.0-21.el8fdn.ppc64le", "8Base-RHOSE-4.7:ovn2.13-debugsource-0:20.09.0-21.el8fdn.s390x", "8Base-RHOSE-4.7:ovn2.13-debugsource-0:20.09.0-21.el8fdn.x86_64", "8Base-RHOSE-4.7:ovn2.13-host-0:20.09.0-21.el8fdn.ppc64le", "8Base-RHOSE-4.7:ovn2.13-host-0:20.09.0-21.el8fdn.s390x", "8Base-RHOSE-4.7:ovn2.13-host-0:20.09.0-21.el8fdn.x86_64", "8Base-RHOSE-4.7:ovn2.13-host-debuginfo-0:20.09.0-21.el8fdn.ppc64le", "8Base-RHOSE-4.7:ovn2.13-host-debuginfo-0:20.09.0-21.el8fdn.s390x", "8Base-RHOSE-4.7:ovn2.13-host-debuginfo-0:20.09.0-21.el8fdn.x86_64", "8Base-RHOSE-4.7:ovn2.13-vtep-0:20.09.0-21.el8fdn.ppc64le", "8Base-RHOSE-4.7:ovn2.13-vtep-0:20.09.0-21.el8fdn.s390x", "8Base-RHOSE-4.7:ovn2.13-vtep-0:20.09.0-21.el8fdn.x86_64", "8Base-RHOSE-4.7:ovn2.13-vtep-debuginfo-0:20.09.0-21.el8fdn.ppc64le", "8Base-RHOSE-4.7:ovn2.13-vtep-debuginfo-0:20.09.0-21.el8fdn.s390x", "8Base-RHOSE-4.7:ovn2.13-vtep-debuginfo-0:20.09.0-21.el8fdn.x86_64", "8Base-RHOSE-4.7:powerpc-utils-0:1.3.6-12.el8_3.ppc64le", "8Base-RHOSE-4.7:powerpc-utils-0:1.3.6-12.el8_3.src", "8Base-RHOSE-4.7:powerpc-utils-core-0:1.3.6-12.el8_3.ppc64le", "8Base-RHOSE-4.7:powerpc-utils-core-debuginfo-0:1.3.6-12.el8_3.ppc64le", "8Base-RHOSE-4.7:powerpc-utils-debugsource-0:1.3.6-12.el8_3.ppc64le", "8Base-RHOSE-4.7:pprof-0:2.6.3-2.el8ost.noarch", "8Base-RHOSE-4.7:prometheus-promu-0:0.5.0-2.git642a960.el8.ppc64le", "8Base-RHOSE-4.7:prometheus-promu-0:0.5.0-2.git642a960.el8.s390x", "8Base-RHOSE-4.7:prometheus-promu-0:0.5.0-2.git642a960.el8.x86_64", "8Base-RHOSE-4.7:protobuf-0:3.6.1-4.el8ost.ppc64le", "8Base-RHOSE-4.7:protobuf-0:3.6.1-4.el8ost.s390x", "8Base-RHOSE-4.7:protobuf-0:3.6.1-4.el8ost.src", "8Base-RHOSE-4.7:protobuf-0:3.6.1-4.el8ost.x86_64", "8Base-RHOSE-4.7:protobuf-compiler-0:3.6.1-4.el8ost.ppc64le", "8Base-RHOSE-4.7:protobuf-compiler-0:3.6.1-4.el8ost.s390x", "8Base-RHOSE-4.7:protobuf-compiler-0:3.6.1-4.el8ost.x86_64", "8Base-RHOSE-4.7:protobuf-compiler-debuginfo-0:3.6.1-4.el8ost.ppc64le", "8Base-RHOSE-4.7:protobuf-compiler-debuginfo-0:3.6.1-4.el8ost.s390x", "8Base-RHOSE-4.7:protobuf-compiler-debuginfo-0:3.6.1-4.el8ost.x86_64", "8Base-RHOSE-4.7:protobuf-debuginfo-0:3.6.1-4.el8ost.ppc64le", "8Base-RHOSE-4.7:protobuf-debuginfo-0:3.6.1-4.el8ost.s390x", "8Base-RHOSE-4.7:protobuf-debuginfo-0:3.6.1-4.el8ost.x86_64", "8Base-RHOSE-4.7:protobuf-debugsource-0:3.6.1-4.el8ost.ppc64le", "8Base-RHOSE-4.7:protobuf-debugsource-0:3.6.1-4.el8ost.s390x", "8Base-RHOSE-4.7:protobuf-debugsource-0:3.6.1-4.el8ost.x86_64", "8Base-RHOSE-4.7:protobuf-devel-0:3.6.1-4.el8ost.ppc64le", "8Base-RHOSE-4.7:protobuf-devel-0:3.6.1-4.el8ost.s390x", "8Base-RHOSE-4.7:protobuf-devel-0:3.6.1-4.el8ost.x86_64", "8Base-RHOSE-4.7:protobuf-lite-0:3.6.1-4.el8ost.ppc64le", "8Base-RHOSE-4.7:protobuf-lite-0:3.6.1-4.el8ost.s390x", "8Base-RHOSE-4.7:protobuf-lite-0:3.6.1-4.el8ost.x86_64", "8Base-RHOSE-4.7:protobuf-lite-debuginfo-0:3.6.1-4.el8ost.ppc64le", "8Base-RHOSE-4.7:protobuf-lite-debuginfo-0:3.6.1-4.el8ost.s390x", "8Base-RHOSE-4.7:protobuf-lite-debuginfo-0:3.6.1-4.el8ost.x86_64", "8Base-RHOSE-4.7:protobuf-lite-devel-0:3.6.1-4.el8ost.ppc64le", "8Base-RHOSE-4.7:protobuf-lite-devel-0:3.6.1-4.el8ost.s390x", "8Base-RHOSE-4.7:protobuf-lite-devel-0:3.6.1-4.el8ost.x86_64", "8Base-RHOSE-4.7:protobuf-lite-static-0:3.6.1-4.el8ost.ppc64le", "8Base-RHOSE-4.7:protobuf-lite-static-0:3.6.1-4.el8ost.s390x", "8Base-RHOSE-4.7:protobuf-lite-static-0:3.6.1-4.el8ost.x86_64", "8Base-RHOSE-4.7:protobuf-static-0:3.6.1-4.el8ost.ppc64le", "8Base-RHOSE-4.7:protobuf-static-0:3.6.1-4.el8ost.s390x", "8Base-RHOSE-4.7:protobuf-static-0:3.6.1-4.el8ost.x86_64", "8Base-RHOSE-4.7:protobuf-vim-0:3.6.1-4.el8ost.noarch", "8Base-RHOSE-4.7:python-alembic-0:1.4.2-5.el8ost.src", "8Base-RHOSE-4.7:python-boto3-0:1.9.101-1.el8ost.src", "8Base-RHOSE-4.7:python-botocore-0:1.12.119-1.el8ost.src", "8Base-RHOSE-4.7:python-cachetools-0:3.1.0-1.el8ost.src", "8Base-RHOSE-4.7:python-certifi-0:2018.10.15-4.el8ost.src", "8Base-RHOSE-4.7:python-construct-0:2.10.56-1.el8ost.src", "8Base-RHOSE-4.7:python-daemon-0:2.1.2-9.el8ar.src", "8Base-RHOSE-4.7:python-debtcollector-0:2.2.0-0.20201008171245.649189d.el8.src", "8Base-RHOSE-4.7:python-dictdiffer-0:0.7.1-2.el8ost.src", "8Base-RHOSE-4.7:python-eventlet-0:0.25.2-3.el8ost.src", "8Base-RHOSE-4.7:python-flask-1:1.1.1-1.el8ost.src", "8Base-RHOSE-4.7:python-flask-doc-1:1.1.1-1.el8ost.noarch", "8Base-RHOSE-4.7:python-google-auth-0:1.3.0-1.el8ost.src", "8Base-RHOSE-4.7:python-hardware-0:0.23.0-0.20201031022149.59211cc.el8.src", "8Base-RHOSE-4.7:python-ifaddr-0:0.1.6-5.el8ost.src", "8Base-RHOSE-4.7:python-importlib-metadata-0:1.7.0-1.el8ost.src", "8Base-RHOSE-4.7:python-ironic-lib-0:4.4.1-0.20201218041209.aa7cfec.el8.src", "8Base-RHOSE-4.7:python-keystoneauth1-0:4.2.0-0.20200630234358.dab8e10.el8ost.src", "8Base-RHOSE-4.7:python-kubernetes-0:11.0.0-1.el8.src", "8Base-RHOSE-4.7:python-kuryr-lib-0:1.1.1-0.20190923160834.41e6964.el8ost.src", "8Base-RHOSE-4.7:python-lockfile-1:0.11.0-8.el8ar.src", "8Base-RHOSE-4.7:python-msgpack-0:0.6.2-1.el8ost.src", "8Base-RHOSE-4.7:python-msgpack-debugsource-0:0.6.2-1.el8ost.x86_64", "8Base-RHOSE-4.7:python-openshift-1:0.11.2-1.el8.src", "8Base-RHOSE-4.7:python-openstacksdk-0:0.48.0-0.20200708092906.3b693c2.el8ost.src", "8Base-RHOSE-4.7:python-oslo-concurrency-0:4.3.0-0.20201008180343.2f78803.el8.src", "8Base-RHOSE-4.7:python-oslo-concurrency-lang-0:4.3.0-0.20201008180343.2f78803.el8.noarch", "8Base-RHOSE-4.7:python-oslo-config-2:8.3.2-0.20201008180634.fcb8894.el8.src", "8Base-RHOSE-4.7:python-oslo-context-0:3.1.1-0.20201008190523.57dbded.el8.src", "8Base-RHOSE-4.7:python-oslo-db-0:8.4.0-0.20200918104110.e42c733.el8ost.src", "8Base-RHOSE-4.7:python-oslo-db-lang-0:8.4.0-0.20200918104110.e42c733.el8ost.noarch", "8Base-RHOSE-4.7:python-oslo-i18n-0:5.0.1-0.20201009131251.73187bd.el8.src", "8Base-RHOSE-4.7:python-oslo-i18n-lang-0:5.0.1-0.20201009131251.73187bd.el8.noarch", "8Base-RHOSE-4.7:python-oslo-log-0:4.3.1-0.20201207021200.1597f24.el8.src", "8Base-RHOSE-4.7:python-oslo-log-lang-0:4.3.1-0.20201207021200.1597f24.el8.noarch", "8Base-RHOSE-4.7:python-oslo-serialization-0:4.0.1-0.20201008182423.c7884b2.el8.src", "8Base-RHOSE-4.7:python-oslo-service-0:2.4.0-0.20201008184547.58466a6.el8.src", "8Base-RHOSE-4.7:python-oslo-utils-0:4.6.0-0.20201009175936.91497da.el8.src", "8Base-RHOSE-4.7:python-oslo-utils-lang-0:4.6.0-0.20201009175936.91497da.el8.noarch", "8Base-RHOSE-4.7:python-packaging-0:20.4-1.el8ost.src", "8Base-RHOSE-4.7:python-packaging-doc-0:20.4-1.el8ost.noarch", "8Base-RHOSE-4.7:python-paste-0:3.2.4-1.el8ost.src", "8Base-RHOSE-4.7:python-paste-deploy-0:2.0.1-4.el8ost.src", "8Base-RHOSE-4.7:python-pbr-0:5.4.3-2.el8ost.src", "8Base-RHOSE-4.7:python-pexpect-0:4.6-2.el8ar.src", "8Base-RHOSE-4.7:python-pint-0:0.10.1-1.el8ost.src", "8Base-RHOSE-4.7:python-psutil-0:5.6.6-1.el8ar.src", "8Base-RHOSE-4.7:python-psutil-debugsource-0:5.6.6-1.el8ar.ppc64le", "8Base-RHOSE-4.7:python-psutil-debugsource-0:5.6.6-1.el8ar.s390x", "8Base-RHOSE-4.7:python-psutil-debugsource-0:5.6.6-1.el8ar.x86_64", "8Base-RHOSE-4.7:python-pyghmi-0:1.5.14-2.1.el8ost.src", "8Base-RHOSE-4.7:python-pyroute2-0:0.5.13-1.el8ost.src", "8Base-RHOSE-4.7:python-requests-unixsocket-0:0.1.5-5.el8ar.src", "8Base-RHOSE-4.7:python-rsa-0:4.7-1.el8.src", "8Base-RHOSE-4.7:python-ruamel-yaml-0:0.15.41-4.el8ost.src", "8Base-RHOSE-4.7:python-ruamel-yaml-debugsource-0:0.15.41-4.el8ost.ppc64le", "8Base-RHOSE-4.7:python-ruamel-yaml-debugsource-0:0.15.41-4.el8ost.s390x", "8Base-RHOSE-4.7:python-ruamel-yaml-debugsource-0:0.15.41-4.el8ost.x86_64", "8Base-RHOSE-4.7:python-s3transfer-0:0.2.0-1.el8ost.src", "8Base-RHOSE-4.7:python-stevedore-0:3.2.2-0.20201009151242.274eaa6.el8.src", "8Base-RHOSE-4.7:python-string_utils-0:0.6.0-4.el8ost.src", "8Base-RHOSE-4.7:python-sushy-0:3.6.1-0.20210122201213.7ec0422.el8.src", "8Base-RHOSE-4.7:python-sushy-oem-idrac-0:0.0.3-0.20200922221223.1202372.el8ost.src", "8Base-RHOSE-4.7:python-tenacity-0:6.2.0-1.el8ost.src", "8Base-RHOSE-4.7:python-tooz-0:2.7.0-0.20200723133754.fca43df.el8ost.src", "8Base-RHOSE-4.7:python-websocket-client-0:0.54.0-1.el8ost.src", "8Base-RHOSE-4.7:python-werkzeug-0:1.0.1-3.el8ost.src", "8Base-RHOSE-4.7:python-zeroconf-0:0.24.4-1.el8ost.src", "8Base-RHOSE-4.7:python-zipp-0:0.5.1-2.el8ost.src", "8Base-RHOSE-4.7:python2-botocore-0:1.12.119-1.el8ost.noarch", "8Base-RHOSE-4.7:python2-cachetools-0:3.1.0-1.el8ost.noarch", "8Base-RHOSE-4.7:python3-alembic-0:1.4.2-5.el8ost.noarch", "8Base-RHOSE-4.7:python3-ansible-runner-0:1.4.6-2.el8ar.noarch", "8Base-RHOSE-4.7:python3-boto3-0:1.9.101-1.el8ost.noarch", "8Base-RHOSE-4.7:python3-botocore-0:1.12.119-1.el8ost.noarch", "8Base-RHOSE-4.7:python3-cachetools-0:3.1.0-1.el8ost.noarch", "8Base-RHOSE-4.7:python3-certifi-0:2018.10.15-4.el8ost.noarch", "8Base-RHOSE-4.7:python3-construct-0:2.10.56-1.el8ost.noarch", "8Base-RHOSE-4.7:python3-daemon-0:2.1.2-9.el8ar.noarch", "8Base-RHOSE-4.7:python3-debtcollector-0:2.2.0-0.20201008171245.649189d.el8.noarch", "8Base-RHOSE-4.7:python3-dictdiffer-0:0.7.1-2.el8ost.noarch", "8Base-RHOSE-4.7:python3-eventlet-0:0.25.2-3.el8ost.noarch", "8Base-RHOSE-4.7:python3-flask-1:1.1.1-1.el8ost.noarch", "8Base-RHOSE-4.7:python3-google-auth-0:1.3.0-1.el8ost.noarch", "8Base-RHOSE-4.7:python3-grpcio-0:1.18.0-4.el8ost.ppc64le", "8Base-RHOSE-4.7:python3-grpcio-0:1.18.0-4.el8ost.s390x", "8Base-RHOSE-4.7:python3-grpcio-0:1.18.0-4.el8ost.x86_64", "8Base-RHOSE-4.7:python3-grpcio-debuginfo-0:1.18.0-4.el8ost.ppc64le", "8Base-RHOSE-4.7:python3-grpcio-debuginfo-0:1.18.0-4.el8ost.s390x", "8Base-RHOSE-4.7:python3-grpcio-debuginfo-0:1.18.0-4.el8ost.x86_64", "8Base-RHOSE-4.7:python3-hardware-0:0.23.0-0.20201031022149.59211cc.el8.noarch", "8Base-RHOSE-4.7:python3-hardware-detect-0:0.23.0-0.20201031022149.59211cc.el8.noarch", "8Base-RHOSE-4.7:python3-ifaddr-0:0.1.6-5.el8ost.noarch", "8Base-RHOSE-4.7:python3-importlib-metadata-0:1.7.0-1.el8ost.noarch", "8Base-RHOSE-4.7:python3-ironic-inspector-tests-0:10.4.1-0.20201123161216.70fccec.el8.noarch", "8Base-RHOSE-4.7:python3-ironic-lib-0:4.4.1-0.20201218041209.aa7cfec.el8.noarch", "8Base-RHOSE-4.7:python3-ironic-python-agent-0:6.4.3-0.20201217171210.bd45db1.el8.noarch", "8Base-RHOSE-4.7:python3-ironic-tests-1:16.0.4-0.20210203051223.7d74ea0.el8.noarch", "8Base-RHOSE-4.7:python3-keystoneauth1-0:4.2.0-0.20200630234358.dab8e10.el8ost.noarch", "8Base-RHOSE-4.7:python3-kubernetes-0:11.0.0-1.el8.noarch", "8Base-RHOSE-4.7:python3-kubernetes-tests-0:11.0.0-1.el8.noarch", "8Base-RHOSE-4.7:python3-kuryr-kubernetes-0:4.7.0-202101262230.p0.git.2494.cd95ce5.el8.noarch", "8Base-RHOSE-4.7:python3-kuryr-lib-0:1.1.1-0.20190923160834.41e6964.el8ost.noarch", "8Base-RHOSE-4.7:python3-kuryr-lib-tests-0:1.1.1-0.20190923160834.41e6964.el8ost.noarch", "8Base-RHOSE-4.7:python3-lockfile-1:0.11.0-8.el8ar.noarch", "8Base-RHOSE-4.7:python3-msgpack-0:0.6.2-1.el8ost.x86_64", "8Base-RHOSE-4.7:python3-msgpack-debuginfo-0:0.6.2-1.el8ost.x86_64", "8Base-RHOSE-4.7:python3-openshift-1:0.11.2-1.el8.noarch", "8Base-RHOSE-4.7:python3-openstacksdk-0:0.48.0-0.20200708092906.3b693c2.el8ost.noarch", "8Base-RHOSE-4.7:python3-openstacksdk-tests-0:0.48.0-0.20200708092906.3b693c2.el8ost.noarch", "8Base-RHOSE-4.7:python3-openvswitch2.13-0:2.13.0-79.el8fdp.ppc64le", "8Base-RHOSE-4.7:python3-openvswitch2.13-0:2.13.0-79.el8fdp.s390x", "8Base-RHOSE-4.7:python3-openvswitch2.13-0:2.13.0-79.el8fdp.x86_64", "8Base-RHOSE-4.7:python3-openvswitch2.13-debuginfo-0:2.13.0-79.el8fdp.ppc64le", "8Base-RHOSE-4.7:python3-openvswitch2.13-debuginfo-0:2.13.0-79.el8fdp.s390x", "8Base-RHOSE-4.7:python3-openvswitch2.13-debuginfo-0:2.13.0-79.el8fdp.x86_64", "8Base-RHOSE-4.7:python3-oslo-concurrency-0:4.3.0-0.20201008180343.2f78803.el8.noarch", "8Base-RHOSE-4.7:python3-oslo-concurrency-tests-0:4.3.0-0.20201008180343.2f78803.el8.noarch", "8Base-RHOSE-4.7:python3-oslo-config-2:8.3.2-0.20201008180634.fcb8894.el8.noarch", "8Base-RHOSE-4.7:python3-oslo-context-0:3.1.1-0.20201008190523.57dbded.el8.noarch", "8Base-RHOSE-4.7:python3-oslo-context-tests-0:3.1.1-0.20201008190523.57dbded.el8.noarch", "8Base-RHOSE-4.7:python3-oslo-db-0:8.4.0-0.20200918104110.e42c733.el8ost.noarch", "8Base-RHOSE-4.7:python3-oslo-db-tests-0:8.4.0-0.20200918104110.e42c733.el8ost.noarch", "8Base-RHOSE-4.7:python3-oslo-i18n-0:5.0.1-0.20201009131251.73187bd.el8.noarch", "8Base-RHOSE-4.7:python3-oslo-log-0:4.3.1-0.20201207021200.1597f24.el8.noarch", "8Base-RHOSE-4.7:python3-oslo-log-tests-0:4.3.1-0.20201207021200.1597f24.el8.noarch", "8Base-RHOSE-4.7:python3-oslo-serialization-0:4.0.1-0.20201008182423.c7884b2.el8.noarch", "8Base-RHOSE-4.7:python3-oslo-serialization-tests-0:4.0.1-0.20201008182423.c7884b2.el8.noarch", "8Base-RHOSE-4.7:python3-oslo-service-0:2.4.0-0.20201008184547.58466a6.el8.noarch", "8Base-RHOSE-4.7:python3-oslo-service-tests-0:2.4.0-0.20201008184547.58466a6.el8.noarch", "8Base-RHOSE-4.7:python3-oslo-utils-0:4.6.0-0.20201009175936.91497da.el8.noarch", "8Base-RHOSE-4.7:python3-oslo-utils-tests-0:4.6.0-0.20201009175936.91497da.el8.noarch", "8Base-RHOSE-4.7:python3-packaging-0:20.4-1.el8ost.noarch", "8Base-RHOSE-4.7:python3-paste-0:3.2.4-1.el8ost.noarch", "8Base-RHOSE-4.7:python3-paste-deploy-0:2.0.1-4.el8ost.noarch", "8Base-RHOSE-4.7:python3-pbr-0:5.4.3-2.el8ost.noarch", "8Base-RHOSE-4.7:python3-pexpect-0:4.6-2.el8ar.noarch", "8Base-RHOSE-4.7:python3-pint-0:0.10.1-1.el8ost.noarch", "8Base-RHOSE-4.7:python3-protobuf-0:3.6.1-4.el8ost.noarch", "8Base-RHOSE-4.7:python3-psutil-0:5.6.6-1.el8ar.ppc64le", "8Base-RHOSE-4.7:python3-psutil-0:5.6.6-1.el8ar.s390x", "8Base-RHOSE-4.7:python3-psutil-0:5.6.6-1.el8ar.x86_64", "8Base-RHOSE-4.7:python3-psutil-debuginfo-0:5.6.6-1.el8ar.ppc64le", "8Base-RHOSE-4.7:python3-psutil-debuginfo-0:5.6.6-1.el8ar.s390x", "8Base-RHOSE-4.7:python3-psutil-debuginfo-0:5.6.6-1.el8ar.x86_64", "8Base-RHOSE-4.7:python3-pyghmi-0:1.5.14-2.1.el8ost.noarch", "8Base-RHOSE-4.7:python3-pyroute2-0:0.5.13-1.el8ost.noarch", "8Base-RHOSE-4.7:python3-requests-unixsocket-0:0.1.5-5.el8ar.noarch", "8Base-RHOSE-4.7:python3-rsa-0:4.7-1.el8.noarch", "8Base-RHOSE-4.7:python3-ruamel-yaml-0:0.15.41-4.el8ost.ppc64le", "8Base-RHOSE-4.7:python3-ruamel-yaml-0:0.15.41-4.el8ost.s390x", "8Base-RHOSE-4.7:python3-ruamel-yaml-0:0.15.41-4.el8ost.x86_64", "8Base-RHOSE-4.7:python3-ruamel-yaml-debuginfo-0:0.15.41-4.el8ost.ppc64le", "8Base-RHOSE-4.7:python3-ruamel-yaml-debuginfo-0:0.15.41-4.el8ost.s390x", "8Base-RHOSE-4.7:python3-ruamel-yaml-debuginfo-0:0.15.41-4.el8ost.x86_64", "8Base-RHOSE-4.7:python3-s3transfer-0:0.2.0-1.el8ost.noarch", "8Base-RHOSE-4.7:python3-stevedore-0:3.2.2-0.20201009151242.274eaa6.el8.noarch", "8Base-RHOSE-4.7:python3-string_utils-0:0.6.0-4.el8ost.noarch", "8Base-RHOSE-4.7:python3-sushy-0:3.6.1-0.20210122201213.7ec0422.el8.noarch", "8Base-RHOSE-4.7:python3-sushy-oem-idrac-0:0.0.3-0.20200922221223.1202372.el8ost.noarch", "8Base-RHOSE-4.7:python3-sushy-oem-idrac-tests-0:0.0.3-0.20200922221223.1202372.el8ost.noarch", "8Base-RHOSE-4.7:python3-sushy-tests-0:3.6.1-0.20210122201213.7ec0422.el8.noarch", "8Base-RHOSE-4.7:python3-tenacity-0:6.2.0-1.el8ost.noarch", "8Base-RHOSE-4.7:python3-tooz-0:2.7.0-0.20200723133754.fca43df.el8ost.noarch", "8Base-RHOSE-4.7:python3-websocket-client-0:0.54.0-1.el8ost.noarch", "8Base-RHOSE-4.7:python3-werkzeug-0:1.0.1-3.el8ost.noarch", "8Base-RHOSE-4.7:python3-zeroconf-0:0.24.4-1.el8ost.noarch", "8Base-RHOSE-4.7:python3-zipp-0:0.5.1-2.el8ost.noarch", "8Base-RHOSE-4.7:redhat-release-coreos-0:47.83-1.el8.ppc64le", "8Base-RHOSE-4.7:redhat-release-coreos-0:47.83-1.el8.s390x", "8Base-RHOSE-4.7:redhat-release-coreos-0:47.83-1.el8.src", "8Base-RHOSE-4.7:redhat-release-coreos-0:47.83-1.el8.x86_64", "8Base-RHOSE-4.7:rhcos-tools-0:0.0.0-1.rhaos4.2.el8.noarch", "8Base-RHOSE-4.7:rhcos-tools-0:0.0.0-1.rhaos4.2.el8.src", "8Base-RHOSE-4.7:rhosp-director-images-0:17.0-20200606.1.el8ost.noarch", "8Base-RHOSE-4.7:rhosp-director-images-0:17.0-20200606.1.el8ost.src", "8Base-RHOSE-4.7:rhosp-director-images-all-0:17.0-20200606.1.el8ost.noarch", "8Base-RHOSE-4.7:rhosp-director-images-ipa-0:17.0-20200606.1.el8ost.noarch", "8Base-RHOSE-4.7:rhosp-director-images-ipa-ppc64le-0:17.0-20200606.1.el8ost.noarch", "8Base-RHOSE-4.7:rhosp-director-images-ipa-x86_64-0:17.0-20200606.1.el8ost.noarch", "8Base-RHOSE-4.7:rhosp-director-images-minimal-0:17.0-20200606.1.el8ost.noarch", "8Base-RHOSE-4.7:rhosp-director-images-ppc64le-0:17.0-20200606.1.el8ost.noarch", "8Base-RHOSE-4.7:rhosp-director-images-x86_64-0:17.0-20200606.1.el8ost.noarch", "8Base-RHOSE-4.7:rpm-ostree-0:2020.7-1.el8_3.ppc64le", "8Base-RHOSE-4.7:rpm-ostree-0:2020.7-1.el8_3.s390x", "8Base-RHOSE-4.7:rpm-ostree-0:2020.7-1.el8_3.src", "8Base-RHOSE-4.7:rpm-ostree-0:2020.7-1.el8_3.x86_64", "8Base-RHOSE-4.7:rpm-ostree-debuginfo-0:2020.7-1.el8_3.ppc64le", "8Base-RHOSE-4.7:rpm-ostree-debuginfo-0:2020.7-1.el8_3.s390x", "8Base-RHOSE-4.7:rpm-ostree-debuginfo-0:2020.7-1.el8_3.x86_64", "8Base-RHOSE-4.7:rpm-ostree-debugsource-0:2020.7-1.el8_3.ppc64le", "8Base-RHOSE-4.7:rpm-ostree-debugsource-0:2020.7-1.el8_3.s390x", "8Base-RHOSE-4.7:rpm-ostree-debugsource-0:2020.7-1.el8_3.x86_64", "8Base-RHOSE-4.7:rpm-ostree-devel-0:2020.7-1.el8_3.ppc64le", "8Base-RHOSE-4.7:rpm-ostree-devel-0:2020.7-1.el8_3.s390x", "8Base-RHOSE-4.7:rpm-ostree-devel-0:2020.7-1.el8_3.x86_64", "8Base-RHOSE-4.7:rpm-ostree-libs-0:2020.7-1.el8_3.ppc64le", "8Base-RHOSE-4.7:rpm-ostree-libs-0:2020.7-1.el8_3.s390x", "8Base-RHOSE-4.7:rpm-ostree-libs-0:2020.7-1.el8_3.x86_64", "8Base-RHOSE-4.7:rpm-ostree-libs-debuginfo-0:2020.7-1.el8_3.ppc64le", "8Base-RHOSE-4.7:rpm-ostree-libs-debuginfo-0:2020.7-1.el8_3.s390x", "8Base-RHOSE-4.7:rpm-ostree-libs-debuginfo-0:2020.7-1.el8_3.x86_64", "8Base-RHOSE-4.7:runc-0:1.0.0-82.rhaos4.6.git086e841.el8.ppc64le", "8Base-RHOSE-4.7:runc-0:1.0.0-82.rhaos4.6.git086e841.el8.s390x", "8Base-RHOSE-4.7:runc-0:1.0.0-82.rhaos4.6.git086e841.el8.src", "8Base-RHOSE-4.7:runc-0:1.0.0-82.rhaos4.6.git086e841.el8.x86_64", "8Base-RHOSE-4.7:runc-debuginfo-0:1.0.0-82.rhaos4.6.git086e841.el8.ppc64le", "8Base-RHOSE-4.7:runc-debuginfo-0:1.0.0-82.rhaos4.6.git086e841.el8.s390x", "8Base-RHOSE-4.7:runc-debuginfo-0:1.0.0-82.rhaos4.6.git086e841.el8.x86_64", "8Base-RHOSE-4.7:runc-debugsource-0:1.0.0-82.rhaos4.6.git086e841.el8.ppc64le", "8Base-RHOSE-4.7:runc-debugsource-0:1.0.0-82.rhaos4.6.git086e841.el8.s390x", "8Base-RHOSE-4.7:runc-debugsource-0:1.0.0-82.rhaos4.6.git086e841.el8.x86_64", "8Base-RHOSE-4.7:rust-afterburn-0:4.6.0-1.rhaos4.7.el8.src", "8Base-RHOSE-4.7:rust-afterburn-debugsource-0:4.6.0-1.rhaos4.7.el8.ppc64le", "8Base-RHOSE-4.7:rust-afterburn-debugsource-0:4.6.0-1.rhaos4.7.el8.s390x", "8Base-RHOSE-4.7:rust-afterburn-debugsource-0:4.6.0-1.rhaos4.7.el8.x86_64", "8Base-RHOSE-4.7:rust-bootupd-0:0.2.5-2.el8.src", "8Base-RHOSE-4.7:rust-bootupd-debugsource-0:0.2.5-2.el8.x86_64", "8Base-RHOSE-4.7:tini-0:0.16.1-1.el8ar.ppc64le", "8Base-RHOSE-4.7:tini-0:0.16.1-1.el8ar.s390x", "8Base-RHOSE-4.7:tini-0:0.16.1-1.el8ar.src", "8Base-RHOSE-4.7:tini-0:0.16.1-1.el8ar.x86_64", "8Base-RHOSE-4.7:toolbox-0:0.0.8-3.rhaos4.7.el8.noarch", "8Base-RHOSE-4.7:toolbox-0:0.0.8-3.rhaos4.7.el8.src" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-15157" }, { "category": "external", "summary": "RHBZ#1888248", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1888248" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-15157", "url": "https://www.cve.org/CVERecord?id=CVE-2020-15157" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-15157", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-15157" }, { "category": "external", "summary": "https://github.com/containerd/containerd/releases/tag/v1.2.14", "url": "https://github.com/containerd/containerd/releases/tag/v1.2.14" }, { "category": "external", "summary": "https://github.com/containerd/containerd/security/advisories/GHSA-742w-89gc-8m9c", "url": "https://github.com/containerd/containerd/security/advisories/GHSA-742w-89gc-8m9c" }, { "category": "external", "summary": "https://www.openwall.com/lists/oss-security/2020/10/15/1", "url": "https://www.openwall.com/lists/oss-security/2020/10/15/1" } ], "release_date": "2020-10-15T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-02-24T14:45:13+00:00", "details": "For OpenShift Container Platform 4.7 see the following documentation, which\nwill be updated shortly for this release, for important instructions on how\nto upgrade your cluster and fully apply this asynchronous errata update:\n\nhttps://docs.openshift.com/container-platform/4.7/release_notes/ocp-4-7-release-notes.html\n\nDetails on how to access this content are available at\nhttps://docs.openshift.com/container-platform/4.7/updating/updating-cluster-cli.html.", "product_ids": [ "7Server-RH7-RHOSE-4.7:openshift-0:4.7.0-202102060108.p0.git.97095.7271b90.el7.src", "7Server-RH7-RHOSE-4.7:openshift-hyperkube-0:4.7.0-202102060108.p0.git.97095.7271b90.el7.x86_64", "8Base-RHOSE-4.7:openshift-0:4.7.0-202102060108.p0.git.97095.7271b90.el8.src", "8Base-RHOSE-4.7:openshift-hyperkube-0:4.7.0-202102060108.p0.git.97095.7271b90.el8.ppc64le", "8Base-RHOSE-4.7:openshift-hyperkube-0:4.7.0-202102060108.p0.git.97095.7271b90.el8.s390x", "8Base-RHOSE-4.7:openshift-hyperkube-0:4.7.0-202102060108.p0.git.97095.7271b90.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:5634" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:N/A:N", "version": "3.1" }, "products": [ "7Server-RH7-RHOSE-4.7:openshift-0:4.7.0-202102060108.p0.git.97095.7271b90.el7.src", "7Server-RH7-RHOSE-4.7:openshift-hyperkube-0:4.7.0-202102060108.p0.git.97095.7271b90.el7.x86_64", "8Base-RHOSE-4.7:openshift-0:4.7.0-202102060108.p0.git.97095.7271b90.el8.src", "8Base-RHOSE-4.7:openshift-hyperkube-0:4.7.0-202102060108.p0.git.97095.7271b90.el8.ppc64le", "8Base-RHOSE-4.7:openshift-hyperkube-0:4.7.0-202102060108.p0.git.97095.7271b90.el8.s390x", "8Base-RHOSE-4.7:openshift-hyperkube-0:4.7.0-202102060108.p0.git.97095.7271b90.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "containerd: credentials leak during image pull" }, { "acknowledgments": [ { "names": [ "Hubert Kario" ], "organization": "Red Hat", "summary": "This issue was discovered by Red Hat." } ], "cve": "CVE-2020-25658", "cwe": { "id": "CWE-385", "name": "Covert Timing Channel" }, "discovery_date": "2020-10-21T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "7Server-RH7-RHOSE-4.7:conmon-2:2.0.21-2.rhaos4.6.el7.src", "7Server-RH7-RHOSE-4.7:conmon-2:2.0.21-2.rhaos4.6.el7.x86_64", "7Server-RH7-RHOSE-4.7:containernetworking-plugins-0:0.8.6-1.rhaos4.5.el7.src", "7Server-RH7-RHOSE-4.7:containernetworking-plugins-0:0.8.6-1.rhaos4.5.el7.x86_64", "7Server-RH7-RHOSE-4.7:containernetworking-plugins-debuginfo-0:0.8.6-1.rhaos4.5.el7.x86_64", "7Server-RH7-RHOSE-4.7:cri-o-0:1.20.0-0.rhaos4.7.git8921e00.el7.51.src", "7Server-RH7-RHOSE-4.7:cri-o-0:1.20.0-0.rhaos4.7.git8921e00.el7.51.x86_64", "7Server-RH7-RHOSE-4.7:cri-o-debuginfo-0:1.20.0-0.rhaos4.7.git8921e00.el7.51.x86_64", "7Server-RH7-RHOSE-4.7:cri-tools-0:1.18.0-3.el7.src", "7Server-RH7-RHOSE-4.7:cri-tools-0:1.18.0-3.el7.x86_64", "7Server-RH7-RHOSE-4.7:cri-tools-debuginfo-0:1.18.0-3.el7.x86_64", "7Server-RH7-RHOSE-4.7:haproxy-0:2.0.19-1.el7.src", "7Server-RH7-RHOSE-4.7:haproxy-debuginfo-0:2.0.19-1.el7.x86_64", "7Server-RH7-RHOSE-4.7:haproxy20-0:2.0.19-1.el7.x86_64", "7Server-RH7-RHOSE-4.7:jq-0:1.6-2.el7.src", "7Server-RH7-RHOSE-4.7:jq-0:1.6-2.el7.x86_64", "7Server-RH7-RHOSE-4.7:jq-debuginfo-0:1.6-2.el7.x86_64", "7Server-RH7-RHOSE-4.7:jq-devel-0:1.6-2.el7.x86_64", "7Server-RH7-RHOSE-4.7:oniguruma-0:5.9.2-5.el7.src", "7Server-RH7-RHOSE-4.7:oniguruma-0:5.9.2-5.el7.x86_64", "7Server-RH7-RHOSE-4.7:oniguruma-debuginfo-0:5.9.2-5.el7.x86_64", "7Server-RH7-RHOSE-4.7:oniguruma-devel-0:5.9.2-5.el7.x86_64", "7Server-RH7-RHOSE-4.7:openshift-0:4.7.0-202102060108.p0.git.97095.7271b90.el7.src", "7Server-RH7-RHOSE-4.7:openshift-ansible-0:4.7.0-202102032256.p0.git.0.bf7d9a7.el7.noarch", "7Server-RH7-RHOSE-4.7:openshift-ansible-0:4.7.0-202102032256.p0.git.0.bf7d9a7.el7.src", "7Server-RH7-RHOSE-4.7:openshift-ansible-test-0:4.7.0-202102032256.p0.git.0.bf7d9a7.el7.noarch", "7Server-RH7-RHOSE-4.7:openshift-clients-0:4.7.0-202102032256.p0.git.3951.0e656ef.el7.src", "7Server-RH7-RHOSE-4.7:openshift-clients-0:4.7.0-202102032256.p0.git.3951.0e656ef.el7.x86_64", "7Server-RH7-RHOSE-4.7:openshift-clients-redistributable-0:4.7.0-202102032256.p0.git.3951.0e656ef.el7.x86_64", "7Server-RH7-RHOSE-4.7:openshift-hyperkube-0:4.7.0-202102060108.p0.git.97095.7271b90.el7.x86_64", "7Server-RH7-RHOSE-4.7:python-botocore-0:1.4.57-5.el7.src", "7Server-RH7-RHOSE-4.7:python2-botocore-0:1.4.57-5.el7.noarch", "7Server-RH7-RHOSE-4.7:runc-0:1.0.0-82.rhaos4.6.git086e841.el7.src", "7Server-RH7-RHOSE-4.7:runc-0:1.0.0-82.rhaos4.6.git086e841.el7.x86_64", "7Server-RH7-RHOSE-4.7:runc-debuginfo-0:1.0.0-82.rhaos4.6.git086e841.el7.x86_64", "8Base-RHOSE-4.7:NetworkManager-1:1.26.0-12.1.rhaos4.7.el8.ppc64le", "8Base-RHOSE-4.7:NetworkManager-1:1.26.0-12.1.rhaos4.7.el8.s390x", "8Base-RHOSE-4.7:NetworkManager-1:1.26.0-12.1.rhaos4.7.el8.src", "8Base-RHOSE-4.7:NetworkManager-1:1.26.0-12.1.rhaos4.7.el8.x86_64", "8Base-RHOSE-4.7:NetworkManager-adsl-1:1.26.0-12.1.rhaos4.7.el8.ppc64le", "8Base-RHOSE-4.7:NetworkManager-adsl-1:1.26.0-12.1.rhaos4.7.el8.s390x", "8Base-RHOSE-4.7:NetworkManager-adsl-1:1.26.0-12.1.rhaos4.7.el8.x86_64", "8Base-RHOSE-4.7:NetworkManager-adsl-debuginfo-1:1.26.0-12.1.rhaos4.7.el8.ppc64le", "8Base-RHOSE-4.7:NetworkManager-adsl-debuginfo-1:1.26.0-12.1.rhaos4.7.el8.s390x", "8Base-RHOSE-4.7:NetworkManager-adsl-debuginfo-1:1.26.0-12.1.rhaos4.7.el8.x86_64", "8Base-RHOSE-4.7:NetworkManager-bluetooth-1:1.26.0-12.1.rhaos4.7.el8.ppc64le", "8Base-RHOSE-4.7:NetworkManager-bluetooth-1:1.26.0-12.1.rhaos4.7.el8.s390x", "8Base-RHOSE-4.7:NetworkManager-bluetooth-1:1.26.0-12.1.rhaos4.7.el8.x86_64", "8Base-RHOSE-4.7:NetworkManager-bluetooth-debuginfo-1:1.26.0-12.1.rhaos4.7.el8.ppc64le", "8Base-RHOSE-4.7:NetworkManager-bluetooth-debuginfo-1:1.26.0-12.1.rhaos4.7.el8.s390x", "8Base-RHOSE-4.7:NetworkManager-bluetooth-debuginfo-1:1.26.0-12.1.rhaos4.7.el8.x86_64", "8Base-RHOSE-4.7:NetworkManager-cloud-setup-1:1.26.0-12.1.rhaos4.7.el8.ppc64le", "8Base-RHOSE-4.7:NetworkManager-cloud-setup-1:1.26.0-12.1.rhaos4.7.el8.s390x", "8Base-RHOSE-4.7:NetworkManager-cloud-setup-1:1.26.0-12.1.rhaos4.7.el8.x86_64", "8Base-RHOSE-4.7:NetworkManager-cloud-setup-debuginfo-1:1.26.0-12.1.rhaos4.7.el8.ppc64le", "8Base-RHOSE-4.7:NetworkManager-cloud-setup-debuginfo-1:1.26.0-12.1.rhaos4.7.el8.s390x", "8Base-RHOSE-4.7:NetworkManager-cloud-setup-debuginfo-1:1.26.0-12.1.rhaos4.7.el8.x86_64", "8Base-RHOSE-4.7:NetworkManager-config-connectivity-redhat-1:1.26.0-12.1.rhaos4.7.el8.noarch", "8Base-RHOSE-4.7:NetworkManager-config-server-1:1.26.0-12.1.rhaos4.7.el8.noarch", "8Base-RHOSE-4.7:NetworkManager-debuginfo-1:1.26.0-12.1.rhaos4.7.el8.ppc64le", "8Base-RHOSE-4.7:NetworkManager-debuginfo-1:1.26.0-12.1.rhaos4.7.el8.s390x", "8Base-RHOSE-4.7:NetworkManager-debuginfo-1:1.26.0-12.1.rhaos4.7.el8.x86_64", "8Base-RHOSE-4.7:NetworkManager-debugsource-1:1.26.0-12.1.rhaos4.7.el8.ppc64le", "8Base-RHOSE-4.7:NetworkManager-debugsource-1:1.26.0-12.1.rhaos4.7.el8.s390x", "8Base-RHOSE-4.7:NetworkManager-debugsource-1:1.26.0-12.1.rhaos4.7.el8.x86_64", "8Base-RHOSE-4.7:NetworkManager-dispatcher-routing-rules-1:1.26.0-12.1.rhaos4.7.el8.noarch", "8Base-RHOSE-4.7:NetworkManager-libnm-1:1.26.0-12.1.rhaos4.7.el8.ppc64le", "8Base-RHOSE-4.7:NetworkManager-libnm-1:1.26.0-12.1.rhaos4.7.el8.s390x", "8Base-RHOSE-4.7:NetworkManager-libnm-1:1.26.0-12.1.rhaos4.7.el8.x86_64", "8Base-RHOSE-4.7:NetworkManager-libnm-debuginfo-1:1.26.0-12.1.rhaos4.7.el8.ppc64le", "8Base-RHOSE-4.7:NetworkManager-libnm-debuginfo-1:1.26.0-12.1.rhaos4.7.el8.s390x", "8Base-RHOSE-4.7:NetworkManager-libnm-debuginfo-1:1.26.0-12.1.rhaos4.7.el8.x86_64", "8Base-RHOSE-4.7:NetworkManager-libnm-devel-1:1.26.0-12.1.rhaos4.7.el8.ppc64le", "8Base-RHOSE-4.7:NetworkManager-libnm-devel-1:1.26.0-12.1.rhaos4.7.el8.s390x", "8Base-RHOSE-4.7:NetworkManager-libnm-devel-1:1.26.0-12.1.rhaos4.7.el8.x86_64", "8Base-RHOSE-4.7:NetworkManager-ovs-1:1.26.0-12.1.rhaos4.7.el8.ppc64le", "8Base-RHOSE-4.7:NetworkManager-ovs-1:1.26.0-12.1.rhaos4.7.el8.s390x", "8Base-RHOSE-4.7:NetworkManager-ovs-1:1.26.0-12.1.rhaos4.7.el8.x86_64", "8Base-RHOSE-4.7:NetworkManager-ovs-debuginfo-1:1.26.0-12.1.rhaos4.7.el8.ppc64le", "8Base-RHOSE-4.7:NetworkManager-ovs-debuginfo-1:1.26.0-12.1.rhaos4.7.el8.s390x", "8Base-RHOSE-4.7:NetworkManager-ovs-debuginfo-1:1.26.0-12.1.rhaos4.7.el8.x86_64", "8Base-RHOSE-4.7:NetworkManager-ppp-1:1.26.0-12.1.rhaos4.7.el8.ppc64le", "8Base-RHOSE-4.7:NetworkManager-ppp-1:1.26.0-12.1.rhaos4.7.el8.s390x", "8Base-RHOSE-4.7:NetworkManager-ppp-1:1.26.0-12.1.rhaos4.7.el8.x86_64", "8Base-RHOSE-4.7:NetworkManager-ppp-debuginfo-1:1.26.0-12.1.rhaos4.7.el8.ppc64le", "8Base-RHOSE-4.7:NetworkManager-ppp-debuginfo-1:1.26.0-12.1.rhaos4.7.el8.s390x", "8Base-RHOSE-4.7:NetworkManager-ppp-debuginfo-1:1.26.0-12.1.rhaos4.7.el8.x86_64", "8Base-RHOSE-4.7:NetworkManager-team-1:1.26.0-12.1.rhaos4.7.el8.ppc64le", "8Base-RHOSE-4.7:NetworkManager-team-1:1.26.0-12.1.rhaos4.7.el8.s390x", "8Base-RHOSE-4.7:NetworkManager-team-1:1.26.0-12.1.rhaos4.7.el8.x86_64", "8Base-RHOSE-4.7:NetworkManager-team-debuginfo-1:1.26.0-12.1.rhaos4.7.el8.ppc64le", "8Base-RHOSE-4.7:NetworkManager-team-debuginfo-1:1.26.0-12.1.rhaos4.7.el8.s390x", "8Base-RHOSE-4.7:NetworkManager-team-debuginfo-1:1.26.0-12.1.rhaos4.7.el8.x86_64", "8Base-RHOSE-4.7:NetworkManager-tui-1:1.26.0-12.1.rhaos4.7.el8.ppc64le", "8Base-RHOSE-4.7:NetworkManager-tui-1:1.26.0-12.1.rhaos4.7.el8.s390x", "8Base-RHOSE-4.7:NetworkManager-tui-1:1.26.0-12.1.rhaos4.7.el8.x86_64", "8Base-RHOSE-4.7:NetworkManager-tui-debuginfo-1:1.26.0-12.1.rhaos4.7.el8.ppc64le", "8Base-RHOSE-4.7:NetworkManager-tui-debuginfo-1:1.26.0-12.1.rhaos4.7.el8.s390x", "8Base-RHOSE-4.7:NetworkManager-tui-debuginfo-1:1.26.0-12.1.rhaos4.7.el8.x86_64", "8Base-RHOSE-4.7:NetworkManager-wifi-1:1.26.0-12.1.rhaos4.7.el8.ppc64le", "8Base-RHOSE-4.7:NetworkManager-wifi-1:1.26.0-12.1.rhaos4.7.el8.s390x", "8Base-RHOSE-4.7:NetworkManager-wifi-1:1.26.0-12.1.rhaos4.7.el8.x86_64", "8Base-RHOSE-4.7:NetworkManager-wifi-debuginfo-1:1.26.0-12.1.rhaos4.7.el8.ppc64le", "8Base-RHOSE-4.7:NetworkManager-wifi-debuginfo-1:1.26.0-12.1.rhaos4.7.el8.s390x", "8Base-RHOSE-4.7:NetworkManager-wifi-debuginfo-1:1.26.0-12.1.rhaos4.7.el8.x86_64", "8Base-RHOSE-4.7:NetworkManager-wwan-1:1.26.0-12.1.rhaos4.7.el8.ppc64le", "8Base-RHOSE-4.7:NetworkManager-wwan-1:1.26.0-12.1.rhaos4.7.el8.s390x", "8Base-RHOSE-4.7:NetworkManager-wwan-1:1.26.0-12.1.rhaos4.7.el8.x86_64", "8Base-RHOSE-4.7:NetworkManager-wwan-debuginfo-1:1.26.0-12.1.rhaos4.7.el8.ppc64le", "8Base-RHOSE-4.7:NetworkManager-wwan-debuginfo-1:1.26.0-12.1.rhaos4.7.el8.s390x", "8Base-RHOSE-4.7:NetworkManager-wwan-debuginfo-1:1.26.0-12.1.rhaos4.7.el8.x86_64", "8Base-RHOSE-4.7:afterburn-0:4.6.0-1.rhaos4.7.el8.ppc64le", "8Base-RHOSE-4.7:afterburn-0:4.6.0-1.rhaos4.7.el8.s390x", "8Base-RHOSE-4.7:afterburn-0:4.6.0-1.rhaos4.7.el8.x86_64", "8Base-RHOSE-4.7:afterburn-debuginfo-0:4.6.0-1.rhaos4.7.el8.ppc64le", "8Base-RHOSE-4.7:afterburn-debuginfo-0:4.6.0-1.rhaos4.7.el8.s390x", "8Base-RHOSE-4.7:afterburn-debuginfo-0:4.6.0-1.rhaos4.7.el8.x86_64", "8Base-RHOSE-4.7:ansible-runner-0:1.4.6-2.el8ar.noarch", "8Base-RHOSE-4.7:ansible-runner-0:1.4.6-2.el8ar.src", "8Base-RHOSE-4.7:ansible-runner-http-0:1.0.0-2.el8ar.noarch", "8Base-RHOSE-4.7:ansible-runner-http-0:1.0.0-2.el8ar.src", "8Base-RHOSE-4.7:atomic-openshift-service-idler-0:4.7.0-202011171454.p0.git.15.675c1c8.el8.ppc64le", "8Base-RHOSE-4.7:atomic-openshift-service-idler-0:4.7.0-202011171454.p0.git.15.675c1c8.el8.s390x", "8Base-RHOSE-4.7:atomic-openshift-service-idler-0:4.7.0-202011171454.p0.git.15.675c1c8.el8.src", "8Base-RHOSE-4.7:atomic-openshift-service-idler-0:4.7.0-202011171454.p0.git.15.675c1c8.el8.x86_64", "8Base-RHOSE-4.7:bootupd-0:0.2.5-2.el8.x86_64", "8Base-RHOSE-4.7:bootupd-debuginfo-0:0.2.5-2.el8.x86_64", "8Base-RHOSE-4.7:clevis-0:15-1.el8.ppc64le", "8Base-RHOSE-4.7:clevis-0:15-1.el8.s390x", "8Base-RHOSE-4.7:clevis-0:15-1.el8.src", "8Base-RHOSE-4.7:clevis-0:15-1.el8.x86_64", "8Base-RHOSE-4.7:clevis-debuginfo-0:15-1.el8.ppc64le", "8Base-RHOSE-4.7:clevis-debuginfo-0:15-1.el8.s390x", "8Base-RHOSE-4.7:clevis-debuginfo-0:15-1.el8.x86_64", "8Base-RHOSE-4.7:clevis-debugsource-0:15-1.el8.ppc64le", "8Base-RHOSE-4.7:clevis-debugsource-0:15-1.el8.s390x", "8Base-RHOSE-4.7:clevis-debugsource-0:15-1.el8.x86_64", "8Base-RHOSE-4.7:clevis-dracut-0:15-1.el8.ppc64le", "8Base-RHOSE-4.7:clevis-dracut-0:15-1.el8.s390x", "8Base-RHOSE-4.7:clevis-dracut-0:15-1.el8.x86_64", "8Base-RHOSE-4.7:clevis-luks-0:15-1.el8.ppc64le", "8Base-RHOSE-4.7:clevis-luks-0:15-1.el8.s390x", "8Base-RHOSE-4.7:clevis-luks-0:15-1.el8.x86_64", "8Base-RHOSE-4.7:clevis-systemd-0:15-1.el8.ppc64le", "8Base-RHOSE-4.7:clevis-systemd-0:15-1.el8.s390x", "8Base-RHOSE-4.7:clevis-systemd-0:15-1.el8.x86_64", "8Base-RHOSE-4.7:clevis-udisks2-0:15-1.el8.ppc64le", "8Base-RHOSE-4.7:clevis-udisks2-0:15-1.el8.s390x", "8Base-RHOSE-4.7:clevis-udisks2-0:15-1.el8.x86_64", "8Base-RHOSE-4.7:clevis-udisks2-debuginfo-0:15-1.el8.ppc64le", "8Base-RHOSE-4.7:clevis-udisks2-debuginfo-0:15-1.el8.s390x", "8Base-RHOSE-4.7:clevis-udisks2-debuginfo-0:15-1.el8.x86_64", "8Base-RHOSE-4.7:conmon-2:2.0.21-2.rhaos4.6.el8.ppc64le", "8Base-RHOSE-4.7:conmon-2:2.0.21-2.rhaos4.6.el8.s390x", "8Base-RHOSE-4.7:conmon-2:2.0.21-2.rhaos4.6.el8.src", "8Base-RHOSE-4.7:conmon-2:2.0.21-2.rhaos4.6.el8.x86_64", "8Base-RHOSE-4.7:console-login-helper-messages-0:0.20.3-1.rhaos4.7.el8.noarch", "8Base-RHOSE-4.7:console-login-helper-messages-0:0.20.3-1.rhaos4.7.el8.src", "8Base-RHOSE-4.7:console-login-helper-messages-issuegen-0:0.20.3-1.rhaos4.7.el8.noarch", "8Base-RHOSE-4.7:console-login-helper-messages-profile-0:0.20.3-1.rhaos4.7.el8.noarch", "8Base-RHOSE-4.7:container-selinux-2:2.151.0-1.rhaos4.7.el8.noarch", "8Base-RHOSE-4.7:container-selinux-2:2.151.0-1.rhaos4.7.el8.src", "8Base-RHOSE-4.7:containernetworking-plugins-0:0.8.6-1.rhaos4.5.el8.ppc64le", "8Base-RHOSE-4.7:containernetworking-plugins-0:0.8.6-1.rhaos4.5.el8.s390x", "8Base-RHOSE-4.7:containernetworking-plugins-0:0.8.6-1.rhaos4.5.el8.src", "8Base-RHOSE-4.7:containernetworking-plugins-0:0.8.6-1.rhaos4.5.el8.x86_64", "8Base-RHOSE-4.7:containernetworking-plugins-debuginfo-0:0.8.6-1.rhaos4.5.el8.ppc64le", "8Base-RHOSE-4.7:containernetworking-plugins-debuginfo-0:0.8.6-1.rhaos4.5.el8.s390x", "8Base-RHOSE-4.7:containernetworking-plugins-debuginfo-0:0.8.6-1.rhaos4.5.el8.x86_64", "8Base-RHOSE-4.7:containernetworking-plugins-debugsource-0:0.8.6-1.rhaos4.5.el8.ppc64le", "8Base-RHOSE-4.7:containernetworking-plugins-debugsource-0:0.8.6-1.rhaos4.5.el8.s390x", "8Base-RHOSE-4.7:containernetworking-plugins-debugsource-0:0.8.6-1.rhaos4.5.el8.x86_64", "8Base-RHOSE-4.7:coreos-installer-0:0.8.0-3.rhaos4.7.el8.ppc64le", "8Base-RHOSE-4.7:coreos-installer-0:0.8.0-3.rhaos4.7.el8.s390x", "8Base-RHOSE-4.7:coreos-installer-0:0.8.0-3.rhaos4.7.el8.src", "8Base-RHOSE-4.7:coreos-installer-0:0.8.0-3.rhaos4.7.el8.x86_64", "8Base-RHOSE-4.7:coreos-installer-bootinfra-0:0.8.0-3.rhaos4.7.el8.ppc64le", "8Base-RHOSE-4.7:coreos-installer-bootinfra-0:0.8.0-3.rhaos4.7.el8.s390x", "8Base-RHOSE-4.7:coreos-installer-bootinfra-debuginfo-0:0.8.0-3.rhaos4.7.el8.ppc64le", "8Base-RHOSE-4.7:coreos-installer-bootinfra-debuginfo-0:0.8.0-3.rhaos4.7.el8.s390x", "8Base-RHOSE-4.7:coreos-installer-bootinfra-debuginfo-0:0.8.0-3.rhaos4.7.el8.x86_64", "8Base-RHOSE-4.7:coreos-installer-debuginfo-0:0.8.0-3.rhaos4.7.el8.ppc64le", "8Base-RHOSE-4.7:coreos-installer-debuginfo-0:0.8.0-3.rhaos4.7.el8.s390x", "8Base-RHOSE-4.7:coreos-installer-debuginfo-0:0.8.0-3.rhaos4.7.el8.x86_64", "8Base-RHOSE-4.7:coreos-installer-debugsource-0:0.8.0-3.rhaos4.7.el8.ppc64le", "8Base-RHOSE-4.7:coreos-installer-debugsource-0:0.8.0-3.rhaos4.7.el8.s390x", "8Base-RHOSE-4.7:coreos-installer-debugsource-0:0.8.0-3.rhaos4.7.el8.x86_64", "8Base-RHOSE-4.7:cri-o-0:1.20.0-0.rhaos4.7.git8921e00.el8.51.ppc64le", "8Base-RHOSE-4.7:cri-o-0:1.20.0-0.rhaos4.7.git8921e00.el8.51.s390x", "8Base-RHOSE-4.7:cri-o-0:1.20.0-0.rhaos4.7.git8921e00.el8.51.src", "8Base-RHOSE-4.7:cri-o-0:1.20.0-0.rhaos4.7.git8921e00.el8.51.x86_64", "8Base-RHOSE-4.7:cri-o-debuginfo-0:1.20.0-0.rhaos4.7.git8921e00.el8.51.ppc64le", "8Base-RHOSE-4.7:cri-o-debuginfo-0:1.20.0-0.rhaos4.7.git8921e00.el8.51.s390x", "8Base-RHOSE-4.7:cri-o-debuginfo-0:1.20.0-0.rhaos4.7.git8921e00.el8.51.x86_64", "8Base-RHOSE-4.7:cri-o-debugsource-0:1.20.0-0.rhaos4.7.git8921e00.el8.51.ppc64le", "8Base-RHOSE-4.7:cri-o-debugsource-0:1.20.0-0.rhaos4.7.git8921e00.el8.51.s390x", "8Base-RHOSE-4.7:cri-o-debugsource-0:1.20.0-0.rhaos4.7.git8921e00.el8.51.x86_64", "8Base-RHOSE-4.7:cri-tools-0:1.20.0-1.el8.ppc64le", "8Base-RHOSE-4.7:cri-tools-0:1.20.0-1.el8.s390x", "8Base-RHOSE-4.7:cri-tools-0:1.20.0-1.el8.src", "8Base-RHOSE-4.7:cri-tools-0:1.20.0-1.el8.x86_64", "8Base-RHOSE-4.7:cri-tools-debuginfo-0:1.20.0-1.el8.ppc64le", "8Base-RHOSE-4.7:cri-tools-debuginfo-0:1.20.0-1.el8.s390x", "8Base-RHOSE-4.7:cri-tools-debuginfo-0:1.20.0-1.el8.x86_64", "8Base-RHOSE-4.7:cri-tools-debugsource-0:1.20.0-1.el8.ppc64le", "8Base-RHOSE-4.7:cri-tools-debugsource-0:1.20.0-1.el8.s390x", "8Base-RHOSE-4.7:cri-tools-debugsource-0:1.20.0-1.el8.x86_64", "8Base-RHOSE-4.7:dracut-0:049-95.git20200804.el8_3.4.ppc64le", "8Base-RHOSE-4.7:dracut-0:049-95.git20200804.el8_3.4.s390x", "8Base-RHOSE-4.7:dracut-0:049-95.git20200804.el8_3.4.src", "8Base-RHOSE-4.7:dracut-0:049-95.git20200804.el8_3.4.x86_64", "8Base-RHOSE-4.7:dracut-caps-0:049-95.git20200804.el8_3.4.ppc64le", "8Base-RHOSE-4.7:dracut-caps-0:049-95.git20200804.el8_3.4.s390x", "8Base-RHOSE-4.7:dracut-caps-0:049-95.git20200804.el8_3.4.x86_64", "8Base-RHOSE-4.7:dracut-config-generic-0:049-95.git20200804.el8_3.4.ppc64le", "8Base-RHOSE-4.7:dracut-config-generic-0:049-95.git20200804.el8_3.4.s390x", "8Base-RHOSE-4.7:dracut-config-generic-0:049-95.git20200804.el8_3.4.x86_64", "8Base-RHOSE-4.7:dracut-config-rescue-0:049-95.git20200804.el8_3.4.ppc64le", "8Base-RHOSE-4.7:dracut-config-rescue-0:049-95.git20200804.el8_3.4.s390x", "8Base-RHOSE-4.7:dracut-config-rescue-0:049-95.git20200804.el8_3.4.x86_64", "8Base-RHOSE-4.7:dracut-debuginfo-0:049-95.git20200804.el8_3.4.ppc64le", "8Base-RHOSE-4.7:dracut-debuginfo-0:049-95.git20200804.el8_3.4.s390x", "8Base-RHOSE-4.7:dracut-debuginfo-0:049-95.git20200804.el8_3.4.x86_64", "8Base-RHOSE-4.7:dracut-debugsource-0:049-95.git20200804.el8_3.4.ppc64le", "8Base-RHOSE-4.7:dracut-debugsource-0:049-95.git20200804.el8_3.4.s390x", "8Base-RHOSE-4.7:dracut-debugsource-0:049-95.git20200804.el8_3.4.x86_64", "8Base-RHOSE-4.7:dracut-live-0:049-95.git20200804.el8_3.4.ppc64le", "8Base-RHOSE-4.7:dracut-live-0:049-95.git20200804.el8_3.4.s390x", "8Base-RHOSE-4.7:dracut-live-0:049-95.git20200804.el8_3.4.x86_64", "8Base-RHOSE-4.7:dracut-network-0:049-95.git20200804.el8_3.4.ppc64le", "8Base-RHOSE-4.7:dracut-network-0:049-95.git20200804.el8_3.4.s390x", "8Base-RHOSE-4.7:dracut-network-0:049-95.git20200804.el8_3.4.x86_64", "8Base-RHOSE-4.7:dracut-squash-0:049-95.git20200804.el8_3.4.ppc64le", "8Base-RHOSE-4.7:dracut-squash-0:049-95.git20200804.el8_3.4.s390x", "8Base-RHOSE-4.7:dracut-squash-0:049-95.git20200804.el8_3.4.x86_64", "8Base-RHOSE-4.7:dracut-tools-0:049-95.git20200804.el8_3.4.ppc64le", "8Base-RHOSE-4.7:dracut-tools-0:049-95.git20200804.el8_3.4.s390x", "8Base-RHOSE-4.7:dracut-tools-0:049-95.git20200804.el8_3.4.x86_64", "8Base-RHOSE-4.7:faq-0:0.0.6-5.el8.ppc64le", "8Base-RHOSE-4.7:faq-0:0.0.6-5.el8.s390x", "8Base-RHOSE-4.7:faq-0:0.0.6-5.el8.src", "8Base-RHOSE-4.7:faq-0:0.0.6-5.el8.x86_64", "8Base-RHOSE-4.7:golang-github-prometheus-promu-0:0.5.0-2.git642a960.el8.ppc64le", "8Base-RHOSE-4.7:golang-github-prometheus-promu-0:0.5.0-2.git642a960.el8.s390x", "8Base-RHOSE-4.7:golang-github-prometheus-promu-0:0.5.0-2.git642a960.el8.src", "8Base-RHOSE-4.7:golang-github-prometheus-promu-0:0.5.0-2.git642a960.el8.x86_64", "8Base-RHOSE-4.7:gperftools-0:2.6.3-2.el8ost.ppc64le", "8Base-RHOSE-4.7:gperftools-0:2.6.3-2.el8ost.s390x", "8Base-RHOSE-4.7:gperftools-0:2.6.3-2.el8ost.src", "8Base-RHOSE-4.7:gperftools-0:2.6.3-2.el8ost.x86_64", "8Base-RHOSE-4.7:gperftools-debugsource-0:2.6.3-2.el8ost.ppc64le", "8Base-RHOSE-4.7:gperftools-debugsource-0:2.6.3-2.el8ost.s390x", "8Base-RHOSE-4.7:gperftools-debugsource-0:2.6.3-2.el8ost.x86_64", "8Base-RHOSE-4.7:gperftools-devel-0:2.6.3-2.el8ost.ppc64le", "8Base-RHOSE-4.7:gperftools-devel-0:2.6.3-2.el8ost.s390x", "8Base-RHOSE-4.7:gperftools-devel-0:2.6.3-2.el8ost.x86_64", "8Base-RHOSE-4.7:gperftools-libs-0:2.6.3-2.el8ost.ppc64le", "8Base-RHOSE-4.7:gperftools-libs-0:2.6.3-2.el8ost.s390x", "8Base-RHOSE-4.7:gperftools-libs-0:2.6.3-2.el8ost.x86_64", "8Base-RHOSE-4.7:gperftools-libs-debuginfo-0:2.6.3-2.el8ost.ppc64le", "8Base-RHOSE-4.7:gperftools-libs-debuginfo-0:2.6.3-2.el8ost.s390x", "8Base-RHOSE-4.7:gperftools-libs-debuginfo-0:2.6.3-2.el8ost.x86_64", "8Base-RHOSE-4.7:grpc-0:1.18.0-4.el8ost.ppc64le", "8Base-RHOSE-4.7:grpc-0:1.18.0-4.el8ost.s390x", "8Base-RHOSE-4.7:grpc-0:1.18.0-4.el8ost.src", "8Base-RHOSE-4.7:grpc-0:1.18.0-4.el8ost.x86_64", "8Base-RHOSE-4.7:grpc-cli-0:1.18.0-4.el8ost.ppc64le", "8Base-RHOSE-4.7:grpc-cli-0:1.18.0-4.el8ost.s390x", "8Base-RHOSE-4.7:grpc-cli-0:1.18.0-4.el8ost.x86_64", "8Base-RHOSE-4.7:grpc-cli-debuginfo-0:1.18.0-4.el8ost.ppc64le", "8Base-RHOSE-4.7:grpc-cli-debuginfo-0:1.18.0-4.el8ost.s390x", "8Base-RHOSE-4.7:grpc-cli-debuginfo-0:1.18.0-4.el8ost.x86_64", "8Base-RHOSE-4.7:grpc-debuginfo-0:1.18.0-4.el8ost.ppc64le", "8Base-RHOSE-4.7:grpc-debuginfo-0:1.18.0-4.el8ost.s390x", "8Base-RHOSE-4.7:grpc-debuginfo-0:1.18.0-4.el8ost.x86_64", "8Base-RHOSE-4.7:grpc-debugsource-0:1.18.0-4.el8ost.ppc64le", "8Base-RHOSE-4.7:grpc-debugsource-0:1.18.0-4.el8ost.s390x", "8Base-RHOSE-4.7:grpc-debugsource-0:1.18.0-4.el8ost.x86_64", "8Base-RHOSE-4.7:grpc-devel-0:1.18.0-4.el8ost.ppc64le", "8Base-RHOSE-4.7:grpc-devel-0:1.18.0-4.el8ost.s390x", "8Base-RHOSE-4.7:grpc-devel-0:1.18.0-4.el8ost.x86_64", "8Base-RHOSE-4.7:grpc-plugins-0:1.18.0-4.el8ost.ppc64le", "8Base-RHOSE-4.7:grpc-plugins-0:1.18.0-4.el8ost.s390x", "8Base-RHOSE-4.7:grpc-plugins-0:1.18.0-4.el8ost.x86_64", "8Base-RHOSE-4.7:grpc-plugins-debuginfo-0:1.18.0-4.el8ost.ppc64le", "8Base-RHOSE-4.7:grpc-plugins-debuginfo-0:1.18.0-4.el8ost.s390x", "8Base-RHOSE-4.7:grpc-plugins-debuginfo-0:1.18.0-4.el8ost.x86_64", "8Base-RHOSE-4.7:haproxy-0:2.0.19-1.el8.src", "8Base-RHOSE-4.7:haproxy-debugsource-0:2.0.19-1.el8.ppc64le", "8Base-RHOSE-4.7:haproxy-debugsource-0:2.0.19-1.el8.s390x", "8Base-RHOSE-4.7:haproxy-debugsource-0:2.0.19-1.el8.x86_64", "8Base-RHOSE-4.7:haproxy20-0:2.0.19-1.el8.ppc64le", "8Base-RHOSE-4.7:haproxy20-0:2.0.19-1.el8.s390x", "8Base-RHOSE-4.7:haproxy20-0:2.0.19-1.el8.x86_64", "8Base-RHOSE-4.7:haproxy20-debuginfo-0:2.0.19-1.el8.ppc64le", "8Base-RHOSE-4.7:haproxy20-debuginfo-0:2.0.19-1.el8.s390x", "8Base-RHOSE-4.7:haproxy20-debuginfo-0:2.0.19-1.el8.x86_64", "8Base-RHOSE-4.7:ignition-0:2.9.0-2.rhaos4.7.git1d56dc8.el8.ppc64le", "8Base-RHOSE-4.7:ignition-0:2.9.0-2.rhaos4.7.git1d56dc8.el8.s390x", "8Base-RHOSE-4.7:ignition-0:2.9.0-2.rhaos4.7.git1d56dc8.el8.src", "8Base-RHOSE-4.7:ignition-0:2.9.0-2.rhaos4.7.git1d56dc8.el8.x86_64", "8Base-RHOSE-4.7:ignition-debuginfo-0:2.9.0-2.rhaos4.7.git1d56dc8.el8.ppc64le", "8Base-RHOSE-4.7:ignition-debuginfo-0:2.9.0-2.rhaos4.7.git1d56dc8.el8.s390x", "8Base-RHOSE-4.7:ignition-debuginfo-0:2.9.0-2.rhaos4.7.git1d56dc8.el8.x86_64", "8Base-RHOSE-4.7:ignition-debugsource-0:2.9.0-2.rhaos4.7.git1d56dc8.el8.ppc64le", "8Base-RHOSE-4.7:ignition-debugsource-0:2.9.0-2.rhaos4.7.git1d56dc8.el8.s390x", "8Base-RHOSE-4.7:ignition-debugsource-0:2.9.0-2.rhaos4.7.git1d56dc8.el8.x86_64", "8Base-RHOSE-4.7:ignition-validate-0:2.9.0-2.rhaos4.7.git1d56dc8.el8.ppc64le", "8Base-RHOSE-4.7:ignition-validate-0:2.9.0-2.rhaos4.7.git1d56dc8.el8.s390x", "8Base-RHOSE-4.7:ignition-validate-0:2.9.0-2.rhaos4.7.git1d56dc8.el8.x86_64", "8Base-RHOSE-4.7:ignition-validate-debuginfo-0:2.9.0-2.rhaos4.7.git1d56dc8.el8.ppc64le", "8Base-RHOSE-4.7:ignition-validate-debuginfo-0:2.9.0-2.rhaos4.7.git1d56dc8.el8.s390x", "8Base-RHOSE-4.7:ignition-validate-debuginfo-0:2.9.0-2.rhaos4.7.git1d56dc8.el8.x86_64", "8Base-RHOSE-4.7:inotify-tools-0:3.20.1-2.el8.ppc64le", "8Base-RHOSE-4.7:inotify-tools-0:3.20.1-2.el8.s390x", "8Base-RHOSE-4.7:inotify-tools-0:3.20.1-2.el8.src", "8Base-RHOSE-4.7:inotify-tools-0:3.20.1-2.el8.x86_64", "8Base-RHOSE-4.7:inotify-tools-debuginfo-0:3.20.1-2.el8.ppc64le", "8Base-RHOSE-4.7:inotify-tools-debuginfo-0:3.20.1-2.el8.s390x", "8Base-RHOSE-4.7:inotify-tools-debuginfo-0:3.20.1-2.el8.x86_64", "8Base-RHOSE-4.7:inotify-tools-debugsource-0:3.20.1-2.el8.ppc64le", "8Base-RHOSE-4.7:inotify-tools-debugsource-0:3.20.1-2.el8.s390x", "8Base-RHOSE-4.7:inotify-tools-debugsource-0:3.20.1-2.el8.x86_64", "8Base-RHOSE-4.7:inotify-tools-devel-0:3.20.1-2.el8.ppc64le", "8Base-RHOSE-4.7:inotify-tools-devel-0:3.20.1-2.el8.s390x", "8Base-RHOSE-4.7:inotify-tools-devel-0:3.20.1-2.el8.x86_64", "8Base-RHOSE-4.7:ironic-images-0:15.1-20210114.1.el8.noarch", "8Base-RHOSE-4.7:ironic-images-0:15.1-20210114.1.el8.src", "8Base-RHOSE-4.7:ironic-images-all-0:15.1-20210114.1.el8.noarch", "8Base-RHOSE-4.7:ironic-images-ipa-ppc64le-0:15.1-20210114.1.el8.noarch", "8Base-RHOSE-4.7:ironic-images-ipa-x86_64-0:15.1-20210114.1.el8.noarch", "8Base-RHOSE-4.7:jenkins-0:2.263.3.1612449007-1.el8.noarch", "8Base-RHOSE-4.7:jenkins-0:2.263.3.1612449007-1.el8.src", "8Base-RHOSE-4.7:jenkins-2-plugins-0:4.7.1611636915-1.el8.noarch", "8Base-RHOSE-4.7:jenkins-2-plugins-0:4.7.1611636915-1.el8.src", "8Base-RHOSE-4.7:jq-0:1.6-2.el8.ppc64le", "8Base-RHOSE-4.7:jq-0:1.6-2.el8.s390x", "8Base-RHOSE-4.7:jq-0:1.6-2.el8.src", "8Base-RHOSE-4.7:jq-0:1.6-2.el8.x86_64", "8Base-RHOSE-4.7:jq-debuginfo-0:1.6-2.el8.ppc64le", "8Base-RHOSE-4.7:jq-debuginfo-0:1.6-2.el8.s390x", "8Base-RHOSE-4.7:jq-debuginfo-0:1.6-2.el8.x86_64", "8Base-RHOSE-4.7:jq-debugsource-0:1.6-2.el8.ppc64le", "8Base-RHOSE-4.7:jq-debugsource-0:1.6-2.el8.s390x", "8Base-RHOSE-4.7:jq-debugsource-0:1.6-2.el8.x86_64", "8Base-RHOSE-4.7:jq-devel-0:1.6-2.el8.ppc64le", "8Base-RHOSE-4.7:jq-devel-0:1.6-2.el8.s390x", "8Base-RHOSE-4.7:jq-devel-0:1.6-2.el8.x86_64", "8Base-RHOSE-4.7:kuryr-binding-scripts-0:1.1.1-0.20190923160834.41e6964.el8ost.noarch", "8Base-RHOSE-4.7:libnftnl-0:1.1.5-4.el8.ppc64le", "8Base-RHOSE-4.7:libnftnl-0:1.1.5-4.el8.s390x", "8Base-RHOSE-4.7:libnftnl-0:1.1.5-4.el8.src", "8Base-RHOSE-4.7:libnftnl-0:1.1.5-4.el8.x86_64", "8Base-RHOSE-4.7:libnftnl-debuginfo-0:1.1.5-4.el8.ppc64le", "8Base-RHOSE-4.7:libnftnl-debuginfo-0:1.1.5-4.el8.s390x", "8Base-RHOSE-4.7:libnftnl-debuginfo-0:1.1.5-4.el8.x86_64", "8Base-RHOSE-4.7:libnftnl-debugsource-0:1.1.5-4.el8.ppc64le", "8Base-RHOSE-4.7:libnftnl-debugsource-0:1.1.5-4.el8.s390x", "8Base-RHOSE-4.7:libnftnl-debugsource-0:1.1.5-4.el8.x86_64", "8Base-RHOSE-4.7:libnftnl-devel-0:1.1.5-4.el8.ppc64le", "8Base-RHOSE-4.7:libnftnl-devel-0:1.1.5-4.el8.s390x", "8Base-RHOSE-4.7:libnftnl-devel-0:1.1.5-4.el8.x86_64", "8Base-RHOSE-4.7:libsodium-0:1.0.16-4.5.el8ost.ppc64le", "8Base-RHOSE-4.7:libsodium-0:1.0.16-4.5.el8ost.s390x", "8Base-RHOSE-4.7:libsodium-0:1.0.16-4.5.el8ost.src", "8Base-RHOSE-4.7:libsodium-0:1.0.16-4.5.el8ost.x86_64", "8Base-RHOSE-4.7:libsodium-debuginfo-0:1.0.16-4.5.el8ost.ppc64le", "8Base-RHOSE-4.7:libsodium-debuginfo-0:1.0.16-4.5.el8ost.s390x", "8Base-RHOSE-4.7:libsodium-debuginfo-0:1.0.16-4.5.el8ost.x86_64", "8Base-RHOSE-4.7:libsodium-debugsource-0:1.0.16-4.5.el8ost.ppc64le", "8Base-RHOSE-4.7:libsodium-debugsource-0:1.0.16-4.5.el8ost.s390x", "8Base-RHOSE-4.7:libsodium-debugsource-0:1.0.16-4.5.el8ost.x86_64", "8Base-RHOSE-4.7:libsodium-devel-0:1.0.16-4.5.el8ost.ppc64le", "8Base-RHOSE-4.7:libsodium-devel-0:1.0.16-4.5.el8ost.s390x", "8Base-RHOSE-4.7:libsodium-devel-0:1.0.16-4.5.el8ost.x86_64", "8Base-RHOSE-4.7:libsodium-static-0:1.0.16-4.5.el8ost.ppc64le", "8Base-RHOSE-4.7:libsodium-static-0:1.0.16-4.5.el8ost.s390x", "8Base-RHOSE-4.7:libsodium-static-0:1.0.16-4.5.el8ost.x86_64", "8Base-RHOSE-4.7:libunwind-0:1.2.1-5.el8.ppc64le", "8Base-RHOSE-4.7:libunwind-0:1.2.1-5.el8.src", "8Base-RHOSE-4.7:libunwind-0:1.2.1-5.el8.x86_64", "8Base-RHOSE-4.7:libunwind-debuginfo-0:1.2.1-5.el8.ppc64le", "8Base-RHOSE-4.7:libunwind-debuginfo-0:1.2.1-5.el8.x86_64", "8Base-RHOSE-4.7:libunwind-debugsource-0:1.2.1-5.el8.ppc64le", "8Base-RHOSE-4.7:libunwind-debugsource-0:1.2.1-5.el8.x86_64", "8Base-RHOSE-4.7:libunwind-devel-0:1.2.1-5.el8.ppc64le", "8Base-RHOSE-4.7:libunwind-devel-0:1.2.1-5.el8.x86_64", "8Base-RHOSE-4.7:network-scripts-openvswitch2.13-0:2.13.0-79.el8fdp.ppc64le", "8Base-RHOSE-4.7:network-scripts-openvswitch2.13-0:2.13.0-79.el8fdp.s390x", "8Base-RHOSE-4.7:network-scripts-openvswitch2.13-0:2.13.0-79.el8fdp.x86_64", "8Base-RHOSE-4.7:octavia-amphora-image-x86_64-0:17.0-20200606.1.el8ost.noarch", "8Base-RHOSE-4.7:openshift-0:4.7.0-202102060108.p0.git.97095.7271b90.el8.src", "8Base-RHOSE-4.7:openshift-clients-0:4.7.0-202102032256.p0.git.3951.0e656ef.el8.ppc64le", "8Base-RHOSE-4.7:openshift-clients-0:4.7.0-202102032256.p0.git.3951.0e656ef.el8.s390x", "8Base-RHOSE-4.7:openshift-clients-0:4.7.0-202102032256.p0.git.3951.0e656ef.el8.src", "8Base-RHOSE-4.7:openshift-clients-0:4.7.0-202102032256.p0.git.3951.0e656ef.el8.x86_64", "8Base-RHOSE-4.7:openshift-clients-redistributable-0:4.7.0-202102032256.p0.git.3951.0e656ef.el8.x86_64", "8Base-RHOSE-4.7:openshift-eventrouter-0:0.2-4.git7c289cc.el8.ppc64le", "8Base-RHOSE-4.7:openshift-eventrouter-0:0.2-4.git7c289cc.el8.s390x", "8Base-RHOSE-4.7:openshift-eventrouter-0:0.2-4.git7c289cc.el8.src", "8Base-RHOSE-4.7:openshift-eventrouter-0:0.2-4.git7c289cc.el8.x86_64", "8Base-RHOSE-4.7:openshift-eventrouter-debuginfo-0:0.2-4.git7c289cc.el8.ppc64le", "8Base-RHOSE-4.7:openshift-eventrouter-debuginfo-0:0.2-4.git7c289cc.el8.s390x", "8Base-RHOSE-4.7:openshift-eventrouter-debuginfo-0:0.2-4.git7c289cc.el8.x86_64", "8Base-RHOSE-4.7:openshift-eventrouter-debugsource-0:0.2-4.git7c289cc.el8.ppc64le", "8Base-RHOSE-4.7:openshift-eventrouter-debugsource-0:0.2-4.git7c289cc.el8.s390x", "8Base-RHOSE-4.7:openshift-eventrouter-debugsource-0:0.2-4.git7c289cc.el8.x86_64", "8Base-RHOSE-4.7:openshift-hyperkube-0:4.7.0-202102060108.p0.git.97095.7271b90.el8.ppc64le", "8Base-RHOSE-4.7:openshift-hyperkube-0:4.7.0-202102060108.p0.git.97095.7271b90.el8.s390x", "8Base-RHOSE-4.7:openshift-hyperkube-0:4.7.0-202102060108.p0.git.97095.7271b90.el8.x86_64", "8Base-RHOSE-4.7:openshift-kuryr-0:4.7.0-202101262230.p0.git.2494.cd95ce5.el8.src", "8Base-RHOSE-4.7:openshift-kuryr-cni-0:4.7.0-202101262230.p0.git.2494.cd95ce5.el8.noarch", "8Base-RHOSE-4.7:openshift-kuryr-common-0:4.7.0-202101262230.p0.git.2494.cd95ce5.el8.noarch", "8Base-RHOSE-4.7:openshift-kuryr-controller-0:4.7.0-202101262230.p0.git.2494.cd95ce5.el8.noarch", "8Base-RHOSE-4.7:openstack-ironic-1:16.0.4-0.20210203051223.7d74ea0.el8.src", "8Base-RHOSE-4.7:openstack-ironic-api-1:16.0.4-0.20210203051223.7d74ea0.el8.noarch", "8Base-RHOSE-4.7:openstack-ironic-common-1:16.0.4-0.20210203051223.7d74ea0.el8.noarch", "8Base-RHOSE-4.7:openstack-ironic-conductor-1:16.0.4-0.20210203051223.7d74ea0.el8.noarch", "8Base-RHOSE-4.7:openstack-ironic-inspector-0:10.4.1-0.20201123161216.70fccec.el8.noarch", "8Base-RHOSE-4.7:openstack-ironic-inspector-0:10.4.1-0.20201123161216.70fccec.el8.src", "8Base-RHOSE-4.7:openstack-ironic-inspector-api-0:10.4.1-0.20201123161216.70fccec.el8.noarch", "8Base-RHOSE-4.7:openstack-ironic-inspector-conductor-0:10.4.1-0.20201123161216.70fccec.el8.noarch", "8Base-RHOSE-4.7:openstack-ironic-inspector-dnsmasq-0:10.4.1-0.20201123161216.70fccec.el8.noarch", "8Base-RHOSE-4.7:openstack-ironic-python-agent-0:6.4.3-0.20201217171210.bd45db1.el8.noarch", "8Base-RHOSE-4.7:openstack-ironic-python-agent-0:6.4.3-0.20201217171210.bd45db1.el8.src", "8Base-RHOSE-4.7:openvswitch2.13-0:2.13.0-79.el8fdp.ppc64le", "8Base-RHOSE-4.7:openvswitch2.13-0:2.13.0-79.el8fdp.s390x", "8Base-RHOSE-4.7:openvswitch2.13-0:2.13.0-79.el8fdp.src", "8Base-RHOSE-4.7:openvswitch2.13-0:2.13.0-79.el8fdp.x86_64", "8Base-RHOSE-4.7:openvswitch2.13-debuginfo-0:2.13.0-79.el8fdp.ppc64le", "8Base-RHOSE-4.7:openvswitch2.13-debuginfo-0:2.13.0-79.el8fdp.s390x", "8Base-RHOSE-4.7:openvswitch2.13-debuginfo-0:2.13.0-79.el8fdp.x86_64", "8Base-RHOSE-4.7:openvswitch2.13-debugsource-0:2.13.0-79.el8fdp.ppc64le", "8Base-RHOSE-4.7:openvswitch2.13-debugsource-0:2.13.0-79.el8fdp.s390x", "8Base-RHOSE-4.7:openvswitch2.13-debugsource-0:2.13.0-79.el8fdp.x86_64", "8Base-RHOSE-4.7:openvswitch2.13-devel-0:2.13.0-79.el8fdp.ppc64le", "8Base-RHOSE-4.7:openvswitch2.13-devel-0:2.13.0-79.el8fdp.s390x", "8Base-RHOSE-4.7:openvswitch2.13-devel-0:2.13.0-79.el8fdp.x86_64", "8Base-RHOSE-4.7:openvswitch2.13-test-0:2.13.0-79.el8fdp.noarch", "8Base-RHOSE-4.7:ostree-0:2020.7-1.el8.ppc64le", "8Base-RHOSE-4.7:ostree-0:2020.7-1.el8.s390x", "8Base-RHOSE-4.7:ostree-0:2020.7-1.el8.src", "8Base-RHOSE-4.7:ostree-0:2020.7-1.el8.x86_64", "8Base-RHOSE-4.7:ostree-debuginfo-0:2020.7-1.el8.ppc64le", "8Base-RHOSE-4.7:ostree-debuginfo-0:2020.7-1.el8.s390x", "8Base-RHOSE-4.7:ostree-debuginfo-0:2020.7-1.el8.x86_64", "8Base-RHOSE-4.7:ostree-debugsource-0:2020.7-1.el8.ppc64le", "8Base-RHOSE-4.7:ostree-debugsource-0:2020.7-1.el8.s390x", "8Base-RHOSE-4.7:ostree-debugsource-0:2020.7-1.el8.x86_64", "8Base-RHOSE-4.7:ostree-devel-0:2020.7-1.el8.ppc64le", "8Base-RHOSE-4.7:ostree-devel-0:2020.7-1.el8.s390x", "8Base-RHOSE-4.7:ostree-devel-0:2020.7-1.el8.x86_64", "8Base-RHOSE-4.7:ostree-grub2-0:2020.7-1.el8.ppc64le", "8Base-RHOSE-4.7:ostree-grub2-0:2020.7-1.el8.x86_64", "8Base-RHOSE-4.7:ostree-libs-0:2020.7-1.el8.ppc64le", "8Base-RHOSE-4.7:ostree-libs-0:2020.7-1.el8.s390x", "8Base-RHOSE-4.7:ostree-libs-0:2020.7-1.el8.x86_64", "8Base-RHOSE-4.7:ostree-libs-debuginfo-0:2020.7-1.el8.ppc64le", "8Base-RHOSE-4.7:ostree-libs-debuginfo-0:2020.7-1.el8.s390x", "8Base-RHOSE-4.7:ostree-libs-debuginfo-0:2020.7-1.el8.x86_64", "8Base-RHOSE-4.7:ovn2.13-0:20.09.0-21.el8fdn.ppc64le", "8Base-RHOSE-4.7:ovn2.13-0:20.09.0-21.el8fdn.s390x", "8Base-RHOSE-4.7:ovn2.13-0:20.09.0-21.el8fdn.src", "8Base-RHOSE-4.7:ovn2.13-0:20.09.0-21.el8fdn.x86_64", "8Base-RHOSE-4.7:ovn2.13-central-0:20.09.0-21.el8fdn.ppc64le", "8Base-RHOSE-4.7:ovn2.13-central-0:20.09.0-21.el8fdn.s390x", "8Base-RHOSE-4.7:ovn2.13-central-0:20.09.0-21.el8fdn.x86_64", "8Base-RHOSE-4.7:ovn2.13-central-debuginfo-0:20.09.0-21.el8fdn.ppc64le", "8Base-RHOSE-4.7:ovn2.13-central-debuginfo-0:20.09.0-21.el8fdn.s390x", "8Base-RHOSE-4.7:ovn2.13-central-debuginfo-0:20.09.0-21.el8fdn.x86_64", "8Base-RHOSE-4.7:ovn2.13-debuginfo-0:20.09.0-21.el8fdn.ppc64le", "8Base-RHOSE-4.7:ovn2.13-debuginfo-0:20.09.0-21.el8fdn.s390x", "8Base-RHOSE-4.7:ovn2.13-debuginfo-0:20.09.0-21.el8fdn.x86_64", "8Base-RHOSE-4.7:ovn2.13-debugsource-0:20.09.0-21.el8fdn.ppc64le", "8Base-RHOSE-4.7:ovn2.13-debugsource-0:20.09.0-21.el8fdn.s390x", "8Base-RHOSE-4.7:ovn2.13-debugsource-0:20.09.0-21.el8fdn.x86_64", "8Base-RHOSE-4.7:ovn2.13-host-0:20.09.0-21.el8fdn.ppc64le", "8Base-RHOSE-4.7:ovn2.13-host-0:20.09.0-21.el8fdn.s390x", "8Base-RHOSE-4.7:ovn2.13-host-0:20.09.0-21.el8fdn.x86_64", "8Base-RHOSE-4.7:ovn2.13-host-debuginfo-0:20.09.0-21.el8fdn.ppc64le", "8Base-RHOSE-4.7:ovn2.13-host-debuginfo-0:20.09.0-21.el8fdn.s390x", "8Base-RHOSE-4.7:ovn2.13-host-debuginfo-0:20.09.0-21.el8fdn.x86_64", "8Base-RHOSE-4.7:ovn2.13-vtep-0:20.09.0-21.el8fdn.ppc64le", "8Base-RHOSE-4.7:ovn2.13-vtep-0:20.09.0-21.el8fdn.s390x", "8Base-RHOSE-4.7:ovn2.13-vtep-0:20.09.0-21.el8fdn.x86_64", "8Base-RHOSE-4.7:ovn2.13-vtep-debuginfo-0:20.09.0-21.el8fdn.ppc64le", "8Base-RHOSE-4.7:ovn2.13-vtep-debuginfo-0:20.09.0-21.el8fdn.s390x", "8Base-RHOSE-4.7:ovn2.13-vtep-debuginfo-0:20.09.0-21.el8fdn.x86_64", "8Base-RHOSE-4.7:powerpc-utils-0:1.3.6-12.el8_3.ppc64le", "8Base-RHOSE-4.7:powerpc-utils-0:1.3.6-12.el8_3.src", "8Base-RHOSE-4.7:powerpc-utils-core-0:1.3.6-12.el8_3.ppc64le", "8Base-RHOSE-4.7:powerpc-utils-core-debuginfo-0:1.3.6-12.el8_3.ppc64le", "8Base-RHOSE-4.7:powerpc-utils-debugsource-0:1.3.6-12.el8_3.ppc64le", "8Base-RHOSE-4.7:pprof-0:2.6.3-2.el8ost.noarch", "8Base-RHOSE-4.7:prometheus-promu-0:0.5.0-2.git642a960.el8.ppc64le", "8Base-RHOSE-4.7:prometheus-promu-0:0.5.0-2.git642a960.el8.s390x", "8Base-RHOSE-4.7:prometheus-promu-0:0.5.0-2.git642a960.el8.x86_64", "8Base-RHOSE-4.7:protobuf-0:3.6.1-4.el8ost.ppc64le", "8Base-RHOSE-4.7:protobuf-0:3.6.1-4.el8ost.s390x", "8Base-RHOSE-4.7:protobuf-0:3.6.1-4.el8ost.src", "8Base-RHOSE-4.7:protobuf-0:3.6.1-4.el8ost.x86_64", "8Base-RHOSE-4.7:protobuf-compiler-0:3.6.1-4.el8ost.ppc64le", "8Base-RHOSE-4.7:protobuf-compiler-0:3.6.1-4.el8ost.s390x", "8Base-RHOSE-4.7:protobuf-compiler-0:3.6.1-4.el8ost.x86_64", "8Base-RHOSE-4.7:protobuf-compiler-debuginfo-0:3.6.1-4.el8ost.ppc64le", "8Base-RHOSE-4.7:protobuf-compiler-debuginfo-0:3.6.1-4.el8ost.s390x", "8Base-RHOSE-4.7:protobuf-compiler-debuginfo-0:3.6.1-4.el8ost.x86_64", "8Base-RHOSE-4.7:protobuf-debuginfo-0:3.6.1-4.el8ost.ppc64le", "8Base-RHOSE-4.7:protobuf-debuginfo-0:3.6.1-4.el8ost.s390x", "8Base-RHOSE-4.7:protobuf-debuginfo-0:3.6.1-4.el8ost.x86_64", "8Base-RHOSE-4.7:protobuf-debugsource-0:3.6.1-4.el8ost.ppc64le", "8Base-RHOSE-4.7:protobuf-debugsource-0:3.6.1-4.el8ost.s390x", "8Base-RHOSE-4.7:protobuf-debugsource-0:3.6.1-4.el8ost.x86_64", "8Base-RHOSE-4.7:protobuf-devel-0:3.6.1-4.el8ost.ppc64le", "8Base-RHOSE-4.7:protobuf-devel-0:3.6.1-4.el8ost.s390x", "8Base-RHOSE-4.7:protobuf-devel-0:3.6.1-4.el8ost.x86_64", "8Base-RHOSE-4.7:protobuf-lite-0:3.6.1-4.el8ost.ppc64le", "8Base-RHOSE-4.7:protobuf-lite-0:3.6.1-4.el8ost.s390x", "8Base-RHOSE-4.7:protobuf-lite-0:3.6.1-4.el8ost.x86_64", "8Base-RHOSE-4.7:protobuf-lite-debuginfo-0:3.6.1-4.el8ost.ppc64le", "8Base-RHOSE-4.7:protobuf-lite-debuginfo-0:3.6.1-4.el8ost.s390x", "8Base-RHOSE-4.7:protobuf-lite-debuginfo-0:3.6.1-4.el8ost.x86_64", "8Base-RHOSE-4.7:protobuf-lite-devel-0:3.6.1-4.el8ost.ppc64le", "8Base-RHOSE-4.7:protobuf-lite-devel-0:3.6.1-4.el8ost.s390x", "8Base-RHOSE-4.7:protobuf-lite-devel-0:3.6.1-4.el8ost.x86_64", "8Base-RHOSE-4.7:protobuf-lite-static-0:3.6.1-4.el8ost.ppc64le", "8Base-RHOSE-4.7:protobuf-lite-static-0:3.6.1-4.el8ost.s390x", "8Base-RHOSE-4.7:protobuf-lite-static-0:3.6.1-4.el8ost.x86_64", "8Base-RHOSE-4.7:protobuf-static-0:3.6.1-4.el8ost.ppc64le", "8Base-RHOSE-4.7:protobuf-static-0:3.6.1-4.el8ost.s390x", "8Base-RHOSE-4.7:protobuf-static-0:3.6.1-4.el8ost.x86_64", "8Base-RHOSE-4.7:protobuf-vim-0:3.6.1-4.el8ost.noarch", "8Base-RHOSE-4.7:python-alembic-0:1.4.2-5.el8ost.src", "8Base-RHOSE-4.7:python-boto3-0:1.9.101-1.el8ost.src", "8Base-RHOSE-4.7:python-botocore-0:1.12.119-1.el8ost.src", "8Base-RHOSE-4.7:python-cachetools-0:3.1.0-1.el8ost.src", "8Base-RHOSE-4.7:python-certifi-0:2018.10.15-4.el8ost.src", "8Base-RHOSE-4.7:python-construct-0:2.10.56-1.el8ost.src", "8Base-RHOSE-4.7:python-daemon-0:2.1.2-9.el8ar.src", "8Base-RHOSE-4.7:python-debtcollector-0:2.2.0-0.20201008171245.649189d.el8.src", "8Base-RHOSE-4.7:python-dictdiffer-0:0.7.1-2.el8ost.src", "8Base-RHOSE-4.7:python-eventlet-0:0.25.2-3.el8ost.src", "8Base-RHOSE-4.7:python-flask-1:1.1.1-1.el8ost.src", "8Base-RHOSE-4.7:python-flask-doc-1:1.1.1-1.el8ost.noarch", "8Base-RHOSE-4.7:python-google-auth-0:1.3.0-1.el8ost.src", "8Base-RHOSE-4.7:python-hardware-0:0.23.0-0.20201031022149.59211cc.el8.src", "8Base-RHOSE-4.7:python-ifaddr-0:0.1.6-5.el8ost.src", "8Base-RHOSE-4.7:python-importlib-metadata-0:1.7.0-1.el8ost.src", "8Base-RHOSE-4.7:python-ironic-lib-0:4.4.1-0.20201218041209.aa7cfec.el8.src", "8Base-RHOSE-4.7:python-keystoneauth1-0:4.2.0-0.20200630234358.dab8e10.el8ost.src", "8Base-RHOSE-4.7:python-kubernetes-0:11.0.0-1.el8.src", "8Base-RHOSE-4.7:python-kuryr-lib-0:1.1.1-0.20190923160834.41e6964.el8ost.src", "8Base-RHOSE-4.7:python-lockfile-1:0.11.0-8.el8ar.src", "8Base-RHOSE-4.7:python-msgpack-0:0.6.2-1.el8ost.src", "8Base-RHOSE-4.7:python-msgpack-debugsource-0:0.6.2-1.el8ost.x86_64", "8Base-RHOSE-4.7:python-openshift-1:0.11.2-1.el8.src", "8Base-RHOSE-4.7:python-openstacksdk-0:0.48.0-0.20200708092906.3b693c2.el8ost.src", "8Base-RHOSE-4.7:python-oslo-concurrency-0:4.3.0-0.20201008180343.2f78803.el8.src", "8Base-RHOSE-4.7:python-oslo-concurrency-lang-0:4.3.0-0.20201008180343.2f78803.el8.noarch", "8Base-RHOSE-4.7:python-oslo-config-2:8.3.2-0.20201008180634.fcb8894.el8.src", "8Base-RHOSE-4.7:python-oslo-context-0:3.1.1-0.20201008190523.57dbded.el8.src", "8Base-RHOSE-4.7:python-oslo-db-0:8.4.0-0.20200918104110.e42c733.el8ost.src", "8Base-RHOSE-4.7:python-oslo-db-lang-0:8.4.0-0.20200918104110.e42c733.el8ost.noarch", "8Base-RHOSE-4.7:python-oslo-i18n-0:5.0.1-0.20201009131251.73187bd.el8.src", "8Base-RHOSE-4.7:python-oslo-i18n-lang-0:5.0.1-0.20201009131251.73187bd.el8.noarch", "8Base-RHOSE-4.7:python-oslo-log-0:4.3.1-0.20201207021200.1597f24.el8.src", "8Base-RHOSE-4.7:python-oslo-log-lang-0:4.3.1-0.20201207021200.1597f24.el8.noarch", "8Base-RHOSE-4.7:python-oslo-serialization-0:4.0.1-0.20201008182423.c7884b2.el8.src", "8Base-RHOSE-4.7:python-oslo-service-0:2.4.0-0.20201008184547.58466a6.el8.src", "8Base-RHOSE-4.7:python-oslo-utils-0:4.6.0-0.20201009175936.91497da.el8.src", "8Base-RHOSE-4.7:python-oslo-utils-lang-0:4.6.0-0.20201009175936.91497da.el8.noarch", "8Base-RHOSE-4.7:python-packaging-0:20.4-1.el8ost.src", "8Base-RHOSE-4.7:python-packaging-doc-0:20.4-1.el8ost.noarch", "8Base-RHOSE-4.7:python-paste-0:3.2.4-1.el8ost.src", "8Base-RHOSE-4.7:python-paste-deploy-0:2.0.1-4.el8ost.src", "8Base-RHOSE-4.7:python-pbr-0:5.4.3-2.el8ost.src", "8Base-RHOSE-4.7:python-pexpect-0:4.6-2.el8ar.src", "8Base-RHOSE-4.7:python-pint-0:0.10.1-1.el8ost.src", "8Base-RHOSE-4.7:python-psutil-0:5.6.6-1.el8ar.src", "8Base-RHOSE-4.7:python-psutil-debugsource-0:5.6.6-1.el8ar.ppc64le", "8Base-RHOSE-4.7:python-psutil-debugsource-0:5.6.6-1.el8ar.s390x", "8Base-RHOSE-4.7:python-psutil-debugsource-0:5.6.6-1.el8ar.x86_64", "8Base-RHOSE-4.7:python-pyghmi-0:1.5.14-2.1.el8ost.src", "8Base-RHOSE-4.7:python-pyroute2-0:0.5.13-1.el8ost.src", "8Base-RHOSE-4.7:python-requests-unixsocket-0:0.1.5-5.el8ar.src", "8Base-RHOSE-4.7:python-ruamel-yaml-0:0.15.41-4.el8ost.src", "8Base-RHOSE-4.7:python-ruamel-yaml-debugsource-0:0.15.41-4.el8ost.ppc64le", "8Base-RHOSE-4.7:python-ruamel-yaml-debugsource-0:0.15.41-4.el8ost.s390x", "8Base-RHOSE-4.7:python-ruamel-yaml-debugsource-0:0.15.41-4.el8ost.x86_64", "8Base-RHOSE-4.7:python-s3transfer-0:0.2.0-1.el8ost.src", "8Base-RHOSE-4.7:python-stevedore-0:3.2.2-0.20201009151242.274eaa6.el8.src", "8Base-RHOSE-4.7:python-string_utils-0:0.6.0-4.el8ost.src", "8Base-RHOSE-4.7:python-sushy-0:3.6.1-0.20210122201213.7ec0422.el8.src", "8Base-RHOSE-4.7:python-sushy-oem-idrac-0:0.0.3-0.20200922221223.1202372.el8ost.src", "8Base-RHOSE-4.7:python-tenacity-0:6.2.0-1.el8ost.src", "8Base-RHOSE-4.7:python-tooz-0:2.7.0-0.20200723133754.fca43df.el8ost.src", "8Base-RHOSE-4.7:python-websocket-client-0:0.54.0-1.el8ost.src", "8Base-RHOSE-4.7:python-werkzeug-0:1.0.1-3.el8ost.src", "8Base-RHOSE-4.7:python-zeroconf-0:0.24.4-1.el8ost.src", "8Base-RHOSE-4.7:python-zipp-0:0.5.1-2.el8ost.src", "8Base-RHOSE-4.7:python2-botocore-0:1.12.119-1.el8ost.noarch", "8Base-RHOSE-4.7:python2-cachetools-0:3.1.0-1.el8ost.noarch", "8Base-RHOSE-4.7:python3-alembic-0:1.4.2-5.el8ost.noarch", "8Base-RHOSE-4.7:python3-ansible-runner-0:1.4.6-2.el8ar.noarch", "8Base-RHOSE-4.7:python3-boto3-0:1.9.101-1.el8ost.noarch", "8Base-RHOSE-4.7:python3-botocore-0:1.12.119-1.el8ost.noarch", "8Base-RHOSE-4.7:python3-cachetools-0:3.1.0-1.el8ost.noarch", "8Base-RHOSE-4.7:python3-certifi-0:2018.10.15-4.el8ost.noarch", "8Base-RHOSE-4.7:python3-construct-0:2.10.56-1.el8ost.noarch", "8Base-RHOSE-4.7:python3-daemon-0:2.1.2-9.el8ar.noarch", "8Base-RHOSE-4.7:python3-debtcollector-0:2.2.0-0.20201008171245.649189d.el8.noarch", "8Base-RHOSE-4.7:python3-dictdiffer-0:0.7.1-2.el8ost.noarch", "8Base-RHOSE-4.7:python3-eventlet-0:0.25.2-3.el8ost.noarch", "8Base-RHOSE-4.7:python3-flask-1:1.1.1-1.el8ost.noarch", "8Base-RHOSE-4.7:python3-google-auth-0:1.3.0-1.el8ost.noarch", "8Base-RHOSE-4.7:python3-grpcio-0:1.18.0-4.el8ost.ppc64le", "8Base-RHOSE-4.7:python3-grpcio-0:1.18.0-4.el8ost.s390x", "8Base-RHOSE-4.7:python3-grpcio-0:1.18.0-4.el8ost.x86_64", "8Base-RHOSE-4.7:python3-grpcio-debuginfo-0:1.18.0-4.el8ost.ppc64le", "8Base-RHOSE-4.7:python3-grpcio-debuginfo-0:1.18.0-4.el8ost.s390x", "8Base-RHOSE-4.7:python3-grpcio-debuginfo-0:1.18.0-4.el8ost.x86_64", "8Base-RHOSE-4.7:python3-hardware-0:0.23.0-0.20201031022149.59211cc.el8.noarch", "8Base-RHOSE-4.7:python3-hardware-detect-0:0.23.0-0.20201031022149.59211cc.el8.noarch", "8Base-RHOSE-4.7:python3-ifaddr-0:0.1.6-5.el8ost.noarch", "8Base-RHOSE-4.7:python3-importlib-metadata-0:1.7.0-1.el8ost.noarch", "8Base-RHOSE-4.7:python3-ironic-inspector-tests-0:10.4.1-0.20201123161216.70fccec.el8.noarch", "8Base-RHOSE-4.7:python3-ironic-lib-0:4.4.1-0.20201218041209.aa7cfec.el8.noarch", "8Base-RHOSE-4.7:python3-ironic-python-agent-0:6.4.3-0.20201217171210.bd45db1.el8.noarch", "8Base-RHOSE-4.7:python3-ironic-tests-1:16.0.4-0.20210203051223.7d74ea0.el8.noarch", "8Base-RHOSE-4.7:python3-keystoneauth1-0:4.2.0-0.20200630234358.dab8e10.el8ost.noarch", "8Base-RHOSE-4.7:python3-kubernetes-0:11.0.0-1.el8.noarch", "8Base-RHOSE-4.7:python3-kubernetes-tests-0:11.0.0-1.el8.noarch", "8Base-RHOSE-4.7:python3-kuryr-kubernetes-0:4.7.0-202101262230.p0.git.2494.cd95ce5.el8.noarch", "8Base-RHOSE-4.7:python3-kuryr-lib-0:1.1.1-0.20190923160834.41e6964.el8ost.noarch", "8Base-RHOSE-4.7:python3-kuryr-lib-tests-0:1.1.1-0.20190923160834.41e6964.el8ost.noarch", "8Base-RHOSE-4.7:python3-lockfile-1:0.11.0-8.el8ar.noarch", "8Base-RHOSE-4.7:python3-msgpack-0:0.6.2-1.el8ost.x86_64", "8Base-RHOSE-4.7:python3-msgpack-debuginfo-0:0.6.2-1.el8ost.x86_64", "8Base-RHOSE-4.7:python3-openshift-1:0.11.2-1.el8.noarch", "8Base-RHOSE-4.7:python3-openstacksdk-0:0.48.0-0.20200708092906.3b693c2.el8ost.noarch", "8Base-RHOSE-4.7:python3-openstacksdk-tests-0:0.48.0-0.20200708092906.3b693c2.el8ost.noarch", "8Base-RHOSE-4.7:python3-openvswitch2.13-0:2.13.0-79.el8fdp.ppc64le", "8Base-RHOSE-4.7:python3-openvswitch2.13-0:2.13.0-79.el8fdp.s390x", "8Base-RHOSE-4.7:python3-openvswitch2.13-0:2.13.0-79.el8fdp.x86_64", "8Base-RHOSE-4.7:python3-openvswitch2.13-debuginfo-0:2.13.0-79.el8fdp.ppc64le", "8Base-RHOSE-4.7:python3-openvswitch2.13-debuginfo-0:2.13.0-79.el8fdp.s390x", "8Base-RHOSE-4.7:python3-openvswitch2.13-debuginfo-0:2.13.0-79.el8fdp.x86_64", "8Base-RHOSE-4.7:python3-oslo-concurrency-0:4.3.0-0.20201008180343.2f78803.el8.noarch", "8Base-RHOSE-4.7:python3-oslo-concurrency-tests-0:4.3.0-0.20201008180343.2f78803.el8.noarch", "8Base-RHOSE-4.7:python3-oslo-config-2:8.3.2-0.20201008180634.fcb8894.el8.noarch", "8Base-RHOSE-4.7:python3-oslo-context-0:3.1.1-0.20201008190523.57dbded.el8.noarch", "8Base-RHOSE-4.7:python3-oslo-context-tests-0:3.1.1-0.20201008190523.57dbded.el8.noarch", "8Base-RHOSE-4.7:python3-oslo-db-0:8.4.0-0.20200918104110.e42c733.el8ost.noarch", "8Base-RHOSE-4.7:python3-oslo-db-tests-0:8.4.0-0.20200918104110.e42c733.el8ost.noarch", "8Base-RHOSE-4.7:python3-oslo-i18n-0:5.0.1-0.20201009131251.73187bd.el8.noarch", "8Base-RHOSE-4.7:python3-oslo-log-0:4.3.1-0.20201207021200.1597f24.el8.noarch", "8Base-RHOSE-4.7:python3-oslo-log-tests-0:4.3.1-0.20201207021200.1597f24.el8.noarch", "8Base-RHOSE-4.7:python3-oslo-serialization-0:4.0.1-0.20201008182423.c7884b2.el8.noarch", "8Base-RHOSE-4.7:python3-oslo-serialization-tests-0:4.0.1-0.20201008182423.c7884b2.el8.noarch", "8Base-RHOSE-4.7:python3-oslo-service-0:2.4.0-0.20201008184547.58466a6.el8.noarch", "8Base-RHOSE-4.7:python3-oslo-service-tests-0:2.4.0-0.20201008184547.58466a6.el8.noarch", "8Base-RHOSE-4.7:python3-oslo-utils-0:4.6.0-0.20201009175936.91497da.el8.noarch", "8Base-RHOSE-4.7:python3-oslo-utils-tests-0:4.6.0-0.20201009175936.91497da.el8.noarch", "8Base-RHOSE-4.7:python3-packaging-0:20.4-1.el8ost.noarch", "8Base-RHOSE-4.7:python3-paste-0:3.2.4-1.el8ost.noarch", "8Base-RHOSE-4.7:python3-paste-deploy-0:2.0.1-4.el8ost.noarch", "8Base-RHOSE-4.7:python3-pbr-0:5.4.3-2.el8ost.noarch", "8Base-RHOSE-4.7:python3-pexpect-0:4.6-2.el8ar.noarch", "8Base-RHOSE-4.7:python3-pint-0:0.10.1-1.el8ost.noarch", "8Base-RHOSE-4.7:python3-protobuf-0:3.6.1-4.el8ost.noarch", "8Base-RHOSE-4.7:python3-psutil-0:5.6.6-1.el8ar.ppc64le", "8Base-RHOSE-4.7:python3-psutil-0:5.6.6-1.el8ar.s390x", "8Base-RHOSE-4.7:python3-psutil-0:5.6.6-1.el8ar.x86_64", "8Base-RHOSE-4.7:python3-psutil-debuginfo-0:5.6.6-1.el8ar.ppc64le", "8Base-RHOSE-4.7:python3-psutil-debuginfo-0:5.6.6-1.el8ar.s390x", "8Base-RHOSE-4.7:python3-psutil-debuginfo-0:5.6.6-1.el8ar.x86_64", "8Base-RHOSE-4.7:python3-pyghmi-0:1.5.14-2.1.el8ost.noarch", "8Base-RHOSE-4.7:python3-pyroute2-0:0.5.13-1.el8ost.noarch", "8Base-RHOSE-4.7:python3-requests-unixsocket-0:0.1.5-5.el8ar.noarch", "8Base-RHOSE-4.7:python3-ruamel-yaml-0:0.15.41-4.el8ost.ppc64le", "8Base-RHOSE-4.7:python3-ruamel-yaml-0:0.15.41-4.el8ost.s390x", "8Base-RHOSE-4.7:python3-ruamel-yaml-0:0.15.41-4.el8ost.x86_64", "8Base-RHOSE-4.7:python3-ruamel-yaml-debuginfo-0:0.15.41-4.el8ost.ppc64le", "8Base-RHOSE-4.7:python3-ruamel-yaml-debuginfo-0:0.15.41-4.el8ost.s390x", "8Base-RHOSE-4.7:python3-ruamel-yaml-debuginfo-0:0.15.41-4.el8ost.x86_64", "8Base-RHOSE-4.7:python3-s3transfer-0:0.2.0-1.el8ost.noarch", "8Base-RHOSE-4.7:python3-stevedore-0:3.2.2-0.20201009151242.274eaa6.el8.noarch", "8Base-RHOSE-4.7:python3-string_utils-0:0.6.0-4.el8ost.noarch", "8Base-RHOSE-4.7:python3-sushy-0:3.6.1-0.20210122201213.7ec0422.el8.noarch", "8Base-RHOSE-4.7:python3-sushy-oem-idrac-0:0.0.3-0.20200922221223.1202372.el8ost.noarch", "8Base-RHOSE-4.7:python3-sushy-oem-idrac-tests-0:0.0.3-0.20200922221223.1202372.el8ost.noarch", "8Base-RHOSE-4.7:python3-sushy-tests-0:3.6.1-0.20210122201213.7ec0422.el8.noarch", "8Base-RHOSE-4.7:python3-tenacity-0:6.2.0-1.el8ost.noarch", "8Base-RHOSE-4.7:python3-tooz-0:2.7.0-0.20200723133754.fca43df.el8ost.noarch", "8Base-RHOSE-4.7:python3-websocket-client-0:0.54.0-1.el8ost.noarch", "8Base-RHOSE-4.7:python3-werkzeug-0:1.0.1-3.el8ost.noarch", "8Base-RHOSE-4.7:python3-zeroconf-0:0.24.4-1.el8ost.noarch", "8Base-RHOSE-4.7:python3-zipp-0:0.5.1-2.el8ost.noarch", "8Base-RHOSE-4.7:redhat-release-coreos-0:47.83-1.el8.ppc64le", "8Base-RHOSE-4.7:redhat-release-coreos-0:47.83-1.el8.s390x", "8Base-RHOSE-4.7:redhat-release-coreos-0:47.83-1.el8.src", "8Base-RHOSE-4.7:redhat-release-coreos-0:47.83-1.el8.x86_64", "8Base-RHOSE-4.7:rhcos-tools-0:0.0.0-1.rhaos4.2.el8.noarch", "8Base-RHOSE-4.7:rhcos-tools-0:0.0.0-1.rhaos4.2.el8.src", "8Base-RHOSE-4.7:rhosp-director-images-0:17.0-20200606.1.el8ost.noarch", "8Base-RHOSE-4.7:rhosp-director-images-0:17.0-20200606.1.el8ost.src", "8Base-RHOSE-4.7:rhosp-director-images-all-0:17.0-20200606.1.el8ost.noarch", "8Base-RHOSE-4.7:rhosp-director-images-ipa-0:17.0-20200606.1.el8ost.noarch", "8Base-RHOSE-4.7:rhosp-director-images-ipa-ppc64le-0:17.0-20200606.1.el8ost.noarch", "8Base-RHOSE-4.7:rhosp-director-images-ipa-x86_64-0:17.0-20200606.1.el8ost.noarch", "8Base-RHOSE-4.7:rhosp-director-images-minimal-0:17.0-20200606.1.el8ost.noarch", "8Base-RHOSE-4.7:rhosp-director-images-ppc64le-0:17.0-20200606.1.el8ost.noarch", "8Base-RHOSE-4.7:rhosp-director-images-x86_64-0:17.0-20200606.1.el8ost.noarch", "8Base-RHOSE-4.7:rpm-ostree-0:2020.7-1.el8_3.ppc64le", "8Base-RHOSE-4.7:rpm-ostree-0:2020.7-1.el8_3.s390x", "8Base-RHOSE-4.7:rpm-ostree-0:2020.7-1.el8_3.src", "8Base-RHOSE-4.7:rpm-ostree-0:2020.7-1.el8_3.x86_64", "8Base-RHOSE-4.7:rpm-ostree-debuginfo-0:2020.7-1.el8_3.ppc64le", "8Base-RHOSE-4.7:rpm-ostree-debuginfo-0:2020.7-1.el8_3.s390x", "8Base-RHOSE-4.7:rpm-ostree-debuginfo-0:2020.7-1.el8_3.x86_64", "8Base-RHOSE-4.7:rpm-ostree-debugsource-0:2020.7-1.el8_3.ppc64le", "8Base-RHOSE-4.7:rpm-ostree-debugsource-0:2020.7-1.el8_3.s390x", "8Base-RHOSE-4.7:rpm-ostree-debugsource-0:2020.7-1.el8_3.x86_64", "8Base-RHOSE-4.7:rpm-ostree-devel-0:2020.7-1.el8_3.ppc64le", "8Base-RHOSE-4.7:rpm-ostree-devel-0:2020.7-1.el8_3.s390x", "8Base-RHOSE-4.7:rpm-ostree-devel-0:2020.7-1.el8_3.x86_64", "8Base-RHOSE-4.7:rpm-ostree-libs-0:2020.7-1.el8_3.ppc64le", "8Base-RHOSE-4.7:rpm-ostree-libs-0:2020.7-1.el8_3.s390x", "8Base-RHOSE-4.7:rpm-ostree-libs-0:2020.7-1.el8_3.x86_64", "8Base-RHOSE-4.7:rpm-ostree-libs-debuginfo-0:2020.7-1.el8_3.ppc64le", "8Base-RHOSE-4.7:rpm-ostree-libs-debuginfo-0:2020.7-1.el8_3.s390x", "8Base-RHOSE-4.7:rpm-ostree-libs-debuginfo-0:2020.7-1.el8_3.x86_64", "8Base-RHOSE-4.7:runc-0:1.0.0-82.rhaos4.6.git086e841.el8.ppc64le", "8Base-RHOSE-4.7:runc-0:1.0.0-82.rhaos4.6.git086e841.el8.s390x", "8Base-RHOSE-4.7:runc-0:1.0.0-82.rhaos4.6.git086e841.el8.src", "8Base-RHOSE-4.7:runc-0:1.0.0-82.rhaos4.6.git086e841.el8.x86_64", "8Base-RHOSE-4.7:runc-debuginfo-0:1.0.0-82.rhaos4.6.git086e841.el8.ppc64le", "8Base-RHOSE-4.7:runc-debuginfo-0:1.0.0-82.rhaos4.6.git086e841.el8.s390x", "8Base-RHOSE-4.7:runc-debuginfo-0:1.0.0-82.rhaos4.6.git086e841.el8.x86_64", "8Base-RHOSE-4.7:runc-debugsource-0:1.0.0-82.rhaos4.6.git086e841.el8.ppc64le", "8Base-RHOSE-4.7:runc-debugsource-0:1.0.0-82.rhaos4.6.git086e841.el8.s390x", "8Base-RHOSE-4.7:runc-debugsource-0:1.0.0-82.rhaos4.6.git086e841.el8.x86_64", "8Base-RHOSE-4.7:rust-afterburn-0:4.6.0-1.rhaos4.7.el8.src", "8Base-RHOSE-4.7:rust-afterburn-debugsource-0:4.6.0-1.rhaos4.7.el8.ppc64le", "8Base-RHOSE-4.7:rust-afterburn-debugsource-0:4.6.0-1.rhaos4.7.el8.s390x", "8Base-RHOSE-4.7:rust-afterburn-debugsource-0:4.6.0-1.rhaos4.7.el8.x86_64", "8Base-RHOSE-4.7:rust-bootupd-0:0.2.5-2.el8.src", "8Base-RHOSE-4.7:rust-bootupd-debugsource-0:0.2.5-2.el8.x86_64", "8Base-RHOSE-4.7:tini-0:0.16.1-1.el8ar.ppc64le", "8Base-RHOSE-4.7:tini-0:0.16.1-1.el8ar.s390x", "8Base-RHOSE-4.7:tini-0:0.16.1-1.el8ar.src", "8Base-RHOSE-4.7:tini-0:0.16.1-1.el8ar.x86_64", "8Base-RHOSE-4.7:toolbox-0:0.0.8-3.rhaos4.7.el8.noarch", "8Base-RHOSE-4.7:toolbox-0:0.0.8-3.rhaos4.7.el8.src" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1889972" } ], "notes": [ { "category": "description", "text": "A flaw was found in python-rsa, where it is vulnerable to Bleichenbacher timing attacks. This flaw allows an attacker, via the RSA decryption API, to decrypt parts of the ciphertext encrypted with RSA. The highest threat from this vulnerability is to confidentiality.", "title": "Vulnerability description" }, { "category": "summary", "text": "python-rsa: bleichenbacher timing oracle attack against RSA decryption", "title": "Vulnerability summary" }, { "category": "other", "text": "In Red Hat OpenStack Platform, because the flaw has a lower impact and the fix would require a substantial amount of development, no update will be provided at this time for the RHOSP python-rsa package.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RHOSE-4.7:python-rsa-0:4.7-1.el8.src", "8Base-RHOSE-4.7:python3-rsa-0:4.7-1.el8.noarch" ], "known_not_affected": [ "7Server-RH7-RHOSE-4.7:conmon-2:2.0.21-2.rhaos4.6.el7.src", "7Server-RH7-RHOSE-4.7:conmon-2:2.0.21-2.rhaos4.6.el7.x86_64", "7Server-RH7-RHOSE-4.7:containernetworking-plugins-0:0.8.6-1.rhaos4.5.el7.src", "7Server-RH7-RHOSE-4.7:containernetworking-plugins-0:0.8.6-1.rhaos4.5.el7.x86_64", "7Server-RH7-RHOSE-4.7:containernetworking-plugins-debuginfo-0:0.8.6-1.rhaos4.5.el7.x86_64", "7Server-RH7-RHOSE-4.7:cri-o-0:1.20.0-0.rhaos4.7.git8921e00.el7.51.src", "7Server-RH7-RHOSE-4.7:cri-o-0:1.20.0-0.rhaos4.7.git8921e00.el7.51.x86_64", "7Server-RH7-RHOSE-4.7:cri-o-debuginfo-0:1.20.0-0.rhaos4.7.git8921e00.el7.51.x86_64", "7Server-RH7-RHOSE-4.7:cri-tools-0:1.18.0-3.el7.src", "7Server-RH7-RHOSE-4.7:cri-tools-0:1.18.0-3.el7.x86_64", "7Server-RH7-RHOSE-4.7:cri-tools-debuginfo-0:1.18.0-3.el7.x86_64", "7Server-RH7-RHOSE-4.7:haproxy-0:2.0.19-1.el7.src", "7Server-RH7-RHOSE-4.7:haproxy-debuginfo-0:2.0.19-1.el7.x86_64", "7Server-RH7-RHOSE-4.7:haproxy20-0:2.0.19-1.el7.x86_64", "7Server-RH7-RHOSE-4.7:jq-0:1.6-2.el7.src", "7Server-RH7-RHOSE-4.7:jq-0:1.6-2.el7.x86_64", "7Server-RH7-RHOSE-4.7:jq-debuginfo-0:1.6-2.el7.x86_64", "7Server-RH7-RHOSE-4.7:jq-devel-0:1.6-2.el7.x86_64", "7Server-RH7-RHOSE-4.7:oniguruma-0:5.9.2-5.el7.src", "7Server-RH7-RHOSE-4.7:oniguruma-0:5.9.2-5.el7.x86_64", "7Server-RH7-RHOSE-4.7:oniguruma-debuginfo-0:5.9.2-5.el7.x86_64", "7Server-RH7-RHOSE-4.7:oniguruma-devel-0:5.9.2-5.el7.x86_64", "7Server-RH7-RHOSE-4.7:openshift-0:4.7.0-202102060108.p0.git.97095.7271b90.el7.src", "7Server-RH7-RHOSE-4.7:openshift-ansible-0:4.7.0-202102032256.p0.git.0.bf7d9a7.el7.noarch", "7Server-RH7-RHOSE-4.7:openshift-ansible-0:4.7.0-202102032256.p0.git.0.bf7d9a7.el7.src", "7Server-RH7-RHOSE-4.7:openshift-ansible-test-0:4.7.0-202102032256.p0.git.0.bf7d9a7.el7.noarch", "7Server-RH7-RHOSE-4.7:openshift-clients-0:4.7.0-202102032256.p0.git.3951.0e656ef.el7.src", "7Server-RH7-RHOSE-4.7:openshift-clients-0:4.7.0-202102032256.p0.git.3951.0e656ef.el7.x86_64", "7Server-RH7-RHOSE-4.7:openshift-clients-redistributable-0:4.7.0-202102032256.p0.git.3951.0e656ef.el7.x86_64", "7Server-RH7-RHOSE-4.7:openshift-hyperkube-0:4.7.0-202102060108.p0.git.97095.7271b90.el7.x86_64", "7Server-RH7-RHOSE-4.7:python-botocore-0:1.4.57-5.el7.src", "7Server-RH7-RHOSE-4.7:python2-botocore-0:1.4.57-5.el7.noarch", "7Server-RH7-RHOSE-4.7:runc-0:1.0.0-82.rhaos4.6.git086e841.el7.src", "7Server-RH7-RHOSE-4.7:runc-0:1.0.0-82.rhaos4.6.git086e841.el7.x86_64", "7Server-RH7-RHOSE-4.7:runc-debuginfo-0:1.0.0-82.rhaos4.6.git086e841.el7.x86_64", "8Base-RHOSE-4.7:NetworkManager-1:1.26.0-12.1.rhaos4.7.el8.ppc64le", "8Base-RHOSE-4.7:NetworkManager-1:1.26.0-12.1.rhaos4.7.el8.s390x", "8Base-RHOSE-4.7:NetworkManager-1:1.26.0-12.1.rhaos4.7.el8.src", "8Base-RHOSE-4.7:NetworkManager-1:1.26.0-12.1.rhaos4.7.el8.x86_64", "8Base-RHOSE-4.7:NetworkManager-adsl-1:1.26.0-12.1.rhaos4.7.el8.ppc64le", "8Base-RHOSE-4.7:NetworkManager-adsl-1:1.26.0-12.1.rhaos4.7.el8.s390x", "8Base-RHOSE-4.7:NetworkManager-adsl-1:1.26.0-12.1.rhaos4.7.el8.x86_64", "8Base-RHOSE-4.7:NetworkManager-adsl-debuginfo-1:1.26.0-12.1.rhaos4.7.el8.ppc64le", "8Base-RHOSE-4.7:NetworkManager-adsl-debuginfo-1:1.26.0-12.1.rhaos4.7.el8.s390x", "8Base-RHOSE-4.7:NetworkManager-adsl-debuginfo-1:1.26.0-12.1.rhaos4.7.el8.x86_64", "8Base-RHOSE-4.7:NetworkManager-bluetooth-1:1.26.0-12.1.rhaos4.7.el8.ppc64le", "8Base-RHOSE-4.7:NetworkManager-bluetooth-1:1.26.0-12.1.rhaos4.7.el8.s390x", "8Base-RHOSE-4.7:NetworkManager-bluetooth-1:1.26.0-12.1.rhaos4.7.el8.x86_64", "8Base-RHOSE-4.7:NetworkManager-bluetooth-debuginfo-1:1.26.0-12.1.rhaos4.7.el8.ppc64le", "8Base-RHOSE-4.7:NetworkManager-bluetooth-debuginfo-1:1.26.0-12.1.rhaos4.7.el8.s390x", "8Base-RHOSE-4.7:NetworkManager-bluetooth-debuginfo-1:1.26.0-12.1.rhaos4.7.el8.x86_64", "8Base-RHOSE-4.7:NetworkManager-cloud-setup-1:1.26.0-12.1.rhaos4.7.el8.ppc64le", "8Base-RHOSE-4.7:NetworkManager-cloud-setup-1:1.26.0-12.1.rhaos4.7.el8.s390x", "8Base-RHOSE-4.7:NetworkManager-cloud-setup-1:1.26.0-12.1.rhaos4.7.el8.x86_64", "8Base-RHOSE-4.7:NetworkManager-cloud-setup-debuginfo-1:1.26.0-12.1.rhaos4.7.el8.ppc64le", "8Base-RHOSE-4.7:NetworkManager-cloud-setup-debuginfo-1:1.26.0-12.1.rhaos4.7.el8.s390x", "8Base-RHOSE-4.7:NetworkManager-cloud-setup-debuginfo-1:1.26.0-12.1.rhaos4.7.el8.x86_64", "8Base-RHOSE-4.7:NetworkManager-config-connectivity-redhat-1:1.26.0-12.1.rhaos4.7.el8.noarch", "8Base-RHOSE-4.7:NetworkManager-config-server-1:1.26.0-12.1.rhaos4.7.el8.noarch", "8Base-RHOSE-4.7:NetworkManager-debuginfo-1:1.26.0-12.1.rhaos4.7.el8.ppc64le", "8Base-RHOSE-4.7:NetworkManager-debuginfo-1:1.26.0-12.1.rhaos4.7.el8.s390x", "8Base-RHOSE-4.7:NetworkManager-debuginfo-1:1.26.0-12.1.rhaos4.7.el8.x86_64", "8Base-RHOSE-4.7:NetworkManager-debugsource-1:1.26.0-12.1.rhaos4.7.el8.ppc64le", "8Base-RHOSE-4.7:NetworkManager-debugsource-1:1.26.0-12.1.rhaos4.7.el8.s390x", "8Base-RHOSE-4.7:NetworkManager-debugsource-1:1.26.0-12.1.rhaos4.7.el8.x86_64", "8Base-RHOSE-4.7:NetworkManager-dispatcher-routing-rules-1:1.26.0-12.1.rhaos4.7.el8.noarch", "8Base-RHOSE-4.7:NetworkManager-libnm-1:1.26.0-12.1.rhaos4.7.el8.ppc64le", "8Base-RHOSE-4.7:NetworkManager-libnm-1:1.26.0-12.1.rhaos4.7.el8.s390x", "8Base-RHOSE-4.7:NetworkManager-libnm-1:1.26.0-12.1.rhaos4.7.el8.x86_64", "8Base-RHOSE-4.7:NetworkManager-libnm-debuginfo-1:1.26.0-12.1.rhaos4.7.el8.ppc64le", "8Base-RHOSE-4.7:NetworkManager-libnm-debuginfo-1:1.26.0-12.1.rhaos4.7.el8.s390x", "8Base-RHOSE-4.7:NetworkManager-libnm-debuginfo-1:1.26.0-12.1.rhaos4.7.el8.x86_64", "8Base-RHOSE-4.7:NetworkManager-libnm-devel-1:1.26.0-12.1.rhaos4.7.el8.ppc64le", "8Base-RHOSE-4.7:NetworkManager-libnm-devel-1:1.26.0-12.1.rhaos4.7.el8.s390x", "8Base-RHOSE-4.7:NetworkManager-libnm-devel-1:1.26.0-12.1.rhaos4.7.el8.x86_64", "8Base-RHOSE-4.7:NetworkManager-ovs-1:1.26.0-12.1.rhaos4.7.el8.ppc64le", "8Base-RHOSE-4.7:NetworkManager-ovs-1:1.26.0-12.1.rhaos4.7.el8.s390x", "8Base-RHOSE-4.7:NetworkManager-ovs-1:1.26.0-12.1.rhaos4.7.el8.x86_64", "8Base-RHOSE-4.7:NetworkManager-ovs-debuginfo-1:1.26.0-12.1.rhaos4.7.el8.ppc64le", "8Base-RHOSE-4.7:NetworkManager-ovs-debuginfo-1:1.26.0-12.1.rhaos4.7.el8.s390x", "8Base-RHOSE-4.7:NetworkManager-ovs-debuginfo-1:1.26.0-12.1.rhaos4.7.el8.x86_64", "8Base-RHOSE-4.7:NetworkManager-ppp-1:1.26.0-12.1.rhaos4.7.el8.ppc64le", "8Base-RHOSE-4.7:NetworkManager-ppp-1:1.26.0-12.1.rhaos4.7.el8.s390x", "8Base-RHOSE-4.7:NetworkManager-ppp-1:1.26.0-12.1.rhaos4.7.el8.x86_64", "8Base-RHOSE-4.7:NetworkManager-ppp-debuginfo-1:1.26.0-12.1.rhaos4.7.el8.ppc64le", "8Base-RHOSE-4.7:NetworkManager-ppp-debuginfo-1:1.26.0-12.1.rhaos4.7.el8.s390x", "8Base-RHOSE-4.7:NetworkManager-ppp-debuginfo-1:1.26.0-12.1.rhaos4.7.el8.x86_64", "8Base-RHOSE-4.7:NetworkManager-team-1:1.26.0-12.1.rhaos4.7.el8.ppc64le", "8Base-RHOSE-4.7:NetworkManager-team-1:1.26.0-12.1.rhaos4.7.el8.s390x", "8Base-RHOSE-4.7:NetworkManager-team-1:1.26.0-12.1.rhaos4.7.el8.x86_64", "8Base-RHOSE-4.7:NetworkManager-team-debuginfo-1:1.26.0-12.1.rhaos4.7.el8.ppc64le", "8Base-RHOSE-4.7:NetworkManager-team-debuginfo-1:1.26.0-12.1.rhaos4.7.el8.s390x", "8Base-RHOSE-4.7:NetworkManager-team-debuginfo-1:1.26.0-12.1.rhaos4.7.el8.x86_64", "8Base-RHOSE-4.7:NetworkManager-tui-1:1.26.0-12.1.rhaos4.7.el8.ppc64le", "8Base-RHOSE-4.7:NetworkManager-tui-1:1.26.0-12.1.rhaos4.7.el8.s390x", "8Base-RHOSE-4.7:NetworkManager-tui-1:1.26.0-12.1.rhaos4.7.el8.x86_64", "8Base-RHOSE-4.7:NetworkManager-tui-debuginfo-1:1.26.0-12.1.rhaos4.7.el8.ppc64le", "8Base-RHOSE-4.7:NetworkManager-tui-debuginfo-1:1.26.0-12.1.rhaos4.7.el8.s390x", "8Base-RHOSE-4.7:NetworkManager-tui-debuginfo-1:1.26.0-12.1.rhaos4.7.el8.x86_64", "8Base-RHOSE-4.7:NetworkManager-wifi-1:1.26.0-12.1.rhaos4.7.el8.ppc64le", "8Base-RHOSE-4.7:NetworkManager-wifi-1:1.26.0-12.1.rhaos4.7.el8.s390x", "8Base-RHOSE-4.7:NetworkManager-wifi-1:1.26.0-12.1.rhaos4.7.el8.x86_64", "8Base-RHOSE-4.7:NetworkManager-wifi-debuginfo-1:1.26.0-12.1.rhaos4.7.el8.ppc64le", "8Base-RHOSE-4.7:NetworkManager-wifi-debuginfo-1:1.26.0-12.1.rhaos4.7.el8.s390x", "8Base-RHOSE-4.7:NetworkManager-wifi-debuginfo-1:1.26.0-12.1.rhaos4.7.el8.x86_64", "8Base-RHOSE-4.7:NetworkManager-wwan-1:1.26.0-12.1.rhaos4.7.el8.ppc64le", "8Base-RHOSE-4.7:NetworkManager-wwan-1:1.26.0-12.1.rhaos4.7.el8.s390x", "8Base-RHOSE-4.7:NetworkManager-wwan-1:1.26.0-12.1.rhaos4.7.el8.x86_64", "8Base-RHOSE-4.7:NetworkManager-wwan-debuginfo-1:1.26.0-12.1.rhaos4.7.el8.ppc64le", "8Base-RHOSE-4.7:NetworkManager-wwan-debuginfo-1:1.26.0-12.1.rhaos4.7.el8.s390x", "8Base-RHOSE-4.7:NetworkManager-wwan-debuginfo-1:1.26.0-12.1.rhaos4.7.el8.x86_64", "8Base-RHOSE-4.7:afterburn-0:4.6.0-1.rhaos4.7.el8.ppc64le", "8Base-RHOSE-4.7:afterburn-0:4.6.0-1.rhaos4.7.el8.s390x", "8Base-RHOSE-4.7:afterburn-0:4.6.0-1.rhaos4.7.el8.x86_64", "8Base-RHOSE-4.7:afterburn-debuginfo-0:4.6.0-1.rhaos4.7.el8.ppc64le", "8Base-RHOSE-4.7:afterburn-debuginfo-0:4.6.0-1.rhaos4.7.el8.s390x", "8Base-RHOSE-4.7:afterburn-debuginfo-0:4.6.0-1.rhaos4.7.el8.x86_64", "8Base-RHOSE-4.7:ansible-runner-0:1.4.6-2.el8ar.noarch", "8Base-RHOSE-4.7:ansible-runner-0:1.4.6-2.el8ar.src", "8Base-RHOSE-4.7:ansible-runner-http-0:1.0.0-2.el8ar.noarch", "8Base-RHOSE-4.7:ansible-runner-http-0:1.0.0-2.el8ar.src", "8Base-RHOSE-4.7:atomic-openshift-service-idler-0:4.7.0-202011171454.p0.git.15.675c1c8.el8.ppc64le", "8Base-RHOSE-4.7:atomic-openshift-service-idler-0:4.7.0-202011171454.p0.git.15.675c1c8.el8.s390x", "8Base-RHOSE-4.7:atomic-openshift-service-idler-0:4.7.0-202011171454.p0.git.15.675c1c8.el8.src", "8Base-RHOSE-4.7:atomic-openshift-service-idler-0:4.7.0-202011171454.p0.git.15.675c1c8.el8.x86_64", "8Base-RHOSE-4.7:bootupd-0:0.2.5-2.el8.x86_64", "8Base-RHOSE-4.7:bootupd-debuginfo-0:0.2.5-2.el8.x86_64", "8Base-RHOSE-4.7:clevis-0:15-1.el8.ppc64le", "8Base-RHOSE-4.7:clevis-0:15-1.el8.s390x", "8Base-RHOSE-4.7:clevis-0:15-1.el8.src", "8Base-RHOSE-4.7:clevis-0:15-1.el8.x86_64", "8Base-RHOSE-4.7:clevis-debuginfo-0:15-1.el8.ppc64le", "8Base-RHOSE-4.7:clevis-debuginfo-0:15-1.el8.s390x", "8Base-RHOSE-4.7:clevis-debuginfo-0:15-1.el8.x86_64", "8Base-RHOSE-4.7:clevis-debugsource-0:15-1.el8.ppc64le", "8Base-RHOSE-4.7:clevis-debugsource-0:15-1.el8.s390x", "8Base-RHOSE-4.7:clevis-debugsource-0:15-1.el8.x86_64", "8Base-RHOSE-4.7:clevis-dracut-0:15-1.el8.ppc64le", "8Base-RHOSE-4.7:clevis-dracut-0:15-1.el8.s390x", "8Base-RHOSE-4.7:clevis-dracut-0:15-1.el8.x86_64", "8Base-RHOSE-4.7:clevis-luks-0:15-1.el8.ppc64le", "8Base-RHOSE-4.7:clevis-luks-0:15-1.el8.s390x", "8Base-RHOSE-4.7:clevis-luks-0:15-1.el8.x86_64", "8Base-RHOSE-4.7:clevis-systemd-0:15-1.el8.ppc64le", "8Base-RHOSE-4.7:clevis-systemd-0:15-1.el8.s390x", "8Base-RHOSE-4.7:clevis-systemd-0:15-1.el8.x86_64", "8Base-RHOSE-4.7:clevis-udisks2-0:15-1.el8.ppc64le", "8Base-RHOSE-4.7:clevis-udisks2-0:15-1.el8.s390x", "8Base-RHOSE-4.7:clevis-udisks2-0:15-1.el8.x86_64", "8Base-RHOSE-4.7:clevis-udisks2-debuginfo-0:15-1.el8.ppc64le", "8Base-RHOSE-4.7:clevis-udisks2-debuginfo-0:15-1.el8.s390x", "8Base-RHOSE-4.7:clevis-udisks2-debuginfo-0:15-1.el8.x86_64", "8Base-RHOSE-4.7:conmon-2:2.0.21-2.rhaos4.6.el8.ppc64le", "8Base-RHOSE-4.7:conmon-2:2.0.21-2.rhaos4.6.el8.s390x", "8Base-RHOSE-4.7:conmon-2:2.0.21-2.rhaos4.6.el8.src", "8Base-RHOSE-4.7:conmon-2:2.0.21-2.rhaos4.6.el8.x86_64", "8Base-RHOSE-4.7:console-login-helper-messages-0:0.20.3-1.rhaos4.7.el8.noarch", "8Base-RHOSE-4.7:console-login-helper-messages-0:0.20.3-1.rhaos4.7.el8.src", "8Base-RHOSE-4.7:console-login-helper-messages-issuegen-0:0.20.3-1.rhaos4.7.el8.noarch", "8Base-RHOSE-4.7:console-login-helper-messages-profile-0:0.20.3-1.rhaos4.7.el8.noarch", "8Base-RHOSE-4.7:container-selinux-2:2.151.0-1.rhaos4.7.el8.noarch", "8Base-RHOSE-4.7:container-selinux-2:2.151.0-1.rhaos4.7.el8.src", "8Base-RHOSE-4.7:containernetworking-plugins-0:0.8.6-1.rhaos4.5.el8.ppc64le", "8Base-RHOSE-4.7:containernetworking-plugins-0:0.8.6-1.rhaos4.5.el8.s390x", "8Base-RHOSE-4.7:containernetworking-plugins-0:0.8.6-1.rhaos4.5.el8.src", "8Base-RHOSE-4.7:containernetworking-plugins-0:0.8.6-1.rhaos4.5.el8.x86_64", "8Base-RHOSE-4.7:containernetworking-plugins-debuginfo-0:0.8.6-1.rhaos4.5.el8.ppc64le", "8Base-RHOSE-4.7:containernetworking-plugins-debuginfo-0:0.8.6-1.rhaos4.5.el8.s390x", "8Base-RHOSE-4.7:containernetworking-plugins-debuginfo-0:0.8.6-1.rhaos4.5.el8.x86_64", "8Base-RHOSE-4.7:containernetworking-plugins-debugsource-0:0.8.6-1.rhaos4.5.el8.ppc64le", "8Base-RHOSE-4.7:containernetworking-plugins-debugsource-0:0.8.6-1.rhaos4.5.el8.s390x", "8Base-RHOSE-4.7:containernetworking-plugins-debugsource-0:0.8.6-1.rhaos4.5.el8.x86_64", "8Base-RHOSE-4.7:coreos-installer-0:0.8.0-3.rhaos4.7.el8.ppc64le", "8Base-RHOSE-4.7:coreos-installer-0:0.8.0-3.rhaos4.7.el8.s390x", "8Base-RHOSE-4.7:coreos-installer-0:0.8.0-3.rhaos4.7.el8.src", "8Base-RHOSE-4.7:coreos-installer-0:0.8.0-3.rhaos4.7.el8.x86_64", "8Base-RHOSE-4.7:coreos-installer-bootinfra-0:0.8.0-3.rhaos4.7.el8.ppc64le", "8Base-RHOSE-4.7:coreos-installer-bootinfra-0:0.8.0-3.rhaos4.7.el8.s390x", "8Base-RHOSE-4.7:coreos-installer-bootinfra-debuginfo-0:0.8.0-3.rhaos4.7.el8.ppc64le", "8Base-RHOSE-4.7:coreos-installer-bootinfra-debuginfo-0:0.8.0-3.rhaos4.7.el8.s390x", "8Base-RHOSE-4.7:coreos-installer-bootinfra-debuginfo-0:0.8.0-3.rhaos4.7.el8.x86_64", "8Base-RHOSE-4.7:coreos-installer-debuginfo-0:0.8.0-3.rhaos4.7.el8.ppc64le", "8Base-RHOSE-4.7:coreos-installer-debuginfo-0:0.8.0-3.rhaos4.7.el8.s390x", "8Base-RHOSE-4.7:coreos-installer-debuginfo-0:0.8.0-3.rhaos4.7.el8.x86_64", "8Base-RHOSE-4.7:coreos-installer-debugsource-0:0.8.0-3.rhaos4.7.el8.ppc64le", "8Base-RHOSE-4.7:coreos-installer-debugsource-0:0.8.0-3.rhaos4.7.el8.s390x", "8Base-RHOSE-4.7:coreos-installer-debugsource-0:0.8.0-3.rhaos4.7.el8.x86_64", "8Base-RHOSE-4.7:cri-o-0:1.20.0-0.rhaos4.7.git8921e00.el8.51.ppc64le", "8Base-RHOSE-4.7:cri-o-0:1.20.0-0.rhaos4.7.git8921e00.el8.51.s390x", "8Base-RHOSE-4.7:cri-o-0:1.20.0-0.rhaos4.7.git8921e00.el8.51.src", "8Base-RHOSE-4.7:cri-o-0:1.20.0-0.rhaos4.7.git8921e00.el8.51.x86_64", "8Base-RHOSE-4.7:cri-o-debuginfo-0:1.20.0-0.rhaos4.7.git8921e00.el8.51.ppc64le", "8Base-RHOSE-4.7:cri-o-debuginfo-0:1.20.0-0.rhaos4.7.git8921e00.el8.51.s390x", "8Base-RHOSE-4.7:cri-o-debuginfo-0:1.20.0-0.rhaos4.7.git8921e00.el8.51.x86_64", "8Base-RHOSE-4.7:cri-o-debugsource-0:1.20.0-0.rhaos4.7.git8921e00.el8.51.ppc64le", "8Base-RHOSE-4.7:cri-o-debugsource-0:1.20.0-0.rhaos4.7.git8921e00.el8.51.s390x", "8Base-RHOSE-4.7:cri-o-debugsource-0:1.20.0-0.rhaos4.7.git8921e00.el8.51.x86_64", "8Base-RHOSE-4.7:cri-tools-0:1.20.0-1.el8.ppc64le", "8Base-RHOSE-4.7:cri-tools-0:1.20.0-1.el8.s390x", "8Base-RHOSE-4.7:cri-tools-0:1.20.0-1.el8.src", "8Base-RHOSE-4.7:cri-tools-0:1.20.0-1.el8.x86_64", "8Base-RHOSE-4.7:cri-tools-debuginfo-0:1.20.0-1.el8.ppc64le", "8Base-RHOSE-4.7:cri-tools-debuginfo-0:1.20.0-1.el8.s390x", "8Base-RHOSE-4.7:cri-tools-debuginfo-0:1.20.0-1.el8.x86_64", "8Base-RHOSE-4.7:cri-tools-debugsource-0:1.20.0-1.el8.ppc64le", "8Base-RHOSE-4.7:cri-tools-debugsource-0:1.20.0-1.el8.s390x", "8Base-RHOSE-4.7:cri-tools-debugsource-0:1.20.0-1.el8.x86_64", "8Base-RHOSE-4.7:dracut-0:049-95.git20200804.el8_3.4.ppc64le", "8Base-RHOSE-4.7:dracut-0:049-95.git20200804.el8_3.4.s390x", "8Base-RHOSE-4.7:dracut-0:049-95.git20200804.el8_3.4.src", "8Base-RHOSE-4.7:dracut-0:049-95.git20200804.el8_3.4.x86_64", "8Base-RHOSE-4.7:dracut-caps-0:049-95.git20200804.el8_3.4.ppc64le", "8Base-RHOSE-4.7:dracut-caps-0:049-95.git20200804.el8_3.4.s390x", "8Base-RHOSE-4.7:dracut-caps-0:049-95.git20200804.el8_3.4.x86_64", "8Base-RHOSE-4.7:dracut-config-generic-0:049-95.git20200804.el8_3.4.ppc64le", "8Base-RHOSE-4.7:dracut-config-generic-0:049-95.git20200804.el8_3.4.s390x", "8Base-RHOSE-4.7:dracut-config-generic-0:049-95.git20200804.el8_3.4.x86_64", "8Base-RHOSE-4.7:dracut-config-rescue-0:049-95.git20200804.el8_3.4.ppc64le", "8Base-RHOSE-4.7:dracut-config-rescue-0:049-95.git20200804.el8_3.4.s390x", "8Base-RHOSE-4.7:dracut-config-rescue-0:049-95.git20200804.el8_3.4.x86_64", "8Base-RHOSE-4.7:dracut-debuginfo-0:049-95.git20200804.el8_3.4.ppc64le", "8Base-RHOSE-4.7:dracut-debuginfo-0:049-95.git20200804.el8_3.4.s390x", "8Base-RHOSE-4.7:dracut-debuginfo-0:049-95.git20200804.el8_3.4.x86_64", "8Base-RHOSE-4.7:dracut-debugsource-0:049-95.git20200804.el8_3.4.ppc64le", "8Base-RHOSE-4.7:dracut-debugsource-0:049-95.git20200804.el8_3.4.s390x", "8Base-RHOSE-4.7:dracut-debugsource-0:049-95.git20200804.el8_3.4.x86_64", "8Base-RHOSE-4.7:dracut-live-0:049-95.git20200804.el8_3.4.ppc64le", "8Base-RHOSE-4.7:dracut-live-0:049-95.git20200804.el8_3.4.s390x", "8Base-RHOSE-4.7:dracut-live-0:049-95.git20200804.el8_3.4.x86_64", "8Base-RHOSE-4.7:dracut-network-0:049-95.git20200804.el8_3.4.ppc64le", "8Base-RHOSE-4.7:dracut-network-0:049-95.git20200804.el8_3.4.s390x", "8Base-RHOSE-4.7:dracut-network-0:049-95.git20200804.el8_3.4.x86_64", "8Base-RHOSE-4.7:dracut-squash-0:049-95.git20200804.el8_3.4.ppc64le", "8Base-RHOSE-4.7:dracut-squash-0:049-95.git20200804.el8_3.4.s390x", "8Base-RHOSE-4.7:dracut-squash-0:049-95.git20200804.el8_3.4.x86_64", "8Base-RHOSE-4.7:dracut-tools-0:049-95.git20200804.el8_3.4.ppc64le", "8Base-RHOSE-4.7:dracut-tools-0:049-95.git20200804.el8_3.4.s390x", "8Base-RHOSE-4.7:dracut-tools-0:049-95.git20200804.el8_3.4.x86_64", "8Base-RHOSE-4.7:faq-0:0.0.6-5.el8.ppc64le", "8Base-RHOSE-4.7:faq-0:0.0.6-5.el8.s390x", "8Base-RHOSE-4.7:faq-0:0.0.6-5.el8.src", "8Base-RHOSE-4.7:faq-0:0.0.6-5.el8.x86_64", "8Base-RHOSE-4.7:golang-github-prometheus-promu-0:0.5.0-2.git642a960.el8.ppc64le", "8Base-RHOSE-4.7:golang-github-prometheus-promu-0:0.5.0-2.git642a960.el8.s390x", "8Base-RHOSE-4.7:golang-github-prometheus-promu-0:0.5.0-2.git642a960.el8.src", "8Base-RHOSE-4.7:golang-github-prometheus-promu-0:0.5.0-2.git642a960.el8.x86_64", "8Base-RHOSE-4.7:gperftools-0:2.6.3-2.el8ost.ppc64le", "8Base-RHOSE-4.7:gperftools-0:2.6.3-2.el8ost.s390x", "8Base-RHOSE-4.7:gperftools-0:2.6.3-2.el8ost.src", "8Base-RHOSE-4.7:gperftools-0:2.6.3-2.el8ost.x86_64", "8Base-RHOSE-4.7:gperftools-debugsource-0:2.6.3-2.el8ost.ppc64le", "8Base-RHOSE-4.7:gperftools-debugsource-0:2.6.3-2.el8ost.s390x", "8Base-RHOSE-4.7:gperftools-debugsource-0:2.6.3-2.el8ost.x86_64", "8Base-RHOSE-4.7:gperftools-devel-0:2.6.3-2.el8ost.ppc64le", "8Base-RHOSE-4.7:gperftools-devel-0:2.6.3-2.el8ost.s390x", "8Base-RHOSE-4.7:gperftools-devel-0:2.6.3-2.el8ost.x86_64", "8Base-RHOSE-4.7:gperftools-libs-0:2.6.3-2.el8ost.ppc64le", "8Base-RHOSE-4.7:gperftools-libs-0:2.6.3-2.el8ost.s390x", "8Base-RHOSE-4.7:gperftools-libs-0:2.6.3-2.el8ost.x86_64", "8Base-RHOSE-4.7:gperftools-libs-debuginfo-0:2.6.3-2.el8ost.ppc64le", "8Base-RHOSE-4.7:gperftools-libs-debuginfo-0:2.6.3-2.el8ost.s390x", "8Base-RHOSE-4.7:gperftools-libs-debuginfo-0:2.6.3-2.el8ost.x86_64", "8Base-RHOSE-4.7:grpc-0:1.18.0-4.el8ost.ppc64le", "8Base-RHOSE-4.7:grpc-0:1.18.0-4.el8ost.s390x", "8Base-RHOSE-4.7:grpc-0:1.18.0-4.el8ost.src", "8Base-RHOSE-4.7:grpc-0:1.18.0-4.el8ost.x86_64", "8Base-RHOSE-4.7:grpc-cli-0:1.18.0-4.el8ost.ppc64le", "8Base-RHOSE-4.7:grpc-cli-0:1.18.0-4.el8ost.s390x", "8Base-RHOSE-4.7:grpc-cli-0:1.18.0-4.el8ost.x86_64", "8Base-RHOSE-4.7:grpc-cli-debuginfo-0:1.18.0-4.el8ost.ppc64le", "8Base-RHOSE-4.7:grpc-cli-debuginfo-0:1.18.0-4.el8ost.s390x", "8Base-RHOSE-4.7:grpc-cli-debuginfo-0:1.18.0-4.el8ost.x86_64", "8Base-RHOSE-4.7:grpc-debuginfo-0:1.18.0-4.el8ost.ppc64le", "8Base-RHOSE-4.7:grpc-debuginfo-0:1.18.0-4.el8ost.s390x", "8Base-RHOSE-4.7:grpc-debuginfo-0:1.18.0-4.el8ost.x86_64", "8Base-RHOSE-4.7:grpc-debugsource-0:1.18.0-4.el8ost.ppc64le", "8Base-RHOSE-4.7:grpc-debugsource-0:1.18.0-4.el8ost.s390x", "8Base-RHOSE-4.7:grpc-debugsource-0:1.18.0-4.el8ost.x86_64", "8Base-RHOSE-4.7:grpc-devel-0:1.18.0-4.el8ost.ppc64le", "8Base-RHOSE-4.7:grpc-devel-0:1.18.0-4.el8ost.s390x", "8Base-RHOSE-4.7:grpc-devel-0:1.18.0-4.el8ost.x86_64", "8Base-RHOSE-4.7:grpc-plugins-0:1.18.0-4.el8ost.ppc64le", "8Base-RHOSE-4.7:grpc-plugins-0:1.18.0-4.el8ost.s390x", "8Base-RHOSE-4.7:grpc-plugins-0:1.18.0-4.el8ost.x86_64", "8Base-RHOSE-4.7:grpc-plugins-debuginfo-0:1.18.0-4.el8ost.ppc64le", "8Base-RHOSE-4.7:grpc-plugins-debuginfo-0:1.18.0-4.el8ost.s390x", "8Base-RHOSE-4.7:grpc-plugins-debuginfo-0:1.18.0-4.el8ost.x86_64", "8Base-RHOSE-4.7:haproxy-0:2.0.19-1.el8.src", "8Base-RHOSE-4.7:haproxy-debugsource-0:2.0.19-1.el8.ppc64le", "8Base-RHOSE-4.7:haproxy-debugsource-0:2.0.19-1.el8.s390x", "8Base-RHOSE-4.7:haproxy-debugsource-0:2.0.19-1.el8.x86_64", "8Base-RHOSE-4.7:haproxy20-0:2.0.19-1.el8.ppc64le", "8Base-RHOSE-4.7:haproxy20-0:2.0.19-1.el8.s390x", "8Base-RHOSE-4.7:haproxy20-0:2.0.19-1.el8.x86_64", "8Base-RHOSE-4.7:haproxy20-debuginfo-0:2.0.19-1.el8.ppc64le", "8Base-RHOSE-4.7:haproxy20-debuginfo-0:2.0.19-1.el8.s390x", "8Base-RHOSE-4.7:haproxy20-debuginfo-0:2.0.19-1.el8.x86_64", "8Base-RHOSE-4.7:ignition-0:2.9.0-2.rhaos4.7.git1d56dc8.el8.ppc64le", "8Base-RHOSE-4.7:ignition-0:2.9.0-2.rhaos4.7.git1d56dc8.el8.s390x", "8Base-RHOSE-4.7:ignition-0:2.9.0-2.rhaos4.7.git1d56dc8.el8.src", "8Base-RHOSE-4.7:ignition-0:2.9.0-2.rhaos4.7.git1d56dc8.el8.x86_64", "8Base-RHOSE-4.7:ignition-debuginfo-0:2.9.0-2.rhaos4.7.git1d56dc8.el8.ppc64le", "8Base-RHOSE-4.7:ignition-debuginfo-0:2.9.0-2.rhaos4.7.git1d56dc8.el8.s390x", "8Base-RHOSE-4.7:ignition-debuginfo-0:2.9.0-2.rhaos4.7.git1d56dc8.el8.x86_64", "8Base-RHOSE-4.7:ignition-debugsource-0:2.9.0-2.rhaos4.7.git1d56dc8.el8.ppc64le", "8Base-RHOSE-4.7:ignition-debugsource-0:2.9.0-2.rhaos4.7.git1d56dc8.el8.s390x", "8Base-RHOSE-4.7:ignition-debugsource-0:2.9.0-2.rhaos4.7.git1d56dc8.el8.x86_64", "8Base-RHOSE-4.7:ignition-validate-0:2.9.0-2.rhaos4.7.git1d56dc8.el8.ppc64le", "8Base-RHOSE-4.7:ignition-validate-0:2.9.0-2.rhaos4.7.git1d56dc8.el8.s390x", "8Base-RHOSE-4.7:ignition-validate-0:2.9.0-2.rhaos4.7.git1d56dc8.el8.x86_64", "8Base-RHOSE-4.7:ignition-validate-debuginfo-0:2.9.0-2.rhaos4.7.git1d56dc8.el8.ppc64le", "8Base-RHOSE-4.7:ignition-validate-debuginfo-0:2.9.0-2.rhaos4.7.git1d56dc8.el8.s390x", "8Base-RHOSE-4.7:ignition-validate-debuginfo-0:2.9.0-2.rhaos4.7.git1d56dc8.el8.x86_64", "8Base-RHOSE-4.7:inotify-tools-0:3.20.1-2.el8.ppc64le", "8Base-RHOSE-4.7:inotify-tools-0:3.20.1-2.el8.s390x", "8Base-RHOSE-4.7:inotify-tools-0:3.20.1-2.el8.src", "8Base-RHOSE-4.7:inotify-tools-0:3.20.1-2.el8.x86_64", "8Base-RHOSE-4.7:inotify-tools-debuginfo-0:3.20.1-2.el8.ppc64le", "8Base-RHOSE-4.7:inotify-tools-debuginfo-0:3.20.1-2.el8.s390x", "8Base-RHOSE-4.7:inotify-tools-debuginfo-0:3.20.1-2.el8.x86_64", "8Base-RHOSE-4.7:inotify-tools-debugsource-0:3.20.1-2.el8.ppc64le", "8Base-RHOSE-4.7:inotify-tools-debugsource-0:3.20.1-2.el8.s390x", "8Base-RHOSE-4.7:inotify-tools-debugsource-0:3.20.1-2.el8.x86_64", "8Base-RHOSE-4.7:inotify-tools-devel-0:3.20.1-2.el8.ppc64le", "8Base-RHOSE-4.7:inotify-tools-devel-0:3.20.1-2.el8.s390x", "8Base-RHOSE-4.7:inotify-tools-devel-0:3.20.1-2.el8.x86_64", "8Base-RHOSE-4.7:ironic-images-0:15.1-20210114.1.el8.noarch", "8Base-RHOSE-4.7:ironic-images-0:15.1-20210114.1.el8.src", "8Base-RHOSE-4.7:ironic-images-all-0:15.1-20210114.1.el8.noarch", "8Base-RHOSE-4.7:ironic-images-ipa-ppc64le-0:15.1-20210114.1.el8.noarch", "8Base-RHOSE-4.7:ironic-images-ipa-x86_64-0:15.1-20210114.1.el8.noarch", "8Base-RHOSE-4.7:jenkins-0:2.263.3.1612449007-1.el8.noarch", "8Base-RHOSE-4.7:jenkins-0:2.263.3.1612449007-1.el8.src", "8Base-RHOSE-4.7:jenkins-2-plugins-0:4.7.1611636915-1.el8.noarch", "8Base-RHOSE-4.7:jenkins-2-plugins-0:4.7.1611636915-1.el8.src", "8Base-RHOSE-4.7:jq-0:1.6-2.el8.ppc64le", "8Base-RHOSE-4.7:jq-0:1.6-2.el8.s390x", "8Base-RHOSE-4.7:jq-0:1.6-2.el8.src", "8Base-RHOSE-4.7:jq-0:1.6-2.el8.x86_64", "8Base-RHOSE-4.7:jq-debuginfo-0:1.6-2.el8.ppc64le", "8Base-RHOSE-4.7:jq-debuginfo-0:1.6-2.el8.s390x", "8Base-RHOSE-4.7:jq-debuginfo-0:1.6-2.el8.x86_64", "8Base-RHOSE-4.7:jq-debugsource-0:1.6-2.el8.ppc64le", "8Base-RHOSE-4.7:jq-debugsource-0:1.6-2.el8.s390x", "8Base-RHOSE-4.7:jq-debugsource-0:1.6-2.el8.x86_64", "8Base-RHOSE-4.7:jq-devel-0:1.6-2.el8.ppc64le", "8Base-RHOSE-4.7:jq-devel-0:1.6-2.el8.s390x", "8Base-RHOSE-4.7:jq-devel-0:1.6-2.el8.x86_64", "8Base-RHOSE-4.7:kuryr-binding-scripts-0:1.1.1-0.20190923160834.41e6964.el8ost.noarch", "8Base-RHOSE-4.7:libnftnl-0:1.1.5-4.el8.ppc64le", "8Base-RHOSE-4.7:libnftnl-0:1.1.5-4.el8.s390x", "8Base-RHOSE-4.7:libnftnl-0:1.1.5-4.el8.src", "8Base-RHOSE-4.7:libnftnl-0:1.1.5-4.el8.x86_64", "8Base-RHOSE-4.7:libnftnl-debuginfo-0:1.1.5-4.el8.ppc64le", "8Base-RHOSE-4.7:libnftnl-debuginfo-0:1.1.5-4.el8.s390x", "8Base-RHOSE-4.7:libnftnl-debuginfo-0:1.1.5-4.el8.x86_64", "8Base-RHOSE-4.7:libnftnl-debugsource-0:1.1.5-4.el8.ppc64le", "8Base-RHOSE-4.7:libnftnl-debugsource-0:1.1.5-4.el8.s390x", "8Base-RHOSE-4.7:libnftnl-debugsource-0:1.1.5-4.el8.x86_64", "8Base-RHOSE-4.7:libnftnl-devel-0:1.1.5-4.el8.ppc64le", "8Base-RHOSE-4.7:libnftnl-devel-0:1.1.5-4.el8.s390x", "8Base-RHOSE-4.7:libnftnl-devel-0:1.1.5-4.el8.x86_64", "8Base-RHOSE-4.7:libsodium-0:1.0.16-4.5.el8ost.ppc64le", "8Base-RHOSE-4.7:libsodium-0:1.0.16-4.5.el8ost.s390x", "8Base-RHOSE-4.7:libsodium-0:1.0.16-4.5.el8ost.src", "8Base-RHOSE-4.7:libsodium-0:1.0.16-4.5.el8ost.x86_64", "8Base-RHOSE-4.7:libsodium-debuginfo-0:1.0.16-4.5.el8ost.ppc64le", "8Base-RHOSE-4.7:libsodium-debuginfo-0:1.0.16-4.5.el8ost.s390x", "8Base-RHOSE-4.7:libsodium-debuginfo-0:1.0.16-4.5.el8ost.x86_64", "8Base-RHOSE-4.7:libsodium-debugsource-0:1.0.16-4.5.el8ost.ppc64le", "8Base-RHOSE-4.7:libsodium-debugsource-0:1.0.16-4.5.el8ost.s390x", "8Base-RHOSE-4.7:libsodium-debugsource-0:1.0.16-4.5.el8ost.x86_64", "8Base-RHOSE-4.7:libsodium-devel-0:1.0.16-4.5.el8ost.ppc64le", "8Base-RHOSE-4.7:libsodium-devel-0:1.0.16-4.5.el8ost.s390x", "8Base-RHOSE-4.7:libsodium-devel-0:1.0.16-4.5.el8ost.x86_64", "8Base-RHOSE-4.7:libsodium-static-0:1.0.16-4.5.el8ost.ppc64le", "8Base-RHOSE-4.7:libsodium-static-0:1.0.16-4.5.el8ost.s390x", "8Base-RHOSE-4.7:libsodium-static-0:1.0.16-4.5.el8ost.x86_64", "8Base-RHOSE-4.7:libunwind-0:1.2.1-5.el8.ppc64le", "8Base-RHOSE-4.7:libunwind-0:1.2.1-5.el8.src", "8Base-RHOSE-4.7:libunwind-0:1.2.1-5.el8.x86_64", "8Base-RHOSE-4.7:libunwind-debuginfo-0:1.2.1-5.el8.ppc64le", "8Base-RHOSE-4.7:libunwind-debuginfo-0:1.2.1-5.el8.x86_64", "8Base-RHOSE-4.7:libunwind-debugsource-0:1.2.1-5.el8.ppc64le", "8Base-RHOSE-4.7:libunwind-debugsource-0:1.2.1-5.el8.x86_64", "8Base-RHOSE-4.7:libunwind-devel-0:1.2.1-5.el8.ppc64le", "8Base-RHOSE-4.7:libunwind-devel-0:1.2.1-5.el8.x86_64", "8Base-RHOSE-4.7:network-scripts-openvswitch2.13-0:2.13.0-79.el8fdp.ppc64le", "8Base-RHOSE-4.7:network-scripts-openvswitch2.13-0:2.13.0-79.el8fdp.s390x", "8Base-RHOSE-4.7:network-scripts-openvswitch2.13-0:2.13.0-79.el8fdp.x86_64", "8Base-RHOSE-4.7:octavia-amphora-image-x86_64-0:17.0-20200606.1.el8ost.noarch", "8Base-RHOSE-4.7:openshift-0:4.7.0-202102060108.p0.git.97095.7271b90.el8.src", "8Base-RHOSE-4.7:openshift-clients-0:4.7.0-202102032256.p0.git.3951.0e656ef.el8.ppc64le", "8Base-RHOSE-4.7:openshift-clients-0:4.7.0-202102032256.p0.git.3951.0e656ef.el8.s390x", "8Base-RHOSE-4.7:openshift-clients-0:4.7.0-202102032256.p0.git.3951.0e656ef.el8.src", "8Base-RHOSE-4.7:openshift-clients-0:4.7.0-202102032256.p0.git.3951.0e656ef.el8.x86_64", "8Base-RHOSE-4.7:openshift-clients-redistributable-0:4.7.0-202102032256.p0.git.3951.0e656ef.el8.x86_64", "8Base-RHOSE-4.7:openshift-eventrouter-0:0.2-4.git7c289cc.el8.ppc64le", "8Base-RHOSE-4.7:openshift-eventrouter-0:0.2-4.git7c289cc.el8.s390x", "8Base-RHOSE-4.7:openshift-eventrouter-0:0.2-4.git7c289cc.el8.src", "8Base-RHOSE-4.7:openshift-eventrouter-0:0.2-4.git7c289cc.el8.x86_64", "8Base-RHOSE-4.7:openshift-eventrouter-debuginfo-0:0.2-4.git7c289cc.el8.ppc64le", "8Base-RHOSE-4.7:openshift-eventrouter-debuginfo-0:0.2-4.git7c289cc.el8.s390x", "8Base-RHOSE-4.7:openshift-eventrouter-debuginfo-0:0.2-4.git7c289cc.el8.x86_64", "8Base-RHOSE-4.7:openshift-eventrouter-debugsource-0:0.2-4.git7c289cc.el8.ppc64le", "8Base-RHOSE-4.7:openshift-eventrouter-debugsource-0:0.2-4.git7c289cc.el8.s390x", "8Base-RHOSE-4.7:openshift-eventrouter-debugsource-0:0.2-4.git7c289cc.el8.x86_64", "8Base-RHOSE-4.7:openshift-hyperkube-0:4.7.0-202102060108.p0.git.97095.7271b90.el8.ppc64le", "8Base-RHOSE-4.7:openshift-hyperkube-0:4.7.0-202102060108.p0.git.97095.7271b90.el8.s390x", "8Base-RHOSE-4.7:openshift-hyperkube-0:4.7.0-202102060108.p0.git.97095.7271b90.el8.x86_64", "8Base-RHOSE-4.7:openshift-kuryr-0:4.7.0-202101262230.p0.git.2494.cd95ce5.el8.src", "8Base-RHOSE-4.7:openshift-kuryr-cni-0:4.7.0-202101262230.p0.git.2494.cd95ce5.el8.noarch", "8Base-RHOSE-4.7:openshift-kuryr-common-0:4.7.0-202101262230.p0.git.2494.cd95ce5.el8.noarch", "8Base-RHOSE-4.7:openshift-kuryr-controller-0:4.7.0-202101262230.p0.git.2494.cd95ce5.el8.noarch", "8Base-RHOSE-4.7:openstack-ironic-1:16.0.4-0.20210203051223.7d74ea0.el8.src", "8Base-RHOSE-4.7:openstack-ironic-api-1:16.0.4-0.20210203051223.7d74ea0.el8.noarch", "8Base-RHOSE-4.7:openstack-ironic-common-1:16.0.4-0.20210203051223.7d74ea0.el8.noarch", "8Base-RHOSE-4.7:openstack-ironic-conductor-1:16.0.4-0.20210203051223.7d74ea0.el8.noarch", "8Base-RHOSE-4.7:openstack-ironic-inspector-0:10.4.1-0.20201123161216.70fccec.el8.noarch", "8Base-RHOSE-4.7:openstack-ironic-inspector-0:10.4.1-0.20201123161216.70fccec.el8.src", "8Base-RHOSE-4.7:openstack-ironic-inspector-api-0:10.4.1-0.20201123161216.70fccec.el8.noarch", "8Base-RHOSE-4.7:openstack-ironic-inspector-conductor-0:10.4.1-0.20201123161216.70fccec.el8.noarch", "8Base-RHOSE-4.7:openstack-ironic-inspector-dnsmasq-0:10.4.1-0.20201123161216.70fccec.el8.noarch", "8Base-RHOSE-4.7:openstack-ironic-python-agent-0:6.4.3-0.20201217171210.bd45db1.el8.noarch", "8Base-RHOSE-4.7:openstack-ironic-python-agent-0:6.4.3-0.20201217171210.bd45db1.el8.src", "8Base-RHOSE-4.7:openvswitch2.13-0:2.13.0-79.el8fdp.ppc64le", "8Base-RHOSE-4.7:openvswitch2.13-0:2.13.0-79.el8fdp.s390x", "8Base-RHOSE-4.7:openvswitch2.13-0:2.13.0-79.el8fdp.src", "8Base-RHOSE-4.7:openvswitch2.13-0:2.13.0-79.el8fdp.x86_64", "8Base-RHOSE-4.7:openvswitch2.13-debuginfo-0:2.13.0-79.el8fdp.ppc64le", "8Base-RHOSE-4.7:openvswitch2.13-debuginfo-0:2.13.0-79.el8fdp.s390x", "8Base-RHOSE-4.7:openvswitch2.13-debuginfo-0:2.13.0-79.el8fdp.x86_64", "8Base-RHOSE-4.7:openvswitch2.13-debugsource-0:2.13.0-79.el8fdp.ppc64le", "8Base-RHOSE-4.7:openvswitch2.13-debugsource-0:2.13.0-79.el8fdp.s390x", "8Base-RHOSE-4.7:openvswitch2.13-debugsource-0:2.13.0-79.el8fdp.x86_64", "8Base-RHOSE-4.7:openvswitch2.13-devel-0:2.13.0-79.el8fdp.ppc64le", "8Base-RHOSE-4.7:openvswitch2.13-devel-0:2.13.0-79.el8fdp.s390x", "8Base-RHOSE-4.7:openvswitch2.13-devel-0:2.13.0-79.el8fdp.x86_64", "8Base-RHOSE-4.7:openvswitch2.13-test-0:2.13.0-79.el8fdp.noarch", "8Base-RHOSE-4.7:ostree-0:2020.7-1.el8.ppc64le", "8Base-RHOSE-4.7:ostree-0:2020.7-1.el8.s390x", "8Base-RHOSE-4.7:ostree-0:2020.7-1.el8.src", "8Base-RHOSE-4.7:ostree-0:2020.7-1.el8.x86_64", "8Base-RHOSE-4.7:ostree-debuginfo-0:2020.7-1.el8.ppc64le", "8Base-RHOSE-4.7:ostree-debuginfo-0:2020.7-1.el8.s390x", "8Base-RHOSE-4.7:ostree-debuginfo-0:2020.7-1.el8.x86_64", "8Base-RHOSE-4.7:ostree-debugsource-0:2020.7-1.el8.ppc64le", "8Base-RHOSE-4.7:ostree-debugsource-0:2020.7-1.el8.s390x", "8Base-RHOSE-4.7:ostree-debugsource-0:2020.7-1.el8.x86_64", "8Base-RHOSE-4.7:ostree-devel-0:2020.7-1.el8.ppc64le", "8Base-RHOSE-4.7:ostree-devel-0:2020.7-1.el8.s390x", "8Base-RHOSE-4.7:ostree-devel-0:2020.7-1.el8.x86_64", "8Base-RHOSE-4.7:ostree-grub2-0:2020.7-1.el8.ppc64le", "8Base-RHOSE-4.7:ostree-grub2-0:2020.7-1.el8.x86_64", "8Base-RHOSE-4.7:ostree-libs-0:2020.7-1.el8.ppc64le", "8Base-RHOSE-4.7:ostree-libs-0:2020.7-1.el8.s390x", "8Base-RHOSE-4.7:ostree-libs-0:2020.7-1.el8.x86_64", "8Base-RHOSE-4.7:ostree-libs-debuginfo-0:2020.7-1.el8.ppc64le", "8Base-RHOSE-4.7:ostree-libs-debuginfo-0:2020.7-1.el8.s390x", "8Base-RHOSE-4.7:ostree-libs-debuginfo-0:2020.7-1.el8.x86_64", "8Base-RHOSE-4.7:ovn2.13-0:20.09.0-21.el8fdn.ppc64le", "8Base-RHOSE-4.7:ovn2.13-0:20.09.0-21.el8fdn.s390x", "8Base-RHOSE-4.7:ovn2.13-0:20.09.0-21.el8fdn.src", "8Base-RHOSE-4.7:ovn2.13-0:20.09.0-21.el8fdn.x86_64", "8Base-RHOSE-4.7:ovn2.13-central-0:20.09.0-21.el8fdn.ppc64le", "8Base-RHOSE-4.7:ovn2.13-central-0:20.09.0-21.el8fdn.s390x", "8Base-RHOSE-4.7:ovn2.13-central-0:20.09.0-21.el8fdn.x86_64", "8Base-RHOSE-4.7:ovn2.13-central-debuginfo-0:20.09.0-21.el8fdn.ppc64le", "8Base-RHOSE-4.7:ovn2.13-central-debuginfo-0:20.09.0-21.el8fdn.s390x", "8Base-RHOSE-4.7:ovn2.13-central-debuginfo-0:20.09.0-21.el8fdn.x86_64", "8Base-RHOSE-4.7:ovn2.13-debuginfo-0:20.09.0-21.el8fdn.ppc64le", "8Base-RHOSE-4.7:ovn2.13-debuginfo-0:20.09.0-21.el8fdn.s390x", "8Base-RHOSE-4.7:ovn2.13-debuginfo-0:20.09.0-21.el8fdn.x86_64", "8Base-RHOSE-4.7:ovn2.13-debugsource-0:20.09.0-21.el8fdn.ppc64le", "8Base-RHOSE-4.7:ovn2.13-debugsource-0:20.09.0-21.el8fdn.s390x", "8Base-RHOSE-4.7:ovn2.13-debugsource-0:20.09.0-21.el8fdn.x86_64", "8Base-RHOSE-4.7:ovn2.13-host-0:20.09.0-21.el8fdn.ppc64le", "8Base-RHOSE-4.7:ovn2.13-host-0:20.09.0-21.el8fdn.s390x", "8Base-RHOSE-4.7:ovn2.13-host-0:20.09.0-21.el8fdn.x86_64", "8Base-RHOSE-4.7:ovn2.13-host-debuginfo-0:20.09.0-21.el8fdn.ppc64le", "8Base-RHOSE-4.7:ovn2.13-host-debuginfo-0:20.09.0-21.el8fdn.s390x", "8Base-RHOSE-4.7:ovn2.13-host-debuginfo-0:20.09.0-21.el8fdn.x86_64", "8Base-RHOSE-4.7:ovn2.13-vtep-0:20.09.0-21.el8fdn.ppc64le", "8Base-RHOSE-4.7:ovn2.13-vtep-0:20.09.0-21.el8fdn.s390x", "8Base-RHOSE-4.7:ovn2.13-vtep-0:20.09.0-21.el8fdn.x86_64", "8Base-RHOSE-4.7:ovn2.13-vtep-debuginfo-0:20.09.0-21.el8fdn.ppc64le", "8Base-RHOSE-4.7:ovn2.13-vtep-debuginfo-0:20.09.0-21.el8fdn.s390x", "8Base-RHOSE-4.7:ovn2.13-vtep-debuginfo-0:20.09.0-21.el8fdn.x86_64", "8Base-RHOSE-4.7:powerpc-utils-0:1.3.6-12.el8_3.ppc64le", "8Base-RHOSE-4.7:powerpc-utils-0:1.3.6-12.el8_3.src", "8Base-RHOSE-4.7:powerpc-utils-core-0:1.3.6-12.el8_3.ppc64le", "8Base-RHOSE-4.7:powerpc-utils-core-debuginfo-0:1.3.6-12.el8_3.ppc64le", "8Base-RHOSE-4.7:powerpc-utils-debugsource-0:1.3.6-12.el8_3.ppc64le", "8Base-RHOSE-4.7:pprof-0:2.6.3-2.el8ost.noarch", "8Base-RHOSE-4.7:prometheus-promu-0:0.5.0-2.git642a960.el8.ppc64le", "8Base-RHOSE-4.7:prometheus-promu-0:0.5.0-2.git642a960.el8.s390x", "8Base-RHOSE-4.7:prometheus-promu-0:0.5.0-2.git642a960.el8.x86_64", "8Base-RHOSE-4.7:protobuf-0:3.6.1-4.el8ost.ppc64le", "8Base-RHOSE-4.7:protobuf-0:3.6.1-4.el8ost.s390x", "8Base-RHOSE-4.7:protobuf-0:3.6.1-4.el8ost.src", "8Base-RHOSE-4.7:protobuf-0:3.6.1-4.el8ost.x86_64", "8Base-RHOSE-4.7:protobuf-compiler-0:3.6.1-4.el8ost.ppc64le", "8Base-RHOSE-4.7:protobuf-compiler-0:3.6.1-4.el8ost.s390x", "8Base-RHOSE-4.7:protobuf-compiler-0:3.6.1-4.el8ost.x86_64", "8Base-RHOSE-4.7:protobuf-compiler-debuginfo-0:3.6.1-4.el8ost.ppc64le", "8Base-RHOSE-4.7:protobuf-compiler-debuginfo-0:3.6.1-4.el8ost.s390x", "8Base-RHOSE-4.7:protobuf-compiler-debuginfo-0:3.6.1-4.el8ost.x86_64", "8Base-RHOSE-4.7:protobuf-debuginfo-0:3.6.1-4.el8ost.ppc64le", "8Base-RHOSE-4.7:protobuf-debuginfo-0:3.6.1-4.el8ost.s390x", "8Base-RHOSE-4.7:protobuf-debuginfo-0:3.6.1-4.el8ost.x86_64", "8Base-RHOSE-4.7:protobuf-debugsource-0:3.6.1-4.el8ost.ppc64le", "8Base-RHOSE-4.7:protobuf-debugsource-0:3.6.1-4.el8ost.s390x", "8Base-RHOSE-4.7:protobuf-debugsource-0:3.6.1-4.el8ost.x86_64", "8Base-RHOSE-4.7:protobuf-devel-0:3.6.1-4.el8ost.ppc64le", "8Base-RHOSE-4.7:protobuf-devel-0:3.6.1-4.el8ost.s390x", "8Base-RHOSE-4.7:protobuf-devel-0:3.6.1-4.el8ost.x86_64", "8Base-RHOSE-4.7:protobuf-lite-0:3.6.1-4.el8ost.ppc64le", "8Base-RHOSE-4.7:protobuf-lite-0:3.6.1-4.el8ost.s390x", "8Base-RHOSE-4.7:protobuf-lite-0:3.6.1-4.el8ost.x86_64", "8Base-RHOSE-4.7:protobuf-lite-debuginfo-0:3.6.1-4.el8ost.ppc64le", "8Base-RHOSE-4.7:protobuf-lite-debuginfo-0:3.6.1-4.el8ost.s390x", "8Base-RHOSE-4.7:protobuf-lite-debuginfo-0:3.6.1-4.el8ost.x86_64", "8Base-RHOSE-4.7:protobuf-lite-devel-0:3.6.1-4.el8ost.ppc64le", "8Base-RHOSE-4.7:protobuf-lite-devel-0:3.6.1-4.el8ost.s390x", "8Base-RHOSE-4.7:protobuf-lite-devel-0:3.6.1-4.el8ost.x86_64", "8Base-RHOSE-4.7:protobuf-lite-static-0:3.6.1-4.el8ost.ppc64le", "8Base-RHOSE-4.7:protobuf-lite-static-0:3.6.1-4.el8ost.s390x", "8Base-RHOSE-4.7:protobuf-lite-static-0:3.6.1-4.el8ost.x86_64", "8Base-RHOSE-4.7:protobuf-static-0:3.6.1-4.el8ost.ppc64le", "8Base-RHOSE-4.7:protobuf-static-0:3.6.1-4.el8ost.s390x", "8Base-RHOSE-4.7:protobuf-static-0:3.6.1-4.el8ost.x86_64", "8Base-RHOSE-4.7:protobuf-vim-0:3.6.1-4.el8ost.noarch", "8Base-RHOSE-4.7:python-alembic-0:1.4.2-5.el8ost.src", "8Base-RHOSE-4.7:python-boto3-0:1.9.101-1.el8ost.src", "8Base-RHOSE-4.7:python-botocore-0:1.12.119-1.el8ost.src", "8Base-RHOSE-4.7:python-cachetools-0:3.1.0-1.el8ost.src", "8Base-RHOSE-4.7:python-certifi-0:2018.10.15-4.el8ost.src", "8Base-RHOSE-4.7:python-construct-0:2.10.56-1.el8ost.src", "8Base-RHOSE-4.7:python-daemon-0:2.1.2-9.el8ar.src", "8Base-RHOSE-4.7:python-debtcollector-0:2.2.0-0.20201008171245.649189d.el8.src", "8Base-RHOSE-4.7:python-dictdiffer-0:0.7.1-2.el8ost.src", "8Base-RHOSE-4.7:python-eventlet-0:0.25.2-3.el8ost.src", "8Base-RHOSE-4.7:python-flask-1:1.1.1-1.el8ost.src", "8Base-RHOSE-4.7:python-flask-doc-1:1.1.1-1.el8ost.noarch", "8Base-RHOSE-4.7:python-google-auth-0:1.3.0-1.el8ost.src", "8Base-RHOSE-4.7:python-hardware-0:0.23.0-0.20201031022149.59211cc.el8.src", "8Base-RHOSE-4.7:python-ifaddr-0:0.1.6-5.el8ost.src", "8Base-RHOSE-4.7:python-importlib-metadata-0:1.7.0-1.el8ost.src", "8Base-RHOSE-4.7:python-ironic-lib-0:4.4.1-0.20201218041209.aa7cfec.el8.src", "8Base-RHOSE-4.7:python-keystoneauth1-0:4.2.0-0.20200630234358.dab8e10.el8ost.src", "8Base-RHOSE-4.7:python-kubernetes-0:11.0.0-1.el8.src", "8Base-RHOSE-4.7:python-kuryr-lib-0:1.1.1-0.20190923160834.41e6964.el8ost.src", "8Base-RHOSE-4.7:python-lockfile-1:0.11.0-8.el8ar.src", "8Base-RHOSE-4.7:python-msgpack-0:0.6.2-1.el8ost.src", "8Base-RHOSE-4.7:python-msgpack-debugsource-0:0.6.2-1.el8ost.x86_64", "8Base-RHOSE-4.7:python-openshift-1:0.11.2-1.el8.src", "8Base-RHOSE-4.7:python-openstacksdk-0:0.48.0-0.20200708092906.3b693c2.el8ost.src", "8Base-RHOSE-4.7:python-oslo-concurrency-0:4.3.0-0.20201008180343.2f78803.el8.src", "8Base-RHOSE-4.7:python-oslo-concurrency-lang-0:4.3.0-0.20201008180343.2f78803.el8.noarch", "8Base-RHOSE-4.7:python-oslo-config-2:8.3.2-0.20201008180634.fcb8894.el8.src", "8Base-RHOSE-4.7:python-oslo-context-0:3.1.1-0.20201008190523.57dbded.el8.src", "8Base-RHOSE-4.7:python-oslo-db-0:8.4.0-0.20200918104110.e42c733.el8ost.src", "8Base-RHOSE-4.7:python-oslo-db-lang-0:8.4.0-0.20200918104110.e42c733.el8ost.noarch", "8Base-RHOSE-4.7:python-oslo-i18n-0:5.0.1-0.20201009131251.73187bd.el8.src", "8Base-RHOSE-4.7:python-oslo-i18n-lang-0:5.0.1-0.20201009131251.73187bd.el8.noarch", "8Base-RHOSE-4.7:python-oslo-log-0:4.3.1-0.20201207021200.1597f24.el8.src", "8Base-RHOSE-4.7:python-oslo-log-lang-0:4.3.1-0.20201207021200.1597f24.el8.noarch", "8Base-RHOSE-4.7:python-oslo-serialization-0:4.0.1-0.20201008182423.c7884b2.el8.src", "8Base-RHOSE-4.7:python-oslo-service-0:2.4.0-0.20201008184547.58466a6.el8.src", "8Base-RHOSE-4.7:python-oslo-utils-0:4.6.0-0.20201009175936.91497da.el8.src", "8Base-RHOSE-4.7:python-oslo-utils-lang-0:4.6.0-0.20201009175936.91497da.el8.noarch", "8Base-RHOSE-4.7:python-packaging-0:20.4-1.el8ost.src", "8Base-RHOSE-4.7:python-packaging-doc-0:20.4-1.el8ost.noarch", "8Base-RHOSE-4.7:python-paste-0:3.2.4-1.el8ost.src", "8Base-RHOSE-4.7:python-paste-deploy-0:2.0.1-4.el8ost.src", "8Base-RHOSE-4.7:python-pbr-0:5.4.3-2.el8ost.src", "8Base-RHOSE-4.7:python-pexpect-0:4.6-2.el8ar.src", "8Base-RHOSE-4.7:python-pint-0:0.10.1-1.el8ost.src", "8Base-RHOSE-4.7:python-psutil-0:5.6.6-1.el8ar.src", "8Base-RHOSE-4.7:python-psutil-debugsource-0:5.6.6-1.el8ar.ppc64le", "8Base-RHOSE-4.7:python-psutil-debugsource-0:5.6.6-1.el8ar.s390x", "8Base-RHOSE-4.7:python-psutil-debugsource-0:5.6.6-1.el8ar.x86_64", "8Base-RHOSE-4.7:python-pyghmi-0:1.5.14-2.1.el8ost.src", "8Base-RHOSE-4.7:python-pyroute2-0:0.5.13-1.el8ost.src", "8Base-RHOSE-4.7:python-requests-unixsocket-0:0.1.5-5.el8ar.src", "8Base-RHOSE-4.7:python-ruamel-yaml-0:0.15.41-4.el8ost.src", "8Base-RHOSE-4.7:python-ruamel-yaml-debugsource-0:0.15.41-4.el8ost.ppc64le", "8Base-RHOSE-4.7:python-ruamel-yaml-debugsource-0:0.15.41-4.el8ost.s390x", "8Base-RHOSE-4.7:python-ruamel-yaml-debugsource-0:0.15.41-4.el8ost.x86_64", "8Base-RHOSE-4.7:python-s3transfer-0:0.2.0-1.el8ost.src", "8Base-RHOSE-4.7:python-stevedore-0:3.2.2-0.20201009151242.274eaa6.el8.src", "8Base-RHOSE-4.7:python-string_utils-0:0.6.0-4.el8ost.src", "8Base-RHOSE-4.7:python-sushy-0:3.6.1-0.20210122201213.7ec0422.el8.src", "8Base-RHOSE-4.7:python-sushy-oem-idrac-0:0.0.3-0.20200922221223.1202372.el8ost.src", "8Base-RHOSE-4.7:python-tenacity-0:6.2.0-1.el8ost.src", "8Base-RHOSE-4.7:python-tooz-0:2.7.0-0.20200723133754.fca43df.el8ost.src", "8Base-RHOSE-4.7:python-websocket-client-0:0.54.0-1.el8ost.src", "8Base-RHOSE-4.7:python-werkzeug-0:1.0.1-3.el8ost.src", "8Base-RHOSE-4.7:python-zeroconf-0:0.24.4-1.el8ost.src", "8Base-RHOSE-4.7:python-zipp-0:0.5.1-2.el8ost.src", "8Base-RHOSE-4.7:python2-botocore-0:1.12.119-1.el8ost.noarch", "8Base-RHOSE-4.7:python2-cachetools-0:3.1.0-1.el8ost.noarch", "8Base-RHOSE-4.7:python3-alembic-0:1.4.2-5.el8ost.noarch", "8Base-RHOSE-4.7:python3-ansible-runner-0:1.4.6-2.el8ar.noarch", "8Base-RHOSE-4.7:python3-boto3-0:1.9.101-1.el8ost.noarch", "8Base-RHOSE-4.7:python3-botocore-0:1.12.119-1.el8ost.noarch", "8Base-RHOSE-4.7:python3-cachetools-0:3.1.0-1.el8ost.noarch", "8Base-RHOSE-4.7:python3-certifi-0:2018.10.15-4.el8ost.noarch", "8Base-RHOSE-4.7:python3-construct-0:2.10.56-1.el8ost.noarch", "8Base-RHOSE-4.7:python3-daemon-0:2.1.2-9.el8ar.noarch", "8Base-RHOSE-4.7:python3-debtcollector-0:2.2.0-0.20201008171245.649189d.el8.noarch", "8Base-RHOSE-4.7:python3-dictdiffer-0:0.7.1-2.el8ost.noarch", "8Base-RHOSE-4.7:python3-eventlet-0:0.25.2-3.el8ost.noarch", "8Base-RHOSE-4.7:python3-flask-1:1.1.1-1.el8ost.noarch", "8Base-RHOSE-4.7:python3-google-auth-0:1.3.0-1.el8ost.noarch", "8Base-RHOSE-4.7:python3-grpcio-0:1.18.0-4.el8ost.ppc64le", "8Base-RHOSE-4.7:python3-grpcio-0:1.18.0-4.el8ost.s390x", "8Base-RHOSE-4.7:python3-grpcio-0:1.18.0-4.el8ost.x86_64", "8Base-RHOSE-4.7:python3-grpcio-debuginfo-0:1.18.0-4.el8ost.ppc64le", "8Base-RHOSE-4.7:python3-grpcio-debuginfo-0:1.18.0-4.el8ost.s390x", "8Base-RHOSE-4.7:python3-grpcio-debuginfo-0:1.18.0-4.el8ost.x86_64", "8Base-RHOSE-4.7:python3-hardware-0:0.23.0-0.20201031022149.59211cc.el8.noarch", "8Base-RHOSE-4.7:python3-hardware-detect-0:0.23.0-0.20201031022149.59211cc.el8.noarch", "8Base-RHOSE-4.7:python3-ifaddr-0:0.1.6-5.el8ost.noarch", "8Base-RHOSE-4.7:python3-importlib-metadata-0:1.7.0-1.el8ost.noarch", "8Base-RHOSE-4.7:python3-ironic-inspector-tests-0:10.4.1-0.20201123161216.70fccec.el8.noarch", "8Base-RHOSE-4.7:python3-ironic-lib-0:4.4.1-0.20201218041209.aa7cfec.el8.noarch", "8Base-RHOSE-4.7:python3-ironic-python-agent-0:6.4.3-0.20201217171210.bd45db1.el8.noarch", "8Base-RHOSE-4.7:python3-ironic-tests-1:16.0.4-0.20210203051223.7d74ea0.el8.noarch", "8Base-RHOSE-4.7:python3-keystoneauth1-0:4.2.0-0.20200630234358.dab8e10.el8ost.noarch", "8Base-RHOSE-4.7:python3-kubernetes-0:11.0.0-1.el8.noarch", "8Base-RHOSE-4.7:python3-kubernetes-tests-0:11.0.0-1.el8.noarch", "8Base-RHOSE-4.7:python3-kuryr-kubernetes-0:4.7.0-202101262230.p0.git.2494.cd95ce5.el8.noarch", "8Base-RHOSE-4.7:python3-kuryr-lib-0:1.1.1-0.20190923160834.41e6964.el8ost.noarch", "8Base-RHOSE-4.7:python3-kuryr-lib-tests-0:1.1.1-0.20190923160834.41e6964.el8ost.noarch", "8Base-RHOSE-4.7:python3-lockfile-1:0.11.0-8.el8ar.noarch", "8Base-RHOSE-4.7:python3-msgpack-0:0.6.2-1.el8ost.x86_64", "8Base-RHOSE-4.7:python3-msgpack-debuginfo-0:0.6.2-1.el8ost.x86_64", "8Base-RHOSE-4.7:python3-openshift-1:0.11.2-1.el8.noarch", "8Base-RHOSE-4.7:python3-openstacksdk-0:0.48.0-0.20200708092906.3b693c2.el8ost.noarch", "8Base-RHOSE-4.7:python3-openstacksdk-tests-0:0.48.0-0.20200708092906.3b693c2.el8ost.noarch", "8Base-RHOSE-4.7:python3-openvswitch2.13-0:2.13.0-79.el8fdp.ppc64le", "8Base-RHOSE-4.7:python3-openvswitch2.13-0:2.13.0-79.el8fdp.s390x", "8Base-RHOSE-4.7:python3-openvswitch2.13-0:2.13.0-79.el8fdp.x86_64", "8Base-RHOSE-4.7:python3-openvswitch2.13-debuginfo-0:2.13.0-79.el8fdp.ppc64le", "8Base-RHOSE-4.7:python3-openvswitch2.13-debuginfo-0:2.13.0-79.el8fdp.s390x", "8Base-RHOSE-4.7:python3-openvswitch2.13-debuginfo-0:2.13.0-79.el8fdp.x86_64", "8Base-RHOSE-4.7:python3-oslo-concurrency-0:4.3.0-0.20201008180343.2f78803.el8.noarch", "8Base-RHOSE-4.7:python3-oslo-concurrency-tests-0:4.3.0-0.20201008180343.2f78803.el8.noarch", "8Base-RHOSE-4.7:python3-oslo-config-2:8.3.2-0.20201008180634.fcb8894.el8.noarch", "8Base-RHOSE-4.7:python3-oslo-context-0:3.1.1-0.20201008190523.57dbded.el8.noarch", "8Base-RHOSE-4.7:python3-oslo-context-tests-0:3.1.1-0.20201008190523.57dbded.el8.noarch", "8Base-RHOSE-4.7:python3-oslo-db-0:8.4.0-0.20200918104110.e42c733.el8ost.noarch", "8Base-RHOSE-4.7:python3-oslo-db-tests-0:8.4.0-0.20200918104110.e42c733.el8ost.noarch", "8Base-RHOSE-4.7:python3-oslo-i18n-0:5.0.1-0.20201009131251.73187bd.el8.noarch", "8Base-RHOSE-4.7:python3-oslo-log-0:4.3.1-0.20201207021200.1597f24.el8.noarch", "8Base-RHOSE-4.7:python3-oslo-log-tests-0:4.3.1-0.20201207021200.1597f24.el8.noarch", "8Base-RHOSE-4.7:python3-oslo-serialization-0:4.0.1-0.20201008182423.c7884b2.el8.noarch", "8Base-RHOSE-4.7:python3-oslo-serialization-tests-0:4.0.1-0.20201008182423.c7884b2.el8.noarch", "8Base-RHOSE-4.7:python3-oslo-service-0:2.4.0-0.20201008184547.58466a6.el8.noarch", "8Base-RHOSE-4.7:python3-oslo-service-tests-0:2.4.0-0.20201008184547.58466a6.el8.noarch", "8Base-RHOSE-4.7:python3-oslo-utils-0:4.6.0-0.20201009175936.91497da.el8.noarch", "8Base-RHOSE-4.7:python3-oslo-utils-tests-0:4.6.0-0.20201009175936.91497da.el8.noarch", "8Base-RHOSE-4.7:python3-packaging-0:20.4-1.el8ost.noarch", "8Base-RHOSE-4.7:python3-paste-0:3.2.4-1.el8ost.noarch", "8Base-RHOSE-4.7:python3-paste-deploy-0:2.0.1-4.el8ost.noarch", "8Base-RHOSE-4.7:python3-pbr-0:5.4.3-2.el8ost.noarch", "8Base-RHOSE-4.7:python3-pexpect-0:4.6-2.el8ar.noarch", "8Base-RHOSE-4.7:python3-pint-0:0.10.1-1.el8ost.noarch", "8Base-RHOSE-4.7:python3-protobuf-0:3.6.1-4.el8ost.noarch", "8Base-RHOSE-4.7:python3-psutil-0:5.6.6-1.el8ar.ppc64le", "8Base-RHOSE-4.7:python3-psutil-0:5.6.6-1.el8ar.s390x", "8Base-RHOSE-4.7:python3-psutil-0:5.6.6-1.el8ar.x86_64", "8Base-RHOSE-4.7:python3-psutil-debuginfo-0:5.6.6-1.el8ar.ppc64le", "8Base-RHOSE-4.7:python3-psutil-debuginfo-0:5.6.6-1.el8ar.s390x", "8Base-RHOSE-4.7:python3-psutil-debuginfo-0:5.6.6-1.el8ar.x86_64", "8Base-RHOSE-4.7:python3-pyghmi-0:1.5.14-2.1.el8ost.noarch", "8Base-RHOSE-4.7:python3-pyroute2-0:0.5.13-1.el8ost.noarch", "8Base-RHOSE-4.7:python3-requests-unixsocket-0:0.1.5-5.el8ar.noarch", "8Base-RHOSE-4.7:python3-ruamel-yaml-0:0.15.41-4.el8ost.ppc64le", "8Base-RHOSE-4.7:python3-ruamel-yaml-0:0.15.41-4.el8ost.s390x", "8Base-RHOSE-4.7:python3-ruamel-yaml-0:0.15.41-4.el8ost.x86_64", "8Base-RHOSE-4.7:python3-ruamel-yaml-debuginfo-0:0.15.41-4.el8ost.ppc64le", "8Base-RHOSE-4.7:python3-ruamel-yaml-debuginfo-0:0.15.41-4.el8ost.s390x", "8Base-RHOSE-4.7:python3-ruamel-yaml-debuginfo-0:0.15.41-4.el8ost.x86_64", "8Base-RHOSE-4.7:python3-s3transfer-0:0.2.0-1.el8ost.noarch", "8Base-RHOSE-4.7:python3-stevedore-0:3.2.2-0.20201009151242.274eaa6.el8.noarch", "8Base-RHOSE-4.7:python3-string_utils-0:0.6.0-4.el8ost.noarch", "8Base-RHOSE-4.7:python3-sushy-0:3.6.1-0.20210122201213.7ec0422.el8.noarch", "8Base-RHOSE-4.7:python3-sushy-oem-idrac-0:0.0.3-0.20200922221223.1202372.el8ost.noarch", "8Base-RHOSE-4.7:python3-sushy-oem-idrac-tests-0:0.0.3-0.20200922221223.1202372.el8ost.noarch", "8Base-RHOSE-4.7:python3-sushy-tests-0:3.6.1-0.20210122201213.7ec0422.el8.noarch", "8Base-RHOSE-4.7:python3-tenacity-0:6.2.0-1.el8ost.noarch", "8Base-RHOSE-4.7:python3-tooz-0:2.7.0-0.20200723133754.fca43df.el8ost.noarch", "8Base-RHOSE-4.7:python3-websocket-client-0:0.54.0-1.el8ost.noarch", "8Base-RHOSE-4.7:python3-werkzeug-0:1.0.1-3.el8ost.noarch", "8Base-RHOSE-4.7:python3-zeroconf-0:0.24.4-1.el8ost.noarch", "8Base-RHOSE-4.7:python3-zipp-0:0.5.1-2.el8ost.noarch", "8Base-RHOSE-4.7:redhat-release-coreos-0:47.83-1.el8.ppc64le", "8Base-RHOSE-4.7:redhat-release-coreos-0:47.83-1.el8.s390x", "8Base-RHOSE-4.7:redhat-release-coreos-0:47.83-1.el8.src", "8Base-RHOSE-4.7:redhat-release-coreos-0:47.83-1.el8.x86_64", "8Base-RHOSE-4.7:rhcos-tools-0:0.0.0-1.rhaos4.2.el8.noarch", "8Base-RHOSE-4.7:rhcos-tools-0:0.0.0-1.rhaos4.2.el8.src", "8Base-RHOSE-4.7:rhosp-director-images-0:17.0-20200606.1.el8ost.noarch", "8Base-RHOSE-4.7:rhosp-director-images-0:17.0-20200606.1.el8ost.src", "8Base-RHOSE-4.7:rhosp-director-images-all-0:17.0-20200606.1.el8ost.noarch", "8Base-RHOSE-4.7:rhosp-director-images-ipa-0:17.0-20200606.1.el8ost.noarch", "8Base-RHOSE-4.7:rhosp-director-images-ipa-ppc64le-0:17.0-20200606.1.el8ost.noarch", "8Base-RHOSE-4.7:rhosp-director-images-ipa-x86_64-0:17.0-20200606.1.el8ost.noarch", "8Base-RHOSE-4.7:rhosp-director-images-minimal-0:17.0-20200606.1.el8ost.noarch", "8Base-RHOSE-4.7:rhosp-director-images-ppc64le-0:17.0-20200606.1.el8ost.noarch", "8Base-RHOSE-4.7:rhosp-director-images-x86_64-0:17.0-20200606.1.el8ost.noarch", "8Base-RHOSE-4.7:rpm-ostree-0:2020.7-1.el8_3.ppc64le", "8Base-RHOSE-4.7:rpm-ostree-0:2020.7-1.el8_3.s390x", "8Base-RHOSE-4.7:rpm-ostree-0:2020.7-1.el8_3.src", "8Base-RHOSE-4.7:rpm-ostree-0:2020.7-1.el8_3.x86_64", "8Base-RHOSE-4.7:rpm-ostree-debuginfo-0:2020.7-1.el8_3.ppc64le", "8Base-RHOSE-4.7:rpm-ostree-debuginfo-0:2020.7-1.el8_3.s390x", "8Base-RHOSE-4.7:rpm-ostree-debuginfo-0:2020.7-1.el8_3.x86_64", "8Base-RHOSE-4.7:rpm-ostree-debugsource-0:2020.7-1.el8_3.ppc64le", "8Base-RHOSE-4.7:rpm-ostree-debugsource-0:2020.7-1.el8_3.s390x", "8Base-RHOSE-4.7:rpm-ostree-debugsource-0:2020.7-1.el8_3.x86_64", "8Base-RHOSE-4.7:rpm-ostree-devel-0:2020.7-1.el8_3.ppc64le", "8Base-RHOSE-4.7:rpm-ostree-devel-0:2020.7-1.el8_3.s390x", "8Base-RHOSE-4.7:rpm-ostree-devel-0:2020.7-1.el8_3.x86_64", "8Base-RHOSE-4.7:rpm-ostree-libs-0:2020.7-1.el8_3.ppc64le", "8Base-RHOSE-4.7:rpm-ostree-libs-0:2020.7-1.el8_3.s390x", "8Base-RHOSE-4.7:rpm-ostree-libs-0:2020.7-1.el8_3.x86_64", "8Base-RHOSE-4.7:rpm-ostree-libs-debuginfo-0:2020.7-1.el8_3.ppc64le", "8Base-RHOSE-4.7:rpm-ostree-libs-debuginfo-0:2020.7-1.el8_3.s390x", "8Base-RHOSE-4.7:rpm-ostree-libs-debuginfo-0:2020.7-1.el8_3.x86_64", "8Base-RHOSE-4.7:runc-0:1.0.0-82.rhaos4.6.git086e841.el8.ppc64le", "8Base-RHOSE-4.7:runc-0:1.0.0-82.rhaos4.6.git086e841.el8.s390x", "8Base-RHOSE-4.7:runc-0:1.0.0-82.rhaos4.6.git086e841.el8.src", "8Base-RHOSE-4.7:runc-0:1.0.0-82.rhaos4.6.git086e841.el8.x86_64", "8Base-RHOSE-4.7:runc-debuginfo-0:1.0.0-82.rhaos4.6.git086e841.el8.ppc64le", "8Base-RHOSE-4.7:runc-debuginfo-0:1.0.0-82.rhaos4.6.git086e841.el8.s390x", "8Base-RHOSE-4.7:runc-debuginfo-0:1.0.0-82.rhaos4.6.git086e841.el8.x86_64", "8Base-RHOSE-4.7:runc-debugsource-0:1.0.0-82.rhaos4.6.git086e841.el8.ppc64le", "8Base-RHOSE-4.7:runc-debugsource-0:1.0.0-82.rhaos4.6.git086e841.el8.s390x", "8Base-RHOSE-4.7:runc-debugsource-0:1.0.0-82.rhaos4.6.git086e841.el8.x86_64", "8Base-RHOSE-4.7:rust-afterburn-0:4.6.0-1.rhaos4.7.el8.src", "8Base-RHOSE-4.7:rust-afterburn-debugsource-0:4.6.0-1.rhaos4.7.el8.ppc64le", "8Base-RHOSE-4.7:rust-afterburn-debugsource-0:4.6.0-1.rhaos4.7.el8.s390x", "8Base-RHOSE-4.7:rust-afterburn-debugsource-0:4.6.0-1.rhaos4.7.el8.x86_64", "8Base-RHOSE-4.7:rust-bootupd-0:0.2.5-2.el8.src", "8Base-RHOSE-4.7:rust-bootupd-debugsource-0:0.2.5-2.el8.x86_64", "8Base-RHOSE-4.7:tini-0:0.16.1-1.el8ar.ppc64le", "8Base-RHOSE-4.7:tini-0:0.16.1-1.el8ar.s390x", "8Base-RHOSE-4.7:tini-0:0.16.1-1.el8ar.src", "8Base-RHOSE-4.7:tini-0:0.16.1-1.el8ar.x86_64", "8Base-RHOSE-4.7:toolbox-0:0.0.8-3.rhaos4.7.el8.noarch", "8Base-RHOSE-4.7:toolbox-0:0.0.8-3.rhaos4.7.el8.src" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-25658" }, { "category": "external", "summary": "RHBZ#1889972", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1889972" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-25658", "url": "https://www.cve.org/CVERecord?id=CVE-2020-25658" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-25658", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-25658" }, { "category": "external", "summary": "https://github.com/sybrenstuvel/python-rsa/issues/165", "url": "https://github.com/sybrenstuvel/python-rsa/issues/165" } ], "release_date": "2020-11-09T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-02-24T14:45:13+00:00", "details": "For OpenShift Container Platform 4.7 see the following documentation, which\nwill be updated shortly for this release, for important instructions on how\nto upgrade your cluster and fully apply this asynchronous errata update:\n\nhttps://docs.openshift.com/container-platform/4.7/release_notes/ocp-4-7-release-notes.html\n\nDetails on how to access this content are available at\nhttps://docs.openshift.com/container-platform/4.7/updating/updating-cluster-cli.html.", "product_ids": [ "8Base-RHOSE-4.7:python-rsa-0:4.7-1.el8.src", "8Base-RHOSE-4.7:python3-rsa-0:4.7-1.el8.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:5634" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "8Base-RHOSE-4.7:python-rsa-0:4.7-1.el8.src", "8Base-RHOSE-4.7:python3-rsa-0:4.7-1.el8.noarch" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "python-rsa: bleichenbacher timing oracle attack against RSA decryption" }, { "cve": "CVE-2020-28362", "cwe": { "id": "CWE-295", "name": "Improper Certificate Validation" }, "discovery_date": "2020-11-12T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "7Server-RH7-RHOSE-4.7:conmon-2:2.0.21-2.rhaos4.6.el7.src", "7Server-RH7-RHOSE-4.7:conmon-2:2.0.21-2.rhaos4.6.el7.x86_64", "7Server-RH7-RHOSE-4.7:containernetworking-plugins-0:0.8.6-1.rhaos4.5.el7.src", "7Server-RH7-RHOSE-4.7:containernetworking-plugins-0:0.8.6-1.rhaos4.5.el7.x86_64", "7Server-RH7-RHOSE-4.7:containernetworking-plugins-debuginfo-0:0.8.6-1.rhaos4.5.el7.x86_64", "7Server-RH7-RHOSE-4.7:cri-o-0:1.20.0-0.rhaos4.7.git8921e00.el7.51.src", "7Server-RH7-RHOSE-4.7:cri-o-0:1.20.0-0.rhaos4.7.git8921e00.el7.51.x86_64", "7Server-RH7-RHOSE-4.7:cri-o-debuginfo-0:1.20.0-0.rhaos4.7.git8921e00.el7.51.x86_64", "7Server-RH7-RHOSE-4.7:cri-tools-0:1.18.0-3.el7.src", "7Server-RH7-RHOSE-4.7:cri-tools-0:1.18.0-3.el7.x86_64", "7Server-RH7-RHOSE-4.7:cri-tools-debuginfo-0:1.18.0-3.el7.x86_64", "7Server-RH7-RHOSE-4.7:haproxy-0:2.0.19-1.el7.src", "7Server-RH7-RHOSE-4.7:haproxy-debuginfo-0:2.0.19-1.el7.x86_64", "7Server-RH7-RHOSE-4.7:haproxy20-0:2.0.19-1.el7.x86_64", "7Server-RH7-RHOSE-4.7:jq-0:1.6-2.el7.src", "7Server-RH7-RHOSE-4.7:jq-0:1.6-2.el7.x86_64", "7Server-RH7-RHOSE-4.7:jq-debuginfo-0:1.6-2.el7.x86_64", "7Server-RH7-RHOSE-4.7:jq-devel-0:1.6-2.el7.x86_64", "7Server-RH7-RHOSE-4.7:oniguruma-0:5.9.2-5.el7.src", "7Server-RH7-RHOSE-4.7:oniguruma-0:5.9.2-5.el7.x86_64", "7Server-RH7-RHOSE-4.7:oniguruma-debuginfo-0:5.9.2-5.el7.x86_64", "7Server-RH7-RHOSE-4.7:oniguruma-devel-0:5.9.2-5.el7.x86_64", "7Server-RH7-RHOSE-4.7:openshift-0:4.7.0-202102060108.p0.git.97095.7271b90.el7.src", "7Server-RH7-RHOSE-4.7:openshift-ansible-0:4.7.0-202102032256.p0.git.0.bf7d9a7.el7.noarch", "7Server-RH7-RHOSE-4.7:openshift-ansible-0:4.7.0-202102032256.p0.git.0.bf7d9a7.el7.src", "7Server-RH7-RHOSE-4.7:openshift-ansible-test-0:4.7.0-202102032256.p0.git.0.bf7d9a7.el7.noarch", "7Server-RH7-RHOSE-4.7:openshift-clients-0:4.7.0-202102032256.p0.git.3951.0e656ef.el7.src", "7Server-RH7-RHOSE-4.7:openshift-clients-0:4.7.0-202102032256.p0.git.3951.0e656ef.el7.x86_64", "7Server-RH7-RHOSE-4.7:openshift-clients-redistributable-0:4.7.0-202102032256.p0.git.3951.0e656ef.el7.x86_64", "7Server-RH7-RHOSE-4.7:openshift-hyperkube-0:4.7.0-202102060108.p0.git.97095.7271b90.el7.x86_64", "7Server-RH7-RHOSE-4.7:python-botocore-0:1.4.57-5.el7.src", "7Server-RH7-RHOSE-4.7:python2-botocore-0:1.4.57-5.el7.noarch", "7Server-RH7-RHOSE-4.7:runc-0:1.0.0-82.rhaos4.6.git086e841.el7.src", "7Server-RH7-RHOSE-4.7:runc-0:1.0.0-82.rhaos4.6.git086e841.el7.x86_64", "7Server-RH7-RHOSE-4.7:runc-debuginfo-0:1.0.0-82.rhaos4.6.git086e841.el7.x86_64", "8Base-RHOSE-4.7:NetworkManager-1:1.26.0-12.1.rhaos4.7.el8.ppc64le", "8Base-RHOSE-4.7:NetworkManager-1:1.26.0-12.1.rhaos4.7.el8.s390x", "8Base-RHOSE-4.7:NetworkManager-1:1.26.0-12.1.rhaos4.7.el8.src", "8Base-RHOSE-4.7:NetworkManager-1:1.26.0-12.1.rhaos4.7.el8.x86_64", "8Base-RHOSE-4.7:NetworkManager-adsl-1:1.26.0-12.1.rhaos4.7.el8.ppc64le", "8Base-RHOSE-4.7:NetworkManager-adsl-1:1.26.0-12.1.rhaos4.7.el8.s390x", "8Base-RHOSE-4.7:NetworkManager-adsl-1:1.26.0-12.1.rhaos4.7.el8.x86_64", "8Base-RHOSE-4.7:NetworkManager-adsl-debuginfo-1:1.26.0-12.1.rhaos4.7.el8.ppc64le", "8Base-RHOSE-4.7:NetworkManager-adsl-debuginfo-1:1.26.0-12.1.rhaos4.7.el8.s390x", "8Base-RHOSE-4.7:NetworkManager-adsl-debuginfo-1:1.26.0-12.1.rhaos4.7.el8.x86_64", "8Base-RHOSE-4.7:NetworkManager-bluetooth-1:1.26.0-12.1.rhaos4.7.el8.ppc64le", "8Base-RHOSE-4.7:NetworkManager-bluetooth-1:1.26.0-12.1.rhaos4.7.el8.s390x", "8Base-RHOSE-4.7:NetworkManager-bluetooth-1:1.26.0-12.1.rhaos4.7.el8.x86_64", "8Base-RHOSE-4.7:NetworkManager-bluetooth-debuginfo-1:1.26.0-12.1.rhaos4.7.el8.ppc64le", "8Base-RHOSE-4.7:NetworkManager-bluetooth-debuginfo-1:1.26.0-12.1.rhaos4.7.el8.s390x", "8Base-RHOSE-4.7:NetworkManager-bluetooth-debuginfo-1:1.26.0-12.1.rhaos4.7.el8.x86_64", "8Base-RHOSE-4.7:NetworkManager-cloud-setup-1:1.26.0-12.1.rhaos4.7.el8.ppc64le", "8Base-RHOSE-4.7:NetworkManager-cloud-setup-1:1.26.0-12.1.rhaos4.7.el8.s390x", "8Base-RHOSE-4.7:NetworkManager-cloud-setup-1:1.26.0-12.1.rhaos4.7.el8.x86_64", "8Base-RHOSE-4.7:NetworkManager-cloud-setup-debuginfo-1:1.26.0-12.1.rhaos4.7.el8.ppc64le", "8Base-RHOSE-4.7:NetworkManager-cloud-setup-debuginfo-1:1.26.0-12.1.rhaos4.7.el8.s390x", "8Base-RHOSE-4.7:NetworkManager-cloud-setup-debuginfo-1:1.26.0-12.1.rhaos4.7.el8.x86_64", "8Base-RHOSE-4.7:NetworkManager-config-connectivity-redhat-1:1.26.0-12.1.rhaos4.7.el8.noarch", "8Base-RHOSE-4.7:NetworkManager-config-server-1:1.26.0-12.1.rhaos4.7.el8.noarch", "8Base-RHOSE-4.7:NetworkManager-debuginfo-1:1.26.0-12.1.rhaos4.7.el8.ppc64le", "8Base-RHOSE-4.7:NetworkManager-debuginfo-1:1.26.0-12.1.rhaos4.7.el8.s390x", "8Base-RHOSE-4.7:NetworkManager-debuginfo-1:1.26.0-12.1.rhaos4.7.el8.x86_64", "8Base-RHOSE-4.7:NetworkManager-debugsource-1:1.26.0-12.1.rhaos4.7.el8.ppc64le", "8Base-RHOSE-4.7:NetworkManager-debugsource-1:1.26.0-12.1.rhaos4.7.el8.s390x", "8Base-RHOSE-4.7:NetworkManager-debugsource-1:1.26.0-12.1.rhaos4.7.el8.x86_64", "8Base-RHOSE-4.7:NetworkManager-dispatcher-routing-rules-1:1.26.0-12.1.rhaos4.7.el8.noarch", "8Base-RHOSE-4.7:NetworkManager-libnm-1:1.26.0-12.1.rhaos4.7.el8.ppc64le", "8Base-RHOSE-4.7:NetworkManager-libnm-1:1.26.0-12.1.rhaos4.7.el8.s390x", "8Base-RHOSE-4.7:NetworkManager-libnm-1:1.26.0-12.1.rhaos4.7.el8.x86_64", "8Base-RHOSE-4.7:NetworkManager-libnm-debuginfo-1:1.26.0-12.1.rhaos4.7.el8.ppc64le", "8Base-RHOSE-4.7:NetworkManager-libnm-debuginfo-1:1.26.0-12.1.rhaos4.7.el8.s390x", "8Base-RHOSE-4.7:NetworkManager-libnm-debuginfo-1:1.26.0-12.1.rhaos4.7.el8.x86_64", "8Base-RHOSE-4.7:NetworkManager-libnm-devel-1:1.26.0-12.1.rhaos4.7.el8.ppc64le", "8Base-RHOSE-4.7:NetworkManager-libnm-devel-1:1.26.0-12.1.rhaos4.7.el8.s390x", "8Base-RHOSE-4.7:NetworkManager-libnm-devel-1:1.26.0-12.1.rhaos4.7.el8.x86_64", "8Base-RHOSE-4.7:NetworkManager-ovs-1:1.26.0-12.1.rhaos4.7.el8.ppc64le", "8Base-RHOSE-4.7:NetworkManager-ovs-1:1.26.0-12.1.rhaos4.7.el8.s390x", "8Base-RHOSE-4.7:NetworkManager-ovs-1:1.26.0-12.1.rhaos4.7.el8.x86_64", "8Base-RHOSE-4.7:NetworkManager-ovs-debuginfo-1:1.26.0-12.1.rhaos4.7.el8.ppc64le", "8Base-RHOSE-4.7:NetworkManager-ovs-debuginfo-1:1.26.0-12.1.rhaos4.7.el8.s390x", "8Base-RHOSE-4.7:NetworkManager-ovs-debuginfo-1:1.26.0-12.1.rhaos4.7.el8.x86_64", "8Base-RHOSE-4.7:NetworkManager-ppp-1:1.26.0-12.1.rhaos4.7.el8.ppc64le", "8Base-RHOSE-4.7:NetworkManager-ppp-1:1.26.0-12.1.rhaos4.7.el8.s390x", "8Base-RHOSE-4.7:NetworkManager-ppp-1:1.26.0-12.1.rhaos4.7.el8.x86_64", "8Base-RHOSE-4.7:NetworkManager-ppp-debuginfo-1:1.26.0-12.1.rhaos4.7.el8.ppc64le", "8Base-RHOSE-4.7:NetworkManager-ppp-debuginfo-1:1.26.0-12.1.rhaos4.7.el8.s390x", "8Base-RHOSE-4.7:NetworkManager-ppp-debuginfo-1:1.26.0-12.1.rhaos4.7.el8.x86_64", "8Base-RHOSE-4.7:NetworkManager-team-1:1.26.0-12.1.rhaos4.7.el8.ppc64le", "8Base-RHOSE-4.7:NetworkManager-team-1:1.26.0-12.1.rhaos4.7.el8.s390x", "8Base-RHOSE-4.7:NetworkManager-team-1:1.26.0-12.1.rhaos4.7.el8.x86_64", "8Base-RHOSE-4.7:NetworkManager-team-debuginfo-1:1.26.0-12.1.rhaos4.7.el8.ppc64le", "8Base-RHOSE-4.7:NetworkManager-team-debuginfo-1:1.26.0-12.1.rhaos4.7.el8.s390x", "8Base-RHOSE-4.7:NetworkManager-team-debuginfo-1:1.26.0-12.1.rhaos4.7.el8.x86_64", "8Base-RHOSE-4.7:NetworkManager-tui-1:1.26.0-12.1.rhaos4.7.el8.ppc64le", "8Base-RHOSE-4.7:NetworkManager-tui-1:1.26.0-12.1.rhaos4.7.el8.s390x", "8Base-RHOSE-4.7:NetworkManager-tui-1:1.26.0-12.1.rhaos4.7.el8.x86_64", "8Base-RHOSE-4.7:NetworkManager-tui-debuginfo-1:1.26.0-12.1.rhaos4.7.el8.ppc64le", "8Base-RHOSE-4.7:NetworkManager-tui-debuginfo-1:1.26.0-12.1.rhaos4.7.el8.s390x", "8Base-RHOSE-4.7:NetworkManager-tui-debuginfo-1:1.26.0-12.1.rhaos4.7.el8.x86_64", "8Base-RHOSE-4.7:NetworkManager-wifi-1:1.26.0-12.1.rhaos4.7.el8.ppc64le", "8Base-RHOSE-4.7:NetworkManager-wifi-1:1.26.0-12.1.rhaos4.7.el8.s390x", "8Base-RHOSE-4.7:NetworkManager-wifi-1:1.26.0-12.1.rhaos4.7.el8.x86_64", "8Base-RHOSE-4.7:NetworkManager-wifi-debuginfo-1:1.26.0-12.1.rhaos4.7.el8.ppc64le", "8Base-RHOSE-4.7:NetworkManager-wifi-debuginfo-1:1.26.0-12.1.rhaos4.7.el8.s390x", "8Base-RHOSE-4.7:NetworkManager-wifi-debuginfo-1:1.26.0-12.1.rhaos4.7.el8.x86_64", "8Base-RHOSE-4.7:NetworkManager-wwan-1:1.26.0-12.1.rhaos4.7.el8.ppc64le", "8Base-RHOSE-4.7:NetworkManager-wwan-1:1.26.0-12.1.rhaos4.7.el8.s390x", "8Base-RHOSE-4.7:NetworkManager-wwan-1:1.26.0-12.1.rhaos4.7.el8.x86_64", "8Base-RHOSE-4.7:NetworkManager-wwan-debuginfo-1:1.26.0-12.1.rhaos4.7.el8.ppc64le", "8Base-RHOSE-4.7:NetworkManager-wwan-debuginfo-1:1.26.0-12.1.rhaos4.7.el8.s390x", "8Base-RHOSE-4.7:NetworkManager-wwan-debuginfo-1:1.26.0-12.1.rhaos4.7.el8.x86_64", "8Base-RHOSE-4.7:afterburn-0:4.6.0-1.rhaos4.7.el8.ppc64le", "8Base-RHOSE-4.7:afterburn-0:4.6.0-1.rhaos4.7.el8.s390x", "8Base-RHOSE-4.7:afterburn-0:4.6.0-1.rhaos4.7.el8.x86_64", "8Base-RHOSE-4.7:afterburn-debuginfo-0:4.6.0-1.rhaos4.7.el8.ppc64le", "8Base-RHOSE-4.7:afterburn-debuginfo-0:4.6.0-1.rhaos4.7.el8.s390x", "8Base-RHOSE-4.7:afterburn-debuginfo-0:4.6.0-1.rhaos4.7.el8.x86_64", "8Base-RHOSE-4.7:ansible-runner-0:1.4.6-2.el8ar.noarch", "8Base-RHOSE-4.7:ansible-runner-0:1.4.6-2.el8ar.src", "8Base-RHOSE-4.7:ansible-runner-http-0:1.0.0-2.el8ar.noarch", "8Base-RHOSE-4.7:ansible-runner-http-0:1.0.0-2.el8ar.src", "8Base-RHOSE-4.7:atomic-openshift-service-idler-0:4.7.0-202011171454.p0.git.15.675c1c8.el8.ppc64le", "8Base-RHOSE-4.7:atomic-openshift-service-idler-0:4.7.0-202011171454.p0.git.15.675c1c8.el8.s390x", "8Base-RHOSE-4.7:atomic-openshift-service-idler-0:4.7.0-202011171454.p0.git.15.675c1c8.el8.src", "8Base-RHOSE-4.7:atomic-openshift-service-idler-0:4.7.0-202011171454.p0.git.15.675c1c8.el8.x86_64", "8Base-RHOSE-4.7:bootupd-0:0.2.5-2.el8.x86_64", "8Base-RHOSE-4.7:bootupd-debuginfo-0:0.2.5-2.el8.x86_64", "8Base-RHOSE-4.7:clevis-0:15-1.el8.ppc64le", "8Base-RHOSE-4.7:clevis-0:15-1.el8.s390x", "8Base-RHOSE-4.7:clevis-0:15-1.el8.src", "8Base-RHOSE-4.7:clevis-0:15-1.el8.x86_64", "8Base-RHOSE-4.7:clevis-debuginfo-0:15-1.el8.ppc64le", "8Base-RHOSE-4.7:clevis-debuginfo-0:15-1.el8.s390x", "8Base-RHOSE-4.7:clevis-debuginfo-0:15-1.el8.x86_64", "8Base-RHOSE-4.7:clevis-debugsource-0:15-1.el8.ppc64le", "8Base-RHOSE-4.7:clevis-debugsource-0:15-1.el8.s390x", "8Base-RHOSE-4.7:clevis-debugsource-0:15-1.el8.x86_64", "8Base-RHOSE-4.7:clevis-dracut-0:15-1.el8.ppc64le", "8Base-RHOSE-4.7:clevis-dracut-0:15-1.el8.s390x", "8Base-RHOSE-4.7:clevis-dracut-0:15-1.el8.x86_64", "8Base-RHOSE-4.7:clevis-luks-0:15-1.el8.ppc64le", "8Base-RHOSE-4.7:clevis-luks-0:15-1.el8.s390x", "8Base-RHOSE-4.7:clevis-luks-0:15-1.el8.x86_64", "8Base-RHOSE-4.7:clevis-systemd-0:15-1.el8.ppc64le", "8Base-RHOSE-4.7:clevis-systemd-0:15-1.el8.s390x", "8Base-RHOSE-4.7:clevis-systemd-0:15-1.el8.x86_64", "8Base-RHOSE-4.7:clevis-udisks2-0:15-1.el8.ppc64le", "8Base-RHOSE-4.7:clevis-udisks2-0:15-1.el8.s390x", "8Base-RHOSE-4.7:clevis-udisks2-0:15-1.el8.x86_64", "8Base-RHOSE-4.7:clevis-udisks2-debuginfo-0:15-1.el8.ppc64le", "8Base-RHOSE-4.7:clevis-udisks2-debuginfo-0:15-1.el8.s390x", "8Base-RHOSE-4.7:clevis-udisks2-debuginfo-0:15-1.el8.x86_64", "8Base-RHOSE-4.7:conmon-2:2.0.21-2.rhaos4.6.el8.ppc64le", "8Base-RHOSE-4.7:conmon-2:2.0.21-2.rhaos4.6.el8.s390x", "8Base-RHOSE-4.7:conmon-2:2.0.21-2.rhaos4.6.el8.src", "8Base-RHOSE-4.7:conmon-2:2.0.21-2.rhaos4.6.el8.x86_64", "8Base-RHOSE-4.7:console-login-helper-messages-0:0.20.3-1.rhaos4.7.el8.noarch", "8Base-RHOSE-4.7:console-login-helper-messages-0:0.20.3-1.rhaos4.7.el8.src", "8Base-RHOSE-4.7:console-login-helper-messages-issuegen-0:0.20.3-1.rhaos4.7.el8.noarch", "8Base-RHOSE-4.7:console-login-helper-messages-profile-0:0.20.3-1.rhaos4.7.el8.noarch", "8Base-RHOSE-4.7:container-selinux-2:2.151.0-1.rhaos4.7.el8.noarch", "8Base-RHOSE-4.7:container-selinux-2:2.151.0-1.rhaos4.7.el8.src", "8Base-RHOSE-4.7:containernetworking-plugins-0:0.8.6-1.rhaos4.5.el8.ppc64le", "8Base-RHOSE-4.7:containernetworking-plugins-0:0.8.6-1.rhaos4.5.el8.s390x", "8Base-RHOSE-4.7:containernetworking-plugins-0:0.8.6-1.rhaos4.5.el8.src", "8Base-RHOSE-4.7:containernetworking-plugins-0:0.8.6-1.rhaos4.5.el8.x86_64", "8Base-RHOSE-4.7:containernetworking-plugins-debuginfo-0:0.8.6-1.rhaos4.5.el8.ppc64le", "8Base-RHOSE-4.7:containernetworking-plugins-debuginfo-0:0.8.6-1.rhaos4.5.el8.s390x", "8Base-RHOSE-4.7:containernetworking-plugins-debuginfo-0:0.8.6-1.rhaos4.5.el8.x86_64", "8Base-RHOSE-4.7:containernetworking-plugins-debugsource-0:0.8.6-1.rhaos4.5.el8.ppc64le", "8Base-RHOSE-4.7:containernetworking-plugins-debugsource-0:0.8.6-1.rhaos4.5.el8.s390x", "8Base-RHOSE-4.7:containernetworking-plugins-debugsource-0:0.8.6-1.rhaos4.5.el8.x86_64", "8Base-RHOSE-4.7:coreos-installer-0:0.8.0-3.rhaos4.7.el8.ppc64le", "8Base-RHOSE-4.7:coreos-installer-0:0.8.0-3.rhaos4.7.el8.s390x", "8Base-RHOSE-4.7:coreos-installer-0:0.8.0-3.rhaos4.7.el8.src", "8Base-RHOSE-4.7:coreos-installer-0:0.8.0-3.rhaos4.7.el8.x86_64", "8Base-RHOSE-4.7:coreos-installer-bootinfra-0:0.8.0-3.rhaos4.7.el8.ppc64le", "8Base-RHOSE-4.7:coreos-installer-bootinfra-0:0.8.0-3.rhaos4.7.el8.s390x", "8Base-RHOSE-4.7:coreos-installer-bootinfra-debuginfo-0:0.8.0-3.rhaos4.7.el8.ppc64le", "8Base-RHOSE-4.7:coreos-installer-bootinfra-debuginfo-0:0.8.0-3.rhaos4.7.el8.s390x", "8Base-RHOSE-4.7:coreos-installer-bootinfra-debuginfo-0:0.8.0-3.rhaos4.7.el8.x86_64", "8Base-RHOSE-4.7:coreos-installer-debuginfo-0:0.8.0-3.rhaos4.7.el8.ppc64le", "8Base-RHOSE-4.7:coreos-installer-debuginfo-0:0.8.0-3.rhaos4.7.el8.s390x", "8Base-RHOSE-4.7:coreos-installer-debuginfo-0:0.8.0-3.rhaos4.7.el8.x86_64", "8Base-RHOSE-4.7:coreos-installer-debugsource-0:0.8.0-3.rhaos4.7.el8.ppc64le", "8Base-RHOSE-4.7:coreos-installer-debugsource-0:0.8.0-3.rhaos4.7.el8.s390x", "8Base-RHOSE-4.7:coreos-installer-debugsource-0:0.8.0-3.rhaos4.7.el8.x86_64", "8Base-RHOSE-4.7:cri-o-0:1.20.0-0.rhaos4.7.git8921e00.el8.51.ppc64le", "8Base-RHOSE-4.7:cri-o-0:1.20.0-0.rhaos4.7.git8921e00.el8.51.s390x", "8Base-RHOSE-4.7:cri-o-0:1.20.0-0.rhaos4.7.git8921e00.el8.51.src", "8Base-RHOSE-4.7:cri-o-0:1.20.0-0.rhaos4.7.git8921e00.el8.51.x86_64", "8Base-RHOSE-4.7:cri-o-debuginfo-0:1.20.0-0.rhaos4.7.git8921e00.el8.51.ppc64le", "8Base-RHOSE-4.7:cri-o-debuginfo-0:1.20.0-0.rhaos4.7.git8921e00.el8.51.s390x", "8Base-RHOSE-4.7:cri-o-debuginfo-0:1.20.0-0.rhaos4.7.git8921e00.el8.51.x86_64", "8Base-RHOSE-4.7:cri-o-debugsource-0:1.20.0-0.rhaos4.7.git8921e00.el8.51.ppc64le", "8Base-RHOSE-4.7:cri-o-debugsource-0:1.20.0-0.rhaos4.7.git8921e00.el8.51.s390x", "8Base-RHOSE-4.7:cri-o-debugsource-0:1.20.0-0.rhaos4.7.git8921e00.el8.51.x86_64", "8Base-RHOSE-4.7:cri-tools-0:1.20.0-1.el8.ppc64le", "8Base-RHOSE-4.7:cri-tools-0:1.20.0-1.el8.s390x", "8Base-RHOSE-4.7:cri-tools-0:1.20.0-1.el8.src", "8Base-RHOSE-4.7:cri-tools-0:1.20.0-1.el8.x86_64", "8Base-RHOSE-4.7:cri-tools-debuginfo-0:1.20.0-1.el8.ppc64le", "8Base-RHOSE-4.7:cri-tools-debuginfo-0:1.20.0-1.el8.s390x", "8Base-RHOSE-4.7:cri-tools-debuginfo-0:1.20.0-1.el8.x86_64", "8Base-RHOSE-4.7:cri-tools-debugsource-0:1.20.0-1.el8.ppc64le", "8Base-RHOSE-4.7:cri-tools-debugsource-0:1.20.0-1.el8.s390x", "8Base-RHOSE-4.7:cri-tools-debugsource-0:1.20.0-1.el8.x86_64", "8Base-RHOSE-4.7:dracut-0:049-95.git20200804.el8_3.4.ppc64le", "8Base-RHOSE-4.7:dracut-0:049-95.git20200804.el8_3.4.s390x", "8Base-RHOSE-4.7:dracut-0:049-95.git20200804.el8_3.4.src", "8Base-RHOSE-4.7:dracut-0:049-95.git20200804.el8_3.4.x86_64", "8Base-RHOSE-4.7:dracut-caps-0:049-95.git20200804.el8_3.4.ppc64le", "8Base-RHOSE-4.7:dracut-caps-0:049-95.git20200804.el8_3.4.s390x", "8Base-RHOSE-4.7:dracut-caps-0:049-95.git20200804.el8_3.4.x86_64", "8Base-RHOSE-4.7:dracut-config-generic-0:049-95.git20200804.el8_3.4.ppc64le", "8Base-RHOSE-4.7:dracut-config-generic-0:049-95.git20200804.el8_3.4.s390x", "8Base-RHOSE-4.7:dracut-config-generic-0:049-95.git20200804.el8_3.4.x86_64", "8Base-RHOSE-4.7:dracut-config-rescue-0:049-95.git20200804.el8_3.4.ppc64le", "8Base-RHOSE-4.7:dracut-config-rescue-0:049-95.git20200804.el8_3.4.s390x", "8Base-RHOSE-4.7:dracut-config-rescue-0:049-95.git20200804.el8_3.4.x86_64", "8Base-RHOSE-4.7:dracut-debuginfo-0:049-95.git20200804.el8_3.4.ppc64le", "8Base-RHOSE-4.7:dracut-debuginfo-0:049-95.git20200804.el8_3.4.s390x", "8Base-RHOSE-4.7:dracut-debuginfo-0:049-95.git20200804.el8_3.4.x86_64", "8Base-RHOSE-4.7:dracut-debugsource-0:049-95.git20200804.el8_3.4.ppc64le", "8Base-RHOSE-4.7:dracut-debugsource-0:049-95.git20200804.el8_3.4.s390x", "8Base-RHOSE-4.7:dracut-debugsource-0:049-95.git20200804.el8_3.4.x86_64", "8Base-RHOSE-4.7:dracut-live-0:049-95.git20200804.el8_3.4.ppc64le", "8Base-RHOSE-4.7:dracut-live-0:049-95.git20200804.el8_3.4.s390x", "8Base-RHOSE-4.7:dracut-live-0:049-95.git20200804.el8_3.4.x86_64", "8Base-RHOSE-4.7:dracut-network-0:049-95.git20200804.el8_3.4.ppc64le", "8Base-RHOSE-4.7:dracut-network-0:049-95.git20200804.el8_3.4.s390x", "8Base-RHOSE-4.7:dracut-network-0:049-95.git20200804.el8_3.4.x86_64", "8Base-RHOSE-4.7:dracut-squash-0:049-95.git20200804.el8_3.4.ppc64le", "8Base-RHOSE-4.7:dracut-squash-0:049-95.git20200804.el8_3.4.s390x", "8Base-RHOSE-4.7:dracut-squash-0:049-95.git20200804.el8_3.4.x86_64", "8Base-RHOSE-4.7:dracut-tools-0:049-95.git20200804.el8_3.4.ppc64le", "8Base-RHOSE-4.7:dracut-tools-0:049-95.git20200804.el8_3.4.s390x", "8Base-RHOSE-4.7:dracut-tools-0:049-95.git20200804.el8_3.4.x86_64", "8Base-RHOSE-4.7:faq-0:0.0.6-5.el8.ppc64le", "8Base-RHOSE-4.7:faq-0:0.0.6-5.el8.s390x", "8Base-RHOSE-4.7:faq-0:0.0.6-5.el8.src", "8Base-RHOSE-4.7:faq-0:0.0.6-5.el8.x86_64", "8Base-RHOSE-4.7:golang-github-prometheus-promu-0:0.5.0-2.git642a960.el8.ppc64le", "8Base-RHOSE-4.7:golang-github-prometheus-promu-0:0.5.0-2.git642a960.el8.s390x", "8Base-RHOSE-4.7:golang-github-prometheus-promu-0:0.5.0-2.git642a960.el8.src", "8Base-RHOSE-4.7:golang-github-prometheus-promu-0:0.5.0-2.git642a960.el8.x86_64", "8Base-RHOSE-4.7:gperftools-0:2.6.3-2.el8ost.ppc64le", "8Base-RHOSE-4.7:gperftools-0:2.6.3-2.el8ost.s390x", "8Base-RHOSE-4.7:gperftools-0:2.6.3-2.el8ost.src", "8Base-RHOSE-4.7:gperftools-0:2.6.3-2.el8ost.x86_64", "8Base-RHOSE-4.7:gperftools-debugsource-0:2.6.3-2.el8ost.ppc64le", "8Base-RHOSE-4.7:gperftools-debugsource-0:2.6.3-2.el8ost.s390x", "8Base-RHOSE-4.7:gperftools-debugsource-0:2.6.3-2.el8ost.x86_64", "8Base-RHOSE-4.7:gperftools-devel-0:2.6.3-2.el8ost.ppc64le", "8Base-RHOSE-4.7:gperftools-devel-0:2.6.3-2.el8ost.s390x", "8Base-RHOSE-4.7:gperftools-devel-0:2.6.3-2.el8ost.x86_64", "8Base-RHOSE-4.7:gperftools-libs-0:2.6.3-2.el8ost.ppc64le", "8Base-RHOSE-4.7:gperftools-libs-0:2.6.3-2.el8ost.s390x", "8Base-RHOSE-4.7:gperftools-libs-0:2.6.3-2.el8ost.x86_64", "8Base-RHOSE-4.7:gperftools-libs-debuginfo-0:2.6.3-2.el8ost.ppc64le", "8Base-RHOSE-4.7:gperftools-libs-debuginfo-0:2.6.3-2.el8ost.s390x", "8Base-RHOSE-4.7:gperftools-libs-debuginfo-0:2.6.3-2.el8ost.x86_64", "8Base-RHOSE-4.7:grpc-0:1.18.0-4.el8ost.ppc64le", "8Base-RHOSE-4.7:grpc-0:1.18.0-4.el8ost.s390x", "8Base-RHOSE-4.7:grpc-0:1.18.0-4.el8ost.src", "8Base-RHOSE-4.7:grpc-0:1.18.0-4.el8ost.x86_64", "8Base-RHOSE-4.7:grpc-cli-0:1.18.0-4.el8ost.ppc64le", "8Base-RHOSE-4.7:grpc-cli-0:1.18.0-4.el8ost.s390x", "8Base-RHOSE-4.7:grpc-cli-0:1.18.0-4.el8ost.x86_64", "8Base-RHOSE-4.7:grpc-cli-debuginfo-0:1.18.0-4.el8ost.ppc64le", "8Base-RHOSE-4.7:grpc-cli-debuginfo-0:1.18.0-4.el8ost.s390x", "8Base-RHOSE-4.7:grpc-cli-debuginfo-0:1.18.0-4.el8ost.x86_64", "8Base-RHOSE-4.7:grpc-debuginfo-0:1.18.0-4.el8ost.ppc64le", "8Base-RHOSE-4.7:grpc-debuginfo-0:1.18.0-4.el8ost.s390x", "8Base-RHOSE-4.7:grpc-debuginfo-0:1.18.0-4.el8ost.x86_64", "8Base-RHOSE-4.7:grpc-debugsource-0:1.18.0-4.el8ost.ppc64le", "8Base-RHOSE-4.7:grpc-debugsource-0:1.18.0-4.el8ost.s390x", "8Base-RHOSE-4.7:grpc-debugsource-0:1.18.0-4.el8ost.x86_64", "8Base-RHOSE-4.7:grpc-devel-0:1.18.0-4.el8ost.ppc64le", "8Base-RHOSE-4.7:grpc-devel-0:1.18.0-4.el8ost.s390x", "8Base-RHOSE-4.7:grpc-devel-0:1.18.0-4.el8ost.x86_64", "8Base-RHOSE-4.7:grpc-plugins-0:1.18.0-4.el8ost.ppc64le", "8Base-RHOSE-4.7:grpc-plugins-0:1.18.0-4.el8ost.s390x", "8Base-RHOSE-4.7:grpc-plugins-0:1.18.0-4.el8ost.x86_64", "8Base-RHOSE-4.7:grpc-plugins-debuginfo-0:1.18.0-4.el8ost.ppc64le", "8Base-RHOSE-4.7:grpc-plugins-debuginfo-0:1.18.0-4.el8ost.s390x", "8Base-RHOSE-4.7:grpc-plugins-debuginfo-0:1.18.0-4.el8ost.x86_64", "8Base-RHOSE-4.7:haproxy-0:2.0.19-1.el8.src", "8Base-RHOSE-4.7:haproxy-debugsource-0:2.0.19-1.el8.ppc64le", "8Base-RHOSE-4.7:haproxy-debugsource-0:2.0.19-1.el8.s390x", "8Base-RHOSE-4.7:haproxy-debugsource-0:2.0.19-1.el8.x86_64", "8Base-RHOSE-4.7:haproxy20-0:2.0.19-1.el8.ppc64le", "8Base-RHOSE-4.7:haproxy20-0:2.0.19-1.el8.s390x", "8Base-RHOSE-4.7:haproxy20-0:2.0.19-1.el8.x86_64", "8Base-RHOSE-4.7:haproxy20-debuginfo-0:2.0.19-1.el8.ppc64le", "8Base-RHOSE-4.7:haproxy20-debuginfo-0:2.0.19-1.el8.s390x", "8Base-RHOSE-4.7:haproxy20-debuginfo-0:2.0.19-1.el8.x86_64", "8Base-RHOSE-4.7:inotify-tools-0:3.20.1-2.el8.ppc64le", "8Base-RHOSE-4.7:inotify-tools-0:3.20.1-2.el8.s390x", "8Base-RHOSE-4.7:inotify-tools-0:3.20.1-2.el8.src", "8Base-RHOSE-4.7:inotify-tools-0:3.20.1-2.el8.x86_64", "8Base-RHOSE-4.7:inotify-tools-debuginfo-0:3.20.1-2.el8.ppc64le", "8Base-RHOSE-4.7:inotify-tools-debuginfo-0:3.20.1-2.el8.s390x", "8Base-RHOSE-4.7:inotify-tools-debuginfo-0:3.20.1-2.el8.x86_64", "8Base-RHOSE-4.7:inotify-tools-debugsource-0:3.20.1-2.el8.ppc64le", "8Base-RHOSE-4.7:inotify-tools-debugsource-0:3.20.1-2.el8.s390x", "8Base-RHOSE-4.7:inotify-tools-debugsource-0:3.20.1-2.el8.x86_64", "8Base-RHOSE-4.7:inotify-tools-devel-0:3.20.1-2.el8.ppc64le", "8Base-RHOSE-4.7:inotify-tools-devel-0:3.20.1-2.el8.s390x", "8Base-RHOSE-4.7:inotify-tools-devel-0:3.20.1-2.el8.x86_64", "8Base-RHOSE-4.7:ironic-images-0:15.1-20210114.1.el8.noarch", "8Base-RHOSE-4.7:ironic-images-0:15.1-20210114.1.el8.src", "8Base-RHOSE-4.7:ironic-images-all-0:15.1-20210114.1.el8.noarch", "8Base-RHOSE-4.7:ironic-images-ipa-ppc64le-0:15.1-20210114.1.el8.noarch", "8Base-RHOSE-4.7:ironic-images-ipa-x86_64-0:15.1-20210114.1.el8.noarch", "8Base-RHOSE-4.7:jenkins-0:2.263.3.1612449007-1.el8.noarch", "8Base-RHOSE-4.7:jenkins-0:2.263.3.1612449007-1.el8.src", "8Base-RHOSE-4.7:jenkins-2-plugins-0:4.7.1611636915-1.el8.noarch", "8Base-RHOSE-4.7:jenkins-2-plugins-0:4.7.1611636915-1.el8.src", "8Base-RHOSE-4.7:jq-0:1.6-2.el8.ppc64le", "8Base-RHOSE-4.7:jq-0:1.6-2.el8.s390x", "8Base-RHOSE-4.7:jq-0:1.6-2.el8.src", "8Base-RHOSE-4.7:jq-0:1.6-2.el8.x86_64", "8Base-RHOSE-4.7:jq-debuginfo-0:1.6-2.el8.ppc64le", "8Base-RHOSE-4.7:jq-debuginfo-0:1.6-2.el8.s390x", "8Base-RHOSE-4.7:jq-debuginfo-0:1.6-2.el8.x86_64", "8Base-RHOSE-4.7:jq-debugsource-0:1.6-2.el8.ppc64le", "8Base-RHOSE-4.7:jq-debugsource-0:1.6-2.el8.s390x", "8Base-RHOSE-4.7:jq-debugsource-0:1.6-2.el8.x86_64", "8Base-RHOSE-4.7:jq-devel-0:1.6-2.el8.ppc64le", "8Base-RHOSE-4.7:jq-devel-0:1.6-2.el8.s390x", "8Base-RHOSE-4.7:jq-devel-0:1.6-2.el8.x86_64", "8Base-RHOSE-4.7:kuryr-binding-scripts-0:1.1.1-0.20190923160834.41e6964.el8ost.noarch", "8Base-RHOSE-4.7:libnftnl-0:1.1.5-4.el8.ppc64le", "8Base-RHOSE-4.7:libnftnl-0:1.1.5-4.el8.s390x", "8Base-RHOSE-4.7:libnftnl-0:1.1.5-4.el8.src", "8Base-RHOSE-4.7:libnftnl-0:1.1.5-4.el8.x86_64", "8Base-RHOSE-4.7:libnftnl-debuginfo-0:1.1.5-4.el8.ppc64le", "8Base-RHOSE-4.7:libnftnl-debuginfo-0:1.1.5-4.el8.s390x", "8Base-RHOSE-4.7:libnftnl-debuginfo-0:1.1.5-4.el8.x86_64", "8Base-RHOSE-4.7:libnftnl-debugsource-0:1.1.5-4.el8.ppc64le", "8Base-RHOSE-4.7:libnftnl-debugsource-0:1.1.5-4.el8.s390x", "8Base-RHOSE-4.7:libnftnl-debugsource-0:1.1.5-4.el8.x86_64", "8Base-RHOSE-4.7:libnftnl-devel-0:1.1.5-4.el8.ppc64le", "8Base-RHOSE-4.7:libnftnl-devel-0:1.1.5-4.el8.s390x", "8Base-RHOSE-4.7:libnftnl-devel-0:1.1.5-4.el8.x86_64", "8Base-RHOSE-4.7:libsodium-0:1.0.16-4.5.el8ost.ppc64le", "8Base-RHOSE-4.7:libsodium-0:1.0.16-4.5.el8ost.s390x", "8Base-RHOSE-4.7:libsodium-0:1.0.16-4.5.el8ost.src", "8Base-RHOSE-4.7:libsodium-0:1.0.16-4.5.el8ost.x86_64", "8Base-RHOSE-4.7:libsodium-debuginfo-0:1.0.16-4.5.el8ost.ppc64le", "8Base-RHOSE-4.7:libsodium-debuginfo-0:1.0.16-4.5.el8ost.s390x", "8Base-RHOSE-4.7:libsodium-debuginfo-0:1.0.16-4.5.el8ost.x86_64", "8Base-RHOSE-4.7:libsodium-debugsource-0:1.0.16-4.5.el8ost.ppc64le", "8Base-RHOSE-4.7:libsodium-debugsource-0:1.0.16-4.5.el8ost.s390x", "8Base-RHOSE-4.7:libsodium-debugsource-0:1.0.16-4.5.el8ost.x86_64", "8Base-RHOSE-4.7:libsodium-devel-0:1.0.16-4.5.el8ost.ppc64le", "8Base-RHOSE-4.7:libsodium-devel-0:1.0.16-4.5.el8ost.s390x", "8Base-RHOSE-4.7:libsodium-devel-0:1.0.16-4.5.el8ost.x86_64", "8Base-RHOSE-4.7:libsodium-static-0:1.0.16-4.5.el8ost.ppc64le", "8Base-RHOSE-4.7:libsodium-static-0:1.0.16-4.5.el8ost.s390x", "8Base-RHOSE-4.7:libsodium-static-0:1.0.16-4.5.el8ost.x86_64", "8Base-RHOSE-4.7:libunwind-0:1.2.1-5.el8.ppc64le", "8Base-RHOSE-4.7:libunwind-0:1.2.1-5.el8.src", "8Base-RHOSE-4.7:libunwind-0:1.2.1-5.el8.x86_64", "8Base-RHOSE-4.7:libunwind-debuginfo-0:1.2.1-5.el8.ppc64le", "8Base-RHOSE-4.7:libunwind-debuginfo-0:1.2.1-5.el8.x86_64", "8Base-RHOSE-4.7:libunwind-debugsource-0:1.2.1-5.el8.ppc64le", "8Base-RHOSE-4.7:libunwind-debugsource-0:1.2.1-5.el8.x86_64", "8Base-RHOSE-4.7:libunwind-devel-0:1.2.1-5.el8.ppc64le", "8Base-RHOSE-4.7:libunwind-devel-0:1.2.1-5.el8.x86_64", "8Base-RHOSE-4.7:network-scripts-openvswitch2.13-0:2.13.0-79.el8fdp.ppc64le", "8Base-RHOSE-4.7:network-scripts-openvswitch2.13-0:2.13.0-79.el8fdp.s390x", "8Base-RHOSE-4.7:network-scripts-openvswitch2.13-0:2.13.0-79.el8fdp.x86_64", "8Base-RHOSE-4.7:octavia-amphora-image-x86_64-0:17.0-20200606.1.el8ost.noarch", "8Base-RHOSE-4.7:openshift-0:4.7.0-202102060108.p0.git.97095.7271b90.el8.src", "8Base-RHOSE-4.7:openshift-clients-0:4.7.0-202102032256.p0.git.3951.0e656ef.el8.ppc64le", "8Base-RHOSE-4.7:openshift-clients-0:4.7.0-202102032256.p0.git.3951.0e656ef.el8.s390x", "8Base-RHOSE-4.7:openshift-clients-0:4.7.0-202102032256.p0.git.3951.0e656ef.el8.src", "8Base-RHOSE-4.7:openshift-clients-0:4.7.0-202102032256.p0.git.3951.0e656ef.el8.x86_64", "8Base-RHOSE-4.7:openshift-clients-redistributable-0:4.7.0-202102032256.p0.git.3951.0e656ef.el8.x86_64", "8Base-RHOSE-4.7:openshift-eventrouter-0:0.2-4.git7c289cc.el8.ppc64le", "8Base-RHOSE-4.7:openshift-eventrouter-0:0.2-4.git7c289cc.el8.s390x", "8Base-RHOSE-4.7:openshift-eventrouter-0:0.2-4.git7c289cc.el8.src", "8Base-RHOSE-4.7:openshift-eventrouter-0:0.2-4.git7c289cc.el8.x86_64", "8Base-RHOSE-4.7:openshift-eventrouter-debuginfo-0:0.2-4.git7c289cc.el8.ppc64le", "8Base-RHOSE-4.7:openshift-eventrouter-debuginfo-0:0.2-4.git7c289cc.el8.s390x", "8Base-RHOSE-4.7:openshift-eventrouter-debuginfo-0:0.2-4.git7c289cc.el8.x86_64", "8Base-RHOSE-4.7:openshift-eventrouter-debugsource-0:0.2-4.git7c289cc.el8.ppc64le", "8Base-RHOSE-4.7:openshift-eventrouter-debugsource-0:0.2-4.git7c289cc.el8.s390x", "8Base-RHOSE-4.7:openshift-eventrouter-debugsource-0:0.2-4.git7c289cc.el8.x86_64", "8Base-RHOSE-4.7:openshift-hyperkube-0:4.7.0-202102060108.p0.git.97095.7271b90.el8.ppc64le", "8Base-RHOSE-4.7:openshift-hyperkube-0:4.7.0-202102060108.p0.git.97095.7271b90.el8.s390x", "8Base-RHOSE-4.7:openshift-hyperkube-0:4.7.0-202102060108.p0.git.97095.7271b90.el8.x86_64", "8Base-RHOSE-4.7:openshift-kuryr-0:4.7.0-202101262230.p0.git.2494.cd95ce5.el8.src", "8Base-RHOSE-4.7:openshift-kuryr-cni-0:4.7.0-202101262230.p0.git.2494.cd95ce5.el8.noarch", "8Base-RHOSE-4.7:openshift-kuryr-common-0:4.7.0-202101262230.p0.git.2494.cd95ce5.el8.noarch", "8Base-RHOSE-4.7:openshift-kuryr-controller-0:4.7.0-202101262230.p0.git.2494.cd95ce5.el8.noarch", "8Base-RHOSE-4.7:openstack-ironic-1:16.0.4-0.20210203051223.7d74ea0.el8.src", "8Base-RHOSE-4.7:openstack-ironic-api-1:16.0.4-0.20210203051223.7d74ea0.el8.noarch", "8Base-RHOSE-4.7:openstack-ironic-common-1:16.0.4-0.20210203051223.7d74ea0.el8.noarch", "8Base-RHOSE-4.7:openstack-ironic-conductor-1:16.0.4-0.20210203051223.7d74ea0.el8.noarch", "8Base-RHOSE-4.7:openstack-ironic-inspector-0:10.4.1-0.20201123161216.70fccec.el8.noarch", "8Base-RHOSE-4.7:openstack-ironic-inspector-0:10.4.1-0.20201123161216.70fccec.el8.src", "8Base-RHOSE-4.7:openstack-ironic-inspector-api-0:10.4.1-0.20201123161216.70fccec.el8.noarch", "8Base-RHOSE-4.7:openstack-ironic-inspector-conductor-0:10.4.1-0.20201123161216.70fccec.el8.noarch", "8Base-RHOSE-4.7:openstack-ironic-inspector-dnsmasq-0:10.4.1-0.20201123161216.70fccec.el8.noarch", "8Base-RHOSE-4.7:openstack-ironic-python-agent-0:6.4.3-0.20201217171210.bd45db1.el8.noarch", "8Base-RHOSE-4.7:openstack-ironic-python-agent-0:6.4.3-0.20201217171210.bd45db1.el8.src", "8Base-RHOSE-4.7:openvswitch2.13-0:2.13.0-79.el8fdp.ppc64le", "8Base-RHOSE-4.7:openvswitch2.13-0:2.13.0-79.el8fdp.s390x", "8Base-RHOSE-4.7:openvswitch2.13-0:2.13.0-79.el8fdp.src", "8Base-RHOSE-4.7:openvswitch2.13-0:2.13.0-79.el8fdp.x86_64", "8Base-RHOSE-4.7:openvswitch2.13-debuginfo-0:2.13.0-79.el8fdp.ppc64le", "8Base-RHOSE-4.7:openvswitch2.13-debuginfo-0:2.13.0-79.el8fdp.s390x", "8Base-RHOSE-4.7:openvswitch2.13-debuginfo-0:2.13.0-79.el8fdp.x86_64", "8Base-RHOSE-4.7:openvswitch2.13-debugsource-0:2.13.0-79.el8fdp.ppc64le", "8Base-RHOSE-4.7:openvswitch2.13-debugsource-0:2.13.0-79.el8fdp.s390x", "8Base-RHOSE-4.7:openvswitch2.13-debugsource-0:2.13.0-79.el8fdp.x86_64", "8Base-RHOSE-4.7:openvswitch2.13-devel-0:2.13.0-79.el8fdp.ppc64le", "8Base-RHOSE-4.7:openvswitch2.13-devel-0:2.13.0-79.el8fdp.s390x", "8Base-RHOSE-4.7:openvswitch2.13-devel-0:2.13.0-79.el8fdp.x86_64", "8Base-RHOSE-4.7:openvswitch2.13-test-0:2.13.0-79.el8fdp.noarch", "8Base-RHOSE-4.7:ostree-0:2020.7-1.el8.ppc64le", "8Base-RHOSE-4.7:ostree-0:2020.7-1.el8.s390x", "8Base-RHOSE-4.7:ostree-0:2020.7-1.el8.src", "8Base-RHOSE-4.7:ostree-0:2020.7-1.el8.x86_64", "8Base-RHOSE-4.7:ostree-debuginfo-0:2020.7-1.el8.ppc64le", "8Base-RHOSE-4.7:ostree-debuginfo-0:2020.7-1.el8.s390x", "8Base-RHOSE-4.7:ostree-debuginfo-0:2020.7-1.el8.x86_64", "8Base-RHOSE-4.7:ostree-debugsource-0:2020.7-1.el8.ppc64le", "8Base-RHOSE-4.7:ostree-debugsource-0:2020.7-1.el8.s390x", "8Base-RHOSE-4.7:ostree-debugsource-0:2020.7-1.el8.x86_64", "8Base-RHOSE-4.7:ostree-devel-0:2020.7-1.el8.ppc64le", "8Base-RHOSE-4.7:ostree-devel-0:2020.7-1.el8.s390x", "8Base-RHOSE-4.7:ostree-devel-0:2020.7-1.el8.x86_64", "8Base-RHOSE-4.7:ostree-grub2-0:2020.7-1.el8.ppc64le", "8Base-RHOSE-4.7:ostree-grub2-0:2020.7-1.el8.x86_64", "8Base-RHOSE-4.7:ostree-libs-0:2020.7-1.el8.ppc64le", "8Base-RHOSE-4.7:ostree-libs-0:2020.7-1.el8.s390x", "8Base-RHOSE-4.7:ostree-libs-0:2020.7-1.el8.x86_64", "8Base-RHOSE-4.7:ostree-libs-debuginfo-0:2020.7-1.el8.ppc64le", "8Base-RHOSE-4.7:ostree-libs-debuginfo-0:2020.7-1.el8.s390x", "8Base-RHOSE-4.7:ostree-libs-debuginfo-0:2020.7-1.el8.x86_64", "8Base-RHOSE-4.7:ovn2.13-0:20.09.0-21.el8fdn.ppc64le", "8Base-RHOSE-4.7:ovn2.13-0:20.09.0-21.el8fdn.s390x", "8Base-RHOSE-4.7:ovn2.13-0:20.09.0-21.el8fdn.src", "8Base-RHOSE-4.7:ovn2.13-0:20.09.0-21.el8fdn.x86_64", "8Base-RHOSE-4.7:ovn2.13-central-0:20.09.0-21.el8fdn.ppc64le", "8Base-RHOSE-4.7:ovn2.13-central-0:20.09.0-21.el8fdn.s390x", "8Base-RHOSE-4.7:ovn2.13-central-0:20.09.0-21.el8fdn.x86_64", "8Base-RHOSE-4.7:ovn2.13-central-debuginfo-0:20.09.0-21.el8fdn.ppc64le", "8Base-RHOSE-4.7:ovn2.13-central-debuginfo-0:20.09.0-21.el8fdn.s390x", "8Base-RHOSE-4.7:ovn2.13-central-debuginfo-0:20.09.0-21.el8fdn.x86_64", "8Base-RHOSE-4.7:ovn2.13-debuginfo-0:20.09.0-21.el8fdn.ppc64le", "8Base-RHOSE-4.7:ovn2.13-debuginfo-0:20.09.0-21.el8fdn.s390x", "8Base-RHOSE-4.7:ovn2.13-debuginfo-0:20.09.0-21.el8fdn.x86_64", "8Base-RHOSE-4.7:ovn2.13-debugsource-0:20.09.0-21.el8fdn.ppc64le", "8Base-RHOSE-4.7:ovn2.13-debugsource-0:20.09.0-21.el8fdn.s390x", "8Base-RHOSE-4.7:ovn2.13-debugsource-0:20.09.0-21.el8fdn.x86_64", "8Base-RHOSE-4.7:ovn2.13-host-0:20.09.0-21.el8fdn.ppc64le", "8Base-RHOSE-4.7:ovn2.13-host-0:20.09.0-21.el8fdn.s390x", "8Base-RHOSE-4.7:ovn2.13-host-0:20.09.0-21.el8fdn.x86_64", "8Base-RHOSE-4.7:ovn2.13-host-debuginfo-0:20.09.0-21.el8fdn.ppc64le", "8Base-RHOSE-4.7:ovn2.13-host-debuginfo-0:20.09.0-21.el8fdn.s390x", "8Base-RHOSE-4.7:ovn2.13-host-debuginfo-0:20.09.0-21.el8fdn.x86_64", "8Base-RHOSE-4.7:ovn2.13-vtep-0:20.09.0-21.el8fdn.ppc64le", "8Base-RHOSE-4.7:ovn2.13-vtep-0:20.09.0-21.el8fdn.s390x", "8Base-RHOSE-4.7:ovn2.13-vtep-0:20.09.0-21.el8fdn.x86_64", "8Base-RHOSE-4.7:ovn2.13-vtep-debuginfo-0:20.09.0-21.el8fdn.ppc64le", "8Base-RHOSE-4.7:ovn2.13-vtep-debuginfo-0:20.09.0-21.el8fdn.s390x", "8Base-RHOSE-4.7:ovn2.13-vtep-debuginfo-0:20.09.0-21.el8fdn.x86_64", "8Base-RHOSE-4.7:powerpc-utils-0:1.3.6-12.el8_3.ppc64le", "8Base-RHOSE-4.7:powerpc-utils-0:1.3.6-12.el8_3.src", "8Base-RHOSE-4.7:powerpc-utils-core-0:1.3.6-12.el8_3.ppc64le", "8Base-RHOSE-4.7:powerpc-utils-core-debuginfo-0:1.3.6-12.el8_3.ppc64le", "8Base-RHOSE-4.7:powerpc-utils-debugsource-0:1.3.6-12.el8_3.ppc64le", "8Base-RHOSE-4.7:pprof-0:2.6.3-2.el8ost.noarch", "8Base-RHOSE-4.7:prometheus-promu-0:0.5.0-2.git642a960.el8.ppc64le", "8Base-RHOSE-4.7:prometheus-promu-0:0.5.0-2.git642a960.el8.s390x", "8Base-RHOSE-4.7:prometheus-promu-0:0.5.0-2.git642a960.el8.x86_64", "8Base-RHOSE-4.7:protobuf-0:3.6.1-4.el8ost.ppc64le", "8Base-RHOSE-4.7:protobuf-0:3.6.1-4.el8ost.s390x", "8Base-RHOSE-4.7:protobuf-0:3.6.1-4.el8ost.src", "8Base-RHOSE-4.7:protobuf-0:3.6.1-4.el8ost.x86_64", "8Base-RHOSE-4.7:protobuf-compiler-0:3.6.1-4.el8ost.ppc64le", "8Base-RHOSE-4.7:protobuf-compiler-0:3.6.1-4.el8ost.s390x", "8Base-RHOSE-4.7:protobuf-compiler-0:3.6.1-4.el8ost.x86_64", "8Base-RHOSE-4.7:protobuf-compiler-debuginfo-0:3.6.1-4.el8ost.ppc64le", "8Base-RHOSE-4.7:protobuf-compiler-debuginfo-0:3.6.1-4.el8ost.s390x", "8Base-RHOSE-4.7:protobuf-compiler-debuginfo-0:3.6.1-4.el8ost.x86_64", "8Base-RHOSE-4.7:protobuf-debuginfo-0:3.6.1-4.el8ost.ppc64le", "8Base-RHOSE-4.7:protobuf-debuginfo-0:3.6.1-4.el8ost.s390x", "8Base-RHOSE-4.7:protobuf-debuginfo-0:3.6.1-4.el8ost.x86_64", "8Base-RHOSE-4.7:protobuf-debugsource-0:3.6.1-4.el8ost.ppc64le", "8Base-RHOSE-4.7:protobuf-debugsource-0:3.6.1-4.el8ost.s390x", "8Base-RHOSE-4.7:protobuf-debugsource-0:3.6.1-4.el8ost.x86_64", "8Base-RHOSE-4.7:protobuf-devel-0:3.6.1-4.el8ost.ppc64le", "8Base-RHOSE-4.7:protobuf-devel-0:3.6.1-4.el8ost.s390x", "8Base-RHOSE-4.7:protobuf-devel-0:3.6.1-4.el8ost.x86_64", "8Base-RHOSE-4.7:protobuf-lite-0:3.6.1-4.el8ost.ppc64le", "8Base-RHOSE-4.7:protobuf-lite-0:3.6.1-4.el8ost.s390x", "8Base-RHOSE-4.7:protobuf-lite-0:3.6.1-4.el8ost.x86_64", "8Base-RHOSE-4.7:protobuf-lite-debuginfo-0:3.6.1-4.el8ost.ppc64le", "8Base-RHOSE-4.7:protobuf-lite-debuginfo-0:3.6.1-4.el8ost.s390x", "8Base-RHOSE-4.7:protobuf-lite-debuginfo-0:3.6.1-4.el8ost.x86_64", "8Base-RHOSE-4.7:protobuf-lite-devel-0:3.6.1-4.el8ost.ppc64le", "8Base-RHOSE-4.7:protobuf-lite-devel-0:3.6.1-4.el8ost.s390x", "8Base-RHOSE-4.7:protobuf-lite-devel-0:3.6.1-4.el8ost.x86_64", "8Base-RHOSE-4.7:protobuf-lite-static-0:3.6.1-4.el8ost.ppc64le", "8Base-RHOSE-4.7:protobuf-lite-static-0:3.6.1-4.el8ost.s390x", "8Base-RHOSE-4.7:protobuf-lite-static-0:3.6.1-4.el8ost.x86_64", "8Base-RHOSE-4.7:protobuf-static-0:3.6.1-4.el8ost.ppc64le", "8Base-RHOSE-4.7:protobuf-static-0:3.6.1-4.el8ost.s390x", "8Base-RHOSE-4.7:protobuf-static-0:3.6.1-4.el8ost.x86_64", "8Base-RHOSE-4.7:protobuf-vim-0:3.6.1-4.el8ost.noarch", "8Base-RHOSE-4.7:python-alembic-0:1.4.2-5.el8ost.src", "8Base-RHOSE-4.7:python-boto3-0:1.9.101-1.el8ost.src", "8Base-RHOSE-4.7:python-botocore-0:1.12.119-1.el8ost.src", "8Base-RHOSE-4.7:python-cachetools-0:3.1.0-1.el8ost.src", "8Base-RHOSE-4.7:python-certifi-0:2018.10.15-4.el8ost.src", "8Base-RHOSE-4.7:python-construct-0:2.10.56-1.el8ost.src", "8Base-RHOSE-4.7:python-daemon-0:2.1.2-9.el8ar.src", "8Base-RHOSE-4.7:python-debtcollector-0:2.2.0-0.20201008171245.649189d.el8.src", "8Base-RHOSE-4.7:python-dictdiffer-0:0.7.1-2.el8ost.src", "8Base-RHOSE-4.7:python-eventlet-0:0.25.2-3.el8ost.src", "8Base-RHOSE-4.7:python-flask-1:1.1.1-1.el8ost.src", "8Base-RHOSE-4.7:python-flask-doc-1:1.1.1-1.el8ost.noarch", "8Base-RHOSE-4.7:python-google-auth-0:1.3.0-1.el8ost.src", "8Base-RHOSE-4.7:python-hardware-0:0.23.0-0.20201031022149.59211cc.el8.src", "8Base-RHOSE-4.7:python-ifaddr-0:0.1.6-5.el8ost.src", "8Base-RHOSE-4.7:python-importlib-metadata-0:1.7.0-1.el8ost.src", "8Base-RHOSE-4.7:python-ironic-lib-0:4.4.1-0.20201218041209.aa7cfec.el8.src", "8Base-RHOSE-4.7:python-keystoneauth1-0:4.2.0-0.20200630234358.dab8e10.el8ost.src", "8Base-RHOSE-4.7:python-kubernetes-0:11.0.0-1.el8.src", "8Base-RHOSE-4.7:python-kuryr-lib-0:1.1.1-0.20190923160834.41e6964.el8ost.src", "8Base-RHOSE-4.7:python-lockfile-1:0.11.0-8.el8ar.src", "8Base-RHOSE-4.7:python-msgpack-0:0.6.2-1.el8ost.src", "8Base-RHOSE-4.7:python-msgpack-debugsource-0:0.6.2-1.el8ost.x86_64", "8Base-RHOSE-4.7:python-openshift-1:0.11.2-1.el8.src", "8Base-RHOSE-4.7:python-openstacksdk-0:0.48.0-0.20200708092906.3b693c2.el8ost.src", "8Base-RHOSE-4.7:python-oslo-concurrency-0:4.3.0-0.20201008180343.2f78803.el8.src", "8Base-RHOSE-4.7:python-oslo-concurrency-lang-0:4.3.0-0.20201008180343.2f78803.el8.noarch", "8Base-RHOSE-4.7:python-oslo-config-2:8.3.2-0.20201008180634.fcb8894.el8.src", "8Base-RHOSE-4.7:python-oslo-context-0:3.1.1-0.20201008190523.57dbded.el8.src", "8Base-RHOSE-4.7:python-oslo-db-0:8.4.0-0.20200918104110.e42c733.el8ost.src", "8Base-RHOSE-4.7:python-oslo-db-lang-0:8.4.0-0.20200918104110.e42c733.el8ost.noarch", "8Base-RHOSE-4.7:python-oslo-i18n-0:5.0.1-0.20201009131251.73187bd.el8.src", "8Base-RHOSE-4.7:python-oslo-i18n-lang-0:5.0.1-0.20201009131251.73187bd.el8.noarch", "8Base-RHOSE-4.7:python-oslo-log-0:4.3.1-0.20201207021200.1597f24.el8.src", "8Base-RHOSE-4.7:python-oslo-log-lang-0:4.3.1-0.20201207021200.1597f24.el8.noarch", "8Base-RHOSE-4.7:python-oslo-serialization-0:4.0.1-0.20201008182423.c7884b2.el8.src", "8Base-RHOSE-4.7:python-oslo-service-0:2.4.0-0.20201008184547.58466a6.el8.src", "8Base-RHOSE-4.7:python-oslo-utils-0:4.6.0-0.20201009175936.91497da.el8.src", "8Base-RHOSE-4.7:python-oslo-utils-lang-0:4.6.0-0.20201009175936.91497da.el8.noarch", "8Base-RHOSE-4.7:python-packaging-0:20.4-1.el8ost.src", "8Base-RHOSE-4.7:python-packaging-doc-0:20.4-1.el8ost.noarch", "8Base-RHOSE-4.7:python-paste-0:3.2.4-1.el8ost.src", "8Base-RHOSE-4.7:python-paste-deploy-0:2.0.1-4.el8ost.src", "8Base-RHOSE-4.7:python-pbr-0:5.4.3-2.el8ost.src", "8Base-RHOSE-4.7:python-pexpect-0:4.6-2.el8ar.src", "8Base-RHOSE-4.7:python-pint-0:0.10.1-1.el8ost.src", "8Base-RHOSE-4.7:python-psutil-0:5.6.6-1.el8ar.src", "8Base-RHOSE-4.7:python-psutil-debugsource-0:5.6.6-1.el8ar.ppc64le", "8Base-RHOSE-4.7:python-psutil-debugsource-0:5.6.6-1.el8ar.s390x", "8Base-RHOSE-4.7:python-psutil-debugsource-0:5.6.6-1.el8ar.x86_64", "8Base-RHOSE-4.7:python-pyghmi-0:1.5.14-2.1.el8ost.src", "8Base-RHOSE-4.7:python-pyroute2-0:0.5.13-1.el8ost.src", "8Base-RHOSE-4.7:python-requests-unixsocket-0:0.1.5-5.el8ar.src", "8Base-RHOSE-4.7:python-rsa-0:4.7-1.el8.src", "8Base-RHOSE-4.7:python-ruamel-yaml-0:0.15.41-4.el8ost.src", "8Base-RHOSE-4.7:python-ruamel-yaml-debugsource-0:0.15.41-4.el8ost.ppc64le", "8Base-RHOSE-4.7:python-ruamel-yaml-debugsource-0:0.15.41-4.el8ost.s390x", "8Base-RHOSE-4.7:python-ruamel-yaml-debugsource-0:0.15.41-4.el8ost.x86_64", "8Base-RHOSE-4.7:python-s3transfer-0:0.2.0-1.el8ost.src", "8Base-RHOSE-4.7:python-stevedore-0:3.2.2-0.20201009151242.274eaa6.el8.src", "8Base-RHOSE-4.7:python-string_utils-0:0.6.0-4.el8ost.src", "8Base-RHOSE-4.7:python-sushy-0:3.6.1-0.20210122201213.7ec0422.el8.src", "8Base-RHOSE-4.7:python-sushy-oem-idrac-0:0.0.3-0.20200922221223.1202372.el8ost.src", "8Base-RHOSE-4.7:python-tenacity-0:6.2.0-1.el8ost.src", "8Base-RHOSE-4.7:python-tooz-0:2.7.0-0.20200723133754.fca43df.el8ost.src", "8Base-RHOSE-4.7:python-websocket-client-0:0.54.0-1.el8ost.src", "8Base-RHOSE-4.7:python-werkzeug-0:1.0.1-3.el8ost.src", "8Base-RHOSE-4.7:python-zeroconf-0:0.24.4-1.el8ost.src", "8Base-RHOSE-4.7:python-zipp-0:0.5.1-2.el8ost.src", "8Base-RHOSE-4.7:python2-botocore-0:1.12.119-1.el8ost.noarch", "8Base-RHOSE-4.7:python2-cachetools-0:3.1.0-1.el8ost.noarch", "8Base-RHOSE-4.7:python3-alembic-0:1.4.2-5.el8ost.noarch", "8Base-RHOSE-4.7:python3-ansible-runner-0:1.4.6-2.el8ar.noarch", "8Base-RHOSE-4.7:python3-boto3-0:1.9.101-1.el8ost.noarch", "8Base-RHOSE-4.7:python3-botocore-0:1.12.119-1.el8ost.noarch", "8Base-RHOSE-4.7:python3-cachetools-0:3.1.0-1.el8ost.noarch", "8Base-RHOSE-4.7:python3-certifi-0:2018.10.15-4.el8ost.noarch", "8Base-RHOSE-4.7:python3-construct-0:2.10.56-1.el8ost.noarch", "8Base-RHOSE-4.7:python3-daemon-0:2.1.2-9.el8ar.noarch", "8Base-RHOSE-4.7:python3-debtcollector-0:2.2.0-0.20201008171245.649189d.el8.noarch", "8Base-RHOSE-4.7:python3-dictdiffer-0:0.7.1-2.el8ost.noarch", "8Base-RHOSE-4.7:python3-eventlet-0:0.25.2-3.el8ost.noarch", "8Base-RHOSE-4.7:python3-flask-1:1.1.1-1.el8ost.noarch", "8Base-RHOSE-4.7:python3-google-auth-0:1.3.0-1.el8ost.noarch", "8Base-RHOSE-4.7:python3-grpcio-0:1.18.0-4.el8ost.ppc64le", "8Base-RHOSE-4.7:python3-grpcio-0:1.18.0-4.el8ost.s390x", "8Base-RHOSE-4.7:python3-grpcio-0:1.18.0-4.el8ost.x86_64", "8Base-RHOSE-4.7:python3-grpcio-debuginfo-0:1.18.0-4.el8ost.ppc64le", "8Base-RHOSE-4.7:python3-grpcio-debuginfo-0:1.18.0-4.el8ost.s390x", "8Base-RHOSE-4.7:python3-grpcio-debuginfo-0:1.18.0-4.el8ost.x86_64", "8Base-RHOSE-4.7:python3-hardware-0:0.23.0-0.20201031022149.59211cc.el8.noarch", "8Base-RHOSE-4.7:python3-hardware-detect-0:0.23.0-0.20201031022149.59211cc.el8.noarch", "8Base-RHOSE-4.7:python3-ifaddr-0:0.1.6-5.el8ost.noarch", "8Base-RHOSE-4.7:python3-importlib-metadata-0:1.7.0-1.el8ost.noarch", "8Base-RHOSE-4.7:python3-ironic-inspector-tests-0:10.4.1-0.20201123161216.70fccec.el8.noarch", "8Base-RHOSE-4.7:python3-ironic-lib-0:4.4.1-0.20201218041209.aa7cfec.el8.noarch", "8Base-RHOSE-4.7:python3-ironic-python-agent-0:6.4.3-0.20201217171210.bd45db1.el8.noarch", "8Base-RHOSE-4.7:python3-ironic-tests-1:16.0.4-0.20210203051223.7d74ea0.el8.noarch", "8Base-RHOSE-4.7:python3-keystoneauth1-0:4.2.0-0.20200630234358.dab8e10.el8ost.noarch", "8Base-RHOSE-4.7:python3-kubernetes-0:11.0.0-1.el8.noarch", "8Base-RHOSE-4.7:python3-kubernetes-tests-0:11.0.0-1.el8.noarch", "8Base-RHOSE-4.7:python3-kuryr-kubernetes-0:4.7.0-202101262230.p0.git.2494.cd95ce5.el8.noarch", "8Base-RHOSE-4.7:python3-kuryr-lib-0:1.1.1-0.20190923160834.41e6964.el8ost.noarch", "8Base-RHOSE-4.7:python3-kuryr-lib-tests-0:1.1.1-0.20190923160834.41e6964.el8ost.noarch", "8Base-RHOSE-4.7:python3-lockfile-1:0.11.0-8.el8ar.noarch", "8Base-RHOSE-4.7:python3-msgpack-0:0.6.2-1.el8ost.x86_64", "8Base-RHOSE-4.7:python3-msgpack-debuginfo-0:0.6.2-1.el8ost.x86_64", "8Base-RHOSE-4.7:python3-openshift-1:0.11.2-1.el8.noarch", "8Base-RHOSE-4.7:python3-openstacksdk-0:0.48.0-0.20200708092906.3b693c2.el8ost.noarch", "8Base-RHOSE-4.7:python3-openstacksdk-tests-0:0.48.0-0.20200708092906.3b693c2.el8ost.noarch", "8Base-RHOSE-4.7:python3-openvswitch2.13-0:2.13.0-79.el8fdp.ppc64le", "8Base-RHOSE-4.7:python3-openvswitch2.13-0:2.13.0-79.el8fdp.s390x", "8Base-RHOSE-4.7:python3-openvswitch2.13-0:2.13.0-79.el8fdp.x86_64", "8Base-RHOSE-4.7:python3-openvswitch2.13-debuginfo-0:2.13.0-79.el8fdp.ppc64le", "8Base-RHOSE-4.7:python3-openvswitch2.13-debuginfo-0:2.13.0-79.el8fdp.s390x", "8Base-RHOSE-4.7:python3-openvswitch2.13-debuginfo-0:2.13.0-79.el8fdp.x86_64", "8Base-RHOSE-4.7:python3-oslo-concurrency-0:4.3.0-0.20201008180343.2f78803.el8.noarch", "8Base-RHOSE-4.7:python3-oslo-concurrency-tests-0:4.3.0-0.20201008180343.2f78803.el8.noarch", "8Base-RHOSE-4.7:python3-oslo-config-2:8.3.2-0.20201008180634.fcb8894.el8.noarch", "8Base-RHOSE-4.7:python3-oslo-context-0:3.1.1-0.20201008190523.57dbded.el8.noarch", "8Base-RHOSE-4.7:python3-oslo-context-tests-0:3.1.1-0.20201008190523.57dbded.el8.noarch", "8Base-RHOSE-4.7:python3-oslo-db-0:8.4.0-0.20200918104110.e42c733.el8ost.noarch", "8Base-RHOSE-4.7:python3-oslo-db-tests-0:8.4.0-0.20200918104110.e42c733.el8ost.noarch", "8Base-RHOSE-4.7:python3-oslo-i18n-0:5.0.1-0.20201009131251.73187bd.el8.noarch", "8Base-RHOSE-4.7:python3-oslo-log-0:4.3.1-0.20201207021200.1597f24.el8.noarch", "8Base-RHOSE-4.7:python3-oslo-log-tests-0:4.3.1-0.20201207021200.1597f24.el8.noarch", "8Base-RHOSE-4.7:python3-oslo-serialization-0:4.0.1-0.20201008182423.c7884b2.el8.noarch", "8Base-RHOSE-4.7:python3-oslo-serialization-tests-0:4.0.1-0.20201008182423.c7884b2.el8.noarch", "8Base-RHOSE-4.7:python3-oslo-service-0:2.4.0-0.20201008184547.58466a6.el8.noarch", "8Base-RHOSE-4.7:python3-oslo-service-tests-0:2.4.0-0.20201008184547.58466a6.el8.noarch", "8Base-RHOSE-4.7:python3-oslo-utils-0:4.6.0-0.20201009175936.91497da.el8.noarch", "8Base-RHOSE-4.7:python3-oslo-utils-tests-0:4.6.0-0.20201009175936.91497da.el8.noarch", "8Base-RHOSE-4.7:python3-packaging-0:20.4-1.el8ost.noarch", "8Base-RHOSE-4.7:python3-paste-0:3.2.4-1.el8ost.noarch", "8Base-RHOSE-4.7:python3-paste-deploy-0:2.0.1-4.el8ost.noarch", "8Base-RHOSE-4.7:python3-pbr-0:5.4.3-2.el8ost.noarch", "8Base-RHOSE-4.7:python3-pexpect-0:4.6-2.el8ar.noarch", "8Base-RHOSE-4.7:python3-pint-0:0.10.1-1.el8ost.noarch", "8Base-RHOSE-4.7:python3-protobuf-0:3.6.1-4.el8ost.noarch", "8Base-RHOSE-4.7:python3-psutil-0:5.6.6-1.el8ar.ppc64le", "8Base-RHOSE-4.7:python3-psutil-0:5.6.6-1.el8ar.s390x", "8Base-RHOSE-4.7:python3-psutil-0:5.6.6-1.el8ar.x86_64", "8Base-RHOSE-4.7:python3-psutil-debuginfo-0:5.6.6-1.el8ar.ppc64le", "8Base-RHOSE-4.7:python3-psutil-debuginfo-0:5.6.6-1.el8ar.s390x", "8Base-RHOSE-4.7:python3-psutil-debuginfo-0:5.6.6-1.el8ar.x86_64", "8Base-RHOSE-4.7:python3-pyghmi-0:1.5.14-2.1.el8ost.noarch", "8Base-RHOSE-4.7:python3-pyroute2-0:0.5.13-1.el8ost.noarch", "8Base-RHOSE-4.7:python3-requests-unixsocket-0:0.1.5-5.el8ar.noarch", "8Base-RHOSE-4.7:python3-rsa-0:4.7-1.el8.noarch", "8Base-RHOSE-4.7:python3-ruamel-yaml-0:0.15.41-4.el8ost.ppc64le", "8Base-RHOSE-4.7:python3-ruamel-yaml-0:0.15.41-4.el8ost.s390x", "8Base-RHOSE-4.7:python3-ruamel-yaml-0:0.15.41-4.el8ost.x86_64", "8Base-RHOSE-4.7:python3-ruamel-yaml-debuginfo-0:0.15.41-4.el8ost.ppc64le", "8Base-RHOSE-4.7:python3-ruamel-yaml-debuginfo-0:0.15.41-4.el8ost.s390x", "8Base-RHOSE-4.7:python3-ruamel-yaml-debuginfo-0:0.15.41-4.el8ost.x86_64", "8Base-RHOSE-4.7:python3-s3transfer-0:0.2.0-1.el8ost.noarch", "8Base-RHOSE-4.7:python3-stevedore-0:3.2.2-0.20201009151242.274eaa6.el8.noarch", "8Base-RHOSE-4.7:python3-string_utils-0:0.6.0-4.el8ost.noarch", "8Base-RHOSE-4.7:python3-sushy-0:3.6.1-0.20210122201213.7ec0422.el8.noarch", "8Base-RHOSE-4.7:python3-sushy-oem-idrac-0:0.0.3-0.20200922221223.1202372.el8ost.noarch", "8Base-RHOSE-4.7:python3-sushy-oem-idrac-tests-0:0.0.3-0.20200922221223.1202372.el8ost.noarch", "8Base-RHOSE-4.7:python3-sushy-tests-0:3.6.1-0.20210122201213.7ec0422.el8.noarch", "8Base-RHOSE-4.7:python3-tenacity-0:6.2.0-1.el8ost.noarch", "8Base-RHOSE-4.7:python3-tooz-0:2.7.0-0.20200723133754.fca43df.el8ost.noarch", "8Base-RHOSE-4.7:python3-websocket-client-0:0.54.0-1.el8ost.noarch", "8Base-RHOSE-4.7:python3-werkzeug-0:1.0.1-3.el8ost.noarch", "8Base-RHOSE-4.7:python3-zeroconf-0:0.24.4-1.el8ost.noarch", "8Base-RHOSE-4.7:python3-zipp-0:0.5.1-2.el8ost.noarch", "8Base-RHOSE-4.7:redhat-release-coreos-0:47.83-1.el8.ppc64le", "8Base-RHOSE-4.7:redhat-release-coreos-0:47.83-1.el8.s390x", "8Base-RHOSE-4.7:redhat-release-coreos-0:47.83-1.el8.src", "8Base-RHOSE-4.7:redhat-release-coreos-0:47.83-1.el8.x86_64", "8Base-RHOSE-4.7:rhcos-tools-0:0.0.0-1.rhaos4.2.el8.noarch", "8Base-RHOSE-4.7:rhcos-tools-0:0.0.0-1.rhaos4.2.el8.src", "8Base-RHOSE-4.7:rhosp-director-images-0:17.0-20200606.1.el8ost.noarch", "8Base-RHOSE-4.7:rhosp-director-images-0:17.0-20200606.1.el8ost.src", "8Base-RHOSE-4.7:rhosp-director-images-all-0:17.0-20200606.1.el8ost.noarch", "8Base-RHOSE-4.7:rhosp-director-images-ipa-0:17.0-20200606.1.el8ost.noarch", "8Base-RHOSE-4.7:rhosp-director-images-ipa-ppc64le-0:17.0-20200606.1.el8ost.noarch", "8Base-RHOSE-4.7:rhosp-director-images-ipa-x86_64-0:17.0-20200606.1.el8ost.noarch", "8Base-RHOSE-4.7:rhosp-director-images-minimal-0:17.0-20200606.1.el8ost.noarch", "8Base-RHOSE-4.7:rhosp-director-images-ppc64le-0:17.0-20200606.1.el8ost.noarch", "8Base-RHOSE-4.7:rhosp-director-images-x86_64-0:17.0-20200606.1.el8ost.noarch", "8Base-RHOSE-4.7:rpm-ostree-0:2020.7-1.el8_3.ppc64le", "8Base-RHOSE-4.7:rpm-ostree-0:2020.7-1.el8_3.s390x", "8Base-RHOSE-4.7:rpm-ostree-0:2020.7-1.el8_3.src", "8Base-RHOSE-4.7:rpm-ostree-0:2020.7-1.el8_3.x86_64", "8Base-RHOSE-4.7:rpm-ostree-debuginfo-0:2020.7-1.el8_3.ppc64le", "8Base-RHOSE-4.7:rpm-ostree-debuginfo-0:2020.7-1.el8_3.s390x", "8Base-RHOSE-4.7:rpm-ostree-debuginfo-0:2020.7-1.el8_3.x86_64", "8Base-RHOSE-4.7:rpm-ostree-debugsource-0:2020.7-1.el8_3.ppc64le", "8Base-RHOSE-4.7:rpm-ostree-debugsource-0:2020.7-1.el8_3.s390x", "8Base-RHOSE-4.7:rpm-ostree-debugsource-0:2020.7-1.el8_3.x86_64", "8Base-RHOSE-4.7:rpm-ostree-devel-0:2020.7-1.el8_3.ppc64le", "8Base-RHOSE-4.7:rpm-ostree-devel-0:2020.7-1.el8_3.s390x", "8Base-RHOSE-4.7:rpm-ostree-devel-0:2020.7-1.el8_3.x86_64", "8Base-RHOSE-4.7:rpm-ostree-libs-0:2020.7-1.el8_3.ppc64le", "8Base-RHOSE-4.7:rpm-ostree-libs-0:2020.7-1.el8_3.s390x", "8Base-RHOSE-4.7:rpm-ostree-libs-0:2020.7-1.el8_3.x86_64", "8Base-RHOSE-4.7:rpm-ostree-libs-debuginfo-0:2020.7-1.el8_3.ppc64le", "8Base-RHOSE-4.7:rpm-ostree-libs-debuginfo-0:2020.7-1.el8_3.s390x", "8Base-RHOSE-4.7:rpm-ostree-libs-debuginfo-0:2020.7-1.el8_3.x86_64", "8Base-RHOSE-4.7:runc-0:1.0.0-82.rhaos4.6.git086e841.el8.ppc64le", "8Base-RHOSE-4.7:runc-0:1.0.0-82.rhaos4.6.git086e841.el8.s390x", "8Base-RHOSE-4.7:runc-0:1.0.0-82.rhaos4.6.git086e841.el8.src", "8Base-RHOSE-4.7:runc-0:1.0.0-82.rhaos4.6.git086e841.el8.x86_64", "8Base-RHOSE-4.7:runc-debuginfo-0:1.0.0-82.rhaos4.6.git086e841.el8.ppc64le", "8Base-RHOSE-4.7:runc-debuginfo-0:1.0.0-82.rhaos4.6.git086e841.el8.s390x", "8Base-RHOSE-4.7:runc-debuginfo-0:1.0.0-82.rhaos4.6.git086e841.el8.x86_64", "8Base-RHOSE-4.7:runc-debugsource-0:1.0.0-82.rhaos4.6.git086e841.el8.ppc64le", "8Base-RHOSE-4.7:runc-debugsource-0:1.0.0-82.rhaos4.6.git086e841.el8.s390x", "8Base-RHOSE-4.7:runc-debugsource-0:1.0.0-82.rhaos4.6.git086e841.el8.x86_64", "8Base-RHOSE-4.7:rust-afterburn-0:4.6.0-1.rhaos4.7.el8.src", "8Base-RHOSE-4.7:rust-afterburn-debugsource-0:4.6.0-1.rhaos4.7.el8.ppc64le", "8Base-RHOSE-4.7:rust-afterburn-debugsource-0:4.6.0-1.rhaos4.7.el8.s390x", "8Base-RHOSE-4.7:rust-afterburn-debugsource-0:4.6.0-1.rhaos4.7.el8.x86_64", "8Base-RHOSE-4.7:rust-bootupd-0:0.2.5-2.el8.src", "8Base-RHOSE-4.7:rust-bootupd-debugsource-0:0.2.5-2.el8.x86_64", "8Base-RHOSE-4.7:tini-0:0.16.1-1.el8ar.ppc64le", "8Base-RHOSE-4.7:tini-0:0.16.1-1.el8ar.s390x", "8Base-RHOSE-4.7:tini-0:0.16.1-1.el8ar.src", "8Base-RHOSE-4.7:tini-0:0.16.1-1.el8ar.x86_64", "8Base-RHOSE-4.7:toolbox-0:0.0.8-3.rhaos4.7.el8.noarch", "8Base-RHOSE-4.7:toolbox-0:0.0.8-3.rhaos4.7.el8.src" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1897635" } ], "notes": [ { "category": "description", "text": "A flaw was found in the math/big package of Go\u0027s standard library that causes a denial of service. Applications written in Go that use math/big via cryptographic packages, including crypto/rsa and crypto/x509, are vulnerable and can potentially cause panic via a crafted certificate chain. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: math/big: panic during recursive division of very large numbers", "title": "Vulnerability summary" }, { "category": "other", "text": "OpenShift ServiceMesh (OSSM) 1.1 is Out Of Support Scope (OOSS) for Moderate and Low impact vulnerabilities because it is now in the Maintenance Phase of the support.\nOpenshift Virtualization 1 (formerly Container Native Virtualization) is Out Of Support Scope (OOSS) for Moderate and Low impact vulnerabilities.\n\nRed Hat Gluster Storage 3 shipped multi-cloud-object-gateway-cli and noobaa-operator container as a technical preview and is not currently planned to be addressed in future updates.\n\nOpenShift Container Platform (OCP) 4.5 and earlier are built with Go versions earlier than 1.14, which are not affected by this vulnerability. OCP 4.6 is built with Go 1.15 and is affected.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RHOSE-4.7:ignition-0:2.9.0-2.rhaos4.7.git1d56dc8.el8.ppc64le", "8Base-RHOSE-4.7:ignition-0:2.9.0-2.rhaos4.7.git1d56dc8.el8.s390x", "8Base-RHOSE-4.7:ignition-0:2.9.0-2.rhaos4.7.git1d56dc8.el8.src", "8Base-RHOSE-4.7:ignition-0:2.9.0-2.rhaos4.7.git1d56dc8.el8.x86_64", "8Base-RHOSE-4.7:ignition-debuginfo-0:2.9.0-2.rhaos4.7.git1d56dc8.el8.ppc64le", "8Base-RHOSE-4.7:ignition-debuginfo-0:2.9.0-2.rhaos4.7.git1d56dc8.el8.s390x", "8Base-RHOSE-4.7:ignition-debuginfo-0:2.9.0-2.rhaos4.7.git1d56dc8.el8.x86_64", "8Base-RHOSE-4.7:ignition-debugsource-0:2.9.0-2.rhaos4.7.git1d56dc8.el8.ppc64le", "8Base-RHOSE-4.7:ignition-debugsource-0:2.9.0-2.rhaos4.7.git1d56dc8.el8.s390x", "8Base-RHOSE-4.7:ignition-debugsource-0:2.9.0-2.rhaos4.7.git1d56dc8.el8.x86_64", "8Base-RHOSE-4.7:ignition-validate-0:2.9.0-2.rhaos4.7.git1d56dc8.el8.ppc64le", "8Base-RHOSE-4.7:ignition-validate-0:2.9.0-2.rhaos4.7.git1d56dc8.el8.s390x", "8Base-RHOSE-4.7:ignition-validate-0:2.9.0-2.rhaos4.7.git1d56dc8.el8.x86_64", "8Base-RHOSE-4.7:ignition-validate-debuginfo-0:2.9.0-2.rhaos4.7.git1d56dc8.el8.ppc64le", "8Base-RHOSE-4.7:ignition-validate-debuginfo-0:2.9.0-2.rhaos4.7.git1d56dc8.el8.s390x", "8Base-RHOSE-4.7:ignition-validate-debuginfo-0:2.9.0-2.rhaos4.7.git1d56dc8.el8.x86_64" ], "known_not_affected": [ "7Server-RH7-RHOSE-4.7:conmon-2:2.0.21-2.rhaos4.6.el7.src", "7Server-RH7-RHOSE-4.7:conmon-2:2.0.21-2.rhaos4.6.el7.x86_64", "7Server-RH7-RHOSE-4.7:containernetworking-plugins-0:0.8.6-1.rhaos4.5.el7.src", "7Server-RH7-RHOSE-4.7:containernetworking-plugins-0:0.8.6-1.rhaos4.5.el7.x86_64", "7Server-RH7-RHOSE-4.7:containernetworking-plugins-debuginfo-0:0.8.6-1.rhaos4.5.el7.x86_64", "7Server-RH7-RHOSE-4.7:cri-o-0:1.20.0-0.rhaos4.7.git8921e00.el7.51.src", "7Server-RH7-RHOSE-4.7:cri-o-0:1.20.0-0.rhaos4.7.git8921e00.el7.51.x86_64", "7Server-RH7-RHOSE-4.7:cri-o-debuginfo-0:1.20.0-0.rhaos4.7.git8921e00.el7.51.x86_64", "7Server-RH7-RHOSE-4.7:cri-tools-0:1.18.0-3.el7.src", "7Server-RH7-RHOSE-4.7:cri-tools-0:1.18.0-3.el7.x86_64", "7Server-RH7-RHOSE-4.7:cri-tools-debuginfo-0:1.18.0-3.el7.x86_64", "7Server-RH7-RHOSE-4.7:haproxy-0:2.0.19-1.el7.src", "7Server-RH7-RHOSE-4.7:haproxy-debuginfo-0:2.0.19-1.el7.x86_64", "7Server-RH7-RHOSE-4.7:haproxy20-0:2.0.19-1.el7.x86_64", "7Server-RH7-RHOSE-4.7:jq-0:1.6-2.el7.src", "7Server-RH7-RHOSE-4.7:jq-0:1.6-2.el7.x86_64", "7Server-RH7-RHOSE-4.7:jq-debuginfo-0:1.6-2.el7.x86_64", "7Server-RH7-RHOSE-4.7:jq-devel-0:1.6-2.el7.x86_64", "7Server-RH7-RHOSE-4.7:oniguruma-0:5.9.2-5.el7.src", "7Server-RH7-RHOSE-4.7:oniguruma-0:5.9.2-5.el7.x86_64", "7Server-RH7-RHOSE-4.7:oniguruma-debuginfo-0:5.9.2-5.el7.x86_64", "7Server-RH7-RHOSE-4.7:oniguruma-devel-0:5.9.2-5.el7.x86_64", "7Server-RH7-RHOSE-4.7:openshift-0:4.7.0-202102060108.p0.git.97095.7271b90.el7.src", "7Server-RH7-RHOSE-4.7:openshift-ansible-0:4.7.0-202102032256.p0.git.0.bf7d9a7.el7.noarch", "7Server-RH7-RHOSE-4.7:openshift-ansible-0:4.7.0-202102032256.p0.git.0.bf7d9a7.el7.src", "7Server-RH7-RHOSE-4.7:openshift-ansible-test-0:4.7.0-202102032256.p0.git.0.bf7d9a7.el7.noarch", "7Server-RH7-RHOSE-4.7:openshift-clients-0:4.7.0-202102032256.p0.git.3951.0e656ef.el7.src", "7Server-RH7-RHOSE-4.7:openshift-clients-0:4.7.0-202102032256.p0.git.3951.0e656ef.el7.x86_64", "7Server-RH7-RHOSE-4.7:openshift-clients-redistributable-0:4.7.0-202102032256.p0.git.3951.0e656ef.el7.x86_64", "7Server-RH7-RHOSE-4.7:openshift-hyperkube-0:4.7.0-202102060108.p0.git.97095.7271b90.el7.x86_64", "7Server-RH7-RHOSE-4.7:python-botocore-0:1.4.57-5.el7.src", "7Server-RH7-RHOSE-4.7:python2-botocore-0:1.4.57-5.el7.noarch", "7Server-RH7-RHOSE-4.7:runc-0:1.0.0-82.rhaos4.6.git086e841.el7.src", "7Server-RH7-RHOSE-4.7:runc-0:1.0.0-82.rhaos4.6.git086e841.el7.x86_64", "7Server-RH7-RHOSE-4.7:runc-debuginfo-0:1.0.0-82.rhaos4.6.git086e841.el7.x86_64", "8Base-RHOSE-4.7:NetworkManager-1:1.26.0-12.1.rhaos4.7.el8.ppc64le", "8Base-RHOSE-4.7:NetworkManager-1:1.26.0-12.1.rhaos4.7.el8.s390x", "8Base-RHOSE-4.7:NetworkManager-1:1.26.0-12.1.rhaos4.7.el8.src", "8Base-RHOSE-4.7:NetworkManager-1:1.26.0-12.1.rhaos4.7.el8.x86_64", "8Base-RHOSE-4.7:NetworkManager-adsl-1:1.26.0-12.1.rhaos4.7.el8.ppc64le", "8Base-RHOSE-4.7:NetworkManager-adsl-1:1.26.0-12.1.rhaos4.7.el8.s390x", "8Base-RHOSE-4.7:NetworkManager-adsl-1:1.26.0-12.1.rhaos4.7.el8.x86_64", "8Base-RHOSE-4.7:NetworkManager-adsl-debuginfo-1:1.26.0-12.1.rhaos4.7.el8.ppc64le", "8Base-RHOSE-4.7:NetworkManager-adsl-debuginfo-1:1.26.0-12.1.rhaos4.7.el8.s390x", "8Base-RHOSE-4.7:NetworkManager-adsl-debuginfo-1:1.26.0-12.1.rhaos4.7.el8.x86_64", "8Base-RHOSE-4.7:NetworkManager-bluetooth-1:1.26.0-12.1.rhaos4.7.el8.ppc64le", "8Base-RHOSE-4.7:NetworkManager-bluetooth-1:1.26.0-12.1.rhaos4.7.el8.s390x", "8Base-RHOSE-4.7:NetworkManager-bluetooth-1:1.26.0-12.1.rhaos4.7.el8.x86_64", "8Base-RHOSE-4.7:NetworkManager-bluetooth-debuginfo-1:1.26.0-12.1.rhaos4.7.el8.ppc64le", "8Base-RHOSE-4.7:NetworkManager-bluetooth-debuginfo-1:1.26.0-12.1.rhaos4.7.el8.s390x", "8Base-RHOSE-4.7:NetworkManager-bluetooth-debuginfo-1:1.26.0-12.1.rhaos4.7.el8.x86_64", "8Base-RHOSE-4.7:NetworkManager-cloud-setup-1:1.26.0-12.1.rhaos4.7.el8.ppc64le", "8Base-RHOSE-4.7:NetworkManager-cloud-setup-1:1.26.0-12.1.rhaos4.7.el8.s390x", "8Base-RHOSE-4.7:NetworkManager-cloud-setup-1:1.26.0-12.1.rhaos4.7.el8.x86_64", "8Base-RHOSE-4.7:NetworkManager-cloud-setup-debuginfo-1:1.26.0-12.1.rhaos4.7.el8.ppc64le", "8Base-RHOSE-4.7:NetworkManager-cloud-setup-debuginfo-1:1.26.0-12.1.rhaos4.7.el8.s390x", "8Base-RHOSE-4.7:NetworkManager-cloud-setup-debuginfo-1:1.26.0-12.1.rhaos4.7.el8.x86_64", "8Base-RHOSE-4.7:NetworkManager-config-connectivity-redhat-1:1.26.0-12.1.rhaos4.7.el8.noarch", "8Base-RHOSE-4.7:NetworkManager-config-server-1:1.26.0-12.1.rhaos4.7.el8.noarch", "8Base-RHOSE-4.7:NetworkManager-debuginfo-1:1.26.0-12.1.rhaos4.7.el8.ppc64le", "8Base-RHOSE-4.7:NetworkManager-debuginfo-1:1.26.0-12.1.rhaos4.7.el8.s390x", "8Base-RHOSE-4.7:NetworkManager-debuginfo-1:1.26.0-12.1.rhaos4.7.el8.x86_64", "8Base-RHOSE-4.7:NetworkManager-debugsource-1:1.26.0-12.1.rhaos4.7.el8.ppc64le", "8Base-RHOSE-4.7:NetworkManager-debugsource-1:1.26.0-12.1.rhaos4.7.el8.s390x", "8Base-RHOSE-4.7:NetworkManager-debugsource-1:1.26.0-12.1.rhaos4.7.el8.x86_64", "8Base-RHOSE-4.7:NetworkManager-dispatcher-routing-rules-1:1.26.0-12.1.rhaos4.7.el8.noarch", "8Base-RHOSE-4.7:NetworkManager-libnm-1:1.26.0-12.1.rhaos4.7.el8.ppc64le", "8Base-RHOSE-4.7:NetworkManager-libnm-1:1.26.0-12.1.rhaos4.7.el8.s390x", "8Base-RHOSE-4.7:NetworkManager-libnm-1:1.26.0-12.1.rhaos4.7.el8.x86_64", "8Base-RHOSE-4.7:NetworkManager-libnm-debuginfo-1:1.26.0-12.1.rhaos4.7.el8.ppc64le", "8Base-RHOSE-4.7:NetworkManager-libnm-debuginfo-1:1.26.0-12.1.rhaos4.7.el8.s390x", "8Base-RHOSE-4.7:NetworkManager-libnm-debuginfo-1:1.26.0-12.1.rhaos4.7.el8.x86_64", "8Base-RHOSE-4.7:NetworkManager-libnm-devel-1:1.26.0-12.1.rhaos4.7.el8.ppc64le", "8Base-RHOSE-4.7:NetworkManager-libnm-devel-1:1.26.0-12.1.rhaos4.7.el8.s390x", "8Base-RHOSE-4.7:NetworkManager-libnm-devel-1:1.26.0-12.1.rhaos4.7.el8.x86_64", "8Base-RHOSE-4.7:NetworkManager-ovs-1:1.26.0-12.1.rhaos4.7.el8.ppc64le", "8Base-RHOSE-4.7:NetworkManager-ovs-1:1.26.0-12.1.rhaos4.7.el8.s390x", "8Base-RHOSE-4.7:NetworkManager-ovs-1:1.26.0-12.1.rhaos4.7.el8.x86_64", "8Base-RHOSE-4.7:NetworkManager-ovs-debuginfo-1:1.26.0-12.1.rhaos4.7.el8.ppc64le", "8Base-RHOSE-4.7:NetworkManager-ovs-debuginfo-1:1.26.0-12.1.rhaos4.7.el8.s390x", "8Base-RHOSE-4.7:NetworkManager-ovs-debuginfo-1:1.26.0-12.1.rhaos4.7.el8.x86_64", "8Base-RHOSE-4.7:NetworkManager-ppp-1:1.26.0-12.1.rhaos4.7.el8.ppc64le", "8Base-RHOSE-4.7:NetworkManager-ppp-1:1.26.0-12.1.rhaos4.7.el8.s390x", "8Base-RHOSE-4.7:NetworkManager-ppp-1:1.26.0-12.1.rhaos4.7.el8.x86_64", "8Base-RHOSE-4.7:NetworkManager-ppp-debuginfo-1:1.26.0-12.1.rhaos4.7.el8.ppc64le", "8Base-RHOSE-4.7:NetworkManager-ppp-debuginfo-1:1.26.0-12.1.rhaos4.7.el8.s390x", "8Base-RHOSE-4.7:NetworkManager-ppp-debuginfo-1:1.26.0-12.1.rhaos4.7.el8.x86_64", "8Base-RHOSE-4.7:NetworkManager-team-1:1.26.0-12.1.rhaos4.7.el8.ppc64le", "8Base-RHOSE-4.7:NetworkManager-team-1:1.26.0-12.1.rhaos4.7.el8.s390x", "8Base-RHOSE-4.7:NetworkManager-team-1:1.26.0-12.1.rhaos4.7.el8.x86_64", "8Base-RHOSE-4.7:NetworkManager-team-debuginfo-1:1.26.0-12.1.rhaos4.7.el8.ppc64le", "8Base-RHOSE-4.7:NetworkManager-team-debuginfo-1:1.26.0-12.1.rhaos4.7.el8.s390x", "8Base-RHOSE-4.7:NetworkManager-team-debuginfo-1:1.26.0-12.1.rhaos4.7.el8.x86_64", "8Base-RHOSE-4.7:NetworkManager-tui-1:1.26.0-12.1.rhaos4.7.el8.ppc64le", "8Base-RHOSE-4.7:NetworkManager-tui-1:1.26.0-12.1.rhaos4.7.el8.s390x", "8Base-RHOSE-4.7:NetworkManager-tui-1:1.26.0-12.1.rhaos4.7.el8.x86_64", "8Base-RHOSE-4.7:NetworkManager-tui-debuginfo-1:1.26.0-12.1.rhaos4.7.el8.ppc64le", "8Base-RHOSE-4.7:NetworkManager-tui-debuginfo-1:1.26.0-12.1.rhaos4.7.el8.s390x", "8Base-RHOSE-4.7:NetworkManager-tui-debuginfo-1:1.26.0-12.1.rhaos4.7.el8.x86_64", "8Base-RHOSE-4.7:NetworkManager-wifi-1:1.26.0-12.1.rhaos4.7.el8.ppc64le", "8Base-RHOSE-4.7:NetworkManager-wifi-1:1.26.0-12.1.rhaos4.7.el8.s390x", "8Base-RHOSE-4.7:NetworkManager-wifi-1:1.26.0-12.1.rhaos4.7.el8.x86_64", "8Base-RHOSE-4.7:NetworkManager-wifi-debuginfo-1:1.26.0-12.1.rhaos4.7.el8.ppc64le", "8Base-RHOSE-4.7:NetworkManager-wifi-debuginfo-1:1.26.0-12.1.rhaos4.7.el8.s390x", "8Base-RHOSE-4.7:NetworkManager-wifi-debuginfo-1:1.26.0-12.1.rhaos4.7.el8.x86_64", "8Base-RHOSE-4.7:NetworkManager-wwan-1:1.26.0-12.1.rhaos4.7.el8.ppc64le", "8Base-RHOSE-4.7:NetworkManager-wwan-1:1.26.0-12.1.rhaos4.7.el8.s390x", "8Base-RHOSE-4.7:NetworkManager-wwan-1:1.26.0-12.1.rhaos4.7.el8.x86_64", "8Base-RHOSE-4.7:NetworkManager-wwan-debuginfo-1:1.26.0-12.1.rhaos4.7.el8.ppc64le", "8Base-RHOSE-4.7:NetworkManager-wwan-debuginfo-1:1.26.0-12.1.rhaos4.7.el8.s390x", "8Base-RHOSE-4.7:NetworkManager-wwan-debuginfo-1:1.26.0-12.1.rhaos4.7.el8.x86_64", "8Base-RHOSE-4.7:afterburn-0:4.6.0-1.rhaos4.7.el8.ppc64le", "8Base-RHOSE-4.7:afterburn-0:4.6.0-1.rhaos4.7.el8.s390x", "8Base-RHOSE-4.7:afterburn-0:4.6.0-1.rhaos4.7.el8.x86_64", "8Base-RHOSE-4.7:afterburn-debuginfo-0:4.6.0-1.rhaos4.7.el8.ppc64le", "8Base-RHOSE-4.7:afterburn-debuginfo-0:4.6.0-1.rhaos4.7.el8.s390x", "8Base-RHOSE-4.7:afterburn-debuginfo-0:4.6.0-1.rhaos4.7.el8.x86_64", "8Base-RHOSE-4.7:ansible-runner-0:1.4.6-2.el8ar.noarch", "8Base-RHOSE-4.7:ansible-runner-0:1.4.6-2.el8ar.src", "8Base-RHOSE-4.7:ansible-runner-http-0:1.0.0-2.el8ar.noarch", "8Base-RHOSE-4.7:ansible-runner-http-0:1.0.0-2.el8ar.src", "8Base-RHOSE-4.7:atomic-openshift-service-idler-0:4.7.0-202011171454.p0.git.15.675c1c8.el8.ppc64le", "8Base-RHOSE-4.7:atomic-openshift-service-idler-0:4.7.0-202011171454.p0.git.15.675c1c8.el8.s390x", "8Base-RHOSE-4.7:atomic-openshift-service-idler-0:4.7.0-202011171454.p0.git.15.675c1c8.el8.src", "8Base-RHOSE-4.7:atomic-openshift-service-idler-0:4.7.0-202011171454.p0.git.15.675c1c8.el8.x86_64", "8Base-RHOSE-4.7:bootupd-0:0.2.5-2.el8.x86_64", "8Base-RHOSE-4.7:bootupd-debuginfo-0:0.2.5-2.el8.x86_64", "8Base-RHOSE-4.7:clevis-0:15-1.el8.ppc64le", "8Base-RHOSE-4.7:clevis-0:15-1.el8.s390x", "8Base-RHOSE-4.7:clevis-0:15-1.el8.src", "8Base-RHOSE-4.7:clevis-0:15-1.el8.x86_64", "8Base-RHOSE-4.7:clevis-debuginfo-0:15-1.el8.ppc64le", "8Base-RHOSE-4.7:clevis-debuginfo-0:15-1.el8.s390x", "8Base-RHOSE-4.7:clevis-debuginfo-0:15-1.el8.x86_64", "8Base-RHOSE-4.7:clevis-debugsource-0:15-1.el8.ppc64le", "8Base-RHOSE-4.7:clevis-debugsource-0:15-1.el8.s390x", "8Base-RHOSE-4.7:clevis-debugsource-0:15-1.el8.x86_64", "8Base-RHOSE-4.7:clevis-dracut-0:15-1.el8.ppc64le", "8Base-RHOSE-4.7:clevis-dracut-0:15-1.el8.s390x", "8Base-RHOSE-4.7:clevis-dracut-0:15-1.el8.x86_64", "8Base-RHOSE-4.7:clevis-luks-0:15-1.el8.ppc64le", "8Base-RHOSE-4.7:clevis-luks-0:15-1.el8.s390x", "8Base-RHOSE-4.7:clevis-luks-0:15-1.el8.x86_64", "8Base-RHOSE-4.7:clevis-systemd-0:15-1.el8.ppc64le", "8Base-RHOSE-4.7:clevis-systemd-0:15-1.el8.s390x", "8Base-RHOSE-4.7:clevis-systemd-0:15-1.el8.x86_64", "8Base-RHOSE-4.7:clevis-udisks2-0:15-1.el8.ppc64le", "8Base-RHOSE-4.7:clevis-udisks2-0:15-1.el8.s390x", "8Base-RHOSE-4.7:clevis-udisks2-0:15-1.el8.x86_64", "8Base-RHOSE-4.7:clevis-udisks2-debuginfo-0:15-1.el8.ppc64le", "8Base-RHOSE-4.7:clevis-udisks2-debuginfo-0:15-1.el8.s390x", "8Base-RHOSE-4.7:clevis-udisks2-debuginfo-0:15-1.el8.x86_64", "8Base-RHOSE-4.7:conmon-2:2.0.21-2.rhaos4.6.el8.ppc64le", "8Base-RHOSE-4.7:conmon-2:2.0.21-2.rhaos4.6.el8.s390x", "8Base-RHOSE-4.7:conmon-2:2.0.21-2.rhaos4.6.el8.src", "8Base-RHOSE-4.7:conmon-2:2.0.21-2.rhaos4.6.el8.x86_64", "8Base-RHOSE-4.7:console-login-helper-messages-0:0.20.3-1.rhaos4.7.el8.noarch", "8Base-RHOSE-4.7:console-login-helper-messages-0:0.20.3-1.rhaos4.7.el8.src", "8Base-RHOSE-4.7:console-login-helper-messages-issuegen-0:0.20.3-1.rhaos4.7.el8.noarch", "8Base-RHOSE-4.7:console-login-helper-messages-profile-0:0.20.3-1.rhaos4.7.el8.noarch", "8Base-RHOSE-4.7:container-selinux-2:2.151.0-1.rhaos4.7.el8.noarch", "8Base-RHOSE-4.7:container-selinux-2:2.151.0-1.rhaos4.7.el8.src", "8Base-RHOSE-4.7:containernetworking-plugins-0:0.8.6-1.rhaos4.5.el8.ppc64le", "8Base-RHOSE-4.7:containernetworking-plugins-0:0.8.6-1.rhaos4.5.el8.s390x", "8Base-RHOSE-4.7:containernetworking-plugins-0:0.8.6-1.rhaos4.5.el8.src", "8Base-RHOSE-4.7:containernetworking-plugins-0:0.8.6-1.rhaos4.5.el8.x86_64", "8Base-RHOSE-4.7:containernetworking-plugins-debuginfo-0:0.8.6-1.rhaos4.5.el8.ppc64le", "8Base-RHOSE-4.7:containernetworking-plugins-debuginfo-0:0.8.6-1.rhaos4.5.el8.s390x", "8Base-RHOSE-4.7:containernetworking-plugins-debuginfo-0:0.8.6-1.rhaos4.5.el8.x86_64", "8Base-RHOSE-4.7:containernetworking-plugins-debugsource-0:0.8.6-1.rhaos4.5.el8.ppc64le", "8Base-RHOSE-4.7:containernetworking-plugins-debugsource-0:0.8.6-1.rhaos4.5.el8.s390x", "8Base-RHOSE-4.7:containernetworking-plugins-debugsource-0:0.8.6-1.rhaos4.5.el8.x86_64", "8Base-RHOSE-4.7:coreos-installer-0:0.8.0-3.rhaos4.7.el8.ppc64le", "8Base-RHOSE-4.7:coreos-installer-0:0.8.0-3.rhaos4.7.el8.s390x", "8Base-RHOSE-4.7:coreos-installer-0:0.8.0-3.rhaos4.7.el8.src", "8Base-RHOSE-4.7:coreos-installer-0:0.8.0-3.rhaos4.7.el8.x86_64", "8Base-RHOSE-4.7:coreos-installer-bootinfra-0:0.8.0-3.rhaos4.7.el8.ppc64le", "8Base-RHOSE-4.7:coreos-installer-bootinfra-0:0.8.0-3.rhaos4.7.el8.s390x", "8Base-RHOSE-4.7:coreos-installer-bootinfra-debuginfo-0:0.8.0-3.rhaos4.7.el8.ppc64le", "8Base-RHOSE-4.7:coreos-installer-bootinfra-debuginfo-0:0.8.0-3.rhaos4.7.el8.s390x", "8Base-RHOSE-4.7:coreos-installer-bootinfra-debuginfo-0:0.8.0-3.rhaos4.7.el8.x86_64", "8Base-RHOSE-4.7:coreos-installer-debuginfo-0:0.8.0-3.rhaos4.7.el8.ppc64le", "8Base-RHOSE-4.7:coreos-installer-debuginfo-0:0.8.0-3.rhaos4.7.el8.s390x", "8Base-RHOSE-4.7:coreos-installer-debuginfo-0:0.8.0-3.rhaos4.7.el8.x86_64", "8Base-RHOSE-4.7:coreos-installer-debugsource-0:0.8.0-3.rhaos4.7.el8.ppc64le", "8Base-RHOSE-4.7:coreos-installer-debugsource-0:0.8.0-3.rhaos4.7.el8.s390x", "8Base-RHOSE-4.7:coreos-installer-debugsource-0:0.8.0-3.rhaos4.7.el8.x86_64", "8Base-RHOSE-4.7:cri-o-0:1.20.0-0.rhaos4.7.git8921e00.el8.51.ppc64le", "8Base-RHOSE-4.7:cri-o-0:1.20.0-0.rhaos4.7.git8921e00.el8.51.s390x", "8Base-RHOSE-4.7:cri-o-0:1.20.0-0.rhaos4.7.git8921e00.el8.51.src", "8Base-RHOSE-4.7:cri-o-0:1.20.0-0.rhaos4.7.git8921e00.el8.51.x86_64", "8Base-RHOSE-4.7:cri-o-debuginfo-0:1.20.0-0.rhaos4.7.git8921e00.el8.51.ppc64le", "8Base-RHOSE-4.7:cri-o-debuginfo-0:1.20.0-0.rhaos4.7.git8921e00.el8.51.s390x", "8Base-RHOSE-4.7:cri-o-debuginfo-0:1.20.0-0.rhaos4.7.git8921e00.el8.51.x86_64", "8Base-RHOSE-4.7:cri-o-debugsource-0:1.20.0-0.rhaos4.7.git8921e00.el8.51.ppc64le", "8Base-RHOSE-4.7:cri-o-debugsource-0:1.20.0-0.rhaos4.7.git8921e00.el8.51.s390x", "8Base-RHOSE-4.7:cri-o-debugsource-0:1.20.0-0.rhaos4.7.git8921e00.el8.51.x86_64", "8Base-RHOSE-4.7:cri-tools-0:1.20.0-1.el8.ppc64le", "8Base-RHOSE-4.7:cri-tools-0:1.20.0-1.el8.s390x", "8Base-RHOSE-4.7:cri-tools-0:1.20.0-1.el8.src", "8Base-RHOSE-4.7:cri-tools-0:1.20.0-1.el8.x86_64", "8Base-RHOSE-4.7:cri-tools-debuginfo-0:1.20.0-1.el8.ppc64le", "8Base-RHOSE-4.7:cri-tools-debuginfo-0:1.20.0-1.el8.s390x", "8Base-RHOSE-4.7:cri-tools-debuginfo-0:1.20.0-1.el8.x86_64", "8Base-RHOSE-4.7:cri-tools-debugsource-0:1.20.0-1.el8.ppc64le", "8Base-RHOSE-4.7:cri-tools-debugsource-0:1.20.0-1.el8.s390x", "8Base-RHOSE-4.7:cri-tools-debugsource-0:1.20.0-1.el8.x86_64", "8Base-RHOSE-4.7:dracut-0:049-95.git20200804.el8_3.4.ppc64le", "8Base-RHOSE-4.7:dracut-0:049-95.git20200804.el8_3.4.s390x", "8Base-RHOSE-4.7:dracut-0:049-95.git20200804.el8_3.4.src", "8Base-RHOSE-4.7:dracut-0:049-95.git20200804.el8_3.4.x86_64", "8Base-RHOSE-4.7:dracut-caps-0:049-95.git20200804.el8_3.4.ppc64le", "8Base-RHOSE-4.7:dracut-caps-0:049-95.git20200804.el8_3.4.s390x", "8Base-RHOSE-4.7:dracut-caps-0:049-95.git20200804.el8_3.4.x86_64", "8Base-RHOSE-4.7:dracut-config-generic-0:049-95.git20200804.el8_3.4.ppc64le", "8Base-RHOSE-4.7:dracut-config-generic-0:049-95.git20200804.el8_3.4.s390x", "8Base-RHOSE-4.7:dracut-config-generic-0:049-95.git20200804.el8_3.4.x86_64", "8Base-RHOSE-4.7:dracut-config-rescue-0:049-95.git20200804.el8_3.4.ppc64le", "8Base-RHOSE-4.7:dracut-config-rescue-0:049-95.git20200804.el8_3.4.s390x", "8Base-RHOSE-4.7:dracut-config-rescue-0:049-95.git20200804.el8_3.4.x86_64", "8Base-RHOSE-4.7:dracut-debuginfo-0:049-95.git20200804.el8_3.4.ppc64le", "8Base-RHOSE-4.7:dracut-debuginfo-0:049-95.git20200804.el8_3.4.s390x", "8Base-RHOSE-4.7:dracut-debuginfo-0:049-95.git20200804.el8_3.4.x86_64", "8Base-RHOSE-4.7:dracut-debugsource-0:049-95.git20200804.el8_3.4.ppc64le", "8Base-RHOSE-4.7:dracut-debugsource-0:049-95.git20200804.el8_3.4.s390x", "8Base-RHOSE-4.7:dracut-debugsource-0:049-95.git20200804.el8_3.4.x86_64", "8Base-RHOSE-4.7:dracut-live-0:049-95.git20200804.el8_3.4.ppc64le", "8Base-RHOSE-4.7:dracut-live-0:049-95.git20200804.el8_3.4.s390x", "8Base-RHOSE-4.7:dracut-live-0:049-95.git20200804.el8_3.4.x86_64", "8Base-RHOSE-4.7:dracut-network-0:049-95.git20200804.el8_3.4.ppc64le", "8Base-RHOSE-4.7:dracut-network-0:049-95.git20200804.el8_3.4.s390x", "8Base-RHOSE-4.7:dracut-network-0:049-95.git20200804.el8_3.4.x86_64", "8Base-RHOSE-4.7:dracut-squash-0:049-95.git20200804.el8_3.4.ppc64le", "8Base-RHOSE-4.7:dracut-squash-0:049-95.git20200804.el8_3.4.s390x", "8Base-RHOSE-4.7:dracut-squash-0:049-95.git20200804.el8_3.4.x86_64", "8Base-RHOSE-4.7:dracut-tools-0:049-95.git20200804.el8_3.4.ppc64le", "8Base-RHOSE-4.7:dracut-tools-0:049-95.git20200804.el8_3.4.s390x", "8Base-RHOSE-4.7:dracut-tools-0:049-95.git20200804.el8_3.4.x86_64", "8Base-RHOSE-4.7:faq-0:0.0.6-5.el8.ppc64le", "8Base-RHOSE-4.7:faq-0:0.0.6-5.el8.s390x", "8Base-RHOSE-4.7:faq-0:0.0.6-5.el8.src", "8Base-RHOSE-4.7:faq-0:0.0.6-5.el8.x86_64", "8Base-RHOSE-4.7:golang-github-prometheus-promu-0:0.5.0-2.git642a960.el8.ppc64le", "8Base-RHOSE-4.7:golang-github-prometheus-promu-0:0.5.0-2.git642a960.el8.s390x", "8Base-RHOSE-4.7:golang-github-prometheus-promu-0:0.5.0-2.git642a960.el8.src", "8Base-RHOSE-4.7:golang-github-prometheus-promu-0:0.5.0-2.git642a960.el8.x86_64", "8Base-RHOSE-4.7:gperftools-0:2.6.3-2.el8ost.ppc64le", "8Base-RHOSE-4.7:gperftools-0:2.6.3-2.el8ost.s390x", "8Base-RHOSE-4.7:gperftools-0:2.6.3-2.el8ost.src", "8Base-RHOSE-4.7:gperftools-0:2.6.3-2.el8ost.x86_64", "8Base-RHOSE-4.7:gperftools-debugsource-0:2.6.3-2.el8ost.ppc64le", "8Base-RHOSE-4.7:gperftools-debugsource-0:2.6.3-2.el8ost.s390x", "8Base-RHOSE-4.7:gperftools-debugsource-0:2.6.3-2.el8ost.x86_64", "8Base-RHOSE-4.7:gperftools-devel-0:2.6.3-2.el8ost.ppc64le", "8Base-RHOSE-4.7:gperftools-devel-0:2.6.3-2.el8ost.s390x", "8Base-RHOSE-4.7:gperftools-devel-0:2.6.3-2.el8ost.x86_64", "8Base-RHOSE-4.7:gperftools-libs-0:2.6.3-2.el8ost.ppc64le", "8Base-RHOSE-4.7:gperftools-libs-0:2.6.3-2.el8ost.s390x", "8Base-RHOSE-4.7:gperftools-libs-0:2.6.3-2.el8ost.x86_64", "8Base-RHOSE-4.7:gperftools-libs-debuginfo-0:2.6.3-2.el8ost.ppc64le", "8Base-RHOSE-4.7:gperftools-libs-debuginfo-0:2.6.3-2.el8ost.s390x", "8Base-RHOSE-4.7:gperftools-libs-debuginfo-0:2.6.3-2.el8ost.x86_64", "8Base-RHOSE-4.7:grpc-0:1.18.0-4.el8ost.ppc64le", "8Base-RHOSE-4.7:grpc-0:1.18.0-4.el8ost.s390x", "8Base-RHOSE-4.7:grpc-0:1.18.0-4.el8ost.src", "8Base-RHOSE-4.7:grpc-0:1.18.0-4.el8ost.x86_64", "8Base-RHOSE-4.7:grpc-cli-0:1.18.0-4.el8ost.ppc64le", "8Base-RHOSE-4.7:grpc-cli-0:1.18.0-4.el8ost.s390x", "8Base-RHOSE-4.7:grpc-cli-0:1.18.0-4.el8ost.x86_64", "8Base-RHOSE-4.7:grpc-cli-debuginfo-0:1.18.0-4.el8ost.ppc64le", "8Base-RHOSE-4.7:grpc-cli-debuginfo-0:1.18.0-4.el8ost.s390x", "8Base-RHOSE-4.7:grpc-cli-debuginfo-0:1.18.0-4.el8ost.x86_64", "8Base-RHOSE-4.7:grpc-debuginfo-0:1.18.0-4.el8ost.ppc64le", "8Base-RHOSE-4.7:grpc-debuginfo-0:1.18.0-4.el8ost.s390x", "8Base-RHOSE-4.7:grpc-debuginfo-0:1.18.0-4.el8ost.x86_64", "8Base-RHOSE-4.7:grpc-debugsource-0:1.18.0-4.el8ost.ppc64le", "8Base-RHOSE-4.7:grpc-debugsource-0:1.18.0-4.el8ost.s390x", "8Base-RHOSE-4.7:grpc-debugsource-0:1.18.0-4.el8ost.x86_64", "8Base-RHOSE-4.7:grpc-devel-0:1.18.0-4.el8ost.ppc64le", "8Base-RHOSE-4.7:grpc-devel-0:1.18.0-4.el8ost.s390x", "8Base-RHOSE-4.7:grpc-devel-0:1.18.0-4.el8ost.x86_64", "8Base-RHOSE-4.7:grpc-plugins-0:1.18.0-4.el8ost.ppc64le", "8Base-RHOSE-4.7:grpc-plugins-0:1.18.0-4.el8ost.s390x", "8Base-RHOSE-4.7:grpc-plugins-0:1.18.0-4.el8ost.x86_64", "8Base-RHOSE-4.7:grpc-plugins-debuginfo-0:1.18.0-4.el8ost.ppc64le", "8Base-RHOSE-4.7:grpc-plugins-debuginfo-0:1.18.0-4.el8ost.s390x", "8Base-RHOSE-4.7:grpc-plugins-debuginfo-0:1.18.0-4.el8ost.x86_64", "8Base-RHOSE-4.7:haproxy-0:2.0.19-1.el8.src", "8Base-RHOSE-4.7:haproxy-debugsource-0:2.0.19-1.el8.ppc64le", "8Base-RHOSE-4.7:haproxy-debugsource-0:2.0.19-1.el8.s390x", "8Base-RHOSE-4.7:haproxy-debugsource-0:2.0.19-1.el8.x86_64", "8Base-RHOSE-4.7:haproxy20-0:2.0.19-1.el8.ppc64le", "8Base-RHOSE-4.7:haproxy20-0:2.0.19-1.el8.s390x", "8Base-RHOSE-4.7:haproxy20-0:2.0.19-1.el8.x86_64", "8Base-RHOSE-4.7:haproxy20-debuginfo-0:2.0.19-1.el8.ppc64le", "8Base-RHOSE-4.7:haproxy20-debuginfo-0:2.0.19-1.el8.s390x", "8Base-RHOSE-4.7:haproxy20-debuginfo-0:2.0.19-1.el8.x86_64", "8Base-RHOSE-4.7:inotify-tools-0:3.20.1-2.el8.ppc64le", "8Base-RHOSE-4.7:inotify-tools-0:3.20.1-2.el8.s390x", "8Base-RHOSE-4.7:inotify-tools-0:3.20.1-2.el8.src", "8Base-RHOSE-4.7:inotify-tools-0:3.20.1-2.el8.x86_64", "8Base-RHOSE-4.7:inotify-tools-debuginfo-0:3.20.1-2.el8.ppc64le", "8Base-RHOSE-4.7:inotify-tools-debuginfo-0:3.20.1-2.el8.s390x", "8Base-RHOSE-4.7:inotify-tools-debuginfo-0:3.20.1-2.el8.x86_64", "8Base-RHOSE-4.7:inotify-tools-debugsource-0:3.20.1-2.el8.ppc64le", "8Base-RHOSE-4.7:inotify-tools-debugsource-0:3.20.1-2.el8.s390x", "8Base-RHOSE-4.7:inotify-tools-debugsource-0:3.20.1-2.el8.x86_64", "8Base-RHOSE-4.7:inotify-tools-devel-0:3.20.1-2.el8.ppc64le", "8Base-RHOSE-4.7:inotify-tools-devel-0:3.20.1-2.el8.s390x", "8Base-RHOSE-4.7:inotify-tools-devel-0:3.20.1-2.el8.x86_64", "8Base-RHOSE-4.7:ironic-images-0:15.1-20210114.1.el8.noarch", "8Base-RHOSE-4.7:ironic-images-0:15.1-20210114.1.el8.src", "8Base-RHOSE-4.7:ironic-images-all-0:15.1-20210114.1.el8.noarch", "8Base-RHOSE-4.7:ironic-images-ipa-ppc64le-0:15.1-20210114.1.el8.noarch", "8Base-RHOSE-4.7:ironic-images-ipa-x86_64-0:15.1-20210114.1.el8.noarch", "8Base-RHOSE-4.7:jenkins-0:2.263.3.1612449007-1.el8.noarch", "8Base-RHOSE-4.7:jenkins-0:2.263.3.1612449007-1.el8.src", "8Base-RHOSE-4.7:jenkins-2-plugins-0:4.7.1611636915-1.el8.noarch", "8Base-RHOSE-4.7:jenkins-2-plugins-0:4.7.1611636915-1.el8.src", "8Base-RHOSE-4.7:jq-0:1.6-2.el8.ppc64le", "8Base-RHOSE-4.7:jq-0:1.6-2.el8.s390x", "8Base-RHOSE-4.7:jq-0:1.6-2.el8.src", "8Base-RHOSE-4.7:jq-0:1.6-2.el8.x86_64", "8Base-RHOSE-4.7:jq-debuginfo-0:1.6-2.el8.ppc64le", "8Base-RHOSE-4.7:jq-debuginfo-0:1.6-2.el8.s390x", "8Base-RHOSE-4.7:jq-debuginfo-0:1.6-2.el8.x86_64", "8Base-RHOSE-4.7:jq-debugsource-0:1.6-2.el8.ppc64le", "8Base-RHOSE-4.7:jq-debugsource-0:1.6-2.el8.s390x", "8Base-RHOSE-4.7:jq-debugsource-0:1.6-2.el8.x86_64", "8Base-RHOSE-4.7:jq-devel-0:1.6-2.el8.ppc64le", "8Base-RHOSE-4.7:jq-devel-0:1.6-2.el8.s390x", "8Base-RHOSE-4.7:jq-devel-0:1.6-2.el8.x86_64", "8Base-RHOSE-4.7:kuryr-binding-scripts-0:1.1.1-0.20190923160834.41e6964.el8ost.noarch", "8Base-RHOSE-4.7:libnftnl-0:1.1.5-4.el8.ppc64le", "8Base-RHOSE-4.7:libnftnl-0:1.1.5-4.el8.s390x", "8Base-RHOSE-4.7:libnftnl-0:1.1.5-4.el8.src", "8Base-RHOSE-4.7:libnftnl-0:1.1.5-4.el8.x86_64", "8Base-RHOSE-4.7:libnftnl-debuginfo-0:1.1.5-4.el8.ppc64le", "8Base-RHOSE-4.7:libnftnl-debuginfo-0:1.1.5-4.el8.s390x", "8Base-RHOSE-4.7:libnftnl-debuginfo-0:1.1.5-4.el8.x86_64", "8Base-RHOSE-4.7:libnftnl-debugsource-0:1.1.5-4.el8.ppc64le", "8Base-RHOSE-4.7:libnftnl-debugsource-0:1.1.5-4.el8.s390x", "8Base-RHOSE-4.7:libnftnl-debugsource-0:1.1.5-4.el8.x86_64", "8Base-RHOSE-4.7:libnftnl-devel-0:1.1.5-4.el8.ppc64le", "8Base-RHOSE-4.7:libnftnl-devel-0:1.1.5-4.el8.s390x", "8Base-RHOSE-4.7:libnftnl-devel-0:1.1.5-4.el8.x86_64", "8Base-RHOSE-4.7:libsodium-0:1.0.16-4.5.el8ost.ppc64le", "8Base-RHOSE-4.7:libsodium-0:1.0.16-4.5.el8ost.s390x", "8Base-RHOSE-4.7:libsodium-0:1.0.16-4.5.el8ost.src", "8Base-RHOSE-4.7:libsodium-0:1.0.16-4.5.el8ost.x86_64", "8Base-RHOSE-4.7:libsodium-debuginfo-0:1.0.16-4.5.el8ost.ppc64le", "8Base-RHOSE-4.7:libsodium-debuginfo-0:1.0.16-4.5.el8ost.s390x", "8Base-RHOSE-4.7:libsodium-debuginfo-0:1.0.16-4.5.el8ost.x86_64", "8Base-RHOSE-4.7:libsodium-debugsource-0:1.0.16-4.5.el8ost.ppc64le", "8Base-RHOSE-4.7:libsodium-debugsource-0:1.0.16-4.5.el8ost.s390x", "8Base-RHOSE-4.7:libsodium-debugsource-0:1.0.16-4.5.el8ost.x86_64", "8Base-RHOSE-4.7:libsodium-devel-0:1.0.16-4.5.el8ost.ppc64le", "8Base-RHOSE-4.7:libsodium-devel-0:1.0.16-4.5.el8ost.s390x", "8Base-RHOSE-4.7:libsodium-devel-0:1.0.16-4.5.el8ost.x86_64", "8Base-RHOSE-4.7:libsodium-static-0:1.0.16-4.5.el8ost.ppc64le", "8Base-RHOSE-4.7:libsodium-static-0:1.0.16-4.5.el8ost.s390x", "8Base-RHOSE-4.7:libsodium-static-0:1.0.16-4.5.el8ost.x86_64", "8Base-RHOSE-4.7:libunwind-0:1.2.1-5.el8.ppc64le", "8Base-RHOSE-4.7:libunwind-0:1.2.1-5.el8.src", "8Base-RHOSE-4.7:libunwind-0:1.2.1-5.el8.x86_64", "8Base-RHOSE-4.7:libunwind-debuginfo-0:1.2.1-5.el8.ppc64le", "8Base-RHOSE-4.7:libunwind-debuginfo-0:1.2.1-5.el8.x86_64", "8Base-RHOSE-4.7:libunwind-debugsource-0:1.2.1-5.el8.ppc64le", "8Base-RHOSE-4.7:libunwind-debugsource-0:1.2.1-5.el8.x86_64", "8Base-RHOSE-4.7:libunwind-devel-0:1.2.1-5.el8.ppc64le", "8Base-RHOSE-4.7:libunwind-devel-0:1.2.1-5.el8.x86_64", "8Base-RHOSE-4.7:network-scripts-openvswitch2.13-0:2.13.0-79.el8fdp.ppc64le", "8Base-RHOSE-4.7:network-scripts-openvswitch2.13-0:2.13.0-79.el8fdp.s390x", "8Base-RHOSE-4.7:network-scripts-openvswitch2.13-0:2.13.0-79.el8fdp.x86_64", "8Base-RHOSE-4.7:octavia-amphora-image-x86_64-0:17.0-20200606.1.el8ost.noarch", "8Base-RHOSE-4.7:openshift-0:4.7.0-202102060108.p0.git.97095.7271b90.el8.src", "8Base-RHOSE-4.7:openshift-clients-0:4.7.0-202102032256.p0.git.3951.0e656ef.el8.ppc64le", "8Base-RHOSE-4.7:openshift-clients-0:4.7.0-202102032256.p0.git.3951.0e656ef.el8.s390x", "8Base-RHOSE-4.7:openshift-clients-0:4.7.0-202102032256.p0.git.3951.0e656ef.el8.src", "8Base-RHOSE-4.7:openshift-clients-0:4.7.0-202102032256.p0.git.3951.0e656ef.el8.x86_64", "8Base-RHOSE-4.7:openshift-clients-redistributable-0:4.7.0-202102032256.p0.git.3951.0e656ef.el8.x86_64", "8Base-RHOSE-4.7:openshift-eventrouter-0:0.2-4.git7c289cc.el8.ppc64le", "8Base-RHOSE-4.7:openshift-eventrouter-0:0.2-4.git7c289cc.el8.s390x", "8Base-RHOSE-4.7:openshift-eventrouter-0:0.2-4.git7c289cc.el8.src", "8Base-RHOSE-4.7:openshift-eventrouter-0:0.2-4.git7c289cc.el8.x86_64", "8Base-RHOSE-4.7:openshift-eventrouter-debuginfo-0:0.2-4.git7c289cc.el8.ppc64le", "8Base-RHOSE-4.7:openshift-eventrouter-debuginfo-0:0.2-4.git7c289cc.el8.s390x", "8Base-RHOSE-4.7:openshift-eventrouter-debuginfo-0:0.2-4.git7c289cc.el8.x86_64", "8Base-RHOSE-4.7:openshift-eventrouter-debugsource-0:0.2-4.git7c289cc.el8.ppc64le", "8Base-RHOSE-4.7:openshift-eventrouter-debugsource-0:0.2-4.git7c289cc.el8.s390x", "8Base-RHOSE-4.7:openshift-eventrouter-debugsource-0:0.2-4.git7c289cc.el8.x86_64", "8Base-RHOSE-4.7:openshift-hyperkube-0:4.7.0-202102060108.p0.git.97095.7271b90.el8.ppc64le", "8Base-RHOSE-4.7:openshift-hyperkube-0:4.7.0-202102060108.p0.git.97095.7271b90.el8.s390x", "8Base-RHOSE-4.7:openshift-hyperkube-0:4.7.0-202102060108.p0.git.97095.7271b90.el8.x86_64", "8Base-RHOSE-4.7:openshift-kuryr-0:4.7.0-202101262230.p0.git.2494.cd95ce5.el8.src", "8Base-RHOSE-4.7:openshift-kuryr-cni-0:4.7.0-202101262230.p0.git.2494.cd95ce5.el8.noarch", "8Base-RHOSE-4.7:openshift-kuryr-common-0:4.7.0-202101262230.p0.git.2494.cd95ce5.el8.noarch", "8Base-RHOSE-4.7:openshift-kuryr-controller-0:4.7.0-202101262230.p0.git.2494.cd95ce5.el8.noarch", "8Base-RHOSE-4.7:openstack-ironic-1:16.0.4-0.20210203051223.7d74ea0.el8.src", "8Base-RHOSE-4.7:openstack-ironic-api-1:16.0.4-0.20210203051223.7d74ea0.el8.noarch", "8Base-RHOSE-4.7:openstack-ironic-common-1:16.0.4-0.20210203051223.7d74ea0.el8.noarch", "8Base-RHOSE-4.7:openstack-ironic-conductor-1:16.0.4-0.20210203051223.7d74ea0.el8.noarch", "8Base-RHOSE-4.7:openstack-ironic-inspector-0:10.4.1-0.20201123161216.70fccec.el8.noarch", "8Base-RHOSE-4.7:openstack-ironic-inspector-0:10.4.1-0.20201123161216.70fccec.el8.src", "8Base-RHOSE-4.7:openstack-ironic-inspector-api-0:10.4.1-0.20201123161216.70fccec.el8.noarch", "8Base-RHOSE-4.7:openstack-ironic-inspector-conductor-0:10.4.1-0.20201123161216.70fccec.el8.noarch", "8Base-RHOSE-4.7:openstack-ironic-inspector-dnsmasq-0:10.4.1-0.20201123161216.70fccec.el8.noarch", "8Base-RHOSE-4.7:openstack-ironic-python-agent-0:6.4.3-0.20201217171210.bd45db1.el8.noarch", "8Base-RHOSE-4.7:openstack-ironic-python-agent-0:6.4.3-0.20201217171210.bd45db1.el8.src", "8Base-RHOSE-4.7:openvswitch2.13-0:2.13.0-79.el8fdp.ppc64le", "8Base-RHOSE-4.7:openvswitch2.13-0:2.13.0-79.el8fdp.s390x", "8Base-RHOSE-4.7:openvswitch2.13-0:2.13.0-79.el8fdp.src", "8Base-RHOSE-4.7:openvswitch2.13-0:2.13.0-79.el8fdp.x86_64", "8Base-RHOSE-4.7:openvswitch2.13-debuginfo-0:2.13.0-79.el8fdp.ppc64le", "8Base-RHOSE-4.7:openvswitch2.13-debuginfo-0:2.13.0-79.el8fdp.s390x", "8Base-RHOSE-4.7:openvswitch2.13-debuginfo-0:2.13.0-79.el8fdp.x86_64", "8Base-RHOSE-4.7:openvswitch2.13-debugsource-0:2.13.0-79.el8fdp.ppc64le", "8Base-RHOSE-4.7:openvswitch2.13-debugsource-0:2.13.0-79.el8fdp.s390x", "8Base-RHOSE-4.7:openvswitch2.13-debugsource-0:2.13.0-79.el8fdp.x86_64", "8Base-RHOSE-4.7:openvswitch2.13-devel-0:2.13.0-79.el8fdp.ppc64le", "8Base-RHOSE-4.7:openvswitch2.13-devel-0:2.13.0-79.el8fdp.s390x", "8Base-RHOSE-4.7:openvswitch2.13-devel-0:2.13.0-79.el8fdp.x86_64", "8Base-RHOSE-4.7:openvswitch2.13-test-0:2.13.0-79.el8fdp.noarch", "8Base-RHOSE-4.7:ostree-0:2020.7-1.el8.ppc64le", "8Base-RHOSE-4.7:ostree-0:2020.7-1.el8.s390x", "8Base-RHOSE-4.7:ostree-0:2020.7-1.el8.src", "8Base-RHOSE-4.7:ostree-0:2020.7-1.el8.x86_64", "8Base-RHOSE-4.7:ostree-debuginfo-0:2020.7-1.el8.ppc64le", "8Base-RHOSE-4.7:ostree-debuginfo-0:2020.7-1.el8.s390x", "8Base-RHOSE-4.7:ostree-debuginfo-0:2020.7-1.el8.x86_64", "8Base-RHOSE-4.7:ostree-debugsource-0:2020.7-1.el8.ppc64le", "8Base-RHOSE-4.7:ostree-debugsource-0:2020.7-1.el8.s390x", "8Base-RHOSE-4.7:ostree-debugsource-0:2020.7-1.el8.x86_64", "8Base-RHOSE-4.7:ostree-devel-0:2020.7-1.el8.ppc64le", "8Base-RHOSE-4.7:ostree-devel-0:2020.7-1.el8.s390x", "8Base-RHOSE-4.7:ostree-devel-0:2020.7-1.el8.x86_64", "8Base-RHOSE-4.7:ostree-grub2-0:2020.7-1.el8.ppc64le", "8Base-RHOSE-4.7:ostree-grub2-0:2020.7-1.el8.x86_64", "8Base-RHOSE-4.7:ostree-libs-0:2020.7-1.el8.ppc64le", "8Base-RHOSE-4.7:ostree-libs-0:2020.7-1.el8.s390x", "8Base-RHOSE-4.7:ostree-libs-0:2020.7-1.el8.x86_64", "8Base-RHOSE-4.7:ostree-libs-debuginfo-0:2020.7-1.el8.ppc64le", "8Base-RHOSE-4.7:ostree-libs-debuginfo-0:2020.7-1.el8.s390x", "8Base-RHOSE-4.7:ostree-libs-debuginfo-0:2020.7-1.el8.x86_64", "8Base-RHOSE-4.7:ovn2.13-0:20.09.0-21.el8fdn.ppc64le", "8Base-RHOSE-4.7:ovn2.13-0:20.09.0-21.el8fdn.s390x", "8Base-RHOSE-4.7:ovn2.13-0:20.09.0-21.el8fdn.src", "8Base-RHOSE-4.7:ovn2.13-0:20.09.0-21.el8fdn.x86_64", "8Base-RHOSE-4.7:ovn2.13-central-0:20.09.0-21.el8fdn.ppc64le", "8Base-RHOSE-4.7:ovn2.13-central-0:20.09.0-21.el8fdn.s390x", "8Base-RHOSE-4.7:ovn2.13-central-0:20.09.0-21.el8fdn.x86_64", "8Base-RHOSE-4.7:ovn2.13-central-debuginfo-0:20.09.0-21.el8fdn.ppc64le", "8Base-RHOSE-4.7:ovn2.13-central-debuginfo-0:20.09.0-21.el8fdn.s390x", "8Base-RHOSE-4.7:ovn2.13-central-debuginfo-0:20.09.0-21.el8fdn.x86_64", "8Base-RHOSE-4.7:ovn2.13-debuginfo-0:20.09.0-21.el8fdn.ppc64le", "8Base-RHOSE-4.7:ovn2.13-debuginfo-0:20.09.0-21.el8fdn.s390x", "8Base-RHOSE-4.7:ovn2.13-debuginfo-0:20.09.0-21.el8fdn.x86_64", "8Base-RHOSE-4.7:ovn2.13-debugsource-0:20.09.0-21.el8fdn.ppc64le", "8Base-RHOSE-4.7:ovn2.13-debugsource-0:20.09.0-21.el8fdn.s390x", "8Base-RHOSE-4.7:ovn2.13-debugsource-0:20.09.0-21.el8fdn.x86_64", "8Base-RHOSE-4.7:ovn2.13-host-0:20.09.0-21.el8fdn.ppc64le", "8Base-RHOSE-4.7:ovn2.13-host-0:20.09.0-21.el8fdn.s390x", "8Base-RHOSE-4.7:ovn2.13-host-0:20.09.0-21.el8fdn.x86_64", "8Base-RHOSE-4.7:ovn2.13-host-debuginfo-0:20.09.0-21.el8fdn.ppc64le", "8Base-RHOSE-4.7:ovn2.13-host-debuginfo-0:20.09.0-21.el8fdn.s390x", "8Base-RHOSE-4.7:ovn2.13-host-debuginfo-0:20.09.0-21.el8fdn.x86_64", "8Base-RHOSE-4.7:ovn2.13-vtep-0:20.09.0-21.el8fdn.ppc64le", "8Base-RHOSE-4.7:ovn2.13-vtep-0:20.09.0-21.el8fdn.s390x", "8Base-RHOSE-4.7:ovn2.13-vtep-0:20.09.0-21.el8fdn.x86_64", "8Base-RHOSE-4.7:ovn2.13-vtep-debuginfo-0:20.09.0-21.el8fdn.ppc64le", "8Base-RHOSE-4.7:ovn2.13-vtep-debuginfo-0:20.09.0-21.el8fdn.s390x", "8Base-RHOSE-4.7:ovn2.13-vtep-debuginfo-0:20.09.0-21.el8fdn.x86_64", "8Base-RHOSE-4.7:powerpc-utils-0:1.3.6-12.el8_3.ppc64le", "8Base-RHOSE-4.7:powerpc-utils-0:1.3.6-12.el8_3.src", "8Base-RHOSE-4.7:powerpc-utils-core-0:1.3.6-12.el8_3.ppc64le", "8Base-RHOSE-4.7:powerpc-utils-core-debuginfo-0:1.3.6-12.el8_3.ppc64le", "8Base-RHOSE-4.7:powerpc-utils-debugsource-0:1.3.6-12.el8_3.ppc64le", "8Base-RHOSE-4.7:pprof-0:2.6.3-2.el8ost.noarch", "8Base-RHOSE-4.7:prometheus-promu-0:0.5.0-2.git642a960.el8.ppc64le", "8Base-RHOSE-4.7:prometheus-promu-0:0.5.0-2.git642a960.el8.s390x", "8Base-RHOSE-4.7:prometheus-promu-0:0.5.0-2.git642a960.el8.x86_64", "8Base-RHOSE-4.7:protobuf-0:3.6.1-4.el8ost.ppc64le", "8Base-RHOSE-4.7:protobuf-0:3.6.1-4.el8ost.s390x", "8Base-RHOSE-4.7:protobuf-0:3.6.1-4.el8ost.src", "8Base-RHOSE-4.7:protobuf-0:3.6.1-4.el8ost.x86_64", "8Base-RHOSE-4.7:protobuf-compiler-0:3.6.1-4.el8ost.ppc64le", "8Base-RHOSE-4.7:protobuf-compiler-0:3.6.1-4.el8ost.s390x", "8Base-RHOSE-4.7:protobuf-compiler-0:3.6.1-4.el8ost.x86_64", "8Base-RHOSE-4.7:protobuf-compiler-debuginfo-0:3.6.1-4.el8ost.ppc64le", "8Base-RHOSE-4.7:protobuf-compiler-debuginfo-0:3.6.1-4.el8ost.s390x", "8Base-RHOSE-4.7:protobuf-compiler-debuginfo-0:3.6.1-4.el8ost.x86_64", "8Base-RHOSE-4.7:protobuf-debuginfo-0:3.6.1-4.el8ost.ppc64le", "8Base-RHOSE-4.7:protobuf-debuginfo-0:3.6.1-4.el8ost.s390x", "8Base-RHOSE-4.7:protobuf-debuginfo-0:3.6.1-4.el8ost.x86_64", "8Base-RHOSE-4.7:protobuf-debugsource-0:3.6.1-4.el8ost.ppc64le", "8Base-RHOSE-4.7:protobuf-debugsource-0:3.6.1-4.el8ost.s390x", "8Base-RHOSE-4.7:protobuf-debugsource-0:3.6.1-4.el8ost.x86_64", "8Base-RHOSE-4.7:protobuf-devel-0:3.6.1-4.el8ost.ppc64le", "8Base-RHOSE-4.7:protobuf-devel-0:3.6.1-4.el8ost.s390x", "8Base-RHOSE-4.7:protobuf-devel-0:3.6.1-4.el8ost.x86_64", "8Base-RHOSE-4.7:protobuf-lite-0:3.6.1-4.el8ost.ppc64le", "8Base-RHOSE-4.7:protobuf-lite-0:3.6.1-4.el8ost.s390x", "8Base-RHOSE-4.7:protobuf-lite-0:3.6.1-4.el8ost.x86_64", "8Base-RHOSE-4.7:protobuf-lite-debuginfo-0:3.6.1-4.el8ost.ppc64le", "8Base-RHOSE-4.7:protobuf-lite-debuginfo-0:3.6.1-4.el8ost.s390x", "8Base-RHOSE-4.7:protobuf-lite-debuginfo-0:3.6.1-4.el8ost.x86_64", "8Base-RHOSE-4.7:protobuf-lite-devel-0:3.6.1-4.el8ost.ppc64le", "8Base-RHOSE-4.7:protobuf-lite-devel-0:3.6.1-4.el8ost.s390x", "8Base-RHOSE-4.7:protobuf-lite-devel-0:3.6.1-4.el8ost.x86_64", "8Base-RHOSE-4.7:protobuf-lite-static-0:3.6.1-4.el8ost.ppc64le", "8Base-RHOSE-4.7:protobuf-lite-static-0:3.6.1-4.el8ost.s390x", "8Base-RHOSE-4.7:protobuf-lite-static-0:3.6.1-4.el8ost.x86_64", "8Base-RHOSE-4.7:protobuf-static-0:3.6.1-4.el8ost.ppc64le", "8Base-RHOSE-4.7:protobuf-static-0:3.6.1-4.el8ost.s390x", "8Base-RHOSE-4.7:protobuf-static-0:3.6.1-4.el8ost.x86_64", "8Base-RHOSE-4.7:protobuf-vim-0:3.6.1-4.el8ost.noarch", "8Base-RHOSE-4.7:python-alembic-0:1.4.2-5.el8ost.src", "8Base-RHOSE-4.7:python-boto3-0:1.9.101-1.el8ost.src", "8Base-RHOSE-4.7:python-botocore-0:1.12.119-1.el8ost.src", "8Base-RHOSE-4.7:python-cachetools-0:3.1.0-1.el8ost.src", "8Base-RHOSE-4.7:python-certifi-0:2018.10.15-4.el8ost.src", "8Base-RHOSE-4.7:python-construct-0:2.10.56-1.el8ost.src", "8Base-RHOSE-4.7:python-daemon-0:2.1.2-9.el8ar.src", "8Base-RHOSE-4.7:python-debtcollector-0:2.2.0-0.20201008171245.649189d.el8.src", "8Base-RHOSE-4.7:python-dictdiffer-0:0.7.1-2.el8ost.src", "8Base-RHOSE-4.7:python-eventlet-0:0.25.2-3.el8ost.src", "8Base-RHOSE-4.7:python-flask-1:1.1.1-1.el8ost.src", "8Base-RHOSE-4.7:python-flask-doc-1:1.1.1-1.el8ost.noarch", "8Base-RHOSE-4.7:python-google-auth-0:1.3.0-1.el8ost.src", "8Base-RHOSE-4.7:python-hardware-0:0.23.0-0.20201031022149.59211cc.el8.src", "8Base-RHOSE-4.7:python-ifaddr-0:0.1.6-5.el8ost.src", "8Base-RHOSE-4.7:python-importlib-metadata-0:1.7.0-1.el8ost.src", "8Base-RHOSE-4.7:python-ironic-lib-0:4.4.1-0.20201218041209.aa7cfec.el8.src", "8Base-RHOSE-4.7:python-keystoneauth1-0:4.2.0-0.20200630234358.dab8e10.el8ost.src", "8Base-RHOSE-4.7:python-kubernetes-0:11.0.0-1.el8.src", "8Base-RHOSE-4.7:python-kuryr-lib-0:1.1.1-0.20190923160834.41e6964.el8ost.src", "8Base-RHOSE-4.7:python-lockfile-1:0.11.0-8.el8ar.src", "8Base-RHOSE-4.7:python-msgpack-0:0.6.2-1.el8ost.src", "8Base-RHOSE-4.7:python-msgpack-debugsource-0:0.6.2-1.el8ost.x86_64", "8Base-RHOSE-4.7:python-openshift-1:0.11.2-1.el8.src", "8Base-RHOSE-4.7:python-openstacksdk-0:0.48.0-0.20200708092906.3b693c2.el8ost.src", "8Base-RHOSE-4.7:python-oslo-concurrency-0:4.3.0-0.20201008180343.2f78803.el8.src", "8Base-RHOSE-4.7:python-oslo-concurrency-lang-0:4.3.0-0.20201008180343.2f78803.el8.noarch", "8Base-RHOSE-4.7:python-oslo-config-2:8.3.2-0.20201008180634.fcb8894.el8.src", "8Base-RHOSE-4.7:python-oslo-context-0:3.1.1-0.20201008190523.57dbded.el8.src", "8Base-RHOSE-4.7:python-oslo-db-0:8.4.0-0.20200918104110.e42c733.el8ost.src", "8Base-RHOSE-4.7:python-oslo-db-lang-0:8.4.0-0.20200918104110.e42c733.el8ost.noarch", "8Base-RHOSE-4.7:python-oslo-i18n-0:5.0.1-0.20201009131251.73187bd.el8.src", "8Base-RHOSE-4.7:python-oslo-i18n-lang-0:5.0.1-0.20201009131251.73187bd.el8.noarch", "8Base-RHOSE-4.7:python-oslo-log-0:4.3.1-0.20201207021200.1597f24.el8.src", "8Base-RHOSE-4.7:python-oslo-log-lang-0:4.3.1-0.20201207021200.1597f24.el8.noarch", "8Base-RHOSE-4.7:python-oslo-serialization-0:4.0.1-0.20201008182423.c7884b2.el8.src", "8Base-RHOSE-4.7:python-oslo-service-0:2.4.0-0.20201008184547.58466a6.el8.src", "8Base-RHOSE-4.7:python-oslo-utils-0:4.6.0-0.20201009175936.91497da.el8.src", "8Base-RHOSE-4.7:python-oslo-utils-lang-0:4.6.0-0.20201009175936.91497da.el8.noarch", "8Base-RHOSE-4.7:python-packaging-0:20.4-1.el8ost.src", "8Base-RHOSE-4.7:python-packaging-doc-0:20.4-1.el8ost.noarch", "8Base-RHOSE-4.7:python-paste-0:3.2.4-1.el8ost.src", "8Base-RHOSE-4.7:python-paste-deploy-0:2.0.1-4.el8ost.src", "8Base-RHOSE-4.7:python-pbr-0:5.4.3-2.el8ost.src", "8Base-RHOSE-4.7:python-pexpect-0:4.6-2.el8ar.src", "8Base-RHOSE-4.7:python-pint-0:0.10.1-1.el8ost.src", "8Base-RHOSE-4.7:python-psutil-0:5.6.6-1.el8ar.src", "8Base-RHOSE-4.7:python-psutil-debugsource-0:5.6.6-1.el8ar.ppc64le", "8Base-RHOSE-4.7:python-psutil-debugsource-0:5.6.6-1.el8ar.s390x", "8Base-RHOSE-4.7:python-psutil-debugsource-0:5.6.6-1.el8ar.x86_64", "8Base-RHOSE-4.7:python-pyghmi-0:1.5.14-2.1.el8ost.src", "8Base-RHOSE-4.7:python-pyroute2-0:0.5.13-1.el8ost.src", "8Base-RHOSE-4.7:python-requests-unixsocket-0:0.1.5-5.el8ar.src", "8Base-RHOSE-4.7:python-rsa-0:4.7-1.el8.src", "8Base-RHOSE-4.7:python-ruamel-yaml-0:0.15.41-4.el8ost.src", "8Base-RHOSE-4.7:python-ruamel-yaml-debugsource-0:0.15.41-4.el8ost.ppc64le", "8Base-RHOSE-4.7:python-ruamel-yaml-debugsource-0:0.15.41-4.el8ost.s390x", "8Base-RHOSE-4.7:python-ruamel-yaml-debugsource-0:0.15.41-4.el8ost.x86_64", "8Base-RHOSE-4.7:python-s3transfer-0:0.2.0-1.el8ost.src", "8Base-RHOSE-4.7:python-stevedore-0:3.2.2-0.20201009151242.274eaa6.el8.src", "8Base-RHOSE-4.7:python-string_utils-0:0.6.0-4.el8ost.src", "8Base-RHOSE-4.7:python-sushy-0:3.6.1-0.20210122201213.7ec0422.el8.src", "8Base-RHOSE-4.7:python-sushy-oem-idrac-0:0.0.3-0.20200922221223.1202372.el8ost.src", "8Base-RHOSE-4.7:python-tenacity-0:6.2.0-1.el8ost.src", "8Base-RHOSE-4.7:python-tooz-0:2.7.0-0.20200723133754.fca43df.el8ost.src", "8Base-RHOSE-4.7:python-websocket-client-0:0.54.0-1.el8ost.src", "8Base-RHOSE-4.7:python-werkzeug-0:1.0.1-3.el8ost.src", "8Base-RHOSE-4.7:python-zeroconf-0:0.24.4-1.el8ost.src", "8Base-RHOSE-4.7:python-zipp-0:0.5.1-2.el8ost.src", "8Base-RHOSE-4.7:python2-botocore-0:1.12.119-1.el8ost.noarch", "8Base-RHOSE-4.7:python2-cachetools-0:3.1.0-1.el8ost.noarch", "8Base-RHOSE-4.7:python3-alembic-0:1.4.2-5.el8ost.noarch", "8Base-RHOSE-4.7:python3-ansible-runner-0:1.4.6-2.el8ar.noarch", "8Base-RHOSE-4.7:python3-boto3-0:1.9.101-1.el8ost.noarch", "8Base-RHOSE-4.7:python3-botocore-0:1.12.119-1.el8ost.noarch", "8Base-RHOSE-4.7:python3-cachetools-0:3.1.0-1.el8ost.noarch", "8Base-RHOSE-4.7:python3-certifi-0:2018.10.15-4.el8ost.noarch", "8Base-RHOSE-4.7:python3-construct-0:2.10.56-1.el8ost.noarch", "8Base-RHOSE-4.7:python3-daemon-0:2.1.2-9.el8ar.noarch", "8Base-RHOSE-4.7:python3-debtcollector-0:2.2.0-0.20201008171245.649189d.el8.noarch", "8Base-RHOSE-4.7:python3-dictdiffer-0:0.7.1-2.el8ost.noarch", "8Base-RHOSE-4.7:python3-eventlet-0:0.25.2-3.el8ost.noarch", "8Base-RHOSE-4.7:python3-flask-1:1.1.1-1.el8ost.noarch", "8Base-RHOSE-4.7:python3-google-auth-0:1.3.0-1.el8ost.noarch", "8Base-RHOSE-4.7:python3-grpcio-0:1.18.0-4.el8ost.ppc64le", "8Base-RHOSE-4.7:python3-grpcio-0:1.18.0-4.el8ost.s390x", "8Base-RHOSE-4.7:python3-grpcio-0:1.18.0-4.el8ost.x86_64", "8Base-RHOSE-4.7:python3-grpcio-debuginfo-0:1.18.0-4.el8ost.ppc64le", "8Base-RHOSE-4.7:python3-grpcio-debuginfo-0:1.18.0-4.el8ost.s390x", "8Base-RHOSE-4.7:python3-grpcio-debuginfo-0:1.18.0-4.el8ost.x86_64", "8Base-RHOSE-4.7:python3-hardware-0:0.23.0-0.20201031022149.59211cc.el8.noarch", "8Base-RHOSE-4.7:python3-hardware-detect-0:0.23.0-0.20201031022149.59211cc.el8.noarch", "8Base-RHOSE-4.7:python3-ifaddr-0:0.1.6-5.el8ost.noarch", "8Base-RHOSE-4.7:python3-importlib-metadata-0:1.7.0-1.el8ost.noarch", "8Base-RHOSE-4.7:python3-ironic-inspector-tests-0:10.4.1-0.20201123161216.70fccec.el8.noarch", "8Base-RHOSE-4.7:python3-ironic-lib-0:4.4.1-0.20201218041209.aa7cfec.el8.noarch", "8Base-RHOSE-4.7:python3-ironic-python-agent-0:6.4.3-0.20201217171210.bd45db1.el8.noarch", "8Base-RHOSE-4.7:python3-ironic-tests-1:16.0.4-0.20210203051223.7d74ea0.el8.noarch", "8Base-RHOSE-4.7:python3-keystoneauth1-0:4.2.0-0.20200630234358.dab8e10.el8ost.noarch", "8Base-RHOSE-4.7:python3-kubernetes-0:11.0.0-1.el8.noarch", "8Base-RHOSE-4.7:python3-kubernetes-tests-0:11.0.0-1.el8.noarch", "8Base-RHOSE-4.7:python3-kuryr-kubernetes-0:4.7.0-202101262230.p0.git.2494.cd95ce5.el8.noarch", "8Base-RHOSE-4.7:python3-kuryr-lib-0:1.1.1-0.20190923160834.41e6964.el8ost.noarch", "8Base-RHOSE-4.7:python3-kuryr-lib-tests-0:1.1.1-0.20190923160834.41e6964.el8ost.noarch", "8Base-RHOSE-4.7:python3-lockfile-1:0.11.0-8.el8ar.noarch", "8Base-RHOSE-4.7:python3-msgpack-0:0.6.2-1.el8ost.x86_64", "8Base-RHOSE-4.7:python3-msgpack-debuginfo-0:0.6.2-1.el8ost.x86_64", "8Base-RHOSE-4.7:python3-openshift-1:0.11.2-1.el8.noarch", "8Base-RHOSE-4.7:python3-openstacksdk-0:0.48.0-0.20200708092906.3b693c2.el8ost.noarch", "8Base-RHOSE-4.7:python3-openstacksdk-tests-0:0.48.0-0.20200708092906.3b693c2.el8ost.noarch", "8Base-RHOSE-4.7:python3-openvswitch2.13-0:2.13.0-79.el8fdp.ppc64le", "8Base-RHOSE-4.7:python3-openvswitch2.13-0:2.13.0-79.el8fdp.s390x", "8Base-RHOSE-4.7:python3-openvswitch2.13-0:2.13.0-79.el8fdp.x86_64", "8Base-RHOSE-4.7:python3-openvswitch2.13-debuginfo-0:2.13.0-79.el8fdp.ppc64le", "8Base-RHOSE-4.7:python3-openvswitch2.13-debuginfo-0:2.13.0-79.el8fdp.s390x", "8Base-RHOSE-4.7:python3-openvswitch2.13-debuginfo-0:2.13.0-79.el8fdp.x86_64", "8Base-RHOSE-4.7:python3-oslo-concurrency-0:4.3.0-0.20201008180343.2f78803.el8.noarch", "8Base-RHOSE-4.7:python3-oslo-concurrency-tests-0:4.3.0-0.20201008180343.2f78803.el8.noarch", "8Base-RHOSE-4.7:python3-oslo-config-2:8.3.2-0.20201008180634.fcb8894.el8.noarch", "8Base-RHOSE-4.7:python3-oslo-context-0:3.1.1-0.20201008190523.57dbded.el8.noarch", "8Base-RHOSE-4.7:python3-oslo-context-tests-0:3.1.1-0.20201008190523.57dbded.el8.noarch", "8Base-RHOSE-4.7:python3-oslo-db-0:8.4.0-0.20200918104110.e42c733.el8ost.noarch", "8Base-RHOSE-4.7:python3-oslo-db-tests-0:8.4.0-0.20200918104110.e42c733.el8ost.noarch", "8Base-RHOSE-4.7:python3-oslo-i18n-0:5.0.1-0.20201009131251.73187bd.el8.noarch", "8Base-RHOSE-4.7:python3-oslo-log-0:4.3.1-0.20201207021200.1597f24.el8.noarch", "8Base-RHOSE-4.7:python3-oslo-log-tests-0:4.3.1-0.20201207021200.1597f24.el8.noarch", "8Base-RHOSE-4.7:python3-oslo-serialization-0:4.0.1-0.20201008182423.c7884b2.el8.noarch", "8Base-RHOSE-4.7:python3-oslo-serialization-tests-0:4.0.1-0.20201008182423.c7884b2.el8.noarch", "8Base-RHOSE-4.7:python3-oslo-service-0:2.4.0-0.20201008184547.58466a6.el8.noarch", "8Base-RHOSE-4.7:python3-oslo-service-tests-0:2.4.0-0.20201008184547.58466a6.el8.noarch", "8Base-RHOSE-4.7:python3-oslo-utils-0:4.6.0-0.20201009175936.91497da.el8.noarch", "8Base-RHOSE-4.7:python3-oslo-utils-tests-0:4.6.0-0.20201009175936.91497da.el8.noarch", "8Base-RHOSE-4.7:python3-packaging-0:20.4-1.el8ost.noarch", "8Base-RHOSE-4.7:python3-paste-0:3.2.4-1.el8ost.noarch", "8Base-RHOSE-4.7:python3-paste-deploy-0:2.0.1-4.el8ost.noarch", "8Base-RHOSE-4.7:python3-pbr-0:5.4.3-2.el8ost.noarch", "8Base-RHOSE-4.7:python3-pexpect-0:4.6-2.el8ar.noarch", "8Base-RHOSE-4.7:python3-pint-0:0.10.1-1.el8ost.noarch", "8Base-RHOSE-4.7:python3-protobuf-0:3.6.1-4.el8ost.noarch", "8Base-RHOSE-4.7:python3-psutil-0:5.6.6-1.el8ar.ppc64le", "8Base-RHOSE-4.7:python3-psutil-0:5.6.6-1.el8ar.s390x", "8Base-RHOSE-4.7:python3-psutil-0:5.6.6-1.el8ar.x86_64", "8Base-RHOSE-4.7:python3-psutil-debuginfo-0:5.6.6-1.el8ar.ppc64le", "8Base-RHOSE-4.7:python3-psutil-debuginfo-0:5.6.6-1.el8ar.s390x", "8Base-RHOSE-4.7:python3-psutil-debuginfo-0:5.6.6-1.el8ar.x86_64", "8Base-RHOSE-4.7:python3-pyghmi-0:1.5.14-2.1.el8ost.noarch", "8Base-RHOSE-4.7:python3-pyroute2-0:0.5.13-1.el8ost.noarch", "8Base-RHOSE-4.7:python3-requests-unixsocket-0:0.1.5-5.el8ar.noarch", "8Base-RHOSE-4.7:python3-rsa-0:4.7-1.el8.noarch", "8Base-RHOSE-4.7:python3-ruamel-yaml-0:0.15.41-4.el8ost.ppc64le", "8Base-RHOSE-4.7:python3-ruamel-yaml-0:0.15.41-4.el8ost.s390x", "8Base-RHOSE-4.7:python3-ruamel-yaml-0:0.15.41-4.el8ost.x86_64", "8Base-RHOSE-4.7:python3-ruamel-yaml-debuginfo-0:0.15.41-4.el8ost.ppc64le", "8Base-RHOSE-4.7:python3-ruamel-yaml-debuginfo-0:0.15.41-4.el8ost.s390x", "8Base-RHOSE-4.7:python3-ruamel-yaml-debuginfo-0:0.15.41-4.el8ost.x86_64", "8Base-RHOSE-4.7:python3-s3transfer-0:0.2.0-1.el8ost.noarch", "8Base-RHOSE-4.7:python3-stevedore-0:3.2.2-0.20201009151242.274eaa6.el8.noarch", "8Base-RHOSE-4.7:python3-string_utils-0:0.6.0-4.el8ost.noarch", "8Base-RHOSE-4.7:python3-sushy-0:3.6.1-0.20210122201213.7ec0422.el8.noarch", "8Base-RHOSE-4.7:python3-sushy-oem-idrac-0:0.0.3-0.20200922221223.1202372.el8ost.noarch", "8Base-RHOSE-4.7:python3-sushy-oem-idrac-tests-0:0.0.3-0.20200922221223.1202372.el8ost.noarch", "8Base-RHOSE-4.7:python3-sushy-tests-0:3.6.1-0.20210122201213.7ec0422.el8.noarch", "8Base-RHOSE-4.7:python3-tenacity-0:6.2.0-1.el8ost.noarch", "8Base-RHOSE-4.7:python3-tooz-0:2.7.0-0.20200723133754.fca43df.el8ost.noarch", "8Base-RHOSE-4.7:python3-websocket-client-0:0.54.0-1.el8ost.noarch", "8Base-RHOSE-4.7:python3-werkzeug-0:1.0.1-3.el8ost.noarch", "8Base-RHOSE-4.7:python3-zeroconf-0:0.24.4-1.el8ost.noarch", "8Base-RHOSE-4.7:python3-zipp-0:0.5.1-2.el8ost.noarch", "8Base-RHOSE-4.7:redhat-release-coreos-0:47.83-1.el8.ppc64le", "8Base-RHOSE-4.7:redhat-release-coreos-0:47.83-1.el8.s390x", "8Base-RHOSE-4.7:redhat-release-coreos-0:47.83-1.el8.src", "8Base-RHOSE-4.7:redhat-release-coreos-0:47.83-1.el8.x86_64", "8Base-RHOSE-4.7:rhcos-tools-0:0.0.0-1.rhaos4.2.el8.noarch", "8Base-RHOSE-4.7:rhcos-tools-0:0.0.0-1.rhaos4.2.el8.src", "8Base-RHOSE-4.7:rhosp-director-images-0:17.0-20200606.1.el8ost.noarch", "8Base-RHOSE-4.7:rhosp-director-images-0:17.0-20200606.1.el8ost.src", "8Base-RHOSE-4.7:rhosp-director-images-all-0:17.0-20200606.1.el8ost.noarch", "8Base-RHOSE-4.7:rhosp-director-images-ipa-0:17.0-20200606.1.el8ost.noarch", "8Base-RHOSE-4.7:rhosp-director-images-ipa-ppc64le-0:17.0-20200606.1.el8ost.noarch", "8Base-RHOSE-4.7:rhosp-director-images-ipa-x86_64-0:17.0-20200606.1.el8ost.noarch", "8Base-RHOSE-4.7:rhosp-director-images-minimal-0:17.0-20200606.1.el8ost.noarch", "8Base-RHOSE-4.7:rhosp-director-images-ppc64le-0:17.0-20200606.1.el8ost.noarch", "8Base-RHOSE-4.7:rhosp-director-images-x86_64-0:17.0-20200606.1.el8ost.noarch", "8Base-RHOSE-4.7:rpm-ostree-0:2020.7-1.el8_3.ppc64le", "8Base-RHOSE-4.7:rpm-ostree-0:2020.7-1.el8_3.s390x", "8Base-RHOSE-4.7:rpm-ostree-0:2020.7-1.el8_3.src", "8Base-RHOSE-4.7:rpm-ostree-0:2020.7-1.el8_3.x86_64", "8Base-RHOSE-4.7:rpm-ostree-debuginfo-0:2020.7-1.el8_3.ppc64le", "8Base-RHOSE-4.7:rpm-ostree-debuginfo-0:2020.7-1.el8_3.s390x", "8Base-RHOSE-4.7:rpm-ostree-debuginfo-0:2020.7-1.el8_3.x86_64", "8Base-RHOSE-4.7:rpm-ostree-debugsource-0:2020.7-1.el8_3.ppc64le", "8Base-RHOSE-4.7:rpm-ostree-debugsource-0:2020.7-1.el8_3.s390x", "8Base-RHOSE-4.7:rpm-ostree-debugsource-0:2020.7-1.el8_3.x86_64", "8Base-RHOSE-4.7:rpm-ostree-devel-0:2020.7-1.el8_3.ppc64le", "8Base-RHOSE-4.7:rpm-ostree-devel-0:2020.7-1.el8_3.s390x", "8Base-RHOSE-4.7:rpm-ostree-devel-0:2020.7-1.el8_3.x86_64", "8Base-RHOSE-4.7:rpm-ostree-libs-0:2020.7-1.el8_3.ppc64le", "8Base-RHOSE-4.7:rpm-ostree-libs-0:2020.7-1.el8_3.s390x", "8Base-RHOSE-4.7:rpm-ostree-libs-0:2020.7-1.el8_3.x86_64", "8Base-RHOSE-4.7:rpm-ostree-libs-debuginfo-0:2020.7-1.el8_3.ppc64le", "8Base-RHOSE-4.7:rpm-ostree-libs-debuginfo-0:2020.7-1.el8_3.s390x", "8Base-RHOSE-4.7:rpm-ostree-libs-debuginfo-0:2020.7-1.el8_3.x86_64", "8Base-RHOSE-4.7:runc-0:1.0.0-82.rhaos4.6.git086e841.el8.ppc64le", "8Base-RHOSE-4.7:runc-0:1.0.0-82.rhaos4.6.git086e841.el8.s390x", "8Base-RHOSE-4.7:runc-0:1.0.0-82.rhaos4.6.git086e841.el8.src", "8Base-RHOSE-4.7:runc-0:1.0.0-82.rhaos4.6.git086e841.el8.x86_64", "8Base-RHOSE-4.7:runc-debuginfo-0:1.0.0-82.rhaos4.6.git086e841.el8.ppc64le", "8Base-RHOSE-4.7:runc-debuginfo-0:1.0.0-82.rhaos4.6.git086e841.el8.s390x", "8Base-RHOSE-4.7:runc-debuginfo-0:1.0.0-82.rhaos4.6.git086e841.el8.x86_64", "8Base-RHOSE-4.7:runc-debugsource-0:1.0.0-82.rhaos4.6.git086e841.el8.ppc64le", "8Base-RHOSE-4.7:runc-debugsource-0:1.0.0-82.rhaos4.6.git086e841.el8.s390x", "8Base-RHOSE-4.7:runc-debugsource-0:1.0.0-82.rhaos4.6.git086e841.el8.x86_64", "8Base-RHOSE-4.7:rust-afterburn-0:4.6.0-1.rhaos4.7.el8.src", "8Base-RHOSE-4.7:rust-afterburn-debugsource-0:4.6.0-1.rhaos4.7.el8.ppc64le", "8Base-RHOSE-4.7:rust-afterburn-debugsource-0:4.6.0-1.rhaos4.7.el8.s390x", "8Base-RHOSE-4.7:rust-afterburn-debugsource-0:4.6.0-1.rhaos4.7.el8.x86_64", "8Base-RHOSE-4.7:rust-bootupd-0:0.2.5-2.el8.src", "8Base-RHOSE-4.7:rust-bootupd-debugsource-0:0.2.5-2.el8.x86_64", "8Base-RHOSE-4.7:tini-0:0.16.1-1.el8ar.ppc64le", "8Base-RHOSE-4.7:tini-0:0.16.1-1.el8ar.s390x", "8Base-RHOSE-4.7:tini-0:0.16.1-1.el8ar.src", "8Base-RHOSE-4.7:tini-0:0.16.1-1.el8ar.x86_64", "8Base-RHOSE-4.7:toolbox-0:0.0.8-3.rhaos4.7.el8.noarch", "8Base-RHOSE-4.7:toolbox-0:0.0.8-3.rhaos4.7.el8.src" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-28362" }, { "category": "external", "summary": "RHBZ#1897635", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1897635" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-28362", "url": "https://www.cve.org/CVERecord?id=CVE-2020-28362" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-28362", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-28362" } ], "release_date": "2020-11-12T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-02-24T14:45:13+00:00", "details": "For OpenShift Container Platform 4.7 see the following documentation, which\nwill be updated shortly for this release, for important instructions on how\nto upgrade your cluster and fully apply this asynchronous errata update:\n\nhttps://docs.openshift.com/container-platform/4.7/release_notes/ocp-4-7-release-notes.html\n\nDetails on how to access this content are available at\nhttps://docs.openshift.com/container-platform/4.7/updating/updating-cluster-cli.html.", "product_ids": [ "8Base-RHOSE-4.7:ignition-0:2.9.0-2.rhaos4.7.git1d56dc8.el8.ppc64le", "8Base-RHOSE-4.7:ignition-0:2.9.0-2.rhaos4.7.git1d56dc8.el8.s390x", "8Base-RHOSE-4.7:ignition-0:2.9.0-2.rhaos4.7.git1d56dc8.el8.src", "8Base-RHOSE-4.7:ignition-0:2.9.0-2.rhaos4.7.git1d56dc8.el8.x86_64", "8Base-RHOSE-4.7:ignition-debuginfo-0:2.9.0-2.rhaos4.7.git1d56dc8.el8.ppc64le", "8Base-RHOSE-4.7:ignition-debuginfo-0:2.9.0-2.rhaos4.7.git1d56dc8.el8.s390x", "8Base-RHOSE-4.7:ignition-debuginfo-0:2.9.0-2.rhaos4.7.git1d56dc8.el8.x86_64", "8Base-RHOSE-4.7:ignition-debugsource-0:2.9.0-2.rhaos4.7.git1d56dc8.el8.ppc64le", "8Base-RHOSE-4.7:ignition-debugsource-0:2.9.0-2.rhaos4.7.git1d56dc8.el8.s390x", "8Base-RHOSE-4.7:ignition-debugsource-0:2.9.0-2.rhaos4.7.git1d56dc8.el8.x86_64", "8Base-RHOSE-4.7:ignition-validate-0:2.9.0-2.rhaos4.7.git1d56dc8.el8.ppc64le", "8Base-RHOSE-4.7:ignition-validate-0:2.9.0-2.rhaos4.7.git1d56dc8.el8.s390x", "8Base-RHOSE-4.7:ignition-validate-0:2.9.0-2.rhaos4.7.git1d56dc8.el8.x86_64", "8Base-RHOSE-4.7:ignition-validate-debuginfo-0:2.9.0-2.rhaos4.7.git1d56dc8.el8.ppc64le", "8Base-RHOSE-4.7:ignition-validate-debuginfo-0:2.9.0-2.rhaos4.7.git1d56dc8.el8.s390x", "8Base-RHOSE-4.7:ignition-validate-debuginfo-0:2.9.0-2.rhaos4.7.git1d56dc8.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:5634" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "8Base-RHOSE-4.7:ignition-0:2.9.0-2.rhaos4.7.git1d56dc8.el8.ppc64le", "8Base-RHOSE-4.7:ignition-0:2.9.0-2.rhaos4.7.git1d56dc8.el8.s390x", "8Base-RHOSE-4.7:ignition-0:2.9.0-2.rhaos4.7.git1d56dc8.el8.src", "8Base-RHOSE-4.7:ignition-0:2.9.0-2.rhaos4.7.git1d56dc8.el8.x86_64", "8Base-RHOSE-4.7:ignition-debuginfo-0:2.9.0-2.rhaos4.7.git1d56dc8.el8.ppc64le", "8Base-RHOSE-4.7:ignition-debuginfo-0:2.9.0-2.rhaos4.7.git1d56dc8.el8.s390x", "8Base-RHOSE-4.7:ignition-debuginfo-0:2.9.0-2.rhaos4.7.git1d56dc8.el8.x86_64", "8Base-RHOSE-4.7:ignition-debugsource-0:2.9.0-2.rhaos4.7.git1d56dc8.el8.ppc64le", "8Base-RHOSE-4.7:ignition-debugsource-0:2.9.0-2.rhaos4.7.git1d56dc8.el8.s390x", "8Base-RHOSE-4.7:ignition-debugsource-0:2.9.0-2.rhaos4.7.git1d56dc8.el8.x86_64", "8Base-RHOSE-4.7:ignition-validate-0:2.9.0-2.rhaos4.7.git1d56dc8.el8.ppc64le", "8Base-RHOSE-4.7:ignition-validate-0:2.9.0-2.rhaos4.7.git1d56dc8.el8.s390x", "8Base-RHOSE-4.7:ignition-validate-0:2.9.0-2.rhaos4.7.git1d56dc8.el8.x86_64", "8Base-RHOSE-4.7:ignition-validate-debuginfo-0:2.9.0-2.rhaos4.7.git1d56dc8.el8.ppc64le", "8Base-RHOSE-4.7:ignition-validate-debuginfo-0:2.9.0-2.rhaos4.7.git1d56dc8.el8.s390x", "8Base-RHOSE-4.7:ignition-validate-debuginfo-0:2.9.0-2.rhaos4.7.git1d56dc8.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang: math/big: panic during recursive division of very large numbers" }, { "cve": "CVE-2021-3121", "cwe": { "id": "CWE-129", "name": "Improper Validation of Array Index" }, "discovery_date": "2021-01-28T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "7Server-RH7-RHOSE-4.7:conmon-2:2.0.21-2.rhaos4.6.el7.src", "7Server-RH7-RHOSE-4.7:conmon-2:2.0.21-2.rhaos4.6.el7.x86_64", "7Server-RH7-RHOSE-4.7:containernetworking-plugins-0:0.8.6-1.rhaos4.5.el7.src", "7Server-RH7-RHOSE-4.7:containernetworking-plugins-0:0.8.6-1.rhaos4.5.el7.x86_64", "7Server-RH7-RHOSE-4.7:containernetworking-plugins-debuginfo-0:0.8.6-1.rhaos4.5.el7.x86_64", "7Server-RH7-RHOSE-4.7:haproxy-0:2.0.19-1.el7.src", "7Server-RH7-RHOSE-4.7:haproxy-debuginfo-0:2.0.19-1.el7.x86_64", "7Server-RH7-RHOSE-4.7:haproxy20-0:2.0.19-1.el7.x86_64", "7Server-RH7-RHOSE-4.7:jq-0:1.6-2.el7.src", "7Server-RH7-RHOSE-4.7:jq-0:1.6-2.el7.x86_64", "7Server-RH7-RHOSE-4.7:jq-debuginfo-0:1.6-2.el7.x86_64", "7Server-RH7-RHOSE-4.7:jq-devel-0:1.6-2.el7.x86_64", "7Server-RH7-RHOSE-4.7:oniguruma-0:5.9.2-5.el7.src", "7Server-RH7-RHOSE-4.7:oniguruma-0:5.9.2-5.el7.x86_64", "7Server-RH7-RHOSE-4.7:oniguruma-debuginfo-0:5.9.2-5.el7.x86_64", "7Server-RH7-RHOSE-4.7:oniguruma-devel-0:5.9.2-5.el7.x86_64", "7Server-RH7-RHOSE-4.7:openshift-0:4.7.0-202102060108.p0.git.97095.7271b90.el7.src", "7Server-RH7-RHOSE-4.7:openshift-ansible-0:4.7.0-202102032256.p0.git.0.bf7d9a7.el7.noarch", "7Server-RH7-RHOSE-4.7:openshift-ansible-0:4.7.0-202102032256.p0.git.0.bf7d9a7.el7.src", "7Server-RH7-RHOSE-4.7:openshift-ansible-test-0:4.7.0-202102032256.p0.git.0.bf7d9a7.el7.noarch", "7Server-RH7-RHOSE-4.7:openshift-clients-0:4.7.0-202102032256.p0.git.3951.0e656ef.el7.src", "7Server-RH7-RHOSE-4.7:openshift-clients-0:4.7.0-202102032256.p0.git.3951.0e656ef.el7.x86_64", "7Server-RH7-RHOSE-4.7:openshift-clients-redistributable-0:4.7.0-202102032256.p0.git.3951.0e656ef.el7.x86_64", "7Server-RH7-RHOSE-4.7:openshift-hyperkube-0:4.7.0-202102060108.p0.git.97095.7271b90.el7.x86_64", "7Server-RH7-RHOSE-4.7:python-botocore-0:1.4.57-5.el7.src", "7Server-RH7-RHOSE-4.7:python2-botocore-0:1.4.57-5.el7.noarch", "7Server-RH7-RHOSE-4.7:runc-0:1.0.0-82.rhaos4.6.git086e841.el7.src", "7Server-RH7-RHOSE-4.7:runc-0:1.0.0-82.rhaos4.6.git086e841.el7.x86_64", "7Server-RH7-RHOSE-4.7:runc-debuginfo-0:1.0.0-82.rhaos4.6.git086e841.el7.x86_64", "8Base-RHOSE-4.7:NetworkManager-1:1.26.0-12.1.rhaos4.7.el8.ppc64le", "8Base-RHOSE-4.7:NetworkManager-1:1.26.0-12.1.rhaos4.7.el8.s390x", "8Base-RHOSE-4.7:NetworkManager-1:1.26.0-12.1.rhaos4.7.el8.src", "8Base-RHOSE-4.7:NetworkManager-1:1.26.0-12.1.rhaos4.7.el8.x86_64", "8Base-RHOSE-4.7:NetworkManager-adsl-1:1.26.0-12.1.rhaos4.7.el8.ppc64le", "8Base-RHOSE-4.7:NetworkManager-adsl-1:1.26.0-12.1.rhaos4.7.el8.s390x", "8Base-RHOSE-4.7:NetworkManager-adsl-1:1.26.0-12.1.rhaos4.7.el8.x86_64", "8Base-RHOSE-4.7:NetworkManager-adsl-debuginfo-1:1.26.0-12.1.rhaos4.7.el8.ppc64le", "8Base-RHOSE-4.7:NetworkManager-adsl-debuginfo-1:1.26.0-12.1.rhaos4.7.el8.s390x", "8Base-RHOSE-4.7:NetworkManager-adsl-debuginfo-1:1.26.0-12.1.rhaos4.7.el8.x86_64", "8Base-RHOSE-4.7:NetworkManager-bluetooth-1:1.26.0-12.1.rhaos4.7.el8.ppc64le", "8Base-RHOSE-4.7:NetworkManager-bluetooth-1:1.26.0-12.1.rhaos4.7.el8.s390x", "8Base-RHOSE-4.7:NetworkManager-bluetooth-1:1.26.0-12.1.rhaos4.7.el8.x86_64", "8Base-RHOSE-4.7:NetworkManager-bluetooth-debuginfo-1:1.26.0-12.1.rhaos4.7.el8.ppc64le", "8Base-RHOSE-4.7:NetworkManager-bluetooth-debuginfo-1:1.26.0-12.1.rhaos4.7.el8.s390x", "8Base-RHOSE-4.7:NetworkManager-bluetooth-debuginfo-1:1.26.0-12.1.rhaos4.7.el8.x86_64", "8Base-RHOSE-4.7:NetworkManager-cloud-setup-1:1.26.0-12.1.rhaos4.7.el8.ppc64le", "8Base-RHOSE-4.7:NetworkManager-cloud-setup-1:1.26.0-12.1.rhaos4.7.el8.s390x", "8Base-RHOSE-4.7:NetworkManager-cloud-setup-1:1.26.0-12.1.rhaos4.7.el8.x86_64", "8Base-RHOSE-4.7:NetworkManager-cloud-setup-debuginfo-1:1.26.0-12.1.rhaos4.7.el8.ppc64le", "8Base-RHOSE-4.7:NetworkManager-cloud-setup-debuginfo-1:1.26.0-12.1.rhaos4.7.el8.s390x", "8Base-RHOSE-4.7:NetworkManager-cloud-setup-debuginfo-1:1.26.0-12.1.rhaos4.7.el8.x86_64", "8Base-RHOSE-4.7:NetworkManager-config-connectivity-redhat-1:1.26.0-12.1.rhaos4.7.el8.noarch", "8Base-RHOSE-4.7:NetworkManager-config-server-1:1.26.0-12.1.rhaos4.7.el8.noarch", "8Base-RHOSE-4.7:NetworkManager-debuginfo-1:1.26.0-12.1.rhaos4.7.el8.ppc64le", "8Base-RHOSE-4.7:NetworkManager-debuginfo-1:1.26.0-12.1.rhaos4.7.el8.s390x", "8Base-RHOSE-4.7:NetworkManager-debuginfo-1:1.26.0-12.1.rhaos4.7.el8.x86_64", "8Base-RHOSE-4.7:NetworkManager-debugsource-1:1.26.0-12.1.rhaos4.7.el8.ppc64le", "8Base-RHOSE-4.7:NetworkManager-debugsource-1:1.26.0-12.1.rhaos4.7.el8.s390x", "8Base-RHOSE-4.7:NetworkManager-debugsource-1:1.26.0-12.1.rhaos4.7.el8.x86_64", "8Base-RHOSE-4.7:NetworkManager-dispatcher-routing-rules-1:1.26.0-12.1.rhaos4.7.el8.noarch", "8Base-RHOSE-4.7:NetworkManager-libnm-1:1.26.0-12.1.rhaos4.7.el8.ppc64le", "8Base-RHOSE-4.7:NetworkManager-libnm-1:1.26.0-12.1.rhaos4.7.el8.s390x", "8Base-RHOSE-4.7:NetworkManager-libnm-1:1.26.0-12.1.rhaos4.7.el8.x86_64", "8Base-RHOSE-4.7:NetworkManager-libnm-debuginfo-1:1.26.0-12.1.rhaos4.7.el8.ppc64le", "8Base-RHOSE-4.7:NetworkManager-libnm-debuginfo-1:1.26.0-12.1.rhaos4.7.el8.s390x", "8Base-RHOSE-4.7:NetworkManager-libnm-debuginfo-1:1.26.0-12.1.rhaos4.7.el8.x86_64", "8Base-RHOSE-4.7:NetworkManager-libnm-devel-1:1.26.0-12.1.rhaos4.7.el8.ppc64le", "8Base-RHOSE-4.7:NetworkManager-libnm-devel-1:1.26.0-12.1.rhaos4.7.el8.s390x", "8Base-RHOSE-4.7:NetworkManager-libnm-devel-1:1.26.0-12.1.rhaos4.7.el8.x86_64", "8Base-RHOSE-4.7:NetworkManager-ovs-1:1.26.0-12.1.rhaos4.7.el8.ppc64le", "8Base-RHOSE-4.7:NetworkManager-ovs-1:1.26.0-12.1.rhaos4.7.el8.s390x", "8Base-RHOSE-4.7:NetworkManager-ovs-1:1.26.0-12.1.rhaos4.7.el8.x86_64", "8Base-RHOSE-4.7:NetworkManager-ovs-debuginfo-1:1.26.0-12.1.rhaos4.7.el8.ppc64le", "8Base-RHOSE-4.7:NetworkManager-ovs-debuginfo-1:1.26.0-12.1.rhaos4.7.el8.s390x", "8Base-RHOSE-4.7:NetworkManager-ovs-debuginfo-1:1.26.0-12.1.rhaos4.7.el8.x86_64", "8Base-RHOSE-4.7:NetworkManager-ppp-1:1.26.0-12.1.rhaos4.7.el8.ppc64le", "8Base-RHOSE-4.7:NetworkManager-ppp-1:1.26.0-12.1.rhaos4.7.el8.s390x", "8Base-RHOSE-4.7:NetworkManager-ppp-1:1.26.0-12.1.rhaos4.7.el8.x86_64", "8Base-RHOSE-4.7:NetworkManager-ppp-debuginfo-1:1.26.0-12.1.rhaos4.7.el8.ppc64le", "8Base-RHOSE-4.7:NetworkManager-ppp-debuginfo-1:1.26.0-12.1.rhaos4.7.el8.s390x", "8Base-RHOSE-4.7:NetworkManager-ppp-debuginfo-1:1.26.0-12.1.rhaos4.7.el8.x86_64", "8Base-RHOSE-4.7:NetworkManager-team-1:1.26.0-12.1.rhaos4.7.el8.ppc64le", "8Base-RHOSE-4.7:NetworkManager-team-1:1.26.0-12.1.rhaos4.7.el8.s390x", "8Base-RHOSE-4.7:NetworkManager-team-1:1.26.0-12.1.rhaos4.7.el8.x86_64", "8Base-RHOSE-4.7:NetworkManager-team-debuginfo-1:1.26.0-12.1.rhaos4.7.el8.ppc64le", "8Base-RHOSE-4.7:NetworkManager-team-debuginfo-1:1.26.0-12.1.rhaos4.7.el8.s390x", "8Base-RHOSE-4.7:NetworkManager-team-debuginfo-1:1.26.0-12.1.rhaos4.7.el8.x86_64", "8Base-RHOSE-4.7:NetworkManager-tui-1:1.26.0-12.1.rhaos4.7.el8.ppc64le", "8Base-RHOSE-4.7:NetworkManager-tui-1:1.26.0-12.1.rhaos4.7.el8.s390x", "8Base-RHOSE-4.7:NetworkManager-tui-1:1.26.0-12.1.rhaos4.7.el8.x86_64", "8Base-RHOSE-4.7:NetworkManager-tui-debuginfo-1:1.26.0-12.1.rhaos4.7.el8.ppc64le", "8Base-RHOSE-4.7:NetworkManager-tui-debuginfo-1:1.26.0-12.1.rhaos4.7.el8.s390x", "8Base-RHOSE-4.7:NetworkManager-tui-debuginfo-1:1.26.0-12.1.rhaos4.7.el8.x86_64", "8Base-RHOSE-4.7:NetworkManager-wifi-1:1.26.0-12.1.rhaos4.7.el8.ppc64le", "8Base-RHOSE-4.7:NetworkManager-wifi-1:1.26.0-12.1.rhaos4.7.el8.s390x", "8Base-RHOSE-4.7:NetworkManager-wifi-1:1.26.0-12.1.rhaos4.7.el8.x86_64", "8Base-RHOSE-4.7:NetworkManager-wifi-debuginfo-1:1.26.0-12.1.rhaos4.7.el8.ppc64le", "8Base-RHOSE-4.7:NetworkManager-wifi-debuginfo-1:1.26.0-12.1.rhaos4.7.el8.s390x", "8Base-RHOSE-4.7:NetworkManager-wifi-debuginfo-1:1.26.0-12.1.rhaos4.7.el8.x86_64", "8Base-RHOSE-4.7:NetworkManager-wwan-1:1.26.0-12.1.rhaos4.7.el8.ppc64le", "8Base-RHOSE-4.7:NetworkManager-wwan-1:1.26.0-12.1.rhaos4.7.el8.s390x", "8Base-RHOSE-4.7:NetworkManager-wwan-1:1.26.0-12.1.rhaos4.7.el8.x86_64", "8Base-RHOSE-4.7:NetworkManager-wwan-debuginfo-1:1.26.0-12.1.rhaos4.7.el8.ppc64le", "8Base-RHOSE-4.7:NetworkManager-wwan-debuginfo-1:1.26.0-12.1.rhaos4.7.el8.s390x", "8Base-RHOSE-4.7:NetworkManager-wwan-debuginfo-1:1.26.0-12.1.rhaos4.7.el8.x86_64", "8Base-RHOSE-4.7:afterburn-0:4.6.0-1.rhaos4.7.el8.ppc64le", "8Base-RHOSE-4.7:afterburn-0:4.6.0-1.rhaos4.7.el8.s390x", "8Base-RHOSE-4.7:afterburn-0:4.6.0-1.rhaos4.7.el8.x86_64", "8Base-RHOSE-4.7:afterburn-debuginfo-0:4.6.0-1.rhaos4.7.el8.ppc64le", "8Base-RHOSE-4.7:afterburn-debuginfo-0:4.6.0-1.rhaos4.7.el8.s390x", "8Base-RHOSE-4.7:afterburn-debuginfo-0:4.6.0-1.rhaos4.7.el8.x86_64", "8Base-RHOSE-4.7:ansible-runner-0:1.4.6-2.el8ar.noarch", "8Base-RHOSE-4.7:ansible-runner-0:1.4.6-2.el8ar.src", "8Base-RHOSE-4.7:ansible-runner-http-0:1.0.0-2.el8ar.noarch", "8Base-RHOSE-4.7:ansible-runner-http-0:1.0.0-2.el8ar.src", "8Base-RHOSE-4.7:atomic-openshift-service-idler-0:4.7.0-202011171454.p0.git.15.675c1c8.el8.ppc64le", "8Base-RHOSE-4.7:atomic-openshift-service-idler-0:4.7.0-202011171454.p0.git.15.675c1c8.el8.s390x", "8Base-RHOSE-4.7:atomic-openshift-service-idler-0:4.7.0-202011171454.p0.git.15.675c1c8.el8.src", "8Base-RHOSE-4.7:atomic-openshift-service-idler-0:4.7.0-202011171454.p0.git.15.675c1c8.el8.x86_64", "8Base-RHOSE-4.7:bootupd-0:0.2.5-2.el8.x86_64", "8Base-RHOSE-4.7:bootupd-debuginfo-0:0.2.5-2.el8.x86_64", "8Base-RHOSE-4.7:clevis-0:15-1.el8.ppc64le", "8Base-RHOSE-4.7:clevis-0:15-1.el8.s390x", "8Base-RHOSE-4.7:clevis-0:15-1.el8.src", "8Base-RHOSE-4.7:clevis-0:15-1.el8.x86_64", "8Base-RHOSE-4.7:clevis-debuginfo-0:15-1.el8.ppc64le", "8Base-RHOSE-4.7:clevis-debuginfo-0:15-1.el8.s390x", "8Base-RHOSE-4.7:clevis-debuginfo-0:15-1.el8.x86_64", "8Base-RHOSE-4.7:clevis-debugsource-0:15-1.el8.ppc64le", "8Base-RHOSE-4.7:clevis-debugsource-0:15-1.el8.s390x", "8Base-RHOSE-4.7:clevis-debugsource-0:15-1.el8.x86_64", "8Base-RHOSE-4.7:clevis-dracut-0:15-1.el8.ppc64le", "8Base-RHOSE-4.7:clevis-dracut-0:15-1.el8.s390x", "8Base-RHOSE-4.7:clevis-dracut-0:15-1.el8.x86_64", "8Base-RHOSE-4.7:clevis-luks-0:15-1.el8.ppc64le", "8Base-RHOSE-4.7:clevis-luks-0:15-1.el8.s390x", "8Base-RHOSE-4.7:clevis-luks-0:15-1.el8.x86_64", "8Base-RHOSE-4.7:clevis-systemd-0:15-1.el8.ppc64le", "8Base-RHOSE-4.7:clevis-systemd-0:15-1.el8.s390x", "8Base-RHOSE-4.7:clevis-systemd-0:15-1.el8.x86_64", "8Base-RHOSE-4.7:clevis-udisks2-0:15-1.el8.ppc64le", "8Base-RHOSE-4.7:clevis-udisks2-0:15-1.el8.s390x", "8Base-RHOSE-4.7:clevis-udisks2-0:15-1.el8.x86_64", "8Base-RHOSE-4.7:clevis-udisks2-debuginfo-0:15-1.el8.ppc64le", "8Base-RHOSE-4.7:clevis-udisks2-debuginfo-0:15-1.el8.s390x", "8Base-RHOSE-4.7:clevis-udisks2-debuginfo-0:15-1.el8.x86_64", "8Base-RHOSE-4.7:conmon-2:2.0.21-2.rhaos4.6.el8.ppc64le", "8Base-RHOSE-4.7:conmon-2:2.0.21-2.rhaos4.6.el8.s390x", "8Base-RHOSE-4.7:conmon-2:2.0.21-2.rhaos4.6.el8.src", "8Base-RHOSE-4.7:conmon-2:2.0.21-2.rhaos4.6.el8.x86_64", "8Base-RHOSE-4.7:console-login-helper-messages-0:0.20.3-1.rhaos4.7.el8.noarch", "8Base-RHOSE-4.7:console-login-helper-messages-0:0.20.3-1.rhaos4.7.el8.src", "8Base-RHOSE-4.7:console-login-helper-messages-issuegen-0:0.20.3-1.rhaos4.7.el8.noarch", "8Base-RHOSE-4.7:console-login-helper-messages-profile-0:0.20.3-1.rhaos4.7.el8.noarch", "8Base-RHOSE-4.7:container-selinux-2:2.151.0-1.rhaos4.7.el8.noarch", "8Base-RHOSE-4.7:container-selinux-2:2.151.0-1.rhaos4.7.el8.src", "8Base-RHOSE-4.7:containernetworking-plugins-0:0.8.6-1.rhaos4.5.el8.ppc64le", "8Base-RHOSE-4.7:containernetworking-plugins-0:0.8.6-1.rhaos4.5.el8.s390x", "8Base-RHOSE-4.7:containernetworking-plugins-0:0.8.6-1.rhaos4.5.el8.src", "8Base-RHOSE-4.7:containernetworking-plugins-0:0.8.6-1.rhaos4.5.el8.x86_64", "8Base-RHOSE-4.7:containernetworking-plugins-debuginfo-0:0.8.6-1.rhaos4.5.el8.ppc64le", "8Base-RHOSE-4.7:containernetworking-plugins-debuginfo-0:0.8.6-1.rhaos4.5.el8.s390x", "8Base-RHOSE-4.7:containernetworking-plugins-debuginfo-0:0.8.6-1.rhaos4.5.el8.x86_64", "8Base-RHOSE-4.7:containernetworking-plugins-debugsource-0:0.8.6-1.rhaos4.5.el8.ppc64le", "8Base-RHOSE-4.7:containernetworking-plugins-debugsource-0:0.8.6-1.rhaos4.5.el8.s390x", "8Base-RHOSE-4.7:containernetworking-plugins-debugsource-0:0.8.6-1.rhaos4.5.el8.x86_64", "8Base-RHOSE-4.7:coreos-installer-0:0.8.0-3.rhaos4.7.el8.ppc64le", "8Base-RHOSE-4.7:coreos-installer-0:0.8.0-3.rhaos4.7.el8.s390x", "8Base-RHOSE-4.7:coreos-installer-0:0.8.0-3.rhaos4.7.el8.src", "8Base-RHOSE-4.7:coreos-installer-0:0.8.0-3.rhaos4.7.el8.x86_64", "8Base-RHOSE-4.7:coreos-installer-bootinfra-0:0.8.0-3.rhaos4.7.el8.ppc64le", "8Base-RHOSE-4.7:coreos-installer-bootinfra-0:0.8.0-3.rhaos4.7.el8.s390x", "8Base-RHOSE-4.7:coreos-installer-bootinfra-debuginfo-0:0.8.0-3.rhaos4.7.el8.ppc64le", "8Base-RHOSE-4.7:coreos-installer-bootinfra-debuginfo-0:0.8.0-3.rhaos4.7.el8.s390x", "8Base-RHOSE-4.7:coreos-installer-bootinfra-debuginfo-0:0.8.0-3.rhaos4.7.el8.x86_64", "8Base-RHOSE-4.7:coreos-installer-debuginfo-0:0.8.0-3.rhaos4.7.el8.ppc64le", "8Base-RHOSE-4.7:coreos-installer-debuginfo-0:0.8.0-3.rhaos4.7.el8.s390x", "8Base-RHOSE-4.7:coreos-installer-debuginfo-0:0.8.0-3.rhaos4.7.el8.x86_64", "8Base-RHOSE-4.7:coreos-installer-debugsource-0:0.8.0-3.rhaos4.7.el8.ppc64le", "8Base-RHOSE-4.7:coreos-installer-debugsource-0:0.8.0-3.rhaos4.7.el8.s390x", "8Base-RHOSE-4.7:coreos-installer-debugsource-0:0.8.0-3.rhaos4.7.el8.x86_64", "8Base-RHOSE-4.7:dracut-0:049-95.git20200804.el8_3.4.ppc64le", "8Base-RHOSE-4.7:dracut-0:049-95.git20200804.el8_3.4.s390x", "8Base-RHOSE-4.7:dracut-0:049-95.git20200804.el8_3.4.src", "8Base-RHOSE-4.7:dracut-0:049-95.git20200804.el8_3.4.x86_64", "8Base-RHOSE-4.7:dracut-caps-0:049-95.git20200804.el8_3.4.ppc64le", "8Base-RHOSE-4.7:dracut-caps-0:049-95.git20200804.el8_3.4.s390x", "8Base-RHOSE-4.7:dracut-caps-0:049-95.git20200804.el8_3.4.x86_64", "8Base-RHOSE-4.7:dracut-config-generic-0:049-95.git20200804.el8_3.4.ppc64le", "8Base-RHOSE-4.7:dracut-config-generic-0:049-95.git20200804.el8_3.4.s390x", "8Base-RHOSE-4.7:dracut-config-generic-0:049-95.git20200804.el8_3.4.x86_64", "8Base-RHOSE-4.7:dracut-config-rescue-0:049-95.git20200804.el8_3.4.ppc64le", "8Base-RHOSE-4.7:dracut-config-rescue-0:049-95.git20200804.el8_3.4.s390x", "8Base-RHOSE-4.7:dracut-config-rescue-0:049-95.git20200804.el8_3.4.x86_64", "8Base-RHOSE-4.7:dracut-debuginfo-0:049-95.git20200804.el8_3.4.ppc64le", "8Base-RHOSE-4.7:dracut-debuginfo-0:049-95.git20200804.el8_3.4.s390x", "8Base-RHOSE-4.7:dracut-debuginfo-0:049-95.git20200804.el8_3.4.x86_64", "8Base-RHOSE-4.7:dracut-debugsource-0:049-95.git20200804.el8_3.4.ppc64le", "8Base-RHOSE-4.7:dracut-debugsource-0:049-95.git20200804.el8_3.4.s390x", "8Base-RHOSE-4.7:dracut-debugsource-0:049-95.git20200804.el8_3.4.x86_64", "8Base-RHOSE-4.7:dracut-live-0:049-95.git20200804.el8_3.4.ppc64le", "8Base-RHOSE-4.7:dracut-live-0:049-95.git20200804.el8_3.4.s390x", "8Base-RHOSE-4.7:dracut-live-0:049-95.git20200804.el8_3.4.x86_64", "8Base-RHOSE-4.7:dracut-network-0:049-95.git20200804.el8_3.4.ppc64le", "8Base-RHOSE-4.7:dracut-network-0:049-95.git20200804.el8_3.4.s390x", "8Base-RHOSE-4.7:dracut-network-0:049-95.git20200804.el8_3.4.x86_64", "8Base-RHOSE-4.7:dracut-squash-0:049-95.git20200804.el8_3.4.ppc64le", "8Base-RHOSE-4.7:dracut-squash-0:049-95.git20200804.el8_3.4.s390x", "8Base-RHOSE-4.7:dracut-squash-0:049-95.git20200804.el8_3.4.x86_64", "8Base-RHOSE-4.7:dracut-tools-0:049-95.git20200804.el8_3.4.ppc64le", "8Base-RHOSE-4.7:dracut-tools-0:049-95.git20200804.el8_3.4.s390x", "8Base-RHOSE-4.7:dracut-tools-0:049-95.git20200804.el8_3.4.x86_64", "8Base-RHOSE-4.7:faq-0:0.0.6-5.el8.ppc64le", "8Base-RHOSE-4.7:faq-0:0.0.6-5.el8.s390x", "8Base-RHOSE-4.7:faq-0:0.0.6-5.el8.src", "8Base-RHOSE-4.7:faq-0:0.0.6-5.el8.x86_64", "8Base-RHOSE-4.7:golang-github-prometheus-promu-0:0.5.0-2.git642a960.el8.ppc64le", "8Base-RHOSE-4.7:golang-github-prometheus-promu-0:0.5.0-2.git642a960.el8.s390x", "8Base-RHOSE-4.7:golang-github-prometheus-promu-0:0.5.0-2.git642a960.el8.src", "8Base-RHOSE-4.7:golang-github-prometheus-promu-0:0.5.0-2.git642a960.el8.x86_64", "8Base-RHOSE-4.7:gperftools-0:2.6.3-2.el8ost.ppc64le", "8Base-RHOSE-4.7:gperftools-0:2.6.3-2.el8ost.s390x", "8Base-RHOSE-4.7:gperftools-0:2.6.3-2.el8ost.src", "8Base-RHOSE-4.7:gperftools-0:2.6.3-2.el8ost.x86_64", "8Base-RHOSE-4.7:gperftools-debugsource-0:2.6.3-2.el8ost.ppc64le", "8Base-RHOSE-4.7:gperftools-debugsource-0:2.6.3-2.el8ost.s390x", "8Base-RHOSE-4.7:gperftools-debugsource-0:2.6.3-2.el8ost.x86_64", "8Base-RHOSE-4.7:gperftools-devel-0:2.6.3-2.el8ost.ppc64le", "8Base-RHOSE-4.7:gperftools-devel-0:2.6.3-2.el8ost.s390x", "8Base-RHOSE-4.7:gperftools-devel-0:2.6.3-2.el8ost.x86_64", "8Base-RHOSE-4.7:gperftools-libs-0:2.6.3-2.el8ost.ppc64le", "8Base-RHOSE-4.7:gperftools-libs-0:2.6.3-2.el8ost.s390x", "8Base-RHOSE-4.7:gperftools-libs-0:2.6.3-2.el8ost.x86_64", "8Base-RHOSE-4.7:gperftools-libs-debuginfo-0:2.6.3-2.el8ost.ppc64le", "8Base-RHOSE-4.7:gperftools-libs-debuginfo-0:2.6.3-2.el8ost.s390x", "8Base-RHOSE-4.7:gperftools-libs-debuginfo-0:2.6.3-2.el8ost.x86_64", "8Base-RHOSE-4.7:grpc-0:1.18.0-4.el8ost.ppc64le", "8Base-RHOSE-4.7:grpc-0:1.18.0-4.el8ost.s390x", "8Base-RHOSE-4.7:grpc-0:1.18.0-4.el8ost.src", "8Base-RHOSE-4.7:grpc-0:1.18.0-4.el8ost.x86_64", "8Base-RHOSE-4.7:grpc-cli-0:1.18.0-4.el8ost.ppc64le", "8Base-RHOSE-4.7:grpc-cli-0:1.18.0-4.el8ost.s390x", "8Base-RHOSE-4.7:grpc-cli-0:1.18.0-4.el8ost.x86_64", "8Base-RHOSE-4.7:grpc-cli-debuginfo-0:1.18.0-4.el8ost.ppc64le", "8Base-RHOSE-4.7:grpc-cli-debuginfo-0:1.18.0-4.el8ost.s390x", "8Base-RHOSE-4.7:grpc-cli-debuginfo-0:1.18.0-4.el8ost.x86_64", "8Base-RHOSE-4.7:grpc-debuginfo-0:1.18.0-4.el8ost.ppc64le", "8Base-RHOSE-4.7:grpc-debuginfo-0:1.18.0-4.el8ost.s390x", "8Base-RHOSE-4.7:grpc-debuginfo-0:1.18.0-4.el8ost.x86_64", "8Base-RHOSE-4.7:grpc-debugsource-0:1.18.0-4.el8ost.ppc64le", "8Base-RHOSE-4.7:grpc-debugsource-0:1.18.0-4.el8ost.s390x", "8Base-RHOSE-4.7:grpc-debugsource-0:1.18.0-4.el8ost.x86_64", "8Base-RHOSE-4.7:grpc-devel-0:1.18.0-4.el8ost.ppc64le", "8Base-RHOSE-4.7:grpc-devel-0:1.18.0-4.el8ost.s390x", "8Base-RHOSE-4.7:grpc-devel-0:1.18.0-4.el8ost.x86_64", "8Base-RHOSE-4.7:grpc-plugins-0:1.18.0-4.el8ost.ppc64le", "8Base-RHOSE-4.7:grpc-plugins-0:1.18.0-4.el8ost.s390x", "8Base-RHOSE-4.7:grpc-plugins-0:1.18.0-4.el8ost.x86_64", "8Base-RHOSE-4.7:grpc-plugins-debuginfo-0:1.18.0-4.el8ost.ppc64le", "8Base-RHOSE-4.7:grpc-plugins-debuginfo-0:1.18.0-4.el8ost.s390x", "8Base-RHOSE-4.7:grpc-plugins-debuginfo-0:1.18.0-4.el8ost.x86_64", "8Base-RHOSE-4.7:haproxy-0:2.0.19-1.el8.src", "8Base-RHOSE-4.7:haproxy-debugsource-0:2.0.19-1.el8.ppc64le", "8Base-RHOSE-4.7:haproxy-debugsource-0:2.0.19-1.el8.s390x", "8Base-RHOSE-4.7:haproxy-debugsource-0:2.0.19-1.el8.x86_64", "8Base-RHOSE-4.7:haproxy20-0:2.0.19-1.el8.ppc64le", "8Base-RHOSE-4.7:haproxy20-0:2.0.19-1.el8.s390x", "8Base-RHOSE-4.7:haproxy20-0:2.0.19-1.el8.x86_64", "8Base-RHOSE-4.7:haproxy20-debuginfo-0:2.0.19-1.el8.ppc64le", "8Base-RHOSE-4.7:haproxy20-debuginfo-0:2.0.19-1.el8.s390x", "8Base-RHOSE-4.7:haproxy20-debuginfo-0:2.0.19-1.el8.x86_64", "8Base-RHOSE-4.7:ignition-0:2.9.0-2.rhaos4.7.git1d56dc8.el8.ppc64le", "8Base-RHOSE-4.7:ignition-0:2.9.0-2.rhaos4.7.git1d56dc8.el8.s390x", "8Base-RHOSE-4.7:ignition-0:2.9.0-2.rhaos4.7.git1d56dc8.el8.src", "8Base-RHOSE-4.7:ignition-0:2.9.0-2.rhaos4.7.git1d56dc8.el8.x86_64", "8Base-RHOSE-4.7:ignition-debuginfo-0:2.9.0-2.rhaos4.7.git1d56dc8.el8.ppc64le", "8Base-RHOSE-4.7:ignition-debuginfo-0:2.9.0-2.rhaos4.7.git1d56dc8.el8.s390x", "8Base-RHOSE-4.7:ignition-debuginfo-0:2.9.0-2.rhaos4.7.git1d56dc8.el8.x86_64", "8Base-RHOSE-4.7:ignition-debugsource-0:2.9.0-2.rhaos4.7.git1d56dc8.el8.ppc64le", "8Base-RHOSE-4.7:ignition-debugsource-0:2.9.0-2.rhaos4.7.git1d56dc8.el8.s390x", "8Base-RHOSE-4.7:ignition-debugsource-0:2.9.0-2.rhaos4.7.git1d56dc8.el8.x86_64", "8Base-RHOSE-4.7:ignition-validate-0:2.9.0-2.rhaos4.7.git1d56dc8.el8.ppc64le", "8Base-RHOSE-4.7:ignition-validate-0:2.9.0-2.rhaos4.7.git1d56dc8.el8.s390x", "8Base-RHOSE-4.7:ignition-validate-0:2.9.0-2.rhaos4.7.git1d56dc8.el8.x86_64", "8Base-RHOSE-4.7:ignition-validate-debuginfo-0:2.9.0-2.rhaos4.7.git1d56dc8.el8.ppc64le", "8Base-RHOSE-4.7:ignition-validate-debuginfo-0:2.9.0-2.rhaos4.7.git1d56dc8.el8.s390x", "8Base-RHOSE-4.7:ignition-validate-debuginfo-0:2.9.0-2.rhaos4.7.git1d56dc8.el8.x86_64", "8Base-RHOSE-4.7:inotify-tools-0:3.20.1-2.el8.ppc64le", "8Base-RHOSE-4.7:inotify-tools-0:3.20.1-2.el8.s390x", "8Base-RHOSE-4.7:inotify-tools-0:3.20.1-2.el8.src", "8Base-RHOSE-4.7:inotify-tools-0:3.20.1-2.el8.x86_64", "8Base-RHOSE-4.7:inotify-tools-debuginfo-0:3.20.1-2.el8.ppc64le", "8Base-RHOSE-4.7:inotify-tools-debuginfo-0:3.20.1-2.el8.s390x", "8Base-RHOSE-4.7:inotify-tools-debuginfo-0:3.20.1-2.el8.x86_64", "8Base-RHOSE-4.7:inotify-tools-debugsource-0:3.20.1-2.el8.ppc64le", "8Base-RHOSE-4.7:inotify-tools-debugsource-0:3.20.1-2.el8.s390x", "8Base-RHOSE-4.7:inotify-tools-debugsource-0:3.20.1-2.el8.x86_64", "8Base-RHOSE-4.7:inotify-tools-devel-0:3.20.1-2.el8.ppc64le", "8Base-RHOSE-4.7:inotify-tools-devel-0:3.20.1-2.el8.s390x", "8Base-RHOSE-4.7:inotify-tools-devel-0:3.20.1-2.el8.x86_64", "8Base-RHOSE-4.7:ironic-images-0:15.1-20210114.1.el8.noarch", "8Base-RHOSE-4.7:ironic-images-0:15.1-20210114.1.el8.src", "8Base-RHOSE-4.7:ironic-images-all-0:15.1-20210114.1.el8.noarch", "8Base-RHOSE-4.7:ironic-images-ipa-ppc64le-0:15.1-20210114.1.el8.noarch", "8Base-RHOSE-4.7:ironic-images-ipa-x86_64-0:15.1-20210114.1.el8.noarch", "8Base-RHOSE-4.7:jenkins-0:2.263.3.1612449007-1.el8.noarch", "8Base-RHOSE-4.7:jenkins-0:2.263.3.1612449007-1.el8.src", "8Base-RHOSE-4.7:jenkins-2-plugins-0:4.7.1611636915-1.el8.noarch", "8Base-RHOSE-4.7:jenkins-2-plugins-0:4.7.1611636915-1.el8.src", "8Base-RHOSE-4.7:jq-0:1.6-2.el8.ppc64le", "8Base-RHOSE-4.7:jq-0:1.6-2.el8.s390x", "8Base-RHOSE-4.7:jq-0:1.6-2.el8.src", "8Base-RHOSE-4.7:jq-0:1.6-2.el8.x86_64", "8Base-RHOSE-4.7:jq-debuginfo-0:1.6-2.el8.ppc64le", "8Base-RHOSE-4.7:jq-debuginfo-0:1.6-2.el8.s390x", "8Base-RHOSE-4.7:jq-debuginfo-0:1.6-2.el8.x86_64", "8Base-RHOSE-4.7:jq-debugsource-0:1.6-2.el8.ppc64le", "8Base-RHOSE-4.7:jq-debugsource-0:1.6-2.el8.s390x", "8Base-RHOSE-4.7:jq-debugsource-0:1.6-2.el8.x86_64", "8Base-RHOSE-4.7:jq-devel-0:1.6-2.el8.ppc64le", "8Base-RHOSE-4.7:jq-devel-0:1.6-2.el8.s390x", "8Base-RHOSE-4.7:jq-devel-0:1.6-2.el8.x86_64", "8Base-RHOSE-4.7:kuryr-binding-scripts-0:1.1.1-0.20190923160834.41e6964.el8ost.noarch", "8Base-RHOSE-4.7:libnftnl-0:1.1.5-4.el8.ppc64le", "8Base-RHOSE-4.7:libnftnl-0:1.1.5-4.el8.s390x", "8Base-RHOSE-4.7:libnftnl-0:1.1.5-4.el8.src", "8Base-RHOSE-4.7:libnftnl-0:1.1.5-4.el8.x86_64", "8Base-RHOSE-4.7:libnftnl-debuginfo-0:1.1.5-4.el8.ppc64le", "8Base-RHOSE-4.7:libnftnl-debuginfo-0:1.1.5-4.el8.s390x", "8Base-RHOSE-4.7:libnftnl-debuginfo-0:1.1.5-4.el8.x86_64", "8Base-RHOSE-4.7:libnftnl-debugsource-0:1.1.5-4.el8.ppc64le", "8Base-RHOSE-4.7:libnftnl-debugsource-0:1.1.5-4.el8.s390x", "8Base-RHOSE-4.7:libnftnl-debugsource-0:1.1.5-4.el8.x86_64", "8Base-RHOSE-4.7:libnftnl-devel-0:1.1.5-4.el8.ppc64le", "8Base-RHOSE-4.7:libnftnl-devel-0:1.1.5-4.el8.s390x", "8Base-RHOSE-4.7:libnftnl-devel-0:1.1.5-4.el8.x86_64", "8Base-RHOSE-4.7:libsodium-0:1.0.16-4.5.el8ost.ppc64le", "8Base-RHOSE-4.7:libsodium-0:1.0.16-4.5.el8ost.s390x", "8Base-RHOSE-4.7:libsodium-0:1.0.16-4.5.el8ost.src", "8Base-RHOSE-4.7:libsodium-0:1.0.16-4.5.el8ost.x86_64", "8Base-RHOSE-4.7:libsodium-debuginfo-0:1.0.16-4.5.el8ost.ppc64le", "8Base-RHOSE-4.7:libsodium-debuginfo-0:1.0.16-4.5.el8ost.s390x", "8Base-RHOSE-4.7:libsodium-debuginfo-0:1.0.16-4.5.el8ost.x86_64", "8Base-RHOSE-4.7:libsodium-debugsource-0:1.0.16-4.5.el8ost.ppc64le", "8Base-RHOSE-4.7:libsodium-debugsource-0:1.0.16-4.5.el8ost.s390x", "8Base-RHOSE-4.7:libsodium-debugsource-0:1.0.16-4.5.el8ost.x86_64", "8Base-RHOSE-4.7:libsodium-devel-0:1.0.16-4.5.el8ost.ppc64le", "8Base-RHOSE-4.7:libsodium-devel-0:1.0.16-4.5.el8ost.s390x", "8Base-RHOSE-4.7:libsodium-devel-0:1.0.16-4.5.el8ost.x86_64", "8Base-RHOSE-4.7:libsodium-static-0:1.0.16-4.5.el8ost.ppc64le", "8Base-RHOSE-4.7:libsodium-static-0:1.0.16-4.5.el8ost.s390x", "8Base-RHOSE-4.7:libsodium-static-0:1.0.16-4.5.el8ost.x86_64", "8Base-RHOSE-4.7:libunwind-0:1.2.1-5.el8.ppc64le", "8Base-RHOSE-4.7:libunwind-0:1.2.1-5.el8.src", "8Base-RHOSE-4.7:libunwind-0:1.2.1-5.el8.x86_64", "8Base-RHOSE-4.7:libunwind-debuginfo-0:1.2.1-5.el8.ppc64le", "8Base-RHOSE-4.7:libunwind-debuginfo-0:1.2.1-5.el8.x86_64", "8Base-RHOSE-4.7:libunwind-debugsource-0:1.2.1-5.el8.ppc64le", "8Base-RHOSE-4.7:libunwind-debugsource-0:1.2.1-5.el8.x86_64", "8Base-RHOSE-4.7:libunwind-devel-0:1.2.1-5.el8.ppc64le", "8Base-RHOSE-4.7:libunwind-devel-0:1.2.1-5.el8.x86_64", "8Base-RHOSE-4.7:network-scripts-openvswitch2.13-0:2.13.0-79.el8fdp.ppc64le", "8Base-RHOSE-4.7:network-scripts-openvswitch2.13-0:2.13.0-79.el8fdp.s390x", "8Base-RHOSE-4.7:network-scripts-openvswitch2.13-0:2.13.0-79.el8fdp.x86_64", "8Base-RHOSE-4.7:octavia-amphora-image-x86_64-0:17.0-20200606.1.el8ost.noarch", "8Base-RHOSE-4.7:openshift-0:4.7.0-202102060108.p0.git.97095.7271b90.el8.src", "8Base-RHOSE-4.7:openshift-clients-0:4.7.0-202102032256.p0.git.3951.0e656ef.el8.ppc64le", "8Base-RHOSE-4.7:openshift-clients-0:4.7.0-202102032256.p0.git.3951.0e656ef.el8.s390x", "8Base-RHOSE-4.7:openshift-clients-0:4.7.0-202102032256.p0.git.3951.0e656ef.el8.src", "8Base-RHOSE-4.7:openshift-clients-0:4.7.0-202102032256.p0.git.3951.0e656ef.el8.x86_64", "8Base-RHOSE-4.7:openshift-clients-redistributable-0:4.7.0-202102032256.p0.git.3951.0e656ef.el8.x86_64", "8Base-RHOSE-4.7:openshift-eventrouter-0:0.2-4.git7c289cc.el8.ppc64le", "8Base-RHOSE-4.7:openshift-eventrouter-0:0.2-4.git7c289cc.el8.s390x", "8Base-RHOSE-4.7:openshift-eventrouter-0:0.2-4.git7c289cc.el8.src", "8Base-RHOSE-4.7:openshift-eventrouter-0:0.2-4.git7c289cc.el8.x86_64", "8Base-RHOSE-4.7:openshift-eventrouter-debuginfo-0:0.2-4.git7c289cc.el8.ppc64le", "8Base-RHOSE-4.7:openshift-eventrouter-debuginfo-0:0.2-4.git7c289cc.el8.s390x", "8Base-RHOSE-4.7:openshift-eventrouter-debuginfo-0:0.2-4.git7c289cc.el8.x86_64", "8Base-RHOSE-4.7:openshift-eventrouter-debugsource-0:0.2-4.git7c289cc.el8.ppc64le", "8Base-RHOSE-4.7:openshift-eventrouter-debugsource-0:0.2-4.git7c289cc.el8.s390x", "8Base-RHOSE-4.7:openshift-eventrouter-debugsource-0:0.2-4.git7c289cc.el8.x86_64", "8Base-RHOSE-4.7:openshift-hyperkube-0:4.7.0-202102060108.p0.git.97095.7271b90.el8.ppc64le", "8Base-RHOSE-4.7:openshift-hyperkube-0:4.7.0-202102060108.p0.git.97095.7271b90.el8.s390x", "8Base-RHOSE-4.7:openshift-hyperkube-0:4.7.0-202102060108.p0.git.97095.7271b90.el8.x86_64", "8Base-RHOSE-4.7:openshift-kuryr-0:4.7.0-202101262230.p0.git.2494.cd95ce5.el8.src", "8Base-RHOSE-4.7:openshift-kuryr-cni-0:4.7.0-202101262230.p0.git.2494.cd95ce5.el8.noarch", "8Base-RHOSE-4.7:openshift-kuryr-common-0:4.7.0-202101262230.p0.git.2494.cd95ce5.el8.noarch", "8Base-RHOSE-4.7:openshift-kuryr-controller-0:4.7.0-202101262230.p0.git.2494.cd95ce5.el8.noarch", "8Base-RHOSE-4.7:openstack-ironic-1:16.0.4-0.20210203051223.7d74ea0.el8.src", "8Base-RHOSE-4.7:openstack-ironic-api-1:16.0.4-0.20210203051223.7d74ea0.el8.noarch", "8Base-RHOSE-4.7:openstack-ironic-common-1:16.0.4-0.20210203051223.7d74ea0.el8.noarch", "8Base-RHOSE-4.7:openstack-ironic-conductor-1:16.0.4-0.20210203051223.7d74ea0.el8.noarch", "8Base-RHOSE-4.7:openstack-ironic-inspector-0:10.4.1-0.20201123161216.70fccec.el8.noarch", "8Base-RHOSE-4.7:openstack-ironic-inspector-0:10.4.1-0.20201123161216.70fccec.el8.src", "8Base-RHOSE-4.7:openstack-ironic-inspector-api-0:10.4.1-0.20201123161216.70fccec.el8.noarch", "8Base-RHOSE-4.7:openstack-ironic-inspector-conductor-0:10.4.1-0.20201123161216.70fccec.el8.noarch", "8Base-RHOSE-4.7:openstack-ironic-inspector-dnsmasq-0:10.4.1-0.20201123161216.70fccec.el8.noarch", "8Base-RHOSE-4.7:openstack-ironic-python-agent-0:6.4.3-0.20201217171210.bd45db1.el8.noarch", "8Base-RHOSE-4.7:openstack-ironic-python-agent-0:6.4.3-0.20201217171210.bd45db1.el8.src", "8Base-RHOSE-4.7:openvswitch2.13-0:2.13.0-79.el8fdp.ppc64le", "8Base-RHOSE-4.7:openvswitch2.13-0:2.13.0-79.el8fdp.s390x", "8Base-RHOSE-4.7:openvswitch2.13-0:2.13.0-79.el8fdp.src", "8Base-RHOSE-4.7:openvswitch2.13-0:2.13.0-79.el8fdp.x86_64", "8Base-RHOSE-4.7:openvswitch2.13-debuginfo-0:2.13.0-79.el8fdp.ppc64le", "8Base-RHOSE-4.7:openvswitch2.13-debuginfo-0:2.13.0-79.el8fdp.s390x", "8Base-RHOSE-4.7:openvswitch2.13-debuginfo-0:2.13.0-79.el8fdp.x86_64", "8Base-RHOSE-4.7:openvswitch2.13-debugsource-0:2.13.0-79.el8fdp.ppc64le", "8Base-RHOSE-4.7:openvswitch2.13-debugsource-0:2.13.0-79.el8fdp.s390x", "8Base-RHOSE-4.7:openvswitch2.13-debugsource-0:2.13.0-79.el8fdp.x86_64", "8Base-RHOSE-4.7:openvswitch2.13-devel-0:2.13.0-79.el8fdp.ppc64le", "8Base-RHOSE-4.7:openvswitch2.13-devel-0:2.13.0-79.el8fdp.s390x", "8Base-RHOSE-4.7:openvswitch2.13-devel-0:2.13.0-79.el8fdp.x86_64", "8Base-RHOSE-4.7:openvswitch2.13-test-0:2.13.0-79.el8fdp.noarch", "8Base-RHOSE-4.7:ostree-0:2020.7-1.el8.ppc64le", "8Base-RHOSE-4.7:ostree-0:2020.7-1.el8.s390x", "8Base-RHOSE-4.7:ostree-0:2020.7-1.el8.src", "8Base-RHOSE-4.7:ostree-0:2020.7-1.el8.x86_64", "8Base-RHOSE-4.7:ostree-debuginfo-0:2020.7-1.el8.ppc64le", "8Base-RHOSE-4.7:ostree-debuginfo-0:2020.7-1.el8.s390x", "8Base-RHOSE-4.7:ostree-debuginfo-0:2020.7-1.el8.x86_64", "8Base-RHOSE-4.7:ostree-debugsource-0:2020.7-1.el8.ppc64le", "8Base-RHOSE-4.7:ostree-debugsource-0:2020.7-1.el8.s390x", "8Base-RHOSE-4.7:ostree-debugsource-0:2020.7-1.el8.x86_64", "8Base-RHOSE-4.7:ostree-devel-0:2020.7-1.el8.ppc64le", "8Base-RHOSE-4.7:ostree-devel-0:2020.7-1.el8.s390x", "8Base-RHOSE-4.7:ostree-devel-0:2020.7-1.el8.x86_64", "8Base-RHOSE-4.7:ostree-grub2-0:2020.7-1.el8.ppc64le", "8Base-RHOSE-4.7:ostree-grub2-0:2020.7-1.el8.x86_64", "8Base-RHOSE-4.7:ostree-libs-0:2020.7-1.el8.ppc64le", "8Base-RHOSE-4.7:ostree-libs-0:2020.7-1.el8.s390x", "8Base-RHOSE-4.7:ostree-libs-0:2020.7-1.el8.x86_64", "8Base-RHOSE-4.7:ostree-libs-debuginfo-0:2020.7-1.el8.ppc64le", "8Base-RHOSE-4.7:ostree-libs-debuginfo-0:2020.7-1.el8.s390x", "8Base-RHOSE-4.7:ostree-libs-debuginfo-0:2020.7-1.el8.x86_64", "8Base-RHOSE-4.7:ovn2.13-0:20.09.0-21.el8fdn.ppc64le", "8Base-RHOSE-4.7:ovn2.13-0:20.09.0-21.el8fdn.s390x", "8Base-RHOSE-4.7:ovn2.13-0:20.09.0-21.el8fdn.src", "8Base-RHOSE-4.7:ovn2.13-0:20.09.0-21.el8fdn.x86_64", "8Base-RHOSE-4.7:ovn2.13-central-0:20.09.0-21.el8fdn.ppc64le", "8Base-RHOSE-4.7:ovn2.13-central-0:20.09.0-21.el8fdn.s390x", "8Base-RHOSE-4.7:ovn2.13-central-0:20.09.0-21.el8fdn.x86_64", "8Base-RHOSE-4.7:ovn2.13-central-debuginfo-0:20.09.0-21.el8fdn.ppc64le", "8Base-RHOSE-4.7:ovn2.13-central-debuginfo-0:20.09.0-21.el8fdn.s390x", "8Base-RHOSE-4.7:ovn2.13-central-debuginfo-0:20.09.0-21.el8fdn.x86_64", "8Base-RHOSE-4.7:ovn2.13-debuginfo-0:20.09.0-21.el8fdn.ppc64le", "8Base-RHOSE-4.7:ovn2.13-debuginfo-0:20.09.0-21.el8fdn.s390x", "8Base-RHOSE-4.7:ovn2.13-debuginfo-0:20.09.0-21.el8fdn.x86_64", "8Base-RHOSE-4.7:ovn2.13-debugsource-0:20.09.0-21.el8fdn.ppc64le", "8Base-RHOSE-4.7:ovn2.13-debugsource-0:20.09.0-21.el8fdn.s390x", "8Base-RHOSE-4.7:ovn2.13-debugsource-0:20.09.0-21.el8fdn.x86_64", "8Base-RHOSE-4.7:ovn2.13-host-0:20.09.0-21.el8fdn.ppc64le", "8Base-RHOSE-4.7:ovn2.13-host-0:20.09.0-21.el8fdn.s390x", "8Base-RHOSE-4.7:ovn2.13-host-0:20.09.0-21.el8fdn.x86_64", "8Base-RHOSE-4.7:ovn2.13-host-debuginfo-0:20.09.0-21.el8fdn.ppc64le", "8Base-RHOSE-4.7:ovn2.13-host-debuginfo-0:20.09.0-21.el8fdn.s390x", "8Base-RHOSE-4.7:ovn2.13-host-debuginfo-0:20.09.0-21.el8fdn.x86_64", "8Base-RHOSE-4.7:ovn2.13-vtep-0:20.09.0-21.el8fdn.ppc64le", "8Base-RHOSE-4.7:ovn2.13-vtep-0:20.09.0-21.el8fdn.s390x", "8Base-RHOSE-4.7:ovn2.13-vtep-0:20.09.0-21.el8fdn.x86_64", "8Base-RHOSE-4.7:ovn2.13-vtep-debuginfo-0:20.09.0-21.el8fdn.ppc64le", "8Base-RHOSE-4.7:ovn2.13-vtep-debuginfo-0:20.09.0-21.el8fdn.s390x", "8Base-RHOSE-4.7:ovn2.13-vtep-debuginfo-0:20.09.0-21.el8fdn.x86_64", "8Base-RHOSE-4.7:powerpc-utils-0:1.3.6-12.el8_3.ppc64le", "8Base-RHOSE-4.7:powerpc-utils-0:1.3.6-12.el8_3.src", "8Base-RHOSE-4.7:powerpc-utils-core-0:1.3.6-12.el8_3.ppc64le", "8Base-RHOSE-4.7:powerpc-utils-core-debuginfo-0:1.3.6-12.el8_3.ppc64le", "8Base-RHOSE-4.7:powerpc-utils-debugsource-0:1.3.6-12.el8_3.ppc64le", "8Base-RHOSE-4.7:pprof-0:2.6.3-2.el8ost.noarch", "8Base-RHOSE-4.7:prometheus-promu-0:0.5.0-2.git642a960.el8.ppc64le", "8Base-RHOSE-4.7:prometheus-promu-0:0.5.0-2.git642a960.el8.s390x", "8Base-RHOSE-4.7:prometheus-promu-0:0.5.0-2.git642a960.el8.x86_64", "8Base-RHOSE-4.7:protobuf-0:3.6.1-4.el8ost.ppc64le", "8Base-RHOSE-4.7:protobuf-0:3.6.1-4.el8ost.s390x", "8Base-RHOSE-4.7:protobuf-0:3.6.1-4.el8ost.src", "8Base-RHOSE-4.7:protobuf-0:3.6.1-4.el8ost.x86_64", "8Base-RHOSE-4.7:protobuf-compiler-0:3.6.1-4.el8ost.ppc64le", "8Base-RHOSE-4.7:protobuf-compiler-0:3.6.1-4.el8ost.s390x", "8Base-RHOSE-4.7:protobuf-compiler-0:3.6.1-4.el8ost.x86_64", "8Base-RHOSE-4.7:protobuf-compiler-debuginfo-0:3.6.1-4.el8ost.ppc64le", "8Base-RHOSE-4.7:protobuf-compiler-debuginfo-0:3.6.1-4.el8ost.s390x", "8Base-RHOSE-4.7:protobuf-compiler-debuginfo-0:3.6.1-4.el8ost.x86_64", "8Base-RHOSE-4.7:protobuf-debuginfo-0:3.6.1-4.el8ost.ppc64le", "8Base-RHOSE-4.7:protobuf-debuginfo-0:3.6.1-4.el8ost.s390x", "8Base-RHOSE-4.7:protobuf-debuginfo-0:3.6.1-4.el8ost.x86_64", "8Base-RHOSE-4.7:protobuf-debugsource-0:3.6.1-4.el8ost.ppc64le", "8Base-RHOSE-4.7:protobuf-debugsource-0:3.6.1-4.el8ost.s390x", "8Base-RHOSE-4.7:protobuf-debugsource-0:3.6.1-4.el8ost.x86_64", "8Base-RHOSE-4.7:protobuf-devel-0:3.6.1-4.el8ost.ppc64le", "8Base-RHOSE-4.7:protobuf-devel-0:3.6.1-4.el8ost.s390x", "8Base-RHOSE-4.7:protobuf-devel-0:3.6.1-4.el8ost.x86_64", "8Base-RHOSE-4.7:protobuf-lite-0:3.6.1-4.el8ost.ppc64le", "8Base-RHOSE-4.7:protobuf-lite-0:3.6.1-4.el8ost.s390x", "8Base-RHOSE-4.7:protobuf-lite-0:3.6.1-4.el8ost.x86_64", "8Base-RHOSE-4.7:protobuf-lite-debuginfo-0:3.6.1-4.el8ost.ppc64le", "8Base-RHOSE-4.7:protobuf-lite-debuginfo-0:3.6.1-4.el8ost.s390x", "8Base-RHOSE-4.7:protobuf-lite-debuginfo-0:3.6.1-4.el8ost.x86_64", "8Base-RHOSE-4.7:protobuf-lite-devel-0:3.6.1-4.el8ost.ppc64le", "8Base-RHOSE-4.7:protobuf-lite-devel-0:3.6.1-4.el8ost.s390x", "8Base-RHOSE-4.7:protobuf-lite-devel-0:3.6.1-4.el8ost.x86_64", "8Base-RHOSE-4.7:protobuf-lite-static-0:3.6.1-4.el8ost.ppc64le", "8Base-RHOSE-4.7:protobuf-lite-static-0:3.6.1-4.el8ost.s390x", "8Base-RHOSE-4.7:protobuf-lite-static-0:3.6.1-4.el8ost.x86_64", "8Base-RHOSE-4.7:protobuf-static-0:3.6.1-4.el8ost.ppc64le", "8Base-RHOSE-4.7:protobuf-static-0:3.6.1-4.el8ost.s390x", "8Base-RHOSE-4.7:protobuf-static-0:3.6.1-4.el8ost.x86_64", "8Base-RHOSE-4.7:protobuf-vim-0:3.6.1-4.el8ost.noarch", "8Base-RHOSE-4.7:python-alembic-0:1.4.2-5.el8ost.src", "8Base-RHOSE-4.7:python-boto3-0:1.9.101-1.el8ost.src", "8Base-RHOSE-4.7:python-botocore-0:1.12.119-1.el8ost.src", "8Base-RHOSE-4.7:python-cachetools-0:3.1.0-1.el8ost.src", "8Base-RHOSE-4.7:python-certifi-0:2018.10.15-4.el8ost.src", "8Base-RHOSE-4.7:python-construct-0:2.10.56-1.el8ost.src", "8Base-RHOSE-4.7:python-daemon-0:2.1.2-9.el8ar.src", "8Base-RHOSE-4.7:python-debtcollector-0:2.2.0-0.20201008171245.649189d.el8.src", "8Base-RHOSE-4.7:python-dictdiffer-0:0.7.1-2.el8ost.src", "8Base-RHOSE-4.7:python-eventlet-0:0.25.2-3.el8ost.src", "8Base-RHOSE-4.7:python-flask-1:1.1.1-1.el8ost.src", "8Base-RHOSE-4.7:python-flask-doc-1:1.1.1-1.el8ost.noarch", "8Base-RHOSE-4.7:python-google-auth-0:1.3.0-1.el8ost.src", "8Base-RHOSE-4.7:python-hardware-0:0.23.0-0.20201031022149.59211cc.el8.src", "8Base-RHOSE-4.7:python-ifaddr-0:0.1.6-5.el8ost.src", "8Base-RHOSE-4.7:python-importlib-metadata-0:1.7.0-1.el8ost.src", "8Base-RHOSE-4.7:python-ironic-lib-0:4.4.1-0.20201218041209.aa7cfec.el8.src", "8Base-RHOSE-4.7:python-keystoneauth1-0:4.2.0-0.20200630234358.dab8e10.el8ost.src", "8Base-RHOSE-4.7:python-kubernetes-0:11.0.0-1.el8.src", "8Base-RHOSE-4.7:python-kuryr-lib-0:1.1.1-0.20190923160834.41e6964.el8ost.src", "8Base-RHOSE-4.7:python-lockfile-1:0.11.0-8.el8ar.src", "8Base-RHOSE-4.7:python-msgpack-0:0.6.2-1.el8ost.src", "8Base-RHOSE-4.7:python-msgpack-debugsource-0:0.6.2-1.el8ost.x86_64", "8Base-RHOSE-4.7:python-openshift-1:0.11.2-1.el8.src", "8Base-RHOSE-4.7:python-openstacksdk-0:0.48.0-0.20200708092906.3b693c2.el8ost.src", "8Base-RHOSE-4.7:python-oslo-concurrency-0:4.3.0-0.20201008180343.2f78803.el8.src", "8Base-RHOSE-4.7:python-oslo-concurrency-lang-0:4.3.0-0.20201008180343.2f78803.el8.noarch", "8Base-RHOSE-4.7:python-oslo-config-2:8.3.2-0.20201008180634.fcb8894.el8.src", "8Base-RHOSE-4.7:python-oslo-context-0:3.1.1-0.20201008190523.57dbded.el8.src", "8Base-RHOSE-4.7:python-oslo-db-0:8.4.0-0.20200918104110.e42c733.el8ost.src", "8Base-RHOSE-4.7:python-oslo-db-lang-0:8.4.0-0.20200918104110.e42c733.el8ost.noarch", "8Base-RHOSE-4.7:python-oslo-i18n-0:5.0.1-0.20201009131251.73187bd.el8.src", "8Base-RHOSE-4.7:python-oslo-i18n-lang-0:5.0.1-0.20201009131251.73187bd.el8.noarch", "8Base-RHOSE-4.7:python-oslo-log-0:4.3.1-0.20201207021200.1597f24.el8.src", "8Base-RHOSE-4.7:python-oslo-log-lang-0:4.3.1-0.20201207021200.1597f24.el8.noarch", "8Base-RHOSE-4.7:python-oslo-serialization-0:4.0.1-0.20201008182423.c7884b2.el8.src", "8Base-RHOSE-4.7:python-oslo-service-0:2.4.0-0.20201008184547.58466a6.el8.src", "8Base-RHOSE-4.7:python-oslo-utils-0:4.6.0-0.20201009175936.91497da.el8.src", "8Base-RHOSE-4.7:python-oslo-utils-lang-0:4.6.0-0.20201009175936.91497da.el8.noarch", "8Base-RHOSE-4.7:python-packaging-0:20.4-1.el8ost.src", "8Base-RHOSE-4.7:python-packaging-doc-0:20.4-1.el8ost.noarch", "8Base-RHOSE-4.7:python-paste-0:3.2.4-1.el8ost.src", "8Base-RHOSE-4.7:python-paste-deploy-0:2.0.1-4.el8ost.src", "8Base-RHOSE-4.7:python-pbr-0:5.4.3-2.el8ost.src", "8Base-RHOSE-4.7:python-pexpect-0:4.6-2.el8ar.src", "8Base-RHOSE-4.7:python-pint-0:0.10.1-1.el8ost.src", "8Base-RHOSE-4.7:python-psutil-0:5.6.6-1.el8ar.src", "8Base-RHOSE-4.7:python-psutil-debugsource-0:5.6.6-1.el8ar.ppc64le", "8Base-RHOSE-4.7:python-psutil-debugsource-0:5.6.6-1.el8ar.s390x", "8Base-RHOSE-4.7:python-psutil-debugsource-0:5.6.6-1.el8ar.x86_64", "8Base-RHOSE-4.7:python-pyghmi-0:1.5.14-2.1.el8ost.src", "8Base-RHOSE-4.7:python-pyroute2-0:0.5.13-1.el8ost.src", "8Base-RHOSE-4.7:python-requests-unixsocket-0:0.1.5-5.el8ar.src", "8Base-RHOSE-4.7:python-rsa-0:4.7-1.el8.src", "8Base-RHOSE-4.7:python-ruamel-yaml-0:0.15.41-4.el8ost.src", "8Base-RHOSE-4.7:python-ruamel-yaml-debugsource-0:0.15.41-4.el8ost.ppc64le", "8Base-RHOSE-4.7:python-ruamel-yaml-debugsource-0:0.15.41-4.el8ost.s390x", "8Base-RHOSE-4.7:python-ruamel-yaml-debugsource-0:0.15.41-4.el8ost.x86_64", "8Base-RHOSE-4.7:python-s3transfer-0:0.2.0-1.el8ost.src", "8Base-RHOSE-4.7:python-stevedore-0:3.2.2-0.20201009151242.274eaa6.el8.src", "8Base-RHOSE-4.7:python-string_utils-0:0.6.0-4.el8ost.src", "8Base-RHOSE-4.7:python-sushy-0:3.6.1-0.20210122201213.7ec0422.el8.src", "8Base-RHOSE-4.7:python-sushy-oem-idrac-0:0.0.3-0.20200922221223.1202372.el8ost.src", "8Base-RHOSE-4.7:python-tenacity-0:6.2.0-1.el8ost.src", "8Base-RHOSE-4.7:python-tooz-0:2.7.0-0.20200723133754.fca43df.el8ost.src", "8Base-RHOSE-4.7:python-websocket-client-0:0.54.0-1.el8ost.src", "8Base-RHOSE-4.7:python-werkzeug-0:1.0.1-3.el8ost.src", "8Base-RHOSE-4.7:python-zeroconf-0:0.24.4-1.el8ost.src", "8Base-RHOSE-4.7:python-zipp-0:0.5.1-2.el8ost.src", "8Base-RHOSE-4.7:python2-botocore-0:1.12.119-1.el8ost.noarch", "8Base-RHOSE-4.7:python2-cachetools-0:3.1.0-1.el8ost.noarch", "8Base-RHOSE-4.7:python3-alembic-0:1.4.2-5.el8ost.noarch", "8Base-RHOSE-4.7:python3-ansible-runner-0:1.4.6-2.el8ar.noarch", "8Base-RHOSE-4.7:python3-boto3-0:1.9.101-1.el8ost.noarch", "8Base-RHOSE-4.7:python3-botocore-0:1.12.119-1.el8ost.noarch", "8Base-RHOSE-4.7:python3-cachetools-0:3.1.0-1.el8ost.noarch", "8Base-RHOSE-4.7:python3-certifi-0:2018.10.15-4.el8ost.noarch", "8Base-RHOSE-4.7:python3-construct-0:2.10.56-1.el8ost.noarch", "8Base-RHOSE-4.7:python3-daemon-0:2.1.2-9.el8ar.noarch", "8Base-RHOSE-4.7:python3-debtcollector-0:2.2.0-0.20201008171245.649189d.el8.noarch", "8Base-RHOSE-4.7:python3-dictdiffer-0:0.7.1-2.el8ost.noarch", "8Base-RHOSE-4.7:python3-eventlet-0:0.25.2-3.el8ost.noarch", "8Base-RHOSE-4.7:python3-flask-1:1.1.1-1.el8ost.noarch", "8Base-RHOSE-4.7:python3-google-auth-0:1.3.0-1.el8ost.noarch", "8Base-RHOSE-4.7:python3-grpcio-0:1.18.0-4.el8ost.ppc64le", "8Base-RHOSE-4.7:python3-grpcio-0:1.18.0-4.el8ost.s390x", "8Base-RHOSE-4.7:python3-grpcio-0:1.18.0-4.el8ost.x86_64", "8Base-RHOSE-4.7:python3-grpcio-debuginfo-0:1.18.0-4.el8ost.ppc64le", "8Base-RHOSE-4.7:python3-grpcio-debuginfo-0:1.18.0-4.el8ost.s390x", "8Base-RHOSE-4.7:python3-grpcio-debuginfo-0:1.18.0-4.el8ost.x86_64", "8Base-RHOSE-4.7:python3-hardware-0:0.23.0-0.20201031022149.59211cc.el8.noarch", "8Base-RHOSE-4.7:python3-hardware-detect-0:0.23.0-0.20201031022149.59211cc.el8.noarch", "8Base-RHOSE-4.7:python3-ifaddr-0:0.1.6-5.el8ost.noarch", "8Base-RHOSE-4.7:python3-importlib-metadata-0:1.7.0-1.el8ost.noarch", "8Base-RHOSE-4.7:python3-ironic-inspector-tests-0:10.4.1-0.20201123161216.70fccec.el8.noarch", "8Base-RHOSE-4.7:python3-ironic-lib-0:4.4.1-0.20201218041209.aa7cfec.el8.noarch", "8Base-RHOSE-4.7:python3-ironic-python-agent-0:6.4.3-0.20201217171210.bd45db1.el8.noarch", "8Base-RHOSE-4.7:python3-ironic-tests-1:16.0.4-0.20210203051223.7d74ea0.el8.noarch", "8Base-RHOSE-4.7:python3-keystoneauth1-0:4.2.0-0.20200630234358.dab8e10.el8ost.noarch", "8Base-RHOSE-4.7:python3-kubernetes-0:11.0.0-1.el8.noarch", "8Base-RHOSE-4.7:python3-kubernetes-tests-0:11.0.0-1.el8.noarch", "8Base-RHOSE-4.7:python3-kuryr-kubernetes-0:4.7.0-202101262230.p0.git.2494.cd95ce5.el8.noarch", "8Base-RHOSE-4.7:python3-kuryr-lib-0:1.1.1-0.20190923160834.41e6964.el8ost.noarch", "8Base-RHOSE-4.7:python3-kuryr-lib-tests-0:1.1.1-0.20190923160834.41e6964.el8ost.noarch", "8Base-RHOSE-4.7:python3-lockfile-1:0.11.0-8.el8ar.noarch", "8Base-RHOSE-4.7:python3-msgpack-0:0.6.2-1.el8ost.x86_64", "8Base-RHOSE-4.7:python3-msgpack-debuginfo-0:0.6.2-1.el8ost.x86_64", "8Base-RHOSE-4.7:python3-openshift-1:0.11.2-1.el8.noarch", "8Base-RHOSE-4.7:python3-openstacksdk-0:0.48.0-0.20200708092906.3b693c2.el8ost.noarch", "8Base-RHOSE-4.7:python3-openstacksdk-tests-0:0.48.0-0.20200708092906.3b693c2.el8ost.noarch", "8Base-RHOSE-4.7:python3-openvswitch2.13-0:2.13.0-79.el8fdp.ppc64le", "8Base-RHOSE-4.7:python3-openvswitch2.13-0:2.13.0-79.el8fdp.s390x", "8Base-RHOSE-4.7:python3-openvswitch2.13-0:2.13.0-79.el8fdp.x86_64", "8Base-RHOSE-4.7:python3-openvswitch2.13-debuginfo-0:2.13.0-79.el8fdp.ppc64le", "8Base-RHOSE-4.7:python3-openvswitch2.13-debuginfo-0:2.13.0-79.el8fdp.s390x", "8Base-RHOSE-4.7:python3-openvswitch2.13-debuginfo-0:2.13.0-79.el8fdp.x86_64", "8Base-RHOSE-4.7:python3-oslo-concurrency-0:4.3.0-0.20201008180343.2f78803.el8.noarch", "8Base-RHOSE-4.7:python3-oslo-concurrency-tests-0:4.3.0-0.20201008180343.2f78803.el8.noarch", "8Base-RHOSE-4.7:python3-oslo-config-2:8.3.2-0.20201008180634.fcb8894.el8.noarch", "8Base-RHOSE-4.7:python3-oslo-context-0:3.1.1-0.20201008190523.57dbded.el8.noarch", "8Base-RHOSE-4.7:python3-oslo-context-tests-0:3.1.1-0.20201008190523.57dbded.el8.noarch", "8Base-RHOSE-4.7:python3-oslo-db-0:8.4.0-0.20200918104110.e42c733.el8ost.noarch", "8Base-RHOSE-4.7:python3-oslo-db-tests-0:8.4.0-0.20200918104110.e42c733.el8ost.noarch", "8Base-RHOSE-4.7:python3-oslo-i18n-0:5.0.1-0.20201009131251.73187bd.el8.noarch", "8Base-RHOSE-4.7:python3-oslo-log-0:4.3.1-0.20201207021200.1597f24.el8.noarch", "8Base-RHOSE-4.7:python3-oslo-log-tests-0:4.3.1-0.20201207021200.1597f24.el8.noarch", "8Base-RHOSE-4.7:python3-oslo-serialization-0:4.0.1-0.20201008182423.c7884b2.el8.noarch", "8Base-RHOSE-4.7:python3-oslo-serialization-tests-0:4.0.1-0.20201008182423.c7884b2.el8.noarch", "8Base-RHOSE-4.7:python3-oslo-service-0:2.4.0-0.20201008184547.58466a6.el8.noarch", "8Base-RHOSE-4.7:python3-oslo-service-tests-0:2.4.0-0.20201008184547.58466a6.el8.noarch", "8Base-RHOSE-4.7:python3-oslo-utils-0:4.6.0-0.20201009175936.91497da.el8.noarch", "8Base-RHOSE-4.7:python3-oslo-utils-tests-0:4.6.0-0.20201009175936.91497da.el8.noarch", "8Base-RHOSE-4.7:python3-packaging-0:20.4-1.el8ost.noarch", "8Base-RHOSE-4.7:python3-paste-0:3.2.4-1.el8ost.noarch", "8Base-RHOSE-4.7:python3-paste-deploy-0:2.0.1-4.el8ost.noarch", "8Base-RHOSE-4.7:python3-pbr-0:5.4.3-2.el8ost.noarch", "8Base-RHOSE-4.7:python3-pexpect-0:4.6-2.el8ar.noarch", "8Base-RHOSE-4.7:python3-pint-0:0.10.1-1.el8ost.noarch", "8Base-RHOSE-4.7:python3-protobuf-0:3.6.1-4.el8ost.noarch", "8Base-RHOSE-4.7:python3-psutil-0:5.6.6-1.el8ar.ppc64le", "8Base-RHOSE-4.7:python3-psutil-0:5.6.6-1.el8ar.s390x", "8Base-RHOSE-4.7:python3-psutil-0:5.6.6-1.el8ar.x86_64", "8Base-RHOSE-4.7:python3-psutil-debuginfo-0:5.6.6-1.el8ar.ppc64le", "8Base-RHOSE-4.7:python3-psutil-debuginfo-0:5.6.6-1.el8ar.s390x", "8Base-RHOSE-4.7:python3-psutil-debuginfo-0:5.6.6-1.el8ar.x86_64", "8Base-RHOSE-4.7:python3-pyghmi-0:1.5.14-2.1.el8ost.noarch", "8Base-RHOSE-4.7:python3-pyroute2-0:0.5.13-1.el8ost.noarch", "8Base-RHOSE-4.7:python3-requests-unixsocket-0:0.1.5-5.el8ar.noarch", "8Base-RHOSE-4.7:python3-rsa-0:4.7-1.el8.noarch", "8Base-RHOSE-4.7:python3-ruamel-yaml-0:0.15.41-4.el8ost.ppc64le", "8Base-RHOSE-4.7:python3-ruamel-yaml-0:0.15.41-4.el8ost.s390x", "8Base-RHOSE-4.7:python3-ruamel-yaml-0:0.15.41-4.el8ost.x86_64", "8Base-RHOSE-4.7:python3-ruamel-yaml-debuginfo-0:0.15.41-4.el8ost.ppc64le", "8Base-RHOSE-4.7:python3-ruamel-yaml-debuginfo-0:0.15.41-4.el8ost.s390x", "8Base-RHOSE-4.7:python3-ruamel-yaml-debuginfo-0:0.15.41-4.el8ost.x86_64", "8Base-RHOSE-4.7:python3-s3transfer-0:0.2.0-1.el8ost.noarch", "8Base-RHOSE-4.7:python3-stevedore-0:3.2.2-0.20201009151242.274eaa6.el8.noarch", "8Base-RHOSE-4.7:python3-string_utils-0:0.6.0-4.el8ost.noarch", "8Base-RHOSE-4.7:python3-sushy-0:3.6.1-0.20210122201213.7ec0422.el8.noarch", "8Base-RHOSE-4.7:python3-sushy-oem-idrac-0:0.0.3-0.20200922221223.1202372.el8ost.noarch", "8Base-RHOSE-4.7:python3-sushy-oem-idrac-tests-0:0.0.3-0.20200922221223.1202372.el8ost.noarch", "8Base-RHOSE-4.7:python3-sushy-tests-0:3.6.1-0.20210122201213.7ec0422.el8.noarch", "8Base-RHOSE-4.7:python3-tenacity-0:6.2.0-1.el8ost.noarch", "8Base-RHOSE-4.7:python3-tooz-0:2.7.0-0.20200723133754.fca43df.el8ost.noarch", "8Base-RHOSE-4.7:python3-websocket-client-0:0.54.0-1.el8ost.noarch", "8Base-RHOSE-4.7:python3-werkzeug-0:1.0.1-3.el8ost.noarch", "8Base-RHOSE-4.7:python3-zeroconf-0:0.24.4-1.el8ost.noarch", "8Base-RHOSE-4.7:python3-zipp-0:0.5.1-2.el8ost.noarch", "8Base-RHOSE-4.7:redhat-release-coreos-0:47.83-1.el8.ppc64le", "8Base-RHOSE-4.7:redhat-release-coreos-0:47.83-1.el8.s390x", "8Base-RHOSE-4.7:redhat-release-coreos-0:47.83-1.el8.src", "8Base-RHOSE-4.7:redhat-release-coreos-0:47.83-1.el8.x86_64", "8Base-RHOSE-4.7:rhcos-tools-0:0.0.0-1.rhaos4.2.el8.noarch", "8Base-RHOSE-4.7:rhcos-tools-0:0.0.0-1.rhaos4.2.el8.src", "8Base-RHOSE-4.7:rhosp-director-images-0:17.0-20200606.1.el8ost.noarch", "8Base-RHOSE-4.7:rhosp-director-images-0:17.0-20200606.1.el8ost.src", "8Base-RHOSE-4.7:rhosp-director-images-all-0:17.0-20200606.1.el8ost.noarch", "8Base-RHOSE-4.7:rhosp-director-images-ipa-0:17.0-20200606.1.el8ost.noarch", "8Base-RHOSE-4.7:rhosp-director-images-ipa-ppc64le-0:17.0-20200606.1.el8ost.noarch", "8Base-RHOSE-4.7:rhosp-director-images-ipa-x86_64-0:17.0-20200606.1.el8ost.noarch", "8Base-RHOSE-4.7:rhosp-director-images-minimal-0:17.0-20200606.1.el8ost.noarch", "8Base-RHOSE-4.7:rhosp-director-images-ppc64le-0:17.0-20200606.1.el8ost.noarch", "8Base-RHOSE-4.7:rhosp-director-images-x86_64-0:17.0-20200606.1.el8ost.noarch", "8Base-RHOSE-4.7:rpm-ostree-0:2020.7-1.el8_3.ppc64le", "8Base-RHOSE-4.7:rpm-ostree-0:2020.7-1.el8_3.s390x", "8Base-RHOSE-4.7:rpm-ostree-0:2020.7-1.el8_3.src", "8Base-RHOSE-4.7:rpm-ostree-0:2020.7-1.el8_3.x86_64", "8Base-RHOSE-4.7:rpm-ostree-debuginfo-0:2020.7-1.el8_3.ppc64le", "8Base-RHOSE-4.7:rpm-ostree-debuginfo-0:2020.7-1.el8_3.s390x", "8Base-RHOSE-4.7:rpm-ostree-debuginfo-0:2020.7-1.el8_3.x86_64", "8Base-RHOSE-4.7:rpm-ostree-debugsource-0:2020.7-1.el8_3.ppc64le", "8Base-RHOSE-4.7:rpm-ostree-debugsource-0:2020.7-1.el8_3.s390x", "8Base-RHOSE-4.7:rpm-ostree-debugsource-0:2020.7-1.el8_3.x86_64", "8Base-RHOSE-4.7:rpm-ostree-devel-0:2020.7-1.el8_3.ppc64le", "8Base-RHOSE-4.7:rpm-ostree-devel-0:2020.7-1.el8_3.s390x", "8Base-RHOSE-4.7:rpm-ostree-devel-0:2020.7-1.el8_3.x86_64", "8Base-RHOSE-4.7:rpm-ostree-libs-0:2020.7-1.el8_3.ppc64le", "8Base-RHOSE-4.7:rpm-ostree-libs-0:2020.7-1.el8_3.s390x", "8Base-RHOSE-4.7:rpm-ostree-libs-0:2020.7-1.el8_3.x86_64", "8Base-RHOSE-4.7:rpm-ostree-libs-debuginfo-0:2020.7-1.el8_3.ppc64le", "8Base-RHOSE-4.7:rpm-ostree-libs-debuginfo-0:2020.7-1.el8_3.s390x", "8Base-RHOSE-4.7:rpm-ostree-libs-debuginfo-0:2020.7-1.el8_3.x86_64", "8Base-RHOSE-4.7:runc-0:1.0.0-82.rhaos4.6.git086e841.el8.ppc64le", "8Base-RHOSE-4.7:runc-0:1.0.0-82.rhaos4.6.git086e841.el8.s390x", "8Base-RHOSE-4.7:runc-0:1.0.0-82.rhaos4.6.git086e841.el8.src", "8Base-RHOSE-4.7:runc-0:1.0.0-82.rhaos4.6.git086e841.el8.x86_64", "8Base-RHOSE-4.7:runc-debuginfo-0:1.0.0-82.rhaos4.6.git086e841.el8.ppc64le", "8Base-RHOSE-4.7:runc-debuginfo-0:1.0.0-82.rhaos4.6.git086e841.el8.s390x", "8Base-RHOSE-4.7:runc-debuginfo-0:1.0.0-82.rhaos4.6.git086e841.el8.x86_64", "8Base-RHOSE-4.7:runc-debugsource-0:1.0.0-82.rhaos4.6.git086e841.el8.ppc64le", "8Base-RHOSE-4.7:runc-debugsource-0:1.0.0-82.rhaos4.6.git086e841.el8.s390x", "8Base-RHOSE-4.7:runc-debugsource-0:1.0.0-82.rhaos4.6.git086e841.el8.x86_64", "8Base-RHOSE-4.7:rust-afterburn-0:4.6.0-1.rhaos4.7.el8.src", "8Base-RHOSE-4.7:rust-afterburn-debugsource-0:4.6.0-1.rhaos4.7.el8.ppc64le", "8Base-RHOSE-4.7:rust-afterburn-debugsource-0:4.6.0-1.rhaos4.7.el8.s390x", "8Base-RHOSE-4.7:rust-afterburn-debugsource-0:4.6.0-1.rhaos4.7.el8.x86_64", "8Base-RHOSE-4.7:rust-bootupd-0:0.2.5-2.el8.src", "8Base-RHOSE-4.7:rust-bootupd-debugsource-0:0.2.5-2.el8.x86_64", "8Base-RHOSE-4.7:tini-0:0.16.1-1.el8ar.ppc64le", "8Base-RHOSE-4.7:tini-0:0.16.1-1.el8ar.s390x", "8Base-RHOSE-4.7:tini-0:0.16.1-1.el8ar.src", "8Base-RHOSE-4.7:tini-0:0.16.1-1.el8ar.x86_64", "8Base-RHOSE-4.7:toolbox-0:0.0.8-3.rhaos4.7.el8.noarch", "8Base-RHOSE-4.7:toolbox-0:0.0.8-3.rhaos4.7.el8.src" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1921650" } ], "notes": [ { "category": "description", "text": "A flaw was found in github.com/gogo/protobuf before 1.3.2 that allows an out-of-bounds access when unmarshalling certain protobuf objects. This flaw allows a remote attacker to send crafted protobuf messages, causing panic and resulting in a denial of service. The highest threat from this vulnerability is to availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "gogo/protobuf: plugin/unmarshal/unmarshal.go lacks certain index validation", "title": "Vulnerability summary" }, { "category": "other", "text": "OpenShift Container Platform (OCP), OpenShift ServiceMesh (OSSM) and Red Hat OpenShift Jaeger (RHOSJ) all include code generated by github.com/gogo/protobuf to parse protobuf messages. However, no component is known to accept protobuf messages from unauthenticated sources, hence this vulnerability is rated Moderate for OCP, OSSM and RHOSJ.\n\nOpenShift Virtualization includes code generated by github.com/gogo/protobuf to parse protobuf messages. However, no component of OpenShift Virtualization is known to accept protobuf messages from unauthenticated sources, hence this vulnerability is rated Moderate.\n\nRed Hat Advanced Cluster Management for Kubernetes (RHACM) includes code generated by github.com/gogo/protobuf to parse protobuf messages. However, no RHACM component is accepting protobuf messages from unauthenticated sources and are used with a limited scope, hence this vulnerability is rated Moderate for RHACM.\n\nRed Hat Cluster Application Migration (CAM) includes code generated by github.com/gogo/protobuf to parse protobuf messages. However, no CAM component is known to accept protobuf messages from unauthenticated sources, hence this vulnerability is rated Moderate for CAM.\n\nCryostat-2 is affected as it does ship gogo/protobuf library with it\u0027s distribution but the only use for Protobuf would be the Kubernetes/OpenShift API server the operator communicates with and it should be authenticated hence it is affected with Moderate impact.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RH7-RHOSE-4.7:cri-o-0:1.20.0-0.rhaos4.7.git8921e00.el7.51.src", "7Server-RH7-RHOSE-4.7:cri-o-0:1.20.0-0.rhaos4.7.git8921e00.el7.51.x86_64", "7Server-RH7-RHOSE-4.7:cri-o-debuginfo-0:1.20.0-0.rhaos4.7.git8921e00.el7.51.x86_64", "7Server-RH7-RHOSE-4.7:cri-tools-0:1.18.0-3.el7.src", "7Server-RH7-RHOSE-4.7:cri-tools-0:1.18.0-3.el7.x86_64", "7Server-RH7-RHOSE-4.7:cri-tools-debuginfo-0:1.18.0-3.el7.x86_64", "8Base-RHOSE-4.7:cri-o-0:1.20.0-0.rhaos4.7.git8921e00.el8.51.ppc64le", "8Base-RHOSE-4.7:cri-o-0:1.20.0-0.rhaos4.7.git8921e00.el8.51.s390x", "8Base-RHOSE-4.7:cri-o-0:1.20.0-0.rhaos4.7.git8921e00.el8.51.src", "8Base-RHOSE-4.7:cri-o-0:1.20.0-0.rhaos4.7.git8921e00.el8.51.x86_64", "8Base-RHOSE-4.7:cri-o-debuginfo-0:1.20.0-0.rhaos4.7.git8921e00.el8.51.ppc64le", "8Base-RHOSE-4.7:cri-o-debuginfo-0:1.20.0-0.rhaos4.7.git8921e00.el8.51.s390x", "8Base-RHOSE-4.7:cri-o-debuginfo-0:1.20.0-0.rhaos4.7.git8921e00.el8.51.x86_64", "8Base-RHOSE-4.7:cri-o-debugsource-0:1.20.0-0.rhaos4.7.git8921e00.el8.51.ppc64le", "8Base-RHOSE-4.7:cri-o-debugsource-0:1.20.0-0.rhaos4.7.git8921e00.el8.51.s390x", "8Base-RHOSE-4.7:cri-o-debugsource-0:1.20.0-0.rhaos4.7.git8921e00.el8.51.x86_64", "8Base-RHOSE-4.7:cri-tools-0:1.20.0-1.el8.ppc64le", "8Base-RHOSE-4.7:cri-tools-0:1.20.0-1.el8.s390x", "8Base-RHOSE-4.7:cri-tools-0:1.20.0-1.el8.src", "8Base-RHOSE-4.7:cri-tools-0:1.20.0-1.el8.x86_64", "8Base-RHOSE-4.7:cri-tools-debuginfo-0:1.20.0-1.el8.ppc64le", "8Base-RHOSE-4.7:cri-tools-debuginfo-0:1.20.0-1.el8.s390x", "8Base-RHOSE-4.7:cri-tools-debuginfo-0:1.20.0-1.el8.x86_64", "8Base-RHOSE-4.7:cri-tools-debugsource-0:1.20.0-1.el8.ppc64le", "8Base-RHOSE-4.7:cri-tools-debugsource-0:1.20.0-1.el8.s390x", "8Base-RHOSE-4.7:cri-tools-debugsource-0:1.20.0-1.el8.x86_64" ], "known_not_affected": [ "7Server-RH7-RHOSE-4.7:conmon-2:2.0.21-2.rhaos4.6.el7.src", "7Server-RH7-RHOSE-4.7:conmon-2:2.0.21-2.rhaos4.6.el7.x86_64", "7Server-RH7-RHOSE-4.7:containernetworking-plugins-0:0.8.6-1.rhaos4.5.el7.src", "7Server-RH7-RHOSE-4.7:containernetworking-plugins-0:0.8.6-1.rhaos4.5.el7.x86_64", "7Server-RH7-RHOSE-4.7:containernetworking-plugins-debuginfo-0:0.8.6-1.rhaos4.5.el7.x86_64", "7Server-RH7-RHOSE-4.7:haproxy-0:2.0.19-1.el7.src", "7Server-RH7-RHOSE-4.7:haproxy-debuginfo-0:2.0.19-1.el7.x86_64", "7Server-RH7-RHOSE-4.7:haproxy20-0:2.0.19-1.el7.x86_64", "7Server-RH7-RHOSE-4.7:jq-0:1.6-2.el7.src", "7Server-RH7-RHOSE-4.7:jq-0:1.6-2.el7.x86_64", "7Server-RH7-RHOSE-4.7:jq-debuginfo-0:1.6-2.el7.x86_64", "7Server-RH7-RHOSE-4.7:jq-devel-0:1.6-2.el7.x86_64", "7Server-RH7-RHOSE-4.7:oniguruma-0:5.9.2-5.el7.src", "7Server-RH7-RHOSE-4.7:oniguruma-0:5.9.2-5.el7.x86_64", "7Server-RH7-RHOSE-4.7:oniguruma-debuginfo-0:5.9.2-5.el7.x86_64", "7Server-RH7-RHOSE-4.7:oniguruma-devel-0:5.9.2-5.el7.x86_64", "7Server-RH7-RHOSE-4.7:openshift-0:4.7.0-202102060108.p0.git.97095.7271b90.el7.src", "7Server-RH7-RHOSE-4.7:openshift-ansible-0:4.7.0-202102032256.p0.git.0.bf7d9a7.el7.noarch", "7Server-RH7-RHOSE-4.7:openshift-ansible-0:4.7.0-202102032256.p0.git.0.bf7d9a7.el7.src", "7Server-RH7-RHOSE-4.7:openshift-ansible-test-0:4.7.0-202102032256.p0.git.0.bf7d9a7.el7.noarch", "7Server-RH7-RHOSE-4.7:openshift-clients-0:4.7.0-202102032256.p0.git.3951.0e656ef.el7.src", "7Server-RH7-RHOSE-4.7:openshift-clients-0:4.7.0-202102032256.p0.git.3951.0e656ef.el7.x86_64", "7Server-RH7-RHOSE-4.7:openshift-clients-redistributable-0:4.7.0-202102032256.p0.git.3951.0e656ef.el7.x86_64", "7Server-RH7-RHOSE-4.7:openshift-hyperkube-0:4.7.0-202102060108.p0.git.97095.7271b90.el7.x86_64", "7Server-RH7-RHOSE-4.7:python-botocore-0:1.4.57-5.el7.src", "7Server-RH7-RHOSE-4.7:python2-botocore-0:1.4.57-5.el7.noarch", "7Server-RH7-RHOSE-4.7:runc-0:1.0.0-82.rhaos4.6.git086e841.el7.src", "7Server-RH7-RHOSE-4.7:runc-0:1.0.0-82.rhaos4.6.git086e841.el7.x86_64", "7Server-RH7-RHOSE-4.7:runc-debuginfo-0:1.0.0-82.rhaos4.6.git086e841.el7.x86_64", "8Base-RHOSE-4.7:NetworkManager-1:1.26.0-12.1.rhaos4.7.el8.ppc64le", "8Base-RHOSE-4.7:NetworkManager-1:1.26.0-12.1.rhaos4.7.el8.s390x", "8Base-RHOSE-4.7:NetworkManager-1:1.26.0-12.1.rhaos4.7.el8.src", "8Base-RHOSE-4.7:NetworkManager-1:1.26.0-12.1.rhaos4.7.el8.x86_64", "8Base-RHOSE-4.7:NetworkManager-adsl-1:1.26.0-12.1.rhaos4.7.el8.ppc64le", "8Base-RHOSE-4.7:NetworkManager-adsl-1:1.26.0-12.1.rhaos4.7.el8.s390x", "8Base-RHOSE-4.7:NetworkManager-adsl-1:1.26.0-12.1.rhaos4.7.el8.x86_64", "8Base-RHOSE-4.7:NetworkManager-adsl-debuginfo-1:1.26.0-12.1.rhaos4.7.el8.ppc64le", "8Base-RHOSE-4.7:NetworkManager-adsl-debuginfo-1:1.26.0-12.1.rhaos4.7.el8.s390x", "8Base-RHOSE-4.7:NetworkManager-adsl-debuginfo-1:1.26.0-12.1.rhaos4.7.el8.x86_64", "8Base-RHOSE-4.7:NetworkManager-bluetooth-1:1.26.0-12.1.rhaos4.7.el8.ppc64le", "8Base-RHOSE-4.7:NetworkManager-bluetooth-1:1.26.0-12.1.rhaos4.7.el8.s390x", "8Base-RHOSE-4.7:NetworkManager-bluetooth-1:1.26.0-12.1.rhaos4.7.el8.x86_64", "8Base-RHOSE-4.7:NetworkManager-bluetooth-debuginfo-1:1.26.0-12.1.rhaos4.7.el8.ppc64le", "8Base-RHOSE-4.7:NetworkManager-bluetooth-debuginfo-1:1.26.0-12.1.rhaos4.7.el8.s390x", "8Base-RHOSE-4.7:NetworkManager-bluetooth-debuginfo-1:1.26.0-12.1.rhaos4.7.el8.x86_64", "8Base-RHOSE-4.7:NetworkManager-cloud-setup-1:1.26.0-12.1.rhaos4.7.el8.ppc64le", "8Base-RHOSE-4.7:NetworkManager-cloud-setup-1:1.26.0-12.1.rhaos4.7.el8.s390x", "8Base-RHOSE-4.7:NetworkManager-cloud-setup-1:1.26.0-12.1.rhaos4.7.el8.x86_64", "8Base-RHOSE-4.7:NetworkManager-cloud-setup-debuginfo-1:1.26.0-12.1.rhaos4.7.el8.ppc64le", "8Base-RHOSE-4.7:NetworkManager-cloud-setup-debuginfo-1:1.26.0-12.1.rhaos4.7.el8.s390x", "8Base-RHOSE-4.7:NetworkManager-cloud-setup-debuginfo-1:1.26.0-12.1.rhaos4.7.el8.x86_64", "8Base-RHOSE-4.7:NetworkManager-config-connectivity-redhat-1:1.26.0-12.1.rhaos4.7.el8.noarch", "8Base-RHOSE-4.7:NetworkManager-config-server-1:1.26.0-12.1.rhaos4.7.el8.noarch", "8Base-RHOSE-4.7:NetworkManager-debuginfo-1:1.26.0-12.1.rhaos4.7.el8.ppc64le", "8Base-RHOSE-4.7:NetworkManager-debuginfo-1:1.26.0-12.1.rhaos4.7.el8.s390x", "8Base-RHOSE-4.7:NetworkManager-debuginfo-1:1.26.0-12.1.rhaos4.7.el8.x86_64", "8Base-RHOSE-4.7:NetworkManager-debugsource-1:1.26.0-12.1.rhaos4.7.el8.ppc64le", "8Base-RHOSE-4.7:NetworkManager-debugsource-1:1.26.0-12.1.rhaos4.7.el8.s390x", "8Base-RHOSE-4.7:NetworkManager-debugsource-1:1.26.0-12.1.rhaos4.7.el8.x86_64", "8Base-RHOSE-4.7:NetworkManager-dispatcher-routing-rules-1:1.26.0-12.1.rhaos4.7.el8.noarch", "8Base-RHOSE-4.7:NetworkManager-libnm-1:1.26.0-12.1.rhaos4.7.el8.ppc64le", "8Base-RHOSE-4.7:NetworkManager-libnm-1:1.26.0-12.1.rhaos4.7.el8.s390x", "8Base-RHOSE-4.7:NetworkManager-libnm-1:1.26.0-12.1.rhaos4.7.el8.x86_64", "8Base-RHOSE-4.7:NetworkManager-libnm-debuginfo-1:1.26.0-12.1.rhaos4.7.el8.ppc64le", "8Base-RHOSE-4.7:NetworkManager-libnm-debuginfo-1:1.26.0-12.1.rhaos4.7.el8.s390x", "8Base-RHOSE-4.7:NetworkManager-libnm-debuginfo-1:1.26.0-12.1.rhaos4.7.el8.x86_64", "8Base-RHOSE-4.7:NetworkManager-libnm-devel-1:1.26.0-12.1.rhaos4.7.el8.ppc64le", "8Base-RHOSE-4.7:NetworkManager-libnm-devel-1:1.26.0-12.1.rhaos4.7.el8.s390x", "8Base-RHOSE-4.7:NetworkManager-libnm-devel-1:1.26.0-12.1.rhaos4.7.el8.x86_64", "8Base-RHOSE-4.7:NetworkManager-ovs-1:1.26.0-12.1.rhaos4.7.el8.ppc64le", "8Base-RHOSE-4.7:NetworkManager-ovs-1:1.26.0-12.1.rhaos4.7.el8.s390x", "8Base-RHOSE-4.7:NetworkManager-ovs-1:1.26.0-12.1.rhaos4.7.el8.x86_64", "8Base-RHOSE-4.7:NetworkManager-ovs-debuginfo-1:1.26.0-12.1.rhaos4.7.el8.ppc64le", "8Base-RHOSE-4.7:NetworkManager-ovs-debuginfo-1:1.26.0-12.1.rhaos4.7.el8.s390x", "8Base-RHOSE-4.7:NetworkManager-ovs-debuginfo-1:1.26.0-12.1.rhaos4.7.el8.x86_64", "8Base-RHOSE-4.7:NetworkManager-ppp-1:1.26.0-12.1.rhaos4.7.el8.ppc64le", "8Base-RHOSE-4.7:NetworkManager-ppp-1:1.26.0-12.1.rhaos4.7.el8.s390x", "8Base-RHOSE-4.7:NetworkManager-ppp-1:1.26.0-12.1.rhaos4.7.el8.x86_64", "8Base-RHOSE-4.7:NetworkManager-ppp-debuginfo-1:1.26.0-12.1.rhaos4.7.el8.ppc64le", "8Base-RHOSE-4.7:NetworkManager-ppp-debuginfo-1:1.26.0-12.1.rhaos4.7.el8.s390x", "8Base-RHOSE-4.7:NetworkManager-ppp-debuginfo-1:1.26.0-12.1.rhaos4.7.el8.x86_64", "8Base-RHOSE-4.7:NetworkManager-team-1:1.26.0-12.1.rhaos4.7.el8.ppc64le", "8Base-RHOSE-4.7:NetworkManager-team-1:1.26.0-12.1.rhaos4.7.el8.s390x", "8Base-RHOSE-4.7:NetworkManager-team-1:1.26.0-12.1.rhaos4.7.el8.x86_64", "8Base-RHOSE-4.7:NetworkManager-team-debuginfo-1:1.26.0-12.1.rhaos4.7.el8.ppc64le", "8Base-RHOSE-4.7:NetworkManager-team-debuginfo-1:1.26.0-12.1.rhaos4.7.el8.s390x", "8Base-RHOSE-4.7:NetworkManager-team-debuginfo-1:1.26.0-12.1.rhaos4.7.el8.x86_64", "8Base-RHOSE-4.7:NetworkManager-tui-1:1.26.0-12.1.rhaos4.7.el8.ppc64le", "8Base-RHOSE-4.7:NetworkManager-tui-1:1.26.0-12.1.rhaos4.7.el8.s390x", "8Base-RHOSE-4.7:NetworkManager-tui-1:1.26.0-12.1.rhaos4.7.el8.x86_64", "8Base-RHOSE-4.7:NetworkManager-tui-debuginfo-1:1.26.0-12.1.rhaos4.7.el8.ppc64le", "8Base-RHOSE-4.7:NetworkManager-tui-debuginfo-1:1.26.0-12.1.rhaos4.7.el8.s390x", "8Base-RHOSE-4.7:NetworkManager-tui-debuginfo-1:1.26.0-12.1.rhaos4.7.el8.x86_64", "8Base-RHOSE-4.7:NetworkManager-wifi-1:1.26.0-12.1.rhaos4.7.el8.ppc64le", "8Base-RHOSE-4.7:NetworkManager-wifi-1:1.26.0-12.1.rhaos4.7.el8.s390x", "8Base-RHOSE-4.7:NetworkManager-wifi-1:1.26.0-12.1.rhaos4.7.el8.x86_64", "8Base-RHOSE-4.7:NetworkManager-wifi-debuginfo-1:1.26.0-12.1.rhaos4.7.el8.ppc64le", "8Base-RHOSE-4.7:NetworkManager-wifi-debuginfo-1:1.26.0-12.1.rhaos4.7.el8.s390x", "8Base-RHOSE-4.7:NetworkManager-wifi-debuginfo-1:1.26.0-12.1.rhaos4.7.el8.x86_64", "8Base-RHOSE-4.7:NetworkManager-wwan-1:1.26.0-12.1.rhaos4.7.el8.ppc64le", "8Base-RHOSE-4.7:NetworkManager-wwan-1:1.26.0-12.1.rhaos4.7.el8.s390x", "8Base-RHOSE-4.7:NetworkManager-wwan-1:1.26.0-12.1.rhaos4.7.el8.x86_64", "8Base-RHOSE-4.7:NetworkManager-wwan-debuginfo-1:1.26.0-12.1.rhaos4.7.el8.ppc64le", "8Base-RHOSE-4.7:NetworkManager-wwan-debuginfo-1:1.26.0-12.1.rhaos4.7.el8.s390x", "8Base-RHOSE-4.7:NetworkManager-wwan-debuginfo-1:1.26.0-12.1.rhaos4.7.el8.x86_64", "8Base-RHOSE-4.7:afterburn-0:4.6.0-1.rhaos4.7.el8.ppc64le", "8Base-RHOSE-4.7:afterburn-0:4.6.0-1.rhaos4.7.el8.s390x", "8Base-RHOSE-4.7:afterburn-0:4.6.0-1.rhaos4.7.el8.x86_64", "8Base-RHOSE-4.7:afterburn-debuginfo-0:4.6.0-1.rhaos4.7.el8.ppc64le", "8Base-RHOSE-4.7:afterburn-debuginfo-0:4.6.0-1.rhaos4.7.el8.s390x", "8Base-RHOSE-4.7:afterburn-debuginfo-0:4.6.0-1.rhaos4.7.el8.x86_64", "8Base-RHOSE-4.7:ansible-runner-0:1.4.6-2.el8ar.noarch", "8Base-RHOSE-4.7:ansible-runner-0:1.4.6-2.el8ar.src", "8Base-RHOSE-4.7:ansible-runner-http-0:1.0.0-2.el8ar.noarch", "8Base-RHOSE-4.7:ansible-runner-http-0:1.0.0-2.el8ar.src", "8Base-RHOSE-4.7:atomic-openshift-service-idler-0:4.7.0-202011171454.p0.git.15.675c1c8.el8.ppc64le", "8Base-RHOSE-4.7:atomic-openshift-service-idler-0:4.7.0-202011171454.p0.git.15.675c1c8.el8.s390x", "8Base-RHOSE-4.7:atomic-openshift-service-idler-0:4.7.0-202011171454.p0.git.15.675c1c8.el8.src", "8Base-RHOSE-4.7:atomic-openshift-service-idler-0:4.7.0-202011171454.p0.git.15.675c1c8.el8.x86_64", "8Base-RHOSE-4.7:bootupd-0:0.2.5-2.el8.x86_64", "8Base-RHOSE-4.7:bootupd-debuginfo-0:0.2.5-2.el8.x86_64", "8Base-RHOSE-4.7:clevis-0:15-1.el8.ppc64le", "8Base-RHOSE-4.7:clevis-0:15-1.el8.s390x", "8Base-RHOSE-4.7:clevis-0:15-1.el8.src", "8Base-RHOSE-4.7:clevis-0:15-1.el8.x86_64", "8Base-RHOSE-4.7:clevis-debuginfo-0:15-1.el8.ppc64le", "8Base-RHOSE-4.7:clevis-debuginfo-0:15-1.el8.s390x", "8Base-RHOSE-4.7:clevis-debuginfo-0:15-1.el8.x86_64", "8Base-RHOSE-4.7:clevis-debugsource-0:15-1.el8.ppc64le", "8Base-RHOSE-4.7:clevis-debugsource-0:15-1.el8.s390x", "8Base-RHOSE-4.7:clevis-debugsource-0:15-1.el8.x86_64", "8Base-RHOSE-4.7:clevis-dracut-0:15-1.el8.ppc64le", "8Base-RHOSE-4.7:clevis-dracut-0:15-1.el8.s390x", "8Base-RHOSE-4.7:clevis-dracut-0:15-1.el8.x86_64", "8Base-RHOSE-4.7:clevis-luks-0:15-1.el8.ppc64le", "8Base-RHOSE-4.7:clevis-luks-0:15-1.el8.s390x", "8Base-RHOSE-4.7:clevis-luks-0:15-1.el8.x86_64", "8Base-RHOSE-4.7:clevis-systemd-0:15-1.el8.ppc64le", "8Base-RHOSE-4.7:clevis-systemd-0:15-1.el8.s390x", "8Base-RHOSE-4.7:clevis-systemd-0:15-1.el8.x86_64", "8Base-RHOSE-4.7:clevis-udisks2-0:15-1.el8.ppc64le", "8Base-RHOSE-4.7:clevis-udisks2-0:15-1.el8.s390x", "8Base-RHOSE-4.7:clevis-udisks2-0:15-1.el8.x86_64", "8Base-RHOSE-4.7:clevis-udisks2-debuginfo-0:15-1.el8.ppc64le", "8Base-RHOSE-4.7:clevis-udisks2-debuginfo-0:15-1.el8.s390x", "8Base-RHOSE-4.7:clevis-udisks2-debuginfo-0:15-1.el8.x86_64", "8Base-RHOSE-4.7:conmon-2:2.0.21-2.rhaos4.6.el8.ppc64le", "8Base-RHOSE-4.7:conmon-2:2.0.21-2.rhaos4.6.el8.s390x", "8Base-RHOSE-4.7:conmon-2:2.0.21-2.rhaos4.6.el8.src", "8Base-RHOSE-4.7:conmon-2:2.0.21-2.rhaos4.6.el8.x86_64", "8Base-RHOSE-4.7:console-login-helper-messages-0:0.20.3-1.rhaos4.7.el8.noarch", "8Base-RHOSE-4.7:console-login-helper-messages-0:0.20.3-1.rhaos4.7.el8.src", "8Base-RHOSE-4.7:console-login-helper-messages-issuegen-0:0.20.3-1.rhaos4.7.el8.noarch", "8Base-RHOSE-4.7:console-login-helper-messages-profile-0:0.20.3-1.rhaos4.7.el8.noarch", "8Base-RHOSE-4.7:container-selinux-2:2.151.0-1.rhaos4.7.el8.noarch", "8Base-RHOSE-4.7:container-selinux-2:2.151.0-1.rhaos4.7.el8.src", "8Base-RHOSE-4.7:containernetworking-plugins-0:0.8.6-1.rhaos4.5.el8.ppc64le", "8Base-RHOSE-4.7:containernetworking-plugins-0:0.8.6-1.rhaos4.5.el8.s390x", "8Base-RHOSE-4.7:containernetworking-plugins-0:0.8.6-1.rhaos4.5.el8.src", "8Base-RHOSE-4.7:containernetworking-plugins-0:0.8.6-1.rhaos4.5.el8.x86_64", "8Base-RHOSE-4.7:containernetworking-plugins-debuginfo-0:0.8.6-1.rhaos4.5.el8.ppc64le", "8Base-RHOSE-4.7:containernetworking-plugins-debuginfo-0:0.8.6-1.rhaos4.5.el8.s390x", "8Base-RHOSE-4.7:containernetworking-plugins-debuginfo-0:0.8.6-1.rhaos4.5.el8.x86_64", "8Base-RHOSE-4.7:containernetworking-plugins-debugsource-0:0.8.6-1.rhaos4.5.el8.ppc64le", "8Base-RHOSE-4.7:containernetworking-plugins-debugsource-0:0.8.6-1.rhaos4.5.el8.s390x", "8Base-RHOSE-4.7:containernetworking-plugins-debugsource-0:0.8.6-1.rhaos4.5.el8.x86_64", "8Base-RHOSE-4.7:coreos-installer-0:0.8.0-3.rhaos4.7.el8.ppc64le", "8Base-RHOSE-4.7:coreos-installer-0:0.8.0-3.rhaos4.7.el8.s390x", "8Base-RHOSE-4.7:coreos-installer-0:0.8.0-3.rhaos4.7.el8.src", "8Base-RHOSE-4.7:coreos-installer-0:0.8.0-3.rhaos4.7.el8.x86_64", "8Base-RHOSE-4.7:coreos-installer-bootinfra-0:0.8.0-3.rhaos4.7.el8.ppc64le", "8Base-RHOSE-4.7:coreos-installer-bootinfra-0:0.8.0-3.rhaos4.7.el8.s390x", "8Base-RHOSE-4.7:coreos-installer-bootinfra-debuginfo-0:0.8.0-3.rhaos4.7.el8.ppc64le", "8Base-RHOSE-4.7:coreos-installer-bootinfra-debuginfo-0:0.8.0-3.rhaos4.7.el8.s390x", "8Base-RHOSE-4.7:coreos-installer-bootinfra-debuginfo-0:0.8.0-3.rhaos4.7.el8.x86_64", "8Base-RHOSE-4.7:coreos-installer-debuginfo-0:0.8.0-3.rhaos4.7.el8.ppc64le", "8Base-RHOSE-4.7:coreos-installer-debuginfo-0:0.8.0-3.rhaos4.7.el8.s390x", "8Base-RHOSE-4.7:coreos-installer-debuginfo-0:0.8.0-3.rhaos4.7.el8.x86_64", "8Base-RHOSE-4.7:coreos-installer-debugsource-0:0.8.0-3.rhaos4.7.el8.ppc64le", "8Base-RHOSE-4.7:coreos-installer-debugsource-0:0.8.0-3.rhaos4.7.el8.s390x", "8Base-RHOSE-4.7:coreos-installer-debugsource-0:0.8.0-3.rhaos4.7.el8.x86_64", "8Base-RHOSE-4.7:dracut-0:049-95.git20200804.el8_3.4.ppc64le", "8Base-RHOSE-4.7:dracut-0:049-95.git20200804.el8_3.4.s390x", "8Base-RHOSE-4.7:dracut-0:049-95.git20200804.el8_3.4.src", "8Base-RHOSE-4.7:dracut-0:049-95.git20200804.el8_3.4.x86_64", "8Base-RHOSE-4.7:dracut-caps-0:049-95.git20200804.el8_3.4.ppc64le", "8Base-RHOSE-4.7:dracut-caps-0:049-95.git20200804.el8_3.4.s390x", "8Base-RHOSE-4.7:dracut-caps-0:049-95.git20200804.el8_3.4.x86_64", "8Base-RHOSE-4.7:dracut-config-generic-0:049-95.git20200804.el8_3.4.ppc64le", "8Base-RHOSE-4.7:dracut-config-generic-0:049-95.git20200804.el8_3.4.s390x", "8Base-RHOSE-4.7:dracut-config-generic-0:049-95.git20200804.el8_3.4.x86_64", "8Base-RHOSE-4.7:dracut-config-rescue-0:049-95.git20200804.el8_3.4.ppc64le", "8Base-RHOSE-4.7:dracut-config-rescue-0:049-95.git20200804.el8_3.4.s390x", "8Base-RHOSE-4.7:dracut-config-rescue-0:049-95.git20200804.el8_3.4.x86_64", "8Base-RHOSE-4.7:dracut-debuginfo-0:049-95.git20200804.el8_3.4.ppc64le", "8Base-RHOSE-4.7:dracut-debuginfo-0:049-95.git20200804.el8_3.4.s390x", "8Base-RHOSE-4.7:dracut-debuginfo-0:049-95.git20200804.el8_3.4.x86_64", "8Base-RHOSE-4.7:dracut-debugsource-0:049-95.git20200804.el8_3.4.ppc64le", "8Base-RHOSE-4.7:dracut-debugsource-0:049-95.git20200804.el8_3.4.s390x", "8Base-RHOSE-4.7:dracut-debugsource-0:049-95.git20200804.el8_3.4.x86_64", "8Base-RHOSE-4.7:dracut-live-0:049-95.git20200804.el8_3.4.ppc64le", "8Base-RHOSE-4.7:dracut-live-0:049-95.git20200804.el8_3.4.s390x", "8Base-RHOSE-4.7:dracut-live-0:049-95.git20200804.el8_3.4.x86_64", "8Base-RHOSE-4.7:dracut-network-0:049-95.git20200804.el8_3.4.ppc64le", "8Base-RHOSE-4.7:dracut-network-0:049-95.git20200804.el8_3.4.s390x", "8Base-RHOSE-4.7:dracut-network-0:049-95.git20200804.el8_3.4.x86_64", "8Base-RHOSE-4.7:dracut-squash-0:049-95.git20200804.el8_3.4.ppc64le", "8Base-RHOSE-4.7:dracut-squash-0:049-95.git20200804.el8_3.4.s390x", "8Base-RHOSE-4.7:dracut-squash-0:049-95.git20200804.el8_3.4.x86_64", "8Base-RHOSE-4.7:dracut-tools-0:049-95.git20200804.el8_3.4.ppc64le", "8Base-RHOSE-4.7:dracut-tools-0:049-95.git20200804.el8_3.4.s390x", "8Base-RHOSE-4.7:dracut-tools-0:049-95.git20200804.el8_3.4.x86_64", "8Base-RHOSE-4.7:faq-0:0.0.6-5.el8.ppc64le", "8Base-RHOSE-4.7:faq-0:0.0.6-5.el8.s390x", "8Base-RHOSE-4.7:faq-0:0.0.6-5.el8.src", "8Base-RHOSE-4.7:faq-0:0.0.6-5.el8.x86_64", "8Base-RHOSE-4.7:golang-github-prometheus-promu-0:0.5.0-2.git642a960.el8.ppc64le", "8Base-RHOSE-4.7:golang-github-prometheus-promu-0:0.5.0-2.git642a960.el8.s390x", "8Base-RHOSE-4.7:golang-github-prometheus-promu-0:0.5.0-2.git642a960.el8.src", "8Base-RHOSE-4.7:golang-github-prometheus-promu-0:0.5.0-2.git642a960.el8.x86_64", "8Base-RHOSE-4.7:gperftools-0:2.6.3-2.el8ost.ppc64le", "8Base-RHOSE-4.7:gperftools-0:2.6.3-2.el8ost.s390x", "8Base-RHOSE-4.7:gperftools-0:2.6.3-2.el8ost.src", "8Base-RHOSE-4.7:gperftools-0:2.6.3-2.el8ost.x86_64", "8Base-RHOSE-4.7:gperftools-debugsource-0:2.6.3-2.el8ost.ppc64le", "8Base-RHOSE-4.7:gperftools-debugsource-0:2.6.3-2.el8ost.s390x", "8Base-RHOSE-4.7:gperftools-debugsource-0:2.6.3-2.el8ost.x86_64", "8Base-RHOSE-4.7:gperftools-devel-0:2.6.3-2.el8ost.ppc64le", "8Base-RHOSE-4.7:gperftools-devel-0:2.6.3-2.el8ost.s390x", "8Base-RHOSE-4.7:gperftools-devel-0:2.6.3-2.el8ost.x86_64", "8Base-RHOSE-4.7:gperftools-libs-0:2.6.3-2.el8ost.ppc64le", "8Base-RHOSE-4.7:gperftools-libs-0:2.6.3-2.el8ost.s390x", "8Base-RHOSE-4.7:gperftools-libs-0:2.6.3-2.el8ost.x86_64", "8Base-RHOSE-4.7:gperftools-libs-debuginfo-0:2.6.3-2.el8ost.ppc64le", "8Base-RHOSE-4.7:gperftools-libs-debuginfo-0:2.6.3-2.el8ost.s390x", "8Base-RHOSE-4.7:gperftools-libs-debuginfo-0:2.6.3-2.el8ost.x86_64", "8Base-RHOSE-4.7:grpc-0:1.18.0-4.el8ost.ppc64le", "8Base-RHOSE-4.7:grpc-0:1.18.0-4.el8ost.s390x", "8Base-RHOSE-4.7:grpc-0:1.18.0-4.el8ost.src", "8Base-RHOSE-4.7:grpc-0:1.18.0-4.el8ost.x86_64", "8Base-RHOSE-4.7:grpc-cli-0:1.18.0-4.el8ost.ppc64le", "8Base-RHOSE-4.7:grpc-cli-0:1.18.0-4.el8ost.s390x", "8Base-RHOSE-4.7:grpc-cli-0:1.18.0-4.el8ost.x86_64", "8Base-RHOSE-4.7:grpc-cli-debuginfo-0:1.18.0-4.el8ost.ppc64le", "8Base-RHOSE-4.7:grpc-cli-debuginfo-0:1.18.0-4.el8ost.s390x", "8Base-RHOSE-4.7:grpc-cli-debuginfo-0:1.18.0-4.el8ost.x86_64", "8Base-RHOSE-4.7:grpc-debuginfo-0:1.18.0-4.el8ost.ppc64le", "8Base-RHOSE-4.7:grpc-debuginfo-0:1.18.0-4.el8ost.s390x", "8Base-RHOSE-4.7:grpc-debuginfo-0:1.18.0-4.el8ost.x86_64", "8Base-RHOSE-4.7:grpc-debugsource-0:1.18.0-4.el8ost.ppc64le", "8Base-RHOSE-4.7:grpc-debugsource-0:1.18.0-4.el8ost.s390x", "8Base-RHOSE-4.7:grpc-debugsource-0:1.18.0-4.el8ost.x86_64", "8Base-RHOSE-4.7:grpc-devel-0:1.18.0-4.el8ost.ppc64le", "8Base-RHOSE-4.7:grpc-devel-0:1.18.0-4.el8ost.s390x", "8Base-RHOSE-4.7:grpc-devel-0:1.18.0-4.el8ost.x86_64", "8Base-RHOSE-4.7:grpc-plugins-0:1.18.0-4.el8ost.ppc64le", "8Base-RHOSE-4.7:grpc-plugins-0:1.18.0-4.el8ost.s390x", "8Base-RHOSE-4.7:grpc-plugins-0:1.18.0-4.el8ost.x86_64", "8Base-RHOSE-4.7:grpc-plugins-debuginfo-0:1.18.0-4.el8ost.ppc64le", "8Base-RHOSE-4.7:grpc-plugins-debuginfo-0:1.18.0-4.el8ost.s390x", "8Base-RHOSE-4.7:grpc-plugins-debuginfo-0:1.18.0-4.el8ost.x86_64", "8Base-RHOSE-4.7:haproxy-0:2.0.19-1.el8.src", "8Base-RHOSE-4.7:haproxy-debugsource-0:2.0.19-1.el8.ppc64le", "8Base-RHOSE-4.7:haproxy-debugsource-0:2.0.19-1.el8.s390x", "8Base-RHOSE-4.7:haproxy-debugsource-0:2.0.19-1.el8.x86_64", "8Base-RHOSE-4.7:haproxy20-0:2.0.19-1.el8.ppc64le", "8Base-RHOSE-4.7:haproxy20-0:2.0.19-1.el8.s390x", "8Base-RHOSE-4.7:haproxy20-0:2.0.19-1.el8.x86_64", "8Base-RHOSE-4.7:haproxy20-debuginfo-0:2.0.19-1.el8.ppc64le", "8Base-RHOSE-4.7:haproxy20-debuginfo-0:2.0.19-1.el8.s390x", "8Base-RHOSE-4.7:haproxy20-debuginfo-0:2.0.19-1.el8.x86_64", "8Base-RHOSE-4.7:ignition-0:2.9.0-2.rhaos4.7.git1d56dc8.el8.ppc64le", "8Base-RHOSE-4.7:ignition-0:2.9.0-2.rhaos4.7.git1d56dc8.el8.s390x", "8Base-RHOSE-4.7:ignition-0:2.9.0-2.rhaos4.7.git1d56dc8.el8.src", "8Base-RHOSE-4.7:ignition-0:2.9.0-2.rhaos4.7.git1d56dc8.el8.x86_64", "8Base-RHOSE-4.7:ignition-debuginfo-0:2.9.0-2.rhaos4.7.git1d56dc8.el8.ppc64le", "8Base-RHOSE-4.7:ignition-debuginfo-0:2.9.0-2.rhaos4.7.git1d56dc8.el8.s390x", "8Base-RHOSE-4.7:ignition-debuginfo-0:2.9.0-2.rhaos4.7.git1d56dc8.el8.x86_64", "8Base-RHOSE-4.7:ignition-debugsource-0:2.9.0-2.rhaos4.7.git1d56dc8.el8.ppc64le", "8Base-RHOSE-4.7:ignition-debugsource-0:2.9.0-2.rhaos4.7.git1d56dc8.el8.s390x", "8Base-RHOSE-4.7:ignition-debugsource-0:2.9.0-2.rhaos4.7.git1d56dc8.el8.x86_64", "8Base-RHOSE-4.7:ignition-validate-0:2.9.0-2.rhaos4.7.git1d56dc8.el8.ppc64le", "8Base-RHOSE-4.7:ignition-validate-0:2.9.0-2.rhaos4.7.git1d56dc8.el8.s390x", "8Base-RHOSE-4.7:ignition-validate-0:2.9.0-2.rhaos4.7.git1d56dc8.el8.x86_64", "8Base-RHOSE-4.7:ignition-validate-debuginfo-0:2.9.0-2.rhaos4.7.git1d56dc8.el8.ppc64le", "8Base-RHOSE-4.7:ignition-validate-debuginfo-0:2.9.0-2.rhaos4.7.git1d56dc8.el8.s390x", "8Base-RHOSE-4.7:ignition-validate-debuginfo-0:2.9.0-2.rhaos4.7.git1d56dc8.el8.x86_64", "8Base-RHOSE-4.7:inotify-tools-0:3.20.1-2.el8.ppc64le", "8Base-RHOSE-4.7:inotify-tools-0:3.20.1-2.el8.s390x", "8Base-RHOSE-4.7:inotify-tools-0:3.20.1-2.el8.src", "8Base-RHOSE-4.7:inotify-tools-0:3.20.1-2.el8.x86_64", "8Base-RHOSE-4.7:inotify-tools-debuginfo-0:3.20.1-2.el8.ppc64le", "8Base-RHOSE-4.7:inotify-tools-debuginfo-0:3.20.1-2.el8.s390x", "8Base-RHOSE-4.7:inotify-tools-debuginfo-0:3.20.1-2.el8.x86_64", "8Base-RHOSE-4.7:inotify-tools-debugsource-0:3.20.1-2.el8.ppc64le", "8Base-RHOSE-4.7:inotify-tools-debugsource-0:3.20.1-2.el8.s390x", "8Base-RHOSE-4.7:inotify-tools-debugsource-0:3.20.1-2.el8.x86_64", "8Base-RHOSE-4.7:inotify-tools-devel-0:3.20.1-2.el8.ppc64le", "8Base-RHOSE-4.7:inotify-tools-devel-0:3.20.1-2.el8.s390x", "8Base-RHOSE-4.7:inotify-tools-devel-0:3.20.1-2.el8.x86_64", "8Base-RHOSE-4.7:ironic-images-0:15.1-20210114.1.el8.noarch", "8Base-RHOSE-4.7:ironic-images-0:15.1-20210114.1.el8.src", "8Base-RHOSE-4.7:ironic-images-all-0:15.1-20210114.1.el8.noarch", "8Base-RHOSE-4.7:ironic-images-ipa-ppc64le-0:15.1-20210114.1.el8.noarch", "8Base-RHOSE-4.7:ironic-images-ipa-x86_64-0:15.1-20210114.1.el8.noarch", "8Base-RHOSE-4.7:jenkins-0:2.263.3.1612449007-1.el8.noarch", "8Base-RHOSE-4.7:jenkins-0:2.263.3.1612449007-1.el8.src", "8Base-RHOSE-4.7:jenkins-2-plugins-0:4.7.1611636915-1.el8.noarch", "8Base-RHOSE-4.7:jenkins-2-plugins-0:4.7.1611636915-1.el8.src", "8Base-RHOSE-4.7:jq-0:1.6-2.el8.ppc64le", "8Base-RHOSE-4.7:jq-0:1.6-2.el8.s390x", "8Base-RHOSE-4.7:jq-0:1.6-2.el8.src", "8Base-RHOSE-4.7:jq-0:1.6-2.el8.x86_64", "8Base-RHOSE-4.7:jq-debuginfo-0:1.6-2.el8.ppc64le", "8Base-RHOSE-4.7:jq-debuginfo-0:1.6-2.el8.s390x", "8Base-RHOSE-4.7:jq-debuginfo-0:1.6-2.el8.x86_64", "8Base-RHOSE-4.7:jq-debugsource-0:1.6-2.el8.ppc64le", "8Base-RHOSE-4.7:jq-debugsource-0:1.6-2.el8.s390x", "8Base-RHOSE-4.7:jq-debugsource-0:1.6-2.el8.x86_64", "8Base-RHOSE-4.7:jq-devel-0:1.6-2.el8.ppc64le", "8Base-RHOSE-4.7:jq-devel-0:1.6-2.el8.s390x", "8Base-RHOSE-4.7:jq-devel-0:1.6-2.el8.x86_64", "8Base-RHOSE-4.7:kuryr-binding-scripts-0:1.1.1-0.20190923160834.41e6964.el8ost.noarch", "8Base-RHOSE-4.7:libnftnl-0:1.1.5-4.el8.ppc64le", "8Base-RHOSE-4.7:libnftnl-0:1.1.5-4.el8.s390x", "8Base-RHOSE-4.7:libnftnl-0:1.1.5-4.el8.src", "8Base-RHOSE-4.7:libnftnl-0:1.1.5-4.el8.x86_64", "8Base-RHOSE-4.7:libnftnl-debuginfo-0:1.1.5-4.el8.ppc64le", "8Base-RHOSE-4.7:libnftnl-debuginfo-0:1.1.5-4.el8.s390x", "8Base-RHOSE-4.7:libnftnl-debuginfo-0:1.1.5-4.el8.x86_64", "8Base-RHOSE-4.7:libnftnl-debugsource-0:1.1.5-4.el8.ppc64le", "8Base-RHOSE-4.7:libnftnl-debugsource-0:1.1.5-4.el8.s390x", "8Base-RHOSE-4.7:libnftnl-debugsource-0:1.1.5-4.el8.x86_64", "8Base-RHOSE-4.7:libnftnl-devel-0:1.1.5-4.el8.ppc64le", "8Base-RHOSE-4.7:libnftnl-devel-0:1.1.5-4.el8.s390x", "8Base-RHOSE-4.7:libnftnl-devel-0:1.1.5-4.el8.x86_64", "8Base-RHOSE-4.7:libsodium-0:1.0.16-4.5.el8ost.ppc64le", "8Base-RHOSE-4.7:libsodium-0:1.0.16-4.5.el8ost.s390x", "8Base-RHOSE-4.7:libsodium-0:1.0.16-4.5.el8ost.src", "8Base-RHOSE-4.7:libsodium-0:1.0.16-4.5.el8ost.x86_64", "8Base-RHOSE-4.7:libsodium-debuginfo-0:1.0.16-4.5.el8ost.ppc64le", "8Base-RHOSE-4.7:libsodium-debuginfo-0:1.0.16-4.5.el8ost.s390x", "8Base-RHOSE-4.7:libsodium-debuginfo-0:1.0.16-4.5.el8ost.x86_64", "8Base-RHOSE-4.7:libsodium-debugsource-0:1.0.16-4.5.el8ost.ppc64le", "8Base-RHOSE-4.7:libsodium-debugsource-0:1.0.16-4.5.el8ost.s390x", "8Base-RHOSE-4.7:libsodium-debugsource-0:1.0.16-4.5.el8ost.x86_64", "8Base-RHOSE-4.7:libsodium-devel-0:1.0.16-4.5.el8ost.ppc64le", "8Base-RHOSE-4.7:libsodium-devel-0:1.0.16-4.5.el8ost.s390x", "8Base-RHOSE-4.7:libsodium-devel-0:1.0.16-4.5.el8ost.x86_64", "8Base-RHOSE-4.7:libsodium-static-0:1.0.16-4.5.el8ost.ppc64le", "8Base-RHOSE-4.7:libsodium-static-0:1.0.16-4.5.el8ost.s390x", "8Base-RHOSE-4.7:libsodium-static-0:1.0.16-4.5.el8ost.x86_64", "8Base-RHOSE-4.7:libunwind-0:1.2.1-5.el8.ppc64le", "8Base-RHOSE-4.7:libunwind-0:1.2.1-5.el8.src", "8Base-RHOSE-4.7:libunwind-0:1.2.1-5.el8.x86_64", "8Base-RHOSE-4.7:libunwind-debuginfo-0:1.2.1-5.el8.ppc64le", "8Base-RHOSE-4.7:libunwind-debuginfo-0:1.2.1-5.el8.x86_64", "8Base-RHOSE-4.7:libunwind-debugsource-0:1.2.1-5.el8.ppc64le", "8Base-RHOSE-4.7:libunwind-debugsource-0:1.2.1-5.el8.x86_64", "8Base-RHOSE-4.7:libunwind-devel-0:1.2.1-5.el8.ppc64le", "8Base-RHOSE-4.7:libunwind-devel-0:1.2.1-5.el8.x86_64", "8Base-RHOSE-4.7:network-scripts-openvswitch2.13-0:2.13.0-79.el8fdp.ppc64le", "8Base-RHOSE-4.7:network-scripts-openvswitch2.13-0:2.13.0-79.el8fdp.s390x", "8Base-RHOSE-4.7:network-scripts-openvswitch2.13-0:2.13.0-79.el8fdp.x86_64", "8Base-RHOSE-4.7:octavia-amphora-image-x86_64-0:17.0-20200606.1.el8ost.noarch", "8Base-RHOSE-4.7:openshift-0:4.7.0-202102060108.p0.git.97095.7271b90.el8.src", "8Base-RHOSE-4.7:openshift-clients-0:4.7.0-202102032256.p0.git.3951.0e656ef.el8.ppc64le", "8Base-RHOSE-4.7:openshift-clients-0:4.7.0-202102032256.p0.git.3951.0e656ef.el8.s390x", "8Base-RHOSE-4.7:openshift-clients-0:4.7.0-202102032256.p0.git.3951.0e656ef.el8.src", "8Base-RHOSE-4.7:openshift-clients-0:4.7.0-202102032256.p0.git.3951.0e656ef.el8.x86_64", "8Base-RHOSE-4.7:openshift-clients-redistributable-0:4.7.0-202102032256.p0.git.3951.0e656ef.el8.x86_64", "8Base-RHOSE-4.7:openshift-eventrouter-0:0.2-4.git7c289cc.el8.ppc64le", "8Base-RHOSE-4.7:openshift-eventrouter-0:0.2-4.git7c289cc.el8.s390x", "8Base-RHOSE-4.7:openshift-eventrouter-0:0.2-4.git7c289cc.el8.src", "8Base-RHOSE-4.7:openshift-eventrouter-0:0.2-4.git7c289cc.el8.x86_64", "8Base-RHOSE-4.7:openshift-eventrouter-debuginfo-0:0.2-4.git7c289cc.el8.ppc64le", "8Base-RHOSE-4.7:openshift-eventrouter-debuginfo-0:0.2-4.git7c289cc.el8.s390x", "8Base-RHOSE-4.7:openshift-eventrouter-debuginfo-0:0.2-4.git7c289cc.el8.x86_64", "8Base-RHOSE-4.7:openshift-eventrouter-debugsource-0:0.2-4.git7c289cc.el8.ppc64le", "8Base-RHOSE-4.7:openshift-eventrouter-debugsource-0:0.2-4.git7c289cc.el8.s390x", "8Base-RHOSE-4.7:openshift-eventrouter-debugsource-0:0.2-4.git7c289cc.el8.x86_64", "8Base-RHOSE-4.7:openshift-hyperkube-0:4.7.0-202102060108.p0.git.97095.7271b90.el8.ppc64le", "8Base-RHOSE-4.7:openshift-hyperkube-0:4.7.0-202102060108.p0.git.97095.7271b90.el8.s390x", "8Base-RHOSE-4.7:openshift-hyperkube-0:4.7.0-202102060108.p0.git.97095.7271b90.el8.x86_64", "8Base-RHOSE-4.7:openshift-kuryr-0:4.7.0-202101262230.p0.git.2494.cd95ce5.el8.src", "8Base-RHOSE-4.7:openshift-kuryr-cni-0:4.7.0-202101262230.p0.git.2494.cd95ce5.el8.noarch", "8Base-RHOSE-4.7:openshift-kuryr-common-0:4.7.0-202101262230.p0.git.2494.cd95ce5.el8.noarch", "8Base-RHOSE-4.7:openshift-kuryr-controller-0:4.7.0-202101262230.p0.git.2494.cd95ce5.el8.noarch", "8Base-RHOSE-4.7:openstack-ironic-1:16.0.4-0.20210203051223.7d74ea0.el8.src", "8Base-RHOSE-4.7:openstack-ironic-api-1:16.0.4-0.20210203051223.7d74ea0.el8.noarch", "8Base-RHOSE-4.7:openstack-ironic-common-1:16.0.4-0.20210203051223.7d74ea0.el8.noarch", "8Base-RHOSE-4.7:openstack-ironic-conductor-1:16.0.4-0.20210203051223.7d74ea0.el8.noarch", "8Base-RHOSE-4.7:openstack-ironic-inspector-0:10.4.1-0.20201123161216.70fccec.el8.noarch", "8Base-RHOSE-4.7:openstack-ironic-inspector-0:10.4.1-0.20201123161216.70fccec.el8.src", "8Base-RHOSE-4.7:openstack-ironic-inspector-api-0:10.4.1-0.20201123161216.70fccec.el8.noarch", "8Base-RHOSE-4.7:openstack-ironic-inspector-conductor-0:10.4.1-0.20201123161216.70fccec.el8.noarch", "8Base-RHOSE-4.7:openstack-ironic-inspector-dnsmasq-0:10.4.1-0.20201123161216.70fccec.el8.noarch", "8Base-RHOSE-4.7:openstack-ironic-python-agent-0:6.4.3-0.20201217171210.bd45db1.el8.noarch", "8Base-RHOSE-4.7:openstack-ironic-python-agent-0:6.4.3-0.20201217171210.bd45db1.el8.src", "8Base-RHOSE-4.7:openvswitch2.13-0:2.13.0-79.el8fdp.ppc64le", "8Base-RHOSE-4.7:openvswitch2.13-0:2.13.0-79.el8fdp.s390x", "8Base-RHOSE-4.7:openvswitch2.13-0:2.13.0-79.el8fdp.src", "8Base-RHOSE-4.7:openvswitch2.13-0:2.13.0-79.el8fdp.x86_64", "8Base-RHOSE-4.7:openvswitch2.13-debuginfo-0:2.13.0-79.el8fdp.ppc64le", "8Base-RHOSE-4.7:openvswitch2.13-debuginfo-0:2.13.0-79.el8fdp.s390x", "8Base-RHOSE-4.7:openvswitch2.13-debuginfo-0:2.13.0-79.el8fdp.x86_64", "8Base-RHOSE-4.7:openvswitch2.13-debugsource-0:2.13.0-79.el8fdp.ppc64le", "8Base-RHOSE-4.7:openvswitch2.13-debugsource-0:2.13.0-79.el8fdp.s390x", "8Base-RHOSE-4.7:openvswitch2.13-debugsource-0:2.13.0-79.el8fdp.x86_64", "8Base-RHOSE-4.7:openvswitch2.13-devel-0:2.13.0-79.el8fdp.ppc64le", "8Base-RHOSE-4.7:openvswitch2.13-devel-0:2.13.0-79.el8fdp.s390x", "8Base-RHOSE-4.7:openvswitch2.13-devel-0:2.13.0-79.el8fdp.x86_64", "8Base-RHOSE-4.7:openvswitch2.13-test-0:2.13.0-79.el8fdp.noarch", "8Base-RHOSE-4.7:ostree-0:2020.7-1.el8.ppc64le", "8Base-RHOSE-4.7:ostree-0:2020.7-1.el8.s390x", "8Base-RHOSE-4.7:ostree-0:2020.7-1.el8.src", "8Base-RHOSE-4.7:ostree-0:2020.7-1.el8.x86_64", "8Base-RHOSE-4.7:ostree-debuginfo-0:2020.7-1.el8.ppc64le", "8Base-RHOSE-4.7:ostree-debuginfo-0:2020.7-1.el8.s390x", "8Base-RHOSE-4.7:ostree-debuginfo-0:2020.7-1.el8.x86_64", "8Base-RHOSE-4.7:ostree-debugsource-0:2020.7-1.el8.ppc64le", "8Base-RHOSE-4.7:ostree-debugsource-0:2020.7-1.el8.s390x", "8Base-RHOSE-4.7:ostree-debugsource-0:2020.7-1.el8.x86_64", "8Base-RHOSE-4.7:ostree-devel-0:2020.7-1.el8.ppc64le", "8Base-RHOSE-4.7:ostree-devel-0:2020.7-1.el8.s390x", "8Base-RHOSE-4.7:ostree-devel-0:2020.7-1.el8.x86_64", "8Base-RHOSE-4.7:ostree-grub2-0:2020.7-1.el8.ppc64le", "8Base-RHOSE-4.7:ostree-grub2-0:2020.7-1.el8.x86_64", "8Base-RHOSE-4.7:ostree-libs-0:2020.7-1.el8.ppc64le", "8Base-RHOSE-4.7:ostree-libs-0:2020.7-1.el8.s390x", "8Base-RHOSE-4.7:ostree-libs-0:2020.7-1.el8.x86_64", "8Base-RHOSE-4.7:ostree-libs-debuginfo-0:2020.7-1.el8.ppc64le", "8Base-RHOSE-4.7:ostree-libs-debuginfo-0:2020.7-1.el8.s390x", "8Base-RHOSE-4.7:ostree-libs-debuginfo-0:2020.7-1.el8.x86_64", "8Base-RHOSE-4.7:ovn2.13-0:20.09.0-21.el8fdn.ppc64le", "8Base-RHOSE-4.7:ovn2.13-0:20.09.0-21.el8fdn.s390x", "8Base-RHOSE-4.7:ovn2.13-0:20.09.0-21.el8fdn.src", "8Base-RHOSE-4.7:ovn2.13-0:20.09.0-21.el8fdn.x86_64", "8Base-RHOSE-4.7:ovn2.13-central-0:20.09.0-21.el8fdn.ppc64le", "8Base-RHOSE-4.7:ovn2.13-central-0:20.09.0-21.el8fdn.s390x", "8Base-RHOSE-4.7:ovn2.13-central-0:20.09.0-21.el8fdn.x86_64", "8Base-RHOSE-4.7:ovn2.13-central-debuginfo-0:20.09.0-21.el8fdn.ppc64le", "8Base-RHOSE-4.7:ovn2.13-central-debuginfo-0:20.09.0-21.el8fdn.s390x", "8Base-RHOSE-4.7:ovn2.13-central-debuginfo-0:20.09.0-21.el8fdn.x86_64", "8Base-RHOSE-4.7:ovn2.13-debuginfo-0:20.09.0-21.el8fdn.ppc64le", "8Base-RHOSE-4.7:ovn2.13-debuginfo-0:20.09.0-21.el8fdn.s390x", "8Base-RHOSE-4.7:ovn2.13-debuginfo-0:20.09.0-21.el8fdn.x86_64", "8Base-RHOSE-4.7:ovn2.13-debugsource-0:20.09.0-21.el8fdn.ppc64le", "8Base-RHOSE-4.7:ovn2.13-debugsource-0:20.09.0-21.el8fdn.s390x", "8Base-RHOSE-4.7:ovn2.13-debugsource-0:20.09.0-21.el8fdn.x86_64", "8Base-RHOSE-4.7:ovn2.13-host-0:20.09.0-21.el8fdn.ppc64le", "8Base-RHOSE-4.7:ovn2.13-host-0:20.09.0-21.el8fdn.s390x", "8Base-RHOSE-4.7:ovn2.13-host-0:20.09.0-21.el8fdn.x86_64", "8Base-RHOSE-4.7:ovn2.13-host-debuginfo-0:20.09.0-21.el8fdn.ppc64le", "8Base-RHOSE-4.7:ovn2.13-host-debuginfo-0:20.09.0-21.el8fdn.s390x", "8Base-RHOSE-4.7:ovn2.13-host-debuginfo-0:20.09.0-21.el8fdn.x86_64", "8Base-RHOSE-4.7:ovn2.13-vtep-0:20.09.0-21.el8fdn.ppc64le", "8Base-RHOSE-4.7:ovn2.13-vtep-0:20.09.0-21.el8fdn.s390x", "8Base-RHOSE-4.7:ovn2.13-vtep-0:20.09.0-21.el8fdn.x86_64", "8Base-RHOSE-4.7:ovn2.13-vtep-debuginfo-0:20.09.0-21.el8fdn.ppc64le", "8Base-RHOSE-4.7:ovn2.13-vtep-debuginfo-0:20.09.0-21.el8fdn.s390x", "8Base-RHOSE-4.7:ovn2.13-vtep-debuginfo-0:20.09.0-21.el8fdn.x86_64", "8Base-RHOSE-4.7:powerpc-utils-0:1.3.6-12.el8_3.ppc64le", "8Base-RHOSE-4.7:powerpc-utils-0:1.3.6-12.el8_3.src", "8Base-RHOSE-4.7:powerpc-utils-core-0:1.3.6-12.el8_3.ppc64le", "8Base-RHOSE-4.7:powerpc-utils-core-debuginfo-0:1.3.6-12.el8_3.ppc64le", "8Base-RHOSE-4.7:powerpc-utils-debugsource-0:1.3.6-12.el8_3.ppc64le", "8Base-RHOSE-4.7:pprof-0:2.6.3-2.el8ost.noarch", "8Base-RHOSE-4.7:prometheus-promu-0:0.5.0-2.git642a960.el8.ppc64le", "8Base-RHOSE-4.7:prometheus-promu-0:0.5.0-2.git642a960.el8.s390x", "8Base-RHOSE-4.7:prometheus-promu-0:0.5.0-2.git642a960.el8.x86_64", "8Base-RHOSE-4.7:protobuf-0:3.6.1-4.el8ost.ppc64le", "8Base-RHOSE-4.7:protobuf-0:3.6.1-4.el8ost.s390x", "8Base-RHOSE-4.7:protobuf-0:3.6.1-4.el8ost.src", "8Base-RHOSE-4.7:protobuf-0:3.6.1-4.el8ost.x86_64", "8Base-RHOSE-4.7:protobuf-compiler-0:3.6.1-4.el8ost.ppc64le", "8Base-RHOSE-4.7:protobuf-compiler-0:3.6.1-4.el8ost.s390x", "8Base-RHOSE-4.7:protobuf-compiler-0:3.6.1-4.el8ost.x86_64", "8Base-RHOSE-4.7:protobuf-compiler-debuginfo-0:3.6.1-4.el8ost.ppc64le", "8Base-RHOSE-4.7:protobuf-compiler-debuginfo-0:3.6.1-4.el8ost.s390x", "8Base-RHOSE-4.7:protobuf-compiler-debuginfo-0:3.6.1-4.el8ost.x86_64", "8Base-RHOSE-4.7:protobuf-debuginfo-0:3.6.1-4.el8ost.ppc64le", "8Base-RHOSE-4.7:protobuf-debuginfo-0:3.6.1-4.el8ost.s390x", "8Base-RHOSE-4.7:protobuf-debuginfo-0:3.6.1-4.el8ost.x86_64", "8Base-RHOSE-4.7:protobuf-debugsource-0:3.6.1-4.el8ost.ppc64le", "8Base-RHOSE-4.7:protobuf-debugsource-0:3.6.1-4.el8ost.s390x", "8Base-RHOSE-4.7:protobuf-debugsource-0:3.6.1-4.el8ost.x86_64", "8Base-RHOSE-4.7:protobuf-devel-0:3.6.1-4.el8ost.ppc64le", "8Base-RHOSE-4.7:protobuf-devel-0:3.6.1-4.el8ost.s390x", "8Base-RHOSE-4.7:protobuf-devel-0:3.6.1-4.el8ost.x86_64", "8Base-RHOSE-4.7:protobuf-lite-0:3.6.1-4.el8ost.ppc64le", "8Base-RHOSE-4.7:protobuf-lite-0:3.6.1-4.el8ost.s390x", "8Base-RHOSE-4.7:protobuf-lite-0:3.6.1-4.el8ost.x86_64", "8Base-RHOSE-4.7:protobuf-lite-debuginfo-0:3.6.1-4.el8ost.ppc64le", "8Base-RHOSE-4.7:protobuf-lite-debuginfo-0:3.6.1-4.el8ost.s390x", "8Base-RHOSE-4.7:protobuf-lite-debuginfo-0:3.6.1-4.el8ost.x86_64", "8Base-RHOSE-4.7:protobuf-lite-devel-0:3.6.1-4.el8ost.ppc64le", "8Base-RHOSE-4.7:protobuf-lite-devel-0:3.6.1-4.el8ost.s390x", "8Base-RHOSE-4.7:protobuf-lite-devel-0:3.6.1-4.el8ost.x86_64", "8Base-RHOSE-4.7:protobuf-lite-static-0:3.6.1-4.el8ost.ppc64le", "8Base-RHOSE-4.7:protobuf-lite-static-0:3.6.1-4.el8ost.s390x", "8Base-RHOSE-4.7:protobuf-lite-static-0:3.6.1-4.el8ost.x86_64", "8Base-RHOSE-4.7:protobuf-static-0:3.6.1-4.el8ost.ppc64le", "8Base-RHOSE-4.7:protobuf-static-0:3.6.1-4.el8ost.s390x", "8Base-RHOSE-4.7:protobuf-static-0:3.6.1-4.el8ost.x86_64", "8Base-RHOSE-4.7:protobuf-vim-0:3.6.1-4.el8ost.noarch", "8Base-RHOSE-4.7:python-alembic-0:1.4.2-5.el8ost.src", "8Base-RHOSE-4.7:python-boto3-0:1.9.101-1.el8ost.src", "8Base-RHOSE-4.7:python-botocore-0:1.12.119-1.el8ost.src", "8Base-RHOSE-4.7:python-cachetools-0:3.1.0-1.el8ost.src", "8Base-RHOSE-4.7:python-certifi-0:2018.10.15-4.el8ost.src", "8Base-RHOSE-4.7:python-construct-0:2.10.56-1.el8ost.src", "8Base-RHOSE-4.7:python-daemon-0:2.1.2-9.el8ar.src", "8Base-RHOSE-4.7:python-debtcollector-0:2.2.0-0.20201008171245.649189d.el8.src", "8Base-RHOSE-4.7:python-dictdiffer-0:0.7.1-2.el8ost.src", "8Base-RHOSE-4.7:python-eventlet-0:0.25.2-3.el8ost.src", "8Base-RHOSE-4.7:python-flask-1:1.1.1-1.el8ost.src", "8Base-RHOSE-4.7:python-flask-doc-1:1.1.1-1.el8ost.noarch", "8Base-RHOSE-4.7:python-google-auth-0:1.3.0-1.el8ost.src", "8Base-RHOSE-4.7:python-hardware-0:0.23.0-0.20201031022149.59211cc.el8.src", "8Base-RHOSE-4.7:python-ifaddr-0:0.1.6-5.el8ost.src", "8Base-RHOSE-4.7:python-importlib-metadata-0:1.7.0-1.el8ost.src", "8Base-RHOSE-4.7:python-ironic-lib-0:4.4.1-0.20201218041209.aa7cfec.el8.src", "8Base-RHOSE-4.7:python-keystoneauth1-0:4.2.0-0.20200630234358.dab8e10.el8ost.src", "8Base-RHOSE-4.7:python-kubernetes-0:11.0.0-1.el8.src", "8Base-RHOSE-4.7:python-kuryr-lib-0:1.1.1-0.20190923160834.41e6964.el8ost.src", "8Base-RHOSE-4.7:python-lockfile-1:0.11.0-8.el8ar.src", "8Base-RHOSE-4.7:python-msgpack-0:0.6.2-1.el8ost.src", "8Base-RHOSE-4.7:python-msgpack-debugsource-0:0.6.2-1.el8ost.x86_64", "8Base-RHOSE-4.7:python-openshift-1:0.11.2-1.el8.src", "8Base-RHOSE-4.7:python-openstacksdk-0:0.48.0-0.20200708092906.3b693c2.el8ost.src", "8Base-RHOSE-4.7:python-oslo-concurrency-0:4.3.0-0.20201008180343.2f78803.el8.src", "8Base-RHOSE-4.7:python-oslo-concurrency-lang-0:4.3.0-0.20201008180343.2f78803.el8.noarch", "8Base-RHOSE-4.7:python-oslo-config-2:8.3.2-0.20201008180634.fcb8894.el8.src", "8Base-RHOSE-4.7:python-oslo-context-0:3.1.1-0.20201008190523.57dbded.el8.src", "8Base-RHOSE-4.7:python-oslo-db-0:8.4.0-0.20200918104110.e42c733.el8ost.src", "8Base-RHOSE-4.7:python-oslo-db-lang-0:8.4.0-0.20200918104110.e42c733.el8ost.noarch", "8Base-RHOSE-4.7:python-oslo-i18n-0:5.0.1-0.20201009131251.73187bd.el8.src", "8Base-RHOSE-4.7:python-oslo-i18n-lang-0:5.0.1-0.20201009131251.73187bd.el8.noarch", "8Base-RHOSE-4.7:python-oslo-log-0:4.3.1-0.20201207021200.1597f24.el8.src", "8Base-RHOSE-4.7:python-oslo-log-lang-0:4.3.1-0.20201207021200.1597f24.el8.noarch", "8Base-RHOSE-4.7:python-oslo-serialization-0:4.0.1-0.20201008182423.c7884b2.el8.src", "8Base-RHOSE-4.7:python-oslo-service-0:2.4.0-0.20201008184547.58466a6.el8.src", "8Base-RHOSE-4.7:python-oslo-utils-0:4.6.0-0.20201009175936.91497da.el8.src", "8Base-RHOSE-4.7:python-oslo-utils-lang-0:4.6.0-0.20201009175936.91497da.el8.noarch", "8Base-RHOSE-4.7:python-packaging-0:20.4-1.el8ost.src", "8Base-RHOSE-4.7:python-packaging-doc-0:20.4-1.el8ost.noarch", "8Base-RHOSE-4.7:python-paste-0:3.2.4-1.el8ost.src", "8Base-RHOSE-4.7:python-paste-deploy-0:2.0.1-4.el8ost.src", "8Base-RHOSE-4.7:python-pbr-0:5.4.3-2.el8ost.src", "8Base-RHOSE-4.7:python-pexpect-0:4.6-2.el8ar.src", "8Base-RHOSE-4.7:python-pint-0:0.10.1-1.el8ost.src", "8Base-RHOSE-4.7:python-psutil-0:5.6.6-1.el8ar.src", "8Base-RHOSE-4.7:python-psutil-debugsource-0:5.6.6-1.el8ar.ppc64le", "8Base-RHOSE-4.7:python-psutil-debugsource-0:5.6.6-1.el8ar.s390x", "8Base-RHOSE-4.7:python-psutil-debugsource-0:5.6.6-1.el8ar.x86_64", "8Base-RHOSE-4.7:python-pyghmi-0:1.5.14-2.1.el8ost.src", "8Base-RHOSE-4.7:python-pyroute2-0:0.5.13-1.el8ost.src", "8Base-RHOSE-4.7:python-requests-unixsocket-0:0.1.5-5.el8ar.src", "8Base-RHOSE-4.7:python-rsa-0:4.7-1.el8.src", "8Base-RHOSE-4.7:python-ruamel-yaml-0:0.15.41-4.el8ost.src", "8Base-RHOSE-4.7:python-ruamel-yaml-debugsource-0:0.15.41-4.el8ost.ppc64le", "8Base-RHOSE-4.7:python-ruamel-yaml-debugsource-0:0.15.41-4.el8ost.s390x", "8Base-RHOSE-4.7:python-ruamel-yaml-debugsource-0:0.15.41-4.el8ost.x86_64", "8Base-RHOSE-4.7:python-s3transfer-0:0.2.0-1.el8ost.src", "8Base-RHOSE-4.7:python-stevedore-0:3.2.2-0.20201009151242.274eaa6.el8.src", "8Base-RHOSE-4.7:python-string_utils-0:0.6.0-4.el8ost.src", "8Base-RHOSE-4.7:python-sushy-0:3.6.1-0.20210122201213.7ec0422.el8.src", "8Base-RHOSE-4.7:python-sushy-oem-idrac-0:0.0.3-0.20200922221223.1202372.el8ost.src", "8Base-RHOSE-4.7:python-tenacity-0:6.2.0-1.el8ost.src", "8Base-RHOSE-4.7:python-tooz-0:2.7.0-0.20200723133754.fca43df.el8ost.src", "8Base-RHOSE-4.7:python-websocket-client-0:0.54.0-1.el8ost.src", "8Base-RHOSE-4.7:python-werkzeug-0:1.0.1-3.el8ost.src", "8Base-RHOSE-4.7:python-zeroconf-0:0.24.4-1.el8ost.src", "8Base-RHOSE-4.7:python-zipp-0:0.5.1-2.el8ost.src", "8Base-RHOSE-4.7:python2-botocore-0:1.12.119-1.el8ost.noarch", "8Base-RHOSE-4.7:python2-cachetools-0:3.1.0-1.el8ost.noarch", "8Base-RHOSE-4.7:python3-alembic-0:1.4.2-5.el8ost.noarch", "8Base-RHOSE-4.7:python3-ansible-runner-0:1.4.6-2.el8ar.noarch", "8Base-RHOSE-4.7:python3-boto3-0:1.9.101-1.el8ost.noarch", "8Base-RHOSE-4.7:python3-botocore-0:1.12.119-1.el8ost.noarch", "8Base-RHOSE-4.7:python3-cachetools-0:3.1.0-1.el8ost.noarch", "8Base-RHOSE-4.7:python3-certifi-0:2018.10.15-4.el8ost.noarch", "8Base-RHOSE-4.7:python3-construct-0:2.10.56-1.el8ost.noarch", "8Base-RHOSE-4.7:python3-daemon-0:2.1.2-9.el8ar.noarch", "8Base-RHOSE-4.7:python3-debtcollector-0:2.2.0-0.20201008171245.649189d.el8.noarch", "8Base-RHOSE-4.7:python3-dictdiffer-0:0.7.1-2.el8ost.noarch", "8Base-RHOSE-4.7:python3-eventlet-0:0.25.2-3.el8ost.noarch", "8Base-RHOSE-4.7:python3-flask-1:1.1.1-1.el8ost.noarch", "8Base-RHOSE-4.7:python3-google-auth-0:1.3.0-1.el8ost.noarch", "8Base-RHOSE-4.7:python3-grpcio-0:1.18.0-4.el8ost.ppc64le", "8Base-RHOSE-4.7:python3-grpcio-0:1.18.0-4.el8ost.s390x", "8Base-RHOSE-4.7:python3-grpcio-0:1.18.0-4.el8ost.x86_64", "8Base-RHOSE-4.7:python3-grpcio-debuginfo-0:1.18.0-4.el8ost.ppc64le", "8Base-RHOSE-4.7:python3-grpcio-debuginfo-0:1.18.0-4.el8ost.s390x", "8Base-RHOSE-4.7:python3-grpcio-debuginfo-0:1.18.0-4.el8ost.x86_64", "8Base-RHOSE-4.7:python3-hardware-0:0.23.0-0.20201031022149.59211cc.el8.noarch", "8Base-RHOSE-4.7:python3-hardware-detect-0:0.23.0-0.20201031022149.59211cc.el8.noarch", "8Base-RHOSE-4.7:python3-ifaddr-0:0.1.6-5.el8ost.noarch", "8Base-RHOSE-4.7:python3-importlib-metadata-0:1.7.0-1.el8ost.noarch", "8Base-RHOSE-4.7:python3-ironic-inspector-tests-0:10.4.1-0.20201123161216.70fccec.el8.noarch", "8Base-RHOSE-4.7:python3-ironic-lib-0:4.4.1-0.20201218041209.aa7cfec.el8.noarch", "8Base-RHOSE-4.7:python3-ironic-python-agent-0:6.4.3-0.20201217171210.bd45db1.el8.noarch", "8Base-RHOSE-4.7:python3-ironic-tests-1:16.0.4-0.20210203051223.7d74ea0.el8.noarch", "8Base-RHOSE-4.7:python3-keystoneauth1-0:4.2.0-0.20200630234358.dab8e10.el8ost.noarch", "8Base-RHOSE-4.7:python3-kubernetes-0:11.0.0-1.el8.noarch", "8Base-RHOSE-4.7:python3-kubernetes-tests-0:11.0.0-1.el8.noarch", "8Base-RHOSE-4.7:python3-kuryr-kubernetes-0:4.7.0-202101262230.p0.git.2494.cd95ce5.el8.noarch", "8Base-RHOSE-4.7:python3-kuryr-lib-0:1.1.1-0.20190923160834.41e6964.el8ost.noarch", "8Base-RHOSE-4.7:python3-kuryr-lib-tests-0:1.1.1-0.20190923160834.41e6964.el8ost.noarch", "8Base-RHOSE-4.7:python3-lockfile-1:0.11.0-8.el8ar.noarch", "8Base-RHOSE-4.7:python3-msgpack-0:0.6.2-1.el8ost.x86_64", "8Base-RHOSE-4.7:python3-msgpack-debuginfo-0:0.6.2-1.el8ost.x86_64", "8Base-RHOSE-4.7:python3-openshift-1:0.11.2-1.el8.noarch", "8Base-RHOSE-4.7:python3-openstacksdk-0:0.48.0-0.20200708092906.3b693c2.el8ost.noarch", "8Base-RHOSE-4.7:python3-openstacksdk-tests-0:0.48.0-0.20200708092906.3b693c2.el8ost.noarch", "8Base-RHOSE-4.7:python3-openvswitch2.13-0:2.13.0-79.el8fdp.ppc64le", "8Base-RHOSE-4.7:python3-openvswitch2.13-0:2.13.0-79.el8fdp.s390x", "8Base-RHOSE-4.7:python3-openvswitch2.13-0:2.13.0-79.el8fdp.x86_64", "8Base-RHOSE-4.7:python3-openvswitch2.13-debuginfo-0:2.13.0-79.el8fdp.ppc64le", "8Base-RHOSE-4.7:python3-openvswitch2.13-debuginfo-0:2.13.0-79.el8fdp.s390x", "8Base-RHOSE-4.7:python3-openvswitch2.13-debuginfo-0:2.13.0-79.el8fdp.x86_64", "8Base-RHOSE-4.7:python3-oslo-concurrency-0:4.3.0-0.20201008180343.2f78803.el8.noarch", "8Base-RHOSE-4.7:python3-oslo-concurrency-tests-0:4.3.0-0.20201008180343.2f78803.el8.noarch", "8Base-RHOSE-4.7:python3-oslo-config-2:8.3.2-0.20201008180634.fcb8894.el8.noarch", "8Base-RHOSE-4.7:python3-oslo-context-0:3.1.1-0.20201008190523.57dbded.el8.noarch", "8Base-RHOSE-4.7:python3-oslo-context-tests-0:3.1.1-0.20201008190523.57dbded.el8.noarch", "8Base-RHOSE-4.7:python3-oslo-db-0:8.4.0-0.20200918104110.e42c733.el8ost.noarch", "8Base-RHOSE-4.7:python3-oslo-db-tests-0:8.4.0-0.20200918104110.e42c733.el8ost.noarch", "8Base-RHOSE-4.7:python3-oslo-i18n-0:5.0.1-0.20201009131251.73187bd.el8.noarch", "8Base-RHOSE-4.7:python3-oslo-log-0:4.3.1-0.20201207021200.1597f24.el8.noarch", "8Base-RHOSE-4.7:python3-oslo-log-tests-0:4.3.1-0.20201207021200.1597f24.el8.noarch", "8Base-RHOSE-4.7:python3-oslo-serialization-0:4.0.1-0.20201008182423.c7884b2.el8.noarch", "8Base-RHOSE-4.7:python3-oslo-serialization-tests-0:4.0.1-0.20201008182423.c7884b2.el8.noarch", "8Base-RHOSE-4.7:python3-oslo-service-0:2.4.0-0.20201008184547.58466a6.el8.noarch", "8Base-RHOSE-4.7:python3-oslo-service-tests-0:2.4.0-0.20201008184547.58466a6.el8.noarch", "8Base-RHOSE-4.7:python3-oslo-utils-0:4.6.0-0.20201009175936.91497da.el8.noarch", "8Base-RHOSE-4.7:python3-oslo-utils-tests-0:4.6.0-0.20201009175936.91497da.el8.noarch", "8Base-RHOSE-4.7:python3-packaging-0:20.4-1.el8ost.noarch", "8Base-RHOSE-4.7:python3-paste-0:3.2.4-1.el8ost.noarch", "8Base-RHOSE-4.7:python3-paste-deploy-0:2.0.1-4.el8ost.noarch", "8Base-RHOSE-4.7:python3-pbr-0:5.4.3-2.el8ost.noarch", "8Base-RHOSE-4.7:python3-pexpect-0:4.6-2.el8ar.noarch", "8Base-RHOSE-4.7:python3-pint-0:0.10.1-1.el8ost.noarch", "8Base-RHOSE-4.7:python3-protobuf-0:3.6.1-4.el8ost.noarch", "8Base-RHOSE-4.7:python3-psutil-0:5.6.6-1.el8ar.ppc64le", "8Base-RHOSE-4.7:python3-psutil-0:5.6.6-1.el8ar.s390x", "8Base-RHOSE-4.7:python3-psutil-0:5.6.6-1.el8ar.x86_64", "8Base-RHOSE-4.7:python3-psutil-debuginfo-0:5.6.6-1.el8ar.ppc64le", "8Base-RHOSE-4.7:python3-psutil-debuginfo-0:5.6.6-1.el8ar.s390x", "8Base-RHOSE-4.7:python3-psutil-debuginfo-0:5.6.6-1.el8ar.x86_64", "8Base-RHOSE-4.7:python3-pyghmi-0:1.5.14-2.1.el8ost.noarch", "8Base-RHOSE-4.7:python3-pyroute2-0:0.5.13-1.el8ost.noarch", "8Base-RHOSE-4.7:python3-requests-unixsocket-0:0.1.5-5.el8ar.noarch", "8Base-RHOSE-4.7:python3-rsa-0:4.7-1.el8.noarch", "8Base-RHOSE-4.7:python3-ruamel-yaml-0:0.15.41-4.el8ost.ppc64le", "8Base-RHOSE-4.7:python3-ruamel-yaml-0:0.15.41-4.el8ost.s390x", "8Base-RHOSE-4.7:python3-ruamel-yaml-0:0.15.41-4.el8ost.x86_64", "8Base-RHOSE-4.7:python3-ruamel-yaml-debuginfo-0:0.15.41-4.el8ost.ppc64le", "8Base-RHOSE-4.7:python3-ruamel-yaml-debuginfo-0:0.15.41-4.el8ost.s390x", "8Base-RHOSE-4.7:python3-ruamel-yaml-debuginfo-0:0.15.41-4.el8ost.x86_64", "8Base-RHOSE-4.7:python3-s3transfer-0:0.2.0-1.el8ost.noarch", "8Base-RHOSE-4.7:python3-stevedore-0:3.2.2-0.20201009151242.274eaa6.el8.noarch", "8Base-RHOSE-4.7:python3-string_utils-0:0.6.0-4.el8ost.noarch", "8Base-RHOSE-4.7:python3-sushy-0:3.6.1-0.20210122201213.7ec0422.el8.noarch", "8Base-RHOSE-4.7:python3-sushy-oem-idrac-0:0.0.3-0.20200922221223.1202372.el8ost.noarch", "8Base-RHOSE-4.7:python3-sushy-oem-idrac-tests-0:0.0.3-0.20200922221223.1202372.el8ost.noarch", "8Base-RHOSE-4.7:python3-sushy-tests-0:3.6.1-0.20210122201213.7ec0422.el8.noarch", "8Base-RHOSE-4.7:python3-tenacity-0:6.2.0-1.el8ost.noarch", "8Base-RHOSE-4.7:python3-tooz-0:2.7.0-0.20200723133754.fca43df.el8ost.noarch", "8Base-RHOSE-4.7:python3-websocket-client-0:0.54.0-1.el8ost.noarch", "8Base-RHOSE-4.7:python3-werkzeug-0:1.0.1-3.el8ost.noarch", "8Base-RHOSE-4.7:python3-zeroconf-0:0.24.4-1.el8ost.noarch", "8Base-RHOSE-4.7:python3-zipp-0:0.5.1-2.el8ost.noarch", "8Base-RHOSE-4.7:redhat-release-coreos-0:47.83-1.el8.ppc64le", "8Base-RHOSE-4.7:redhat-release-coreos-0:47.83-1.el8.s390x", "8Base-RHOSE-4.7:redhat-release-coreos-0:47.83-1.el8.src", "8Base-RHOSE-4.7:redhat-release-coreos-0:47.83-1.el8.x86_64", "8Base-RHOSE-4.7:rhcos-tools-0:0.0.0-1.rhaos4.2.el8.noarch", "8Base-RHOSE-4.7:rhcos-tools-0:0.0.0-1.rhaos4.2.el8.src", "8Base-RHOSE-4.7:rhosp-director-images-0:17.0-20200606.1.el8ost.noarch", "8Base-RHOSE-4.7:rhosp-director-images-0:17.0-20200606.1.el8ost.src", "8Base-RHOSE-4.7:rhosp-director-images-all-0:17.0-20200606.1.el8ost.noarch", "8Base-RHOSE-4.7:rhosp-director-images-ipa-0:17.0-20200606.1.el8ost.noarch", "8Base-RHOSE-4.7:rhosp-director-images-ipa-ppc64le-0:17.0-20200606.1.el8ost.noarch", "8Base-RHOSE-4.7:rhosp-director-images-ipa-x86_64-0:17.0-20200606.1.el8ost.noarch", "8Base-RHOSE-4.7:rhosp-director-images-minimal-0:17.0-20200606.1.el8ost.noarch", "8Base-RHOSE-4.7:rhosp-director-images-ppc64le-0:17.0-20200606.1.el8ost.noarch", "8Base-RHOSE-4.7:rhosp-director-images-x86_64-0:17.0-20200606.1.el8ost.noarch", "8Base-RHOSE-4.7:rpm-ostree-0:2020.7-1.el8_3.ppc64le", "8Base-RHOSE-4.7:rpm-ostree-0:2020.7-1.el8_3.s390x", "8Base-RHOSE-4.7:rpm-ostree-0:2020.7-1.el8_3.src", "8Base-RHOSE-4.7:rpm-ostree-0:2020.7-1.el8_3.x86_64", "8Base-RHOSE-4.7:rpm-ostree-debuginfo-0:2020.7-1.el8_3.ppc64le", "8Base-RHOSE-4.7:rpm-ostree-debuginfo-0:2020.7-1.el8_3.s390x", "8Base-RHOSE-4.7:rpm-ostree-debuginfo-0:2020.7-1.el8_3.x86_64", "8Base-RHOSE-4.7:rpm-ostree-debugsource-0:2020.7-1.el8_3.ppc64le", "8Base-RHOSE-4.7:rpm-ostree-debugsource-0:2020.7-1.el8_3.s390x", "8Base-RHOSE-4.7:rpm-ostree-debugsource-0:2020.7-1.el8_3.x86_64", "8Base-RHOSE-4.7:rpm-ostree-devel-0:2020.7-1.el8_3.ppc64le", "8Base-RHOSE-4.7:rpm-ostree-devel-0:2020.7-1.el8_3.s390x", "8Base-RHOSE-4.7:rpm-ostree-devel-0:2020.7-1.el8_3.x86_64", "8Base-RHOSE-4.7:rpm-ostree-libs-0:2020.7-1.el8_3.ppc64le", "8Base-RHOSE-4.7:rpm-ostree-libs-0:2020.7-1.el8_3.s390x", "8Base-RHOSE-4.7:rpm-ostree-libs-0:2020.7-1.el8_3.x86_64", "8Base-RHOSE-4.7:rpm-ostree-libs-debuginfo-0:2020.7-1.el8_3.ppc64le", "8Base-RHOSE-4.7:rpm-ostree-libs-debuginfo-0:2020.7-1.el8_3.s390x", "8Base-RHOSE-4.7:rpm-ostree-libs-debuginfo-0:2020.7-1.el8_3.x86_64", "8Base-RHOSE-4.7:runc-0:1.0.0-82.rhaos4.6.git086e841.el8.ppc64le", "8Base-RHOSE-4.7:runc-0:1.0.0-82.rhaos4.6.git086e841.el8.s390x", "8Base-RHOSE-4.7:runc-0:1.0.0-82.rhaos4.6.git086e841.el8.src", "8Base-RHOSE-4.7:runc-0:1.0.0-82.rhaos4.6.git086e841.el8.x86_64", "8Base-RHOSE-4.7:runc-debuginfo-0:1.0.0-82.rhaos4.6.git086e841.el8.ppc64le", "8Base-RHOSE-4.7:runc-debuginfo-0:1.0.0-82.rhaos4.6.git086e841.el8.s390x", "8Base-RHOSE-4.7:runc-debuginfo-0:1.0.0-82.rhaos4.6.git086e841.el8.x86_64", "8Base-RHOSE-4.7:runc-debugsource-0:1.0.0-82.rhaos4.6.git086e841.el8.ppc64le", "8Base-RHOSE-4.7:runc-debugsource-0:1.0.0-82.rhaos4.6.git086e841.el8.s390x", "8Base-RHOSE-4.7:runc-debugsource-0:1.0.0-82.rhaos4.6.git086e841.el8.x86_64", "8Base-RHOSE-4.7:rust-afterburn-0:4.6.0-1.rhaos4.7.el8.src", "8Base-RHOSE-4.7:rust-afterburn-debugsource-0:4.6.0-1.rhaos4.7.el8.ppc64le", "8Base-RHOSE-4.7:rust-afterburn-debugsource-0:4.6.0-1.rhaos4.7.el8.s390x", "8Base-RHOSE-4.7:rust-afterburn-debugsource-0:4.6.0-1.rhaos4.7.el8.x86_64", "8Base-RHOSE-4.7:rust-bootupd-0:0.2.5-2.el8.src", "8Base-RHOSE-4.7:rust-bootupd-debugsource-0:0.2.5-2.el8.x86_64", "8Base-RHOSE-4.7:tini-0:0.16.1-1.el8ar.ppc64le", "8Base-RHOSE-4.7:tini-0:0.16.1-1.el8ar.s390x", "8Base-RHOSE-4.7:tini-0:0.16.1-1.el8ar.src", "8Base-RHOSE-4.7:tini-0:0.16.1-1.el8ar.x86_64", "8Base-RHOSE-4.7:toolbox-0:0.0.8-3.rhaos4.7.el8.noarch", "8Base-RHOSE-4.7:toolbox-0:0.0.8-3.rhaos4.7.el8.src" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-3121" }, { "category": "external", "summary": "RHBZ#1921650", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1921650" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-3121", "url": "https://www.cve.org/CVERecord?id=CVE-2021-3121" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3121", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3121" } ], "release_date": "2021-01-11T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-02-24T14:45:13+00:00", "details": "For OpenShift Container Platform 4.7 see the following documentation, which\nwill be updated shortly for this release, for important instructions on how\nto upgrade your cluster and fully apply this asynchronous errata update:\n\nhttps://docs.openshift.com/container-platform/4.7/release_notes/ocp-4-7-release-notes.html\n\nDetails on how to access this content are available at\nhttps://docs.openshift.com/container-platform/4.7/updating/updating-cluster-cli.html.", "product_ids": [ "7Server-RH7-RHOSE-4.7:cri-o-0:1.20.0-0.rhaos4.7.git8921e00.el7.51.src", "7Server-RH7-RHOSE-4.7:cri-o-0:1.20.0-0.rhaos4.7.git8921e00.el7.51.x86_64", "7Server-RH7-RHOSE-4.7:cri-o-debuginfo-0:1.20.0-0.rhaos4.7.git8921e00.el7.51.x86_64", "7Server-RH7-RHOSE-4.7:cri-tools-0:1.18.0-3.el7.src", "7Server-RH7-RHOSE-4.7:cri-tools-0:1.18.0-3.el7.x86_64", "7Server-RH7-RHOSE-4.7:cri-tools-debuginfo-0:1.18.0-3.el7.x86_64", "8Base-RHOSE-4.7:cri-o-0:1.20.0-0.rhaos4.7.git8921e00.el8.51.ppc64le", "8Base-RHOSE-4.7:cri-o-0:1.20.0-0.rhaos4.7.git8921e00.el8.51.s390x", "8Base-RHOSE-4.7:cri-o-0:1.20.0-0.rhaos4.7.git8921e00.el8.51.src", "8Base-RHOSE-4.7:cri-o-0:1.20.0-0.rhaos4.7.git8921e00.el8.51.x86_64", "8Base-RHOSE-4.7:cri-o-debuginfo-0:1.20.0-0.rhaos4.7.git8921e00.el8.51.ppc64le", "8Base-RHOSE-4.7:cri-o-debuginfo-0:1.20.0-0.rhaos4.7.git8921e00.el8.51.s390x", "8Base-RHOSE-4.7:cri-o-debuginfo-0:1.20.0-0.rhaos4.7.git8921e00.el8.51.x86_64", "8Base-RHOSE-4.7:cri-o-debugsource-0:1.20.0-0.rhaos4.7.git8921e00.el8.51.ppc64le", "8Base-RHOSE-4.7:cri-o-debugsource-0:1.20.0-0.rhaos4.7.git8921e00.el8.51.s390x", "8Base-RHOSE-4.7:cri-o-debugsource-0:1.20.0-0.rhaos4.7.git8921e00.el8.51.x86_64", "8Base-RHOSE-4.7:cri-tools-0:1.20.0-1.el8.ppc64le", "8Base-RHOSE-4.7:cri-tools-0:1.20.0-1.el8.s390x", "8Base-RHOSE-4.7:cri-tools-0:1.20.0-1.el8.src", "8Base-RHOSE-4.7:cri-tools-0:1.20.0-1.el8.x86_64", "8Base-RHOSE-4.7:cri-tools-debuginfo-0:1.20.0-1.el8.ppc64le", "8Base-RHOSE-4.7:cri-tools-debuginfo-0:1.20.0-1.el8.s390x", "8Base-RHOSE-4.7:cri-tools-debuginfo-0:1.20.0-1.el8.x86_64", "8Base-RHOSE-4.7:cri-tools-debugsource-0:1.20.0-1.el8.ppc64le", "8Base-RHOSE-4.7:cri-tools-debugsource-0:1.20.0-1.el8.s390x", "8Base-RHOSE-4.7:cri-tools-debugsource-0:1.20.0-1.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:5634" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.6, "baseSeverity": "HIGH", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H", "version": "3.1" }, "products": [ "7Server-RH7-RHOSE-4.7:cri-o-0:1.20.0-0.rhaos4.7.git8921e00.el7.51.src", "7Server-RH7-RHOSE-4.7:cri-o-0:1.20.0-0.rhaos4.7.git8921e00.el7.51.x86_64", "7Server-RH7-RHOSE-4.7:cri-o-debuginfo-0:1.20.0-0.rhaos4.7.git8921e00.el7.51.x86_64", "7Server-RH7-RHOSE-4.7:cri-tools-0:1.18.0-3.el7.src", "7Server-RH7-RHOSE-4.7:cri-tools-0:1.18.0-3.el7.x86_64", "7Server-RH7-RHOSE-4.7:cri-tools-debuginfo-0:1.18.0-3.el7.x86_64", "8Base-RHOSE-4.7:cri-o-0:1.20.0-0.rhaos4.7.git8921e00.el8.51.ppc64le", "8Base-RHOSE-4.7:cri-o-0:1.20.0-0.rhaos4.7.git8921e00.el8.51.s390x", "8Base-RHOSE-4.7:cri-o-0:1.20.0-0.rhaos4.7.git8921e00.el8.51.src", "8Base-RHOSE-4.7:cri-o-0:1.20.0-0.rhaos4.7.git8921e00.el8.51.x86_64", "8Base-RHOSE-4.7:cri-o-debuginfo-0:1.20.0-0.rhaos4.7.git8921e00.el8.51.ppc64le", "8Base-RHOSE-4.7:cri-o-debuginfo-0:1.20.0-0.rhaos4.7.git8921e00.el8.51.s390x", "8Base-RHOSE-4.7:cri-o-debuginfo-0:1.20.0-0.rhaos4.7.git8921e00.el8.51.x86_64", "8Base-RHOSE-4.7:cri-o-debugsource-0:1.20.0-0.rhaos4.7.git8921e00.el8.51.ppc64le", "8Base-RHOSE-4.7:cri-o-debugsource-0:1.20.0-0.rhaos4.7.git8921e00.el8.51.s390x", "8Base-RHOSE-4.7:cri-o-debugsource-0:1.20.0-0.rhaos4.7.git8921e00.el8.51.x86_64", "8Base-RHOSE-4.7:cri-tools-0:1.20.0-1.el8.ppc64le", "8Base-RHOSE-4.7:cri-tools-0:1.20.0-1.el8.s390x", "8Base-RHOSE-4.7:cri-tools-0:1.20.0-1.el8.src", "8Base-RHOSE-4.7:cri-tools-0:1.20.0-1.el8.x86_64", "8Base-RHOSE-4.7:cri-tools-debuginfo-0:1.20.0-1.el8.ppc64le", "8Base-RHOSE-4.7:cri-tools-debuginfo-0:1.20.0-1.el8.s390x", "8Base-RHOSE-4.7:cri-tools-debuginfo-0:1.20.0-1.el8.x86_64", "8Base-RHOSE-4.7:cri-tools-debugsource-0:1.20.0-1.el8.ppc64le", "8Base-RHOSE-4.7:cri-tools-debugsource-0:1.20.0-1.el8.s390x", "8Base-RHOSE-4.7:cri-tools-debugsource-0:1.20.0-1.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "gogo/protobuf: plugin/unmarshal/unmarshal.go lacks certain index validation" } ] }
rhsa-2021_0637
Vulnerability from csaf_redhat
Published
2021-03-03 12:28
Modified
2024-11-22 16:25
Summary
Red Hat Security Advisory: OpenShift Container Platform 3.11.394 bug fix and security update
Notes
Topic
Red Hat OpenShift Container Platform release 3.11.394 is now available with
updates to packages and images that fix several bugs and add enhancements.
Red Hat Product Security has rated this update as having a security impact
of Important. A Common Vulnerability Scoring System (CVSS) base score,
which gives a detailed severity rating, is available for each vulnerability
from the CVE link(s) in the References section.
Details
Red Hat OpenShift Container Platform is Red Hat's cloud computing
Kubernetes application platform solution designed for on-premise or private
cloud deployments.
Security Fix(es):
* jenkins-2-plugins/subversion: XML parser is not preventing XML external entity (XXE) attacks (CVE-2020-2304)
* jenkins-2-plugins/mercurial: XML parser is not preventing XML external entity (XXE) attacks (CVE-2020-2305)
* ant: Insecure temporary file vulnerability (CVE-2020-1945)
* jenkins-2-plugins/mercurial: Missing permission check in an HTTP endpoint could result in information disclosure (CVE-2020-2306)
* jenkins-2-plugins/kubernetes: Jenkins controller environment variables are accessible in Kubernetes plug-in (CVE-2020-2307)
* jenkins-2-plugins/kubernetes: Missing permission check in Kubernetes Plugin allows listing pod templates (CVE-2020-2308)
* jenkins-2-plugins/kubernetes: Missing permission check in Kubernetes plug-in allows enumerating credentials IDs (CVE-2020-2309)
* ant: Insecure temporary file (CVE-2020-11979)
* python-rsa: Bleichenbacher timing oracle attack against RSA decryption (CVE-2020-25658)
For more details about the security issue(s), including the impact, a CVSS
score, acknowledgments, and other related information, refer to the CVE
page(s) listed in the References section.
This advisory contains the RPM packages for Red Hat OpenShift Container
Platform 3.11.394. See the following advisory for the container images for this release:
https://access.redhat.com/errata/RHBA-2021:0638
Space precludes documenting all of the container images in this advisory. See the following Release Notes documentation, which will be updated shortly for this release, for details about these changes:
https://docs.openshift.com/container-platform/3.11/release_notes/ocp_3_11_release_notes.html
This update fixes the following bugs among others:
* Previously, the restart-cluster playbook did not evaluate the defined cluster size for ops clusters. This was causing come clusters to never complete their restart. This bug fix passes the logging ops cluster size, allowing restarts of ops clusters to complete successfully. (BZ#1879407)
* Previously, the `openshift_named_certificates` role checked the contents of the `ca-bundle.crt` file during cluster installation. This caused the check to fail during initial installation because the `ca-bundle.crt` file is not yet created in that scenario. This bug fix allows the cluster to skip checking the `ca-bundle.crt` file if it does not exist, resulting in initial installations succeeding. (BZ#1920567)
* Previously, if the `openshift_release` attribute was not set in the Ansible inventory file, the nodes of the cluster would fail during an upgrade. This was caused by the `cluster_facts.yml` file being gathered before the `openshift_release` attribute was defined by the upgrade playbook. Now the `cluster_facts.yml` file is gathered after the `openshift_version` role runs and the `openshift_release` attribute is set, allowing for successful node upgrades. (BZ#1921353)
All OpenShift Container Platform 3.11 users are advised to upgrade to these updated packages and images.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Red Hat OpenShift Container Platform release 3.11.394 is now available with\nupdates to packages and images that fix several bugs and add enhancements.\n\nRed Hat Product Security has rated this update as having a security impact\nof Important. A Common Vulnerability Scoring System (CVSS) base score,\nwhich gives a detailed severity rating, is available for each vulnerability\nfrom the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "Red Hat OpenShift Container Platform is Red Hat\u0027s cloud computing\nKubernetes application platform solution designed for on-premise or private\ncloud deployments.\n\nSecurity Fix(es):\n\n* jenkins-2-plugins/subversion: XML parser is not preventing XML external entity (XXE) attacks (CVE-2020-2304)\n\n* jenkins-2-plugins/mercurial: XML parser is not preventing XML external entity (XXE) attacks (CVE-2020-2305)\n\n* ant: Insecure temporary file vulnerability (CVE-2020-1945)\n\n* jenkins-2-plugins/mercurial: Missing permission check in an HTTP endpoint could result in information disclosure (CVE-2020-2306)\n\n* jenkins-2-plugins/kubernetes: Jenkins controller environment variables are accessible in Kubernetes plug-in (CVE-2020-2307)\n\n* jenkins-2-plugins/kubernetes: Missing permission check in Kubernetes Plugin allows listing pod templates (CVE-2020-2308)\n\n* jenkins-2-plugins/kubernetes: Missing permission check in Kubernetes plug-in allows enumerating credentials IDs (CVE-2020-2309)\n\n* ant: Insecure temporary file (CVE-2020-11979)\n\n* python-rsa: Bleichenbacher timing oracle attack against RSA decryption (CVE-2020-25658)\n\nFor more details about the security issue(s), including the impact, a CVSS\nscore, acknowledgments, and other related information, refer to the CVE\npage(s) listed in the References section.\n\nThis advisory contains the RPM packages for Red Hat OpenShift Container\nPlatform 3.11.394. See the following advisory for the container images for this release:\n\nhttps://access.redhat.com/errata/RHBA-2021:0638\n\nSpace precludes documenting all of the container images in this advisory. See the following Release Notes documentation, which will be updated shortly for this release, for details about these changes:\n\nhttps://docs.openshift.com/container-platform/3.11/release_notes/ocp_3_11_release_notes.html\n\nThis update fixes the following bugs among others:\n\n* Previously, the restart-cluster playbook did not evaluate the defined cluster size for ops clusters. This was causing come clusters to never complete their restart. This bug fix passes the logging ops cluster size, allowing restarts of ops clusters to complete successfully. (BZ#1879407)\n\n* Previously, the `openshift_named_certificates` role checked the contents of the `ca-bundle.crt` file during cluster installation. This caused the check to fail during initial installation because the `ca-bundle.crt` file is not yet created in that scenario. This bug fix allows the cluster to skip checking the `ca-bundle.crt` file if it does not exist, resulting in initial installations succeeding. (BZ#1920567)\n\n* Previously, if the `openshift_release` attribute was not set in the Ansible inventory file, the nodes of the cluster would fail during an upgrade. This was caused by the `cluster_facts.yml` file being gathered before the `openshift_release` attribute was defined by the upgrade playbook. Now the `cluster_facts.yml` file is gathered after the `openshift_version` role runs and the `openshift_release` attribute is set, allowing for successful node upgrades. (BZ#1921353)\n\nAll OpenShift Container Platform 3.11 users are advised to upgrade to these updated packages and images.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2021:0637", "url": "https://access.redhat.com/errata/RHSA-2021:0637" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "1837444", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1837444" }, { "category": "external", "summary": "1849003", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1849003" }, { "category": "external", "summary": "1873346", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1873346" }, { "category": "external", "summary": "1879407", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1879407" }, { "category": "external", "summary": "1889972", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1889972" }, { "category": "external", "summary": "1895939", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1895939" }, { "category": "external", "summary": "1895940", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1895940" }, { "category": "external", "summary": "1895941", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1895941" }, { "category": "external", "summary": "1895945", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1895945" }, { "category": "external", "summary": "1895946", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1895946" }, { "category": "external", "summary": "1895947", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1895947" }, { "category": "external", "summary": "1903699", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1903699" }, { "category": "external", "summary": "1903702", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1903702" }, { "category": "external", "summary": "1918392", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1918392" }, { "category": "external", "summary": "1920567", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1920567" }, { "category": "external", "summary": "1921353", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1921353" }, { "category": "external", "summary": "1924614", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1924614" }, { "category": "external", "summary": "1924811", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1924811" }, { "category": "external", "summary": "1929170", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1929170" }, { "category": "external", "summary": "1929216", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1929216" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2021/rhsa-2021_0637.json" } ], "title": "Red Hat Security Advisory: OpenShift Container Platform 3.11.394 bug fix and security update", "tracking": { "current_release_date": "2024-11-22T16:25:59+00:00", "generator": { "date": "2024-11-22T16:25:59+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2021:0637", "initial_release_date": "2021-03-03T12:28:39+00:00", "revision_history": [ { "date": "2021-03-03T12:28:39+00:00", "number": "1", "summary": "Initial version" }, { "date": "2021-03-03T12:28:39+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-22T16:25:59+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat OpenShift Container Platform 3.11", "product": { "name": "Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11", "product_identification_helper": { "cpe": "cpe:/a:redhat:openshift:3.11::el7" } } } ], "category": "product_family", "name": "Red Hat OpenShift Enterprise" }, { "branches": [ { "category": "product_version", "name": "atomic-enterprise-service-catalog-1:3.11.394-1.git.1675.fdb6e0b.el7.src", "product": { "name": "atomic-enterprise-service-catalog-1:3.11.394-1.git.1675.fdb6e0b.el7.src", "product_id": "atomic-enterprise-service-catalog-1:3.11.394-1.git.1675.fdb6e0b.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/atomic-enterprise-service-catalog@3.11.394-1.git.1675.fdb6e0b.el7?arch=src\u0026epoch=1" } } }, { "category": "product_version", "name": "atomic-openshift-node-problem-detector-0:3.11.394-1.git.263.49acf3a.el7.src", "product": { "name": "atomic-openshift-node-problem-detector-0:3.11.394-1.git.263.49acf3a.el7.src", "product_id": "atomic-openshift-node-problem-detector-0:3.11.394-1.git.263.49acf3a.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/atomic-openshift-node-problem-detector@3.11.394-1.git.263.49acf3a.el7?arch=src" } } }, { "category": "product_version", "name": "golang-github-prometheus-node_exporter-0:3.11.394-1.git.1062.8adc4b8.el7.src", "product": { "name": "golang-github-prometheus-node_exporter-0:3.11.394-1.git.1062.8adc4b8.el7.src", "product_id": "golang-github-prometheus-node_exporter-0:3.11.394-1.git.1062.8adc4b8.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/golang-github-prometheus-node_exporter@3.11.394-1.git.1062.8adc4b8.el7?arch=src" } } }, { "category": "product_version", "name": "atomic-openshift-dockerregistry-0:3.11.394-1.git.481.6e48246.el7.src", "product": { "name": "atomic-openshift-dockerregistry-0:3.11.394-1.git.481.6e48246.el7.src", "product_id": "atomic-openshift-dockerregistry-0:3.11.394-1.git.481.6e48246.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/atomic-openshift-dockerregistry@3.11.394-1.git.481.6e48246.el7?arch=src" } } }, { "category": "product_version", "name": "atomic-openshift-cluster-autoscaler-0:3.11.394-1.git.0.1900c76.el7.src", "product": { "name": "atomic-openshift-cluster-autoscaler-0:3.11.394-1.git.0.1900c76.el7.src", "product_id": "atomic-openshift-cluster-autoscaler-0:3.11.394-1.git.0.1900c76.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/atomic-openshift-cluster-autoscaler@3.11.394-1.git.0.1900c76.el7?arch=src" } } }, { "category": "product_version", "name": "golang-github-openshift-oauth-proxy-0:3.11.394-1.git.439.4c37707.el7.src", "product": { "name": "golang-github-openshift-oauth-proxy-0:3.11.394-1.git.439.4c37707.el7.src", "product_id": "golang-github-openshift-oauth-proxy-0:3.11.394-1.git.439.4c37707.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/golang-github-openshift-oauth-proxy@3.11.394-1.git.439.4c37707.el7?arch=src" } } }, { "category": "product_version", "name": "openshift-enterprise-cluster-capacity-0:3.11.394-1.git.379.92adfdc.el7.src", "product": { "name": "openshift-enterprise-cluster-capacity-0:3.11.394-1.git.379.92adfdc.el7.src", "product_id": "openshift-enterprise-cluster-capacity-0:3.11.394-1.git.379.92adfdc.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-enterprise-cluster-capacity@3.11.394-1.git.379.92adfdc.el7?arch=src" } } }, { "category": "product_version", "name": "atomic-openshift-metrics-server-0:3.11.394-1.git.53.3d82586.el7.src", "product": { "name": "atomic-openshift-metrics-server-0:3.11.394-1.git.53.3d82586.el7.src", "product_id": "atomic-openshift-metrics-server-0:3.11.394-1.git.53.3d82586.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/atomic-openshift-metrics-server@3.11.394-1.git.53.3d82586.el7?arch=src" } } }, { "category": "product_version", "name": "golang-github-prometheus-alertmanager-0:3.11.394-1.git.0.1fbb64c.el7.src", "product": { "name": "golang-github-prometheus-alertmanager-0:3.11.394-1.git.0.1fbb64c.el7.src", "product_id": "golang-github-prometheus-alertmanager-0:3.11.394-1.git.0.1fbb64c.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/golang-github-prometheus-alertmanager@3.11.394-1.git.0.1fbb64c.el7?arch=src" } } }, { "category": "product_version", "name": "openshift-enterprise-autoheal-0:3.11.394-1.git.218.59eb597.el7.src", "product": { "name": "openshift-enterprise-autoheal-0:3.11.394-1.git.218.59eb597.el7.src", "product_id": "openshift-enterprise-autoheal-0:3.11.394-1.git.218.59eb597.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-enterprise-autoheal@3.11.394-1.git.218.59eb597.el7?arch=src" } } }, { "category": "product_version", "name": "atomic-openshift-descheduler-0:3.11.394-1.git.299.ad3a3c0.el7.src", "product": { "name": "atomic-openshift-descheduler-0:3.11.394-1.git.299.ad3a3c0.el7.src", "product_id": "atomic-openshift-descheduler-0:3.11.394-1.git.299.ad3a3c0.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/atomic-openshift-descheduler@3.11.394-1.git.299.ad3a3c0.el7?arch=src" } } }, { "category": "product_version", "name": "atomic-openshift-web-console-0:3.11.394-1.git.667.08dd2a6.el7.src", "product": { "name": "atomic-openshift-web-console-0:3.11.394-1.git.667.08dd2a6.el7.src", "product_id": "atomic-openshift-web-console-0:3.11.394-1.git.667.08dd2a6.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/atomic-openshift-web-console@3.11.394-1.git.667.08dd2a6.el7?arch=src" } } }, { "category": "product_version", "name": "atomic-openshift-service-idler-0:3.11.394-1.git.15.73f73cd.el7.src", "product": { "name": "atomic-openshift-service-idler-0:3.11.394-1.git.15.73f73cd.el7.src", "product_id": "atomic-openshift-service-idler-0:3.11.394-1.git.15.73f73cd.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/atomic-openshift-service-idler@3.11.394-1.git.15.73f73cd.el7?arch=src" } } }, { "category": "product_version", "name": "golang-github-prometheus-prometheus-0:3.11.394-1.git.5026.2c9627f.el7.src", "product": { "name": "golang-github-prometheus-prometheus-0:3.11.394-1.git.5026.2c9627f.el7.src", "product_id": "golang-github-prometheus-prometheus-0:3.11.394-1.git.5026.2c9627f.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/golang-github-prometheus-prometheus@3.11.394-1.git.5026.2c9627f.el7?arch=src" } } }, { "category": "product_version", "name": "openshift-kuryr-0:3.11.394-1.git.1490.16ed375.el7.src", "product": { "name": "openshift-kuryr-0:3.11.394-1.git.1490.16ed375.el7.src", "product_id": "openshift-kuryr-0:3.11.394-1.git.1490.16ed375.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-kuryr@3.11.394-1.git.1490.16ed375.el7?arch=src" } } }, { "category": "product_version", "name": "atomic-openshift-0:3.11.394-1.git.0.e03a88e.el7.src", "product": { "name": "atomic-openshift-0:3.11.394-1.git.0.e03a88e.el7.src", "product_id": "atomic-openshift-0:3.11.394-1.git.0.e03a88e.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/atomic-openshift@3.11.394-1.git.0.e03a88e.el7?arch=src" } } }, { "category": "product_version", "name": "haproxy-0:1.8.28-1.el7.src", "product": { "name": "haproxy-0:1.8.28-1.el7.src", "product_id": "haproxy-0:1.8.28-1.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/haproxy@1.8.28-1.el7?arch=src" } } }, { "category": "product_version", "name": "jenkins-2-plugins-0:3.11.1612862361-1.el7.src", "product": { "name": "jenkins-2-plugins-0:3.11.1612862361-1.el7.src", "product_id": "jenkins-2-plugins-0:3.11.1612862361-1.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jenkins-2-plugins@3.11.1612862361-1.el7?arch=src" } } }, { "category": "product_version", "name": "jenkins-0:2.263.3.1612433584-1.el7.src", "product": { "name": "jenkins-0:2.263.3.1612433584-1.el7.src", "product_id": "jenkins-0:2.263.3.1612433584-1.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jenkins@2.263.3.1612433584-1.el7?arch=src" } } }, { "category": "product_version", "name": "python-rsa-0:4.5-3.el7.src", "product": { "name": "python-rsa-0:4.5-3.el7.src", "product_id": "python-rsa-0:4.5-3.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-rsa@4.5-3.el7?arch=src" } } }, { "category": "product_version", "name": "openshift-ansible-0:3.11.394-6.git.0.47ec25d.el7.src", "product": { "name": "openshift-ansible-0:3.11.394-6.git.0.47ec25d.el7.src", "product_id": "openshift-ansible-0:3.11.394-6.git.0.47ec25d.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-ansible@3.11.394-6.git.0.47ec25d.el7?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "atomic-enterprise-service-catalog-1:3.11.394-1.git.1675.fdb6e0b.el7.x86_64", "product": { "name": "atomic-enterprise-service-catalog-1:3.11.394-1.git.1675.fdb6e0b.el7.x86_64", "product_id": "atomic-enterprise-service-catalog-1:3.11.394-1.git.1675.fdb6e0b.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/atomic-enterprise-service-catalog@3.11.394-1.git.1675.fdb6e0b.el7?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "atomic-enterprise-service-catalog-svcat-1:3.11.394-1.git.1675.fdb6e0b.el7.x86_64", "product": { "name": "atomic-enterprise-service-catalog-svcat-1:3.11.394-1.git.1675.fdb6e0b.el7.x86_64", "product_id": "atomic-enterprise-service-catalog-svcat-1:3.11.394-1.git.1675.fdb6e0b.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/atomic-enterprise-service-catalog-svcat@3.11.394-1.git.1675.fdb6e0b.el7?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "atomic-openshift-node-problem-detector-0:3.11.394-1.git.263.49acf3a.el7.x86_64", "product": { "name": "atomic-openshift-node-problem-detector-0:3.11.394-1.git.263.49acf3a.el7.x86_64", "product_id": "atomic-openshift-node-problem-detector-0:3.11.394-1.git.263.49acf3a.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/atomic-openshift-node-problem-detector@3.11.394-1.git.263.49acf3a.el7?arch=x86_64" } } }, { "category": "product_version", "name": "prometheus-node-exporter-0:3.11.394-1.git.1062.8adc4b8.el7.x86_64", "product": { "name": "prometheus-node-exporter-0:3.11.394-1.git.1062.8adc4b8.el7.x86_64", "product_id": "prometheus-node-exporter-0:3.11.394-1.git.1062.8adc4b8.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/prometheus-node-exporter@3.11.394-1.git.1062.8adc4b8.el7?arch=x86_64" } } }, { "category": "product_version", "name": "atomic-openshift-dockerregistry-0:3.11.394-1.git.481.6e48246.el7.x86_64", "product": { "name": "atomic-openshift-dockerregistry-0:3.11.394-1.git.481.6e48246.el7.x86_64", "product_id": "atomic-openshift-dockerregistry-0:3.11.394-1.git.481.6e48246.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/atomic-openshift-dockerregistry@3.11.394-1.git.481.6e48246.el7?arch=x86_64" } } }, { "category": "product_version", "name": "atomic-openshift-cluster-autoscaler-0:3.11.394-1.git.0.1900c76.el7.x86_64", "product": { "name": "atomic-openshift-cluster-autoscaler-0:3.11.394-1.git.0.1900c76.el7.x86_64", "product_id": "atomic-openshift-cluster-autoscaler-0:3.11.394-1.git.0.1900c76.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/atomic-openshift-cluster-autoscaler@3.11.394-1.git.0.1900c76.el7?arch=x86_64" } } }, { "category": "product_version", "name": "golang-github-openshift-oauth-proxy-0:3.11.394-1.git.439.4c37707.el7.x86_64", "product": { "name": "golang-github-openshift-oauth-proxy-0:3.11.394-1.git.439.4c37707.el7.x86_64", "product_id": "golang-github-openshift-oauth-proxy-0:3.11.394-1.git.439.4c37707.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/golang-github-openshift-oauth-proxy@3.11.394-1.git.439.4c37707.el7?arch=x86_64" } } }, { "category": "product_version", "name": "openshift-enterprise-cluster-capacity-0:3.11.394-1.git.379.92adfdc.el7.x86_64", "product": { "name": "openshift-enterprise-cluster-capacity-0:3.11.394-1.git.379.92adfdc.el7.x86_64", "product_id": "openshift-enterprise-cluster-capacity-0:3.11.394-1.git.379.92adfdc.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-enterprise-cluster-capacity@3.11.394-1.git.379.92adfdc.el7?arch=x86_64" } } }, { "category": "product_version", "name": "atomic-openshift-metrics-server-0:3.11.394-1.git.53.3d82586.el7.x86_64", "product": { "name": "atomic-openshift-metrics-server-0:3.11.394-1.git.53.3d82586.el7.x86_64", "product_id": "atomic-openshift-metrics-server-0:3.11.394-1.git.53.3d82586.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/atomic-openshift-metrics-server@3.11.394-1.git.53.3d82586.el7?arch=x86_64" } } }, { "category": "product_version", "name": "prometheus-alertmanager-0:3.11.394-1.git.0.1fbb64c.el7.x86_64", "product": { "name": "prometheus-alertmanager-0:3.11.394-1.git.0.1fbb64c.el7.x86_64", "product_id": "prometheus-alertmanager-0:3.11.394-1.git.0.1fbb64c.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/prometheus-alertmanager@3.11.394-1.git.0.1fbb64c.el7?arch=x86_64" } } }, { "category": "product_version", "name": "openshift-enterprise-autoheal-0:3.11.394-1.git.218.59eb597.el7.x86_64", "product": { "name": "openshift-enterprise-autoheal-0:3.11.394-1.git.218.59eb597.el7.x86_64", "product_id": "openshift-enterprise-autoheal-0:3.11.394-1.git.218.59eb597.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-enterprise-autoheal@3.11.394-1.git.218.59eb597.el7?arch=x86_64" } } }, { "category": "product_version", "name": "atomic-openshift-descheduler-0:3.11.394-1.git.299.ad3a3c0.el7.x86_64", "product": { "name": "atomic-openshift-descheduler-0:3.11.394-1.git.299.ad3a3c0.el7.x86_64", "product_id": "atomic-openshift-descheduler-0:3.11.394-1.git.299.ad3a3c0.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/atomic-openshift-descheduler@3.11.394-1.git.299.ad3a3c0.el7?arch=x86_64" } } }, { "category": "product_version", "name": "atomic-openshift-web-console-0:3.11.394-1.git.667.08dd2a6.el7.x86_64", "product": { "name": "atomic-openshift-web-console-0:3.11.394-1.git.667.08dd2a6.el7.x86_64", "product_id": "atomic-openshift-web-console-0:3.11.394-1.git.667.08dd2a6.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/atomic-openshift-web-console@3.11.394-1.git.667.08dd2a6.el7?arch=x86_64" } } }, { "category": "product_version", "name": "atomic-openshift-service-idler-0:3.11.394-1.git.15.73f73cd.el7.x86_64", "product": { "name": "atomic-openshift-service-idler-0:3.11.394-1.git.15.73f73cd.el7.x86_64", "product_id": "atomic-openshift-service-idler-0:3.11.394-1.git.15.73f73cd.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/atomic-openshift-service-idler@3.11.394-1.git.15.73f73cd.el7?arch=x86_64" } } }, { "category": "product_version", "name": "prometheus-0:3.11.394-1.git.5026.2c9627f.el7.x86_64", "product": { "name": "prometheus-0:3.11.394-1.git.5026.2c9627f.el7.x86_64", "product_id": "prometheus-0:3.11.394-1.git.5026.2c9627f.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/prometheus@3.11.394-1.git.5026.2c9627f.el7?arch=x86_64" } } }, { "category": "product_version", "name": "atomic-openshift-0:3.11.394-1.git.0.e03a88e.el7.x86_64", "product": { "name": "atomic-openshift-0:3.11.394-1.git.0.e03a88e.el7.x86_64", "product_id": "atomic-openshift-0:3.11.394-1.git.0.e03a88e.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/atomic-openshift@3.11.394-1.git.0.e03a88e.el7?arch=x86_64" } } }, { "category": "product_version", "name": "atomic-openshift-clients-0:3.11.394-1.git.0.e03a88e.el7.x86_64", "product": { "name": "atomic-openshift-clients-0:3.11.394-1.git.0.e03a88e.el7.x86_64", "product_id": "atomic-openshift-clients-0:3.11.394-1.git.0.e03a88e.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/atomic-openshift-clients@3.11.394-1.git.0.e03a88e.el7?arch=x86_64" } } }, { "category": "product_version", "name": "atomic-openshift-clients-redistributable-0:3.11.394-1.git.0.e03a88e.el7.x86_64", "product": { "name": "atomic-openshift-clients-redistributable-0:3.11.394-1.git.0.e03a88e.el7.x86_64", "product_id": "atomic-openshift-clients-redistributable-0:3.11.394-1.git.0.e03a88e.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/atomic-openshift-clients-redistributable@3.11.394-1.git.0.e03a88e.el7?arch=x86_64" } } }, { "category": "product_version", "name": "atomic-openshift-hyperkube-0:3.11.394-1.git.0.e03a88e.el7.x86_64", "product": { "name": "atomic-openshift-hyperkube-0:3.11.394-1.git.0.e03a88e.el7.x86_64", "product_id": "atomic-openshift-hyperkube-0:3.11.394-1.git.0.e03a88e.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/atomic-openshift-hyperkube@3.11.394-1.git.0.e03a88e.el7?arch=x86_64" } } }, { "category": "product_version", "name": "atomic-openshift-hypershift-0:3.11.394-1.git.0.e03a88e.el7.x86_64", "product": { "name": "atomic-openshift-hypershift-0:3.11.394-1.git.0.e03a88e.el7.x86_64", "product_id": "atomic-openshift-hypershift-0:3.11.394-1.git.0.e03a88e.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/atomic-openshift-hypershift@3.11.394-1.git.0.e03a88e.el7?arch=x86_64" } } }, { "category": "product_version", "name": "atomic-openshift-master-0:3.11.394-1.git.0.e03a88e.el7.x86_64", "product": { "name": "atomic-openshift-master-0:3.11.394-1.git.0.e03a88e.el7.x86_64", "product_id": "atomic-openshift-master-0:3.11.394-1.git.0.e03a88e.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/atomic-openshift-master@3.11.394-1.git.0.e03a88e.el7?arch=x86_64" } } }, { "category": "product_version", "name": "atomic-openshift-node-0:3.11.394-1.git.0.e03a88e.el7.x86_64", "product": { "name": "atomic-openshift-node-0:3.11.394-1.git.0.e03a88e.el7.x86_64", "product_id": "atomic-openshift-node-0:3.11.394-1.git.0.e03a88e.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/atomic-openshift-node@3.11.394-1.git.0.e03a88e.el7?arch=x86_64" } } }, { "category": "product_version", "name": "atomic-openshift-pod-0:3.11.394-1.git.0.e03a88e.el7.x86_64", "product": { "name": "atomic-openshift-pod-0:3.11.394-1.git.0.e03a88e.el7.x86_64", "product_id": "atomic-openshift-pod-0:3.11.394-1.git.0.e03a88e.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/atomic-openshift-pod@3.11.394-1.git.0.e03a88e.el7?arch=x86_64" } } }, { "category": "product_version", "name": "atomic-openshift-sdn-ovs-0:3.11.394-1.git.0.e03a88e.el7.x86_64", "product": { "name": "atomic-openshift-sdn-ovs-0:3.11.394-1.git.0.e03a88e.el7.x86_64", "product_id": "atomic-openshift-sdn-ovs-0:3.11.394-1.git.0.e03a88e.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/atomic-openshift-sdn-ovs@3.11.394-1.git.0.e03a88e.el7?arch=x86_64" } } }, { "category": "product_version", "name": "atomic-openshift-template-service-broker-0:3.11.394-1.git.0.e03a88e.el7.x86_64", "product": { "name": "atomic-openshift-template-service-broker-0:3.11.394-1.git.0.e03a88e.el7.x86_64", "product_id": "atomic-openshift-template-service-broker-0:3.11.394-1.git.0.e03a88e.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/atomic-openshift-template-service-broker@3.11.394-1.git.0.e03a88e.el7?arch=x86_64" } } }, { "category": "product_version", "name": "atomic-openshift-tests-0:3.11.394-1.git.0.e03a88e.el7.x86_64", "product": { "name": "atomic-openshift-tests-0:3.11.394-1.git.0.e03a88e.el7.x86_64", "product_id": "atomic-openshift-tests-0:3.11.394-1.git.0.e03a88e.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/atomic-openshift-tests@3.11.394-1.git.0.e03a88e.el7?arch=x86_64" } } }, { "category": "product_version", "name": "haproxy18-0:1.8.28-1.el7.x86_64", "product": { "name": "haproxy18-0:1.8.28-1.el7.x86_64", "product_id": "haproxy18-0:1.8.28-1.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/haproxy18@1.8.28-1.el7?arch=x86_64" } } }, { "category": "product_version", "name": "haproxy-debuginfo-0:1.8.28-1.el7.x86_64", "product": { "name": "haproxy-debuginfo-0:1.8.28-1.el7.x86_64", "product_id": "haproxy-debuginfo-0:1.8.28-1.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/haproxy-debuginfo@1.8.28-1.el7?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "atomic-enterprise-service-catalog-1:3.11.394-1.git.1675.fdb6e0b.el7.ppc64le", "product": { "name": "atomic-enterprise-service-catalog-1:3.11.394-1.git.1675.fdb6e0b.el7.ppc64le", "product_id": "atomic-enterprise-service-catalog-1:3.11.394-1.git.1675.fdb6e0b.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/atomic-enterprise-service-catalog@3.11.394-1.git.1675.fdb6e0b.el7?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "atomic-enterprise-service-catalog-svcat-1:3.11.394-1.git.1675.fdb6e0b.el7.ppc64le", "product": { "name": "atomic-enterprise-service-catalog-svcat-1:3.11.394-1.git.1675.fdb6e0b.el7.ppc64le", "product_id": "atomic-enterprise-service-catalog-svcat-1:3.11.394-1.git.1675.fdb6e0b.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/atomic-enterprise-service-catalog-svcat@3.11.394-1.git.1675.fdb6e0b.el7?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "atomic-openshift-node-problem-detector-0:3.11.394-1.git.263.49acf3a.el7.ppc64le", "product": { "name": "atomic-openshift-node-problem-detector-0:3.11.394-1.git.263.49acf3a.el7.ppc64le", "product_id": "atomic-openshift-node-problem-detector-0:3.11.394-1.git.263.49acf3a.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/atomic-openshift-node-problem-detector@3.11.394-1.git.263.49acf3a.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "prometheus-node-exporter-0:3.11.394-1.git.1062.8adc4b8.el7.ppc64le", "product": { "name": "prometheus-node-exporter-0:3.11.394-1.git.1062.8adc4b8.el7.ppc64le", "product_id": "prometheus-node-exporter-0:3.11.394-1.git.1062.8adc4b8.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/prometheus-node-exporter@3.11.394-1.git.1062.8adc4b8.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "atomic-openshift-cluster-autoscaler-0:3.11.394-1.git.0.1900c76.el7.ppc64le", "product": { "name": "atomic-openshift-cluster-autoscaler-0:3.11.394-1.git.0.1900c76.el7.ppc64le", "product_id": "atomic-openshift-cluster-autoscaler-0:3.11.394-1.git.0.1900c76.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/atomic-openshift-cluster-autoscaler@3.11.394-1.git.0.1900c76.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "golang-github-openshift-oauth-proxy-0:3.11.394-1.git.439.4c37707.el7.ppc64le", "product": { "name": "golang-github-openshift-oauth-proxy-0:3.11.394-1.git.439.4c37707.el7.ppc64le", "product_id": "golang-github-openshift-oauth-proxy-0:3.11.394-1.git.439.4c37707.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/golang-github-openshift-oauth-proxy@3.11.394-1.git.439.4c37707.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "openshift-enterprise-cluster-capacity-0:3.11.394-1.git.379.92adfdc.el7.ppc64le", "product": { "name": "openshift-enterprise-cluster-capacity-0:3.11.394-1.git.379.92adfdc.el7.ppc64le", "product_id": "openshift-enterprise-cluster-capacity-0:3.11.394-1.git.379.92adfdc.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-enterprise-cluster-capacity@3.11.394-1.git.379.92adfdc.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "atomic-openshift-metrics-server-0:3.11.394-1.git.53.3d82586.el7.ppc64le", "product": { "name": "atomic-openshift-metrics-server-0:3.11.394-1.git.53.3d82586.el7.ppc64le", "product_id": "atomic-openshift-metrics-server-0:3.11.394-1.git.53.3d82586.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/atomic-openshift-metrics-server@3.11.394-1.git.53.3d82586.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "prometheus-alertmanager-0:3.11.394-1.git.0.1fbb64c.el7.ppc64le", "product": { "name": "prometheus-alertmanager-0:3.11.394-1.git.0.1fbb64c.el7.ppc64le", "product_id": "prometheus-alertmanager-0:3.11.394-1.git.0.1fbb64c.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/prometheus-alertmanager@3.11.394-1.git.0.1fbb64c.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "openshift-enterprise-autoheal-0:3.11.394-1.git.218.59eb597.el7.ppc64le", "product": { "name": "openshift-enterprise-autoheal-0:3.11.394-1.git.218.59eb597.el7.ppc64le", "product_id": "openshift-enterprise-autoheal-0:3.11.394-1.git.218.59eb597.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-enterprise-autoheal@3.11.394-1.git.218.59eb597.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "atomic-openshift-descheduler-0:3.11.394-1.git.299.ad3a3c0.el7.ppc64le", "product": { "name": "atomic-openshift-descheduler-0:3.11.394-1.git.299.ad3a3c0.el7.ppc64le", "product_id": "atomic-openshift-descheduler-0:3.11.394-1.git.299.ad3a3c0.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/atomic-openshift-descheduler@3.11.394-1.git.299.ad3a3c0.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "atomic-openshift-web-console-0:3.11.394-1.git.667.08dd2a6.el7.ppc64le", "product": { "name": "atomic-openshift-web-console-0:3.11.394-1.git.667.08dd2a6.el7.ppc64le", "product_id": "atomic-openshift-web-console-0:3.11.394-1.git.667.08dd2a6.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/atomic-openshift-web-console@3.11.394-1.git.667.08dd2a6.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "atomic-openshift-service-idler-0:3.11.394-1.git.15.73f73cd.el7.ppc64le", "product": { "name": "atomic-openshift-service-idler-0:3.11.394-1.git.15.73f73cd.el7.ppc64le", "product_id": "atomic-openshift-service-idler-0:3.11.394-1.git.15.73f73cd.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/atomic-openshift-service-idler@3.11.394-1.git.15.73f73cd.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "prometheus-0:3.11.394-1.git.5026.2c9627f.el7.ppc64le", "product": { "name": "prometheus-0:3.11.394-1.git.5026.2c9627f.el7.ppc64le", "product_id": "prometheus-0:3.11.394-1.git.5026.2c9627f.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/prometheus@3.11.394-1.git.5026.2c9627f.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "atomic-openshift-0:3.11.394-1.git.0.e03a88e.el7.ppc64le", "product": { "name": "atomic-openshift-0:3.11.394-1.git.0.e03a88e.el7.ppc64le", "product_id": "atomic-openshift-0:3.11.394-1.git.0.e03a88e.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/atomic-openshift@3.11.394-1.git.0.e03a88e.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "atomic-openshift-clients-0:3.11.394-1.git.0.e03a88e.el7.ppc64le", "product": { "name": "atomic-openshift-clients-0:3.11.394-1.git.0.e03a88e.el7.ppc64le", "product_id": "atomic-openshift-clients-0:3.11.394-1.git.0.e03a88e.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/atomic-openshift-clients@3.11.394-1.git.0.e03a88e.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "atomic-openshift-hyperkube-0:3.11.394-1.git.0.e03a88e.el7.ppc64le", "product": { "name": "atomic-openshift-hyperkube-0:3.11.394-1.git.0.e03a88e.el7.ppc64le", "product_id": "atomic-openshift-hyperkube-0:3.11.394-1.git.0.e03a88e.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/atomic-openshift-hyperkube@3.11.394-1.git.0.e03a88e.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "atomic-openshift-hypershift-0:3.11.394-1.git.0.e03a88e.el7.ppc64le", "product": { "name": "atomic-openshift-hypershift-0:3.11.394-1.git.0.e03a88e.el7.ppc64le", "product_id": "atomic-openshift-hypershift-0:3.11.394-1.git.0.e03a88e.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/atomic-openshift-hypershift@3.11.394-1.git.0.e03a88e.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "atomic-openshift-master-0:3.11.394-1.git.0.e03a88e.el7.ppc64le", "product": { "name": "atomic-openshift-master-0:3.11.394-1.git.0.e03a88e.el7.ppc64le", "product_id": "atomic-openshift-master-0:3.11.394-1.git.0.e03a88e.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/atomic-openshift-master@3.11.394-1.git.0.e03a88e.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "atomic-openshift-node-0:3.11.394-1.git.0.e03a88e.el7.ppc64le", "product": { "name": "atomic-openshift-node-0:3.11.394-1.git.0.e03a88e.el7.ppc64le", "product_id": "atomic-openshift-node-0:3.11.394-1.git.0.e03a88e.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/atomic-openshift-node@3.11.394-1.git.0.e03a88e.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "atomic-openshift-pod-0:3.11.394-1.git.0.e03a88e.el7.ppc64le", "product": { "name": "atomic-openshift-pod-0:3.11.394-1.git.0.e03a88e.el7.ppc64le", "product_id": "atomic-openshift-pod-0:3.11.394-1.git.0.e03a88e.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/atomic-openshift-pod@3.11.394-1.git.0.e03a88e.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "atomic-openshift-sdn-ovs-0:3.11.394-1.git.0.e03a88e.el7.ppc64le", "product": { "name": "atomic-openshift-sdn-ovs-0:3.11.394-1.git.0.e03a88e.el7.ppc64le", "product_id": "atomic-openshift-sdn-ovs-0:3.11.394-1.git.0.e03a88e.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/atomic-openshift-sdn-ovs@3.11.394-1.git.0.e03a88e.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "atomic-openshift-template-service-broker-0:3.11.394-1.git.0.e03a88e.el7.ppc64le", "product": { "name": "atomic-openshift-template-service-broker-0:3.11.394-1.git.0.e03a88e.el7.ppc64le", "product_id": "atomic-openshift-template-service-broker-0:3.11.394-1.git.0.e03a88e.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/atomic-openshift-template-service-broker@3.11.394-1.git.0.e03a88e.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "atomic-openshift-tests-0:3.11.394-1.git.0.e03a88e.el7.ppc64le", "product": { "name": "atomic-openshift-tests-0:3.11.394-1.git.0.e03a88e.el7.ppc64le", "product_id": "atomic-openshift-tests-0:3.11.394-1.git.0.e03a88e.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/atomic-openshift-tests@3.11.394-1.git.0.e03a88e.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "haproxy18-0:1.8.28-1.el7.ppc64le", "product": { "name": "haproxy18-0:1.8.28-1.el7.ppc64le", "product_id": "haproxy18-0:1.8.28-1.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/haproxy18@1.8.28-1.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "haproxy-debuginfo-0:1.8.28-1.el7.ppc64le", "product": { "name": "haproxy-debuginfo-0:1.8.28-1.el7.ppc64le", "product_id": "haproxy-debuginfo-0:1.8.28-1.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/haproxy-debuginfo@1.8.28-1.el7?arch=ppc64le" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "openshift-kuryr-cni-0:3.11.394-1.git.1490.16ed375.el7.noarch", "product": { "name": "openshift-kuryr-cni-0:3.11.394-1.git.1490.16ed375.el7.noarch", "product_id": "openshift-kuryr-cni-0:3.11.394-1.git.1490.16ed375.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-kuryr-cni@3.11.394-1.git.1490.16ed375.el7?arch=noarch" } } }, { "category": "product_version", "name": "openshift-kuryr-common-0:3.11.394-1.git.1490.16ed375.el7.noarch", "product": { "name": "openshift-kuryr-common-0:3.11.394-1.git.1490.16ed375.el7.noarch", "product_id": "openshift-kuryr-common-0:3.11.394-1.git.1490.16ed375.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-kuryr-common@3.11.394-1.git.1490.16ed375.el7?arch=noarch" } } }, { "category": "product_version", "name": "openshift-kuryr-controller-0:3.11.394-1.git.1490.16ed375.el7.noarch", "product": { "name": "openshift-kuryr-controller-0:3.11.394-1.git.1490.16ed375.el7.noarch", "product_id": "openshift-kuryr-controller-0:3.11.394-1.git.1490.16ed375.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-kuryr-controller@3.11.394-1.git.1490.16ed375.el7?arch=noarch" } } }, { "category": "product_version", "name": "python2-kuryr-kubernetes-0:3.11.394-1.git.1490.16ed375.el7.noarch", "product": { "name": "python2-kuryr-kubernetes-0:3.11.394-1.git.1490.16ed375.el7.noarch", "product_id": "python2-kuryr-kubernetes-0:3.11.394-1.git.1490.16ed375.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/python2-kuryr-kubernetes@3.11.394-1.git.1490.16ed375.el7?arch=noarch" } } }, { "category": "product_version", "name": "atomic-openshift-docker-excluder-0:3.11.394-1.git.0.e03a88e.el7.noarch", "product": { "name": "atomic-openshift-docker-excluder-0:3.11.394-1.git.0.e03a88e.el7.noarch", "product_id": "atomic-openshift-docker-excluder-0:3.11.394-1.git.0.e03a88e.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/atomic-openshift-docker-excluder@3.11.394-1.git.0.e03a88e.el7?arch=noarch" } } }, { "category": "product_version", "name": "atomic-openshift-excluder-0:3.11.394-1.git.0.e03a88e.el7.noarch", "product": { "name": "atomic-openshift-excluder-0:3.11.394-1.git.0.e03a88e.el7.noarch", "product_id": "atomic-openshift-excluder-0:3.11.394-1.git.0.e03a88e.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/atomic-openshift-excluder@3.11.394-1.git.0.e03a88e.el7?arch=noarch" } } }, { "category": "product_version", "name": "jenkins-2-plugins-0:3.11.1612862361-1.el7.noarch", "product": { "name": "jenkins-2-plugins-0:3.11.1612862361-1.el7.noarch", "product_id": "jenkins-2-plugins-0:3.11.1612862361-1.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jenkins-2-plugins@3.11.1612862361-1.el7?arch=noarch" } } }, { "category": "product_version", "name": "jenkins-0:2.263.3.1612433584-1.el7.noarch", "product": { "name": "jenkins-0:2.263.3.1612433584-1.el7.noarch", "product_id": "jenkins-0:2.263.3.1612433584-1.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jenkins@2.263.3.1612433584-1.el7?arch=noarch" } } }, { "category": "product_version", "name": "python2-rsa-0:4.5-3.el7.noarch", "product": { "name": "python2-rsa-0:4.5-3.el7.noarch", "product_id": "python2-rsa-0:4.5-3.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/python2-rsa@4.5-3.el7?arch=noarch" } } }, { "category": "product_version", "name": "openshift-ansible-0:3.11.394-6.git.0.47ec25d.el7.noarch", "product": { "name": "openshift-ansible-0:3.11.394-6.git.0.47ec25d.el7.noarch", "product_id": "openshift-ansible-0:3.11.394-6.git.0.47ec25d.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-ansible@3.11.394-6.git.0.47ec25d.el7?arch=noarch" } } }, { "category": "product_version", "name": "openshift-ansible-docs-0:3.11.394-6.git.0.47ec25d.el7.noarch", "product": { "name": "openshift-ansible-docs-0:3.11.394-6.git.0.47ec25d.el7.noarch", "product_id": "openshift-ansible-docs-0:3.11.394-6.git.0.47ec25d.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-ansible-docs@3.11.394-6.git.0.47ec25d.el7?arch=noarch" } } }, { "category": "product_version", "name": "openshift-ansible-playbooks-0:3.11.394-6.git.0.47ec25d.el7.noarch", "product": { "name": "openshift-ansible-playbooks-0:3.11.394-6.git.0.47ec25d.el7.noarch", "product_id": "openshift-ansible-playbooks-0:3.11.394-6.git.0.47ec25d.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-ansible-playbooks@3.11.394-6.git.0.47ec25d.el7?arch=noarch" } } }, { "category": "product_version", "name": "openshift-ansible-roles-0:3.11.394-6.git.0.47ec25d.el7.noarch", "product": { "name": "openshift-ansible-roles-0:3.11.394-6.git.0.47ec25d.el7.noarch", "product_id": "openshift-ansible-roles-0:3.11.394-6.git.0.47ec25d.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-ansible-roles@3.11.394-6.git.0.47ec25d.el7?arch=noarch" } } }, { "category": "product_version", "name": "openshift-ansible-test-0:3.11.394-6.git.0.47ec25d.el7.noarch", "product": { "name": "openshift-ansible-test-0:3.11.394-6.git.0.47ec25d.el7.noarch", "product_id": "openshift-ansible-test-0:3.11.394-6.git.0.47ec25d.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-ansible-test@3.11.394-6.git.0.47ec25d.el7?arch=noarch" } } } ], "category": "architecture", "name": "noarch" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "atomic-enterprise-service-catalog-1:3.11.394-1.git.1675.fdb6e0b.el7.ppc64le as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:atomic-enterprise-service-catalog-1:3.11.394-1.git.1675.fdb6e0b.el7.ppc64le" }, "product_reference": "atomic-enterprise-service-catalog-1:3.11.394-1.git.1675.fdb6e0b.el7.ppc64le", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-enterprise-service-catalog-1:3.11.394-1.git.1675.fdb6e0b.el7.src as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:atomic-enterprise-service-catalog-1:3.11.394-1.git.1675.fdb6e0b.el7.src" }, "product_reference": "atomic-enterprise-service-catalog-1:3.11.394-1.git.1675.fdb6e0b.el7.src", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-enterprise-service-catalog-1:3.11.394-1.git.1675.fdb6e0b.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:atomic-enterprise-service-catalog-1:3.11.394-1.git.1675.fdb6e0b.el7.x86_64" }, "product_reference": "atomic-enterprise-service-catalog-1:3.11.394-1.git.1675.fdb6e0b.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-enterprise-service-catalog-svcat-1:3.11.394-1.git.1675.fdb6e0b.el7.ppc64le as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:atomic-enterprise-service-catalog-svcat-1:3.11.394-1.git.1675.fdb6e0b.el7.ppc64le" }, "product_reference": "atomic-enterprise-service-catalog-svcat-1:3.11.394-1.git.1675.fdb6e0b.el7.ppc64le", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-enterprise-service-catalog-svcat-1:3.11.394-1.git.1675.fdb6e0b.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:atomic-enterprise-service-catalog-svcat-1:3.11.394-1.git.1675.fdb6e0b.el7.x86_64" }, "product_reference": "atomic-enterprise-service-catalog-svcat-1:3.11.394-1.git.1675.fdb6e0b.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-0:3.11.394-1.git.0.e03a88e.el7.ppc64le as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:atomic-openshift-0:3.11.394-1.git.0.e03a88e.el7.ppc64le" }, "product_reference": "atomic-openshift-0:3.11.394-1.git.0.e03a88e.el7.ppc64le", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-0:3.11.394-1.git.0.e03a88e.el7.src as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:atomic-openshift-0:3.11.394-1.git.0.e03a88e.el7.src" }, "product_reference": "atomic-openshift-0:3.11.394-1.git.0.e03a88e.el7.src", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-0:3.11.394-1.git.0.e03a88e.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:atomic-openshift-0:3.11.394-1.git.0.e03a88e.el7.x86_64" }, "product_reference": "atomic-openshift-0:3.11.394-1.git.0.e03a88e.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-clients-0:3.11.394-1.git.0.e03a88e.el7.ppc64le as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:atomic-openshift-clients-0:3.11.394-1.git.0.e03a88e.el7.ppc64le" }, "product_reference": "atomic-openshift-clients-0:3.11.394-1.git.0.e03a88e.el7.ppc64le", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-clients-0:3.11.394-1.git.0.e03a88e.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:atomic-openshift-clients-0:3.11.394-1.git.0.e03a88e.el7.x86_64" }, "product_reference": "atomic-openshift-clients-0:3.11.394-1.git.0.e03a88e.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-clients-redistributable-0:3.11.394-1.git.0.e03a88e.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:atomic-openshift-clients-redistributable-0:3.11.394-1.git.0.e03a88e.el7.x86_64" }, "product_reference": "atomic-openshift-clients-redistributable-0:3.11.394-1.git.0.e03a88e.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-cluster-autoscaler-0:3.11.394-1.git.0.1900c76.el7.ppc64le as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:atomic-openshift-cluster-autoscaler-0:3.11.394-1.git.0.1900c76.el7.ppc64le" }, "product_reference": "atomic-openshift-cluster-autoscaler-0:3.11.394-1.git.0.1900c76.el7.ppc64le", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-cluster-autoscaler-0:3.11.394-1.git.0.1900c76.el7.src as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:atomic-openshift-cluster-autoscaler-0:3.11.394-1.git.0.1900c76.el7.src" }, "product_reference": "atomic-openshift-cluster-autoscaler-0:3.11.394-1.git.0.1900c76.el7.src", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-cluster-autoscaler-0:3.11.394-1.git.0.1900c76.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:atomic-openshift-cluster-autoscaler-0:3.11.394-1.git.0.1900c76.el7.x86_64" }, "product_reference": "atomic-openshift-cluster-autoscaler-0:3.11.394-1.git.0.1900c76.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-descheduler-0:3.11.394-1.git.299.ad3a3c0.el7.ppc64le as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:atomic-openshift-descheduler-0:3.11.394-1.git.299.ad3a3c0.el7.ppc64le" }, "product_reference": "atomic-openshift-descheduler-0:3.11.394-1.git.299.ad3a3c0.el7.ppc64le", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-descheduler-0:3.11.394-1.git.299.ad3a3c0.el7.src as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:atomic-openshift-descheduler-0:3.11.394-1.git.299.ad3a3c0.el7.src" }, "product_reference": "atomic-openshift-descheduler-0:3.11.394-1.git.299.ad3a3c0.el7.src", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-descheduler-0:3.11.394-1.git.299.ad3a3c0.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:atomic-openshift-descheduler-0:3.11.394-1.git.299.ad3a3c0.el7.x86_64" }, "product_reference": "atomic-openshift-descheduler-0:3.11.394-1.git.299.ad3a3c0.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-docker-excluder-0:3.11.394-1.git.0.e03a88e.el7.noarch as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:atomic-openshift-docker-excluder-0:3.11.394-1.git.0.e03a88e.el7.noarch" }, "product_reference": "atomic-openshift-docker-excluder-0:3.11.394-1.git.0.e03a88e.el7.noarch", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-dockerregistry-0:3.11.394-1.git.481.6e48246.el7.src as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:atomic-openshift-dockerregistry-0:3.11.394-1.git.481.6e48246.el7.src" }, "product_reference": "atomic-openshift-dockerregistry-0:3.11.394-1.git.481.6e48246.el7.src", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-dockerregistry-0:3.11.394-1.git.481.6e48246.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:atomic-openshift-dockerregistry-0:3.11.394-1.git.481.6e48246.el7.x86_64" }, "product_reference": "atomic-openshift-dockerregistry-0:3.11.394-1.git.481.6e48246.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-excluder-0:3.11.394-1.git.0.e03a88e.el7.noarch as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:atomic-openshift-excluder-0:3.11.394-1.git.0.e03a88e.el7.noarch" }, "product_reference": "atomic-openshift-excluder-0:3.11.394-1.git.0.e03a88e.el7.noarch", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-hyperkube-0:3.11.394-1.git.0.e03a88e.el7.ppc64le as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:atomic-openshift-hyperkube-0:3.11.394-1.git.0.e03a88e.el7.ppc64le" }, "product_reference": "atomic-openshift-hyperkube-0:3.11.394-1.git.0.e03a88e.el7.ppc64le", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-hyperkube-0:3.11.394-1.git.0.e03a88e.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:atomic-openshift-hyperkube-0:3.11.394-1.git.0.e03a88e.el7.x86_64" }, "product_reference": "atomic-openshift-hyperkube-0:3.11.394-1.git.0.e03a88e.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-hypershift-0:3.11.394-1.git.0.e03a88e.el7.ppc64le as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:atomic-openshift-hypershift-0:3.11.394-1.git.0.e03a88e.el7.ppc64le" }, "product_reference": "atomic-openshift-hypershift-0:3.11.394-1.git.0.e03a88e.el7.ppc64le", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-hypershift-0:3.11.394-1.git.0.e03a88e.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:atomic-openshift-hypershift-0:3.11.394-1.git.0.e03a88e.el7.x86_64" }, "product_reference": "atomic-openshift-hypershift-0:3.11.394-1.git.0.e03a88e.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-master-0:3.11.394-1.git.0.e03a88e.el7.ppc64le as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:atomic-openshift-master-0:3.11.394-1.git.0.e03a88e.el7.ppc64le" }, "product_reference": "atomic-openshift-master-0:3.11.394-1.git.0.e03a88e.el7.ppc64le", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-master-0:3.11.394-1.git.0.e03a88e.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:atomic-openshift-master-0:3.11.394-1.git.0.e03a88e.el7.x86_64" }, "product_reference": "atomic-openshift-master-0:3.11.394-1.git.0.e03a88e.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-metrics-server-0:3.11.394-1.git.53.3d82586.el7.ppc64le as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:atomic-openshift-metrics-server-0:3.11.394-1.git.53.3d82586.el7.ppc64le" }, "product_reference": "atomic-openshift-metrics-server-0:3.11.394-1.git.53.3d82586.el7.ppc64le", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-metrics-server-0:3.11.394-1.git.53.3d82586.el7.src as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:atomic-openshift-metrics-server-0:3.11.394-1.git.53.3d82586.el7.src" }, "product_reference": "atomic-openshift-metrics-server-0:3.11.394-1.git.53.3d82586.el7.src", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-metrics-server-0:3.11.394-1.git.53.3d82586.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:atomic-openshift-metrics-server-0:3.11.394-1.git.53.3d82586.el7.x86_64" }, "product_reference": "atomic-openshift-metrics-server-0:3.11.394-1.git.53.3d82586.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-node-0:3.11.394-1.git.0.e03a88e.el7.ppc64le as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:atomic-openshift-node-0:3.11.394-1.git.0.e03a88e.el7.ppc64le" }, "product_reference": "atomic-openshift-node-0:3.11.394-1.git.0.e03a88e.el7.ppc64le", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-node-0:3.11.394-1.git.0.e03a88e.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:atomic-openshift-node-0:3.11.394-1.git.0.e03a88e.el7.x86_64" }, "product_reference": "atomic-openshift-node-0:3.11.394-1.git.0.e03a88e.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-node-problem-detector-0:3.11.394-1.git.263.49acf3a.el7.ppc64le as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:atomic-openshift-node-problem-detector-0:3.11.394-1.git.263.49acf3a.el7.ppc64le" }, "product_reference": "atomic-openshift-node-problem-detector-0:3.11.394-1.git.263.49acf3a.el7.ppc64le", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-node-problem-detector-0:3.11.394-1.git.263.49acf3a.el7.src as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:atomic-openshift-node-problem-detector-0:3.11.394-1.git.263.49acf3a.el7.src" }, "product_reference": "atomic-openshift-node-problem-detector-0:3.11.394-1.git.263.49acf3a.el7.src", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-node-problem-detector-0:3.11.394-1.git.263.49acf3a.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:atomic-openshift-node-problem-detector-0:3.11.394-1.git.263.49acf3a.el7.x86_64" }, "product_reference": "atomic-openshift-node-problem-detector-0:3.11.394-1.git.263.49acf3a.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-pod-0:3.11.394-1.git.0.e03a88e.el7.ppc64le as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:atomic-openshift-pod-0:3.11.394-1.git.0.e03a88e.el7.ppc64le" }, "product_reference": "atomic-openshift-pod-0:3.11.394-1.git.0.e03a88e.el7.ppc64le", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-pod-0:3.11.394-1.git.0.e03a88e.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:atomic-openshift-pod-0:3.11.394-1.git.0.e03a88e.el7.x86_64" }, "product_reference": "atomic-openshift-pod-0:3.11.394-1.git.0.e03a88e.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-sdn-ovs-0:3.11.394-1.git.0.e03a88e.el7.ppc64le as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:atomic-openshift-sdn-ovs-0:3.11.394-1.git.0.e03a88e.el7.ppc64le" }, "product_reference": "atomic-openshift-sdn-ovs-0:3.11.394-1.git.0.e03a88e.el7.ppc64le", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-sdn-ovs-0:3.11.394-1.git.0.e03a88e.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:atomic-openshift-sdn-ovs-0:3.11.394-1.git.0.e03a88e.el7.x86_64" }, "product_reference": "atomic-openshift-sdn-ovs-0:3.11.394-1.git.0.e03a88e.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-service-idler-0:3.11.394-1.git.15.73f73cd.el7.ppc64le as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:atomic-openshift-service-idler-0:3.11.394-1.git.15.73f73cd.el7.ppc64le" }, "product_reference": "atomic-openshift-service-idler-0:3.11.394-1.git.15.73f73cd.el7.ppc64le", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-service-idler-0:3.11.394-1.git.15.73f73cd.el7.src as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:atomic-openshift-service-idler-0:3.11.394-1.git.15.73f73cd.el7.src" }, "product_reference": "atomic-openshift-service-idler-0:3.11.394-1.git.15.73f73cd.el7.src", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-service-idler-0:3.11.394-1.git.15.73f73cd.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:atomic-openshift-service-idler-0:3.11.394-1.git.15.73f73cd.el7.x86_64" }, "product_reference": "atomic-openshift-service-idler-0:3.11.394-1.git.15.73f73cd.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-template-service-broker-0:3.11.394-1.git.0.e03a88e.el7.ppc64le as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:atomic-openshift-template-service-broker-0:3.11.394-1.git.0.e03a88e.el7.ppc64le" }, "product_reference": "atomic-openshift-template-service-broker-0:3.11.394-1.git.0.e03a88e.el7.ppc64le", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-template-service-broker-0:3.11.394-1.git.0.e03a88e.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:atomic-openshift-template-service-broker-0:3.11.394-1.git.0.e03a88e.el7.x86_64" }, "product_reference": "atomic-openshift-template-service-broker-0:3.11.394-1.git.0.e03a88e.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-tests-0:3.11.394-1.git.0.e03a88e.el7.ppc64le as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:atomic-openshift-tests-0:3.11.394-1.git.0.e03a88e.el7.ppc64le" }, "product_reference": "atomic-openshift-tests-0:3.11.394-1.git.0.e03a88e.el7.ppc64le", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-tests-0:3.11.394-1.git.0.e03a88e.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:atomic-openshift-tests-0:3.11.394-1.git.0.e03a88e.el7.x86_64" }, "product_reference": "atomic-openshift-tests-0:3.11.394-1.git.0.e03a88e.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-web-console-0:3.11.394-1.git.667.08dd2a6.el7.ppc64le as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:atomic-openshift-web-console-0:3.11.394-1.git.667.08dd2a6.el7.ppc64le" }, "product_reference": "atomic-openshift-web-console-0:3.11.394-1.git.667.08dd2a6.el7.ppc64le", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-web-console-0:3.11.394-1.git.667.08dd2a6.el7.src as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:atomic-openshift-web-console-0:3.11.394-1.git.667.08dd2a6.el7.src" }, "product_reference": "atomic-openshift-web-console-0:3.11.394-1.git.667.08dd2a6.el7.src", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-web-console-0:3.11.394-1.git.667.08dd2a6.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:atomic-openshift-web-console-0:3.11.394-1.git.667.08dd2a6.el7.x86_64" }, "product_reference": "atomic-openshift-web-console-0:3.11.394-1.git.667.08dd2a6.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "golang-github-openshift-oauth-proxy-0:3.11.394-1.git.439.4c37707.el7.ppc64le as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:golang-github-openshift-oauth-proxy-0:3.11.394-1.git.439.4c37707.el7.ppc64le" }, "product_reference": "golang-github-openshift-oauth-proxy-0:3.11.394-1.git.439.4c37707.el7.ppc64le", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "golang-github-openshift-oauth-proxy-0:3.11.394-1.git.439.4c37707.el7.src as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:golang-github-openshift-oauth-proxy-0:3.11.394-1.git.439.4c37707.el7.src" }, "product_reference": "golang-github-openshift-oauth-proxy-0:3.11.394-1.git.439.4c37707.el7.src", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "golang-github-openshift-oauth-proxy-0:3.11.394-1.git.439.4c37707.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:golang-github-openshift-oauth-proxy-0:3.11.394-1.git.439.4c37707.el7.x86_64" }, "product_reference": "golang-github-openshift-oauth-proxy-0:3.11.394-1.git.439.4c37707.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "golang-github-prometheus-alertmanager-0:3.11.394-1.git.0.1fbb64c.el7.src as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:golang-github-prometheus-alertmanager-0:3.11.394-1.git.0.1fbb64c.el7.src" }, "product_reference": "golang-github-prometheus-alertmanager-0:3.11.394-1.git.0.1fbb64c.el7.src", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "golang-github-prometheus-node_exporter-0:3.11.394-1.git.1062.8adc4b8.el7.src as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:golang-github-prometheus-node_exporter-0:3.11.394-1.git.1062.8adc4b8.el7.src" }, "product_reference": "golang-github-prometheus-node_exporter-0:3.11.394-1.git.1062.8adc4b8.el7.src", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "golang-github-prometheus-prometheus-0:3.11.394-1.git.5026.2c9627f.el7.src as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:golang-github-prometheus-prometheus-0:3.11.394-1.git.5026.2c9627f.el7.src" }, "product_reference": "golang-github-prometheus-prometheus-0:3.11.394-1.git.5026.2c9627f.el7.src", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "haproxy-0:1.8.28-1.el7.src as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:haproxy-0:1.8.28-1.el7.src" }, "product_reference": "haproxy-0:1.8.28-1.el7.src", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "haproxy-debuginfo-0:1.8.28-1.el7.ppc64le as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:haproxy-debuginfo-0:1.8.28-1.el7.ppc64le" }, "product_reference": "haproxy-debuginfo-0:1.8.28-1.el7.ppc64le", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "haproxy-debuginfo-0:1.8.28-1.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:haproxy-debuginfo-0:1.8.28-1.el7.x86_64" }, "product_reference": "haproxy-debuginfo-0:1.8.28-1.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "haproxy18-0:1.8.28-1.el7.ppc64le as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:haproxy18-0:1.8.28-1.el7.ppc64le" }, "product_reference": "haproxy18-0:1.8.28-1.el7.ppc64le", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "haproxy18-0:1.8.28-1.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:haproxy18-0:1.8.28-1.el7.x86_64" }, "product_reference": "haproxy18-0:1.8.28-1.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "jenkins-0:2.263.3.1612433584-1.el7.noarch as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:jenkins-0:2.263.3.1612433584-1.el7.noarch" }, "product_reference": "jenkins-0:2.263.3.1612433584-1.el7.noarch", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "jenkins-0:2.263.3.1612433584-1.el7.src as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:jenkins-0:2.263.3.1612433584-1.el7.src" }, "product_reference": "jenkins-0:2.263.3.1612433584-1.el7.src", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "jenkins-2-plugins-0:3.11.1612862361-1.el7.noarch as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:jenkins-2-plugins-0:3.11.1612862361-1.el7.noarch" }, "product_reference": "jenkins-2-plugins-0:3.11.1612862361-1.el7.noarch", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "jenkins-2-plugins-0:3.11.1612862361-1.el7.src as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:jenkins-2-plugins-0:3.11.1612862361-1.el7.src" }, "product_reference": "jenkins-2-plugins-0:3.11.1612862361-1.el7.src", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-ansible-0:3.11.394-6.git.0.47ec25d.el7.noarch as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:openshift-ansible-0:3.11.394-6.git.0.47ec25d.el7.noarch" }, "product_reference": "openshift-ansible-0:3.11.394-6.git.0.47ec25d.el7.noarch", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-ansible-0:3.11.394-6.git.0.47ec25d.el7.src as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:openshift-ansible-0:3.11.394-6.git.0.47ec25d.el7.src" }, "product_reference": "openshift-ansible-0:3.11.394-6.git.0.47ec25d.el7.src", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-ansible-docs-0:3.11.394-6.git.0.47ec25d.el7.noarch as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:openshift-ansible-docs-0:3.11.394-6.git.0.47ec25d.el7.noarch" }, "product_reference": "openshift-ansible-docs-0:3.11.394-6.git.0.47ec25d.el7.noarch", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-ansible-playbooks-0:3.11.394-6.git.0.47ec25d.el7.noarch as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:openshift-ansible-playbooks-0:3.11.394-6.git.0.47ec25d.el7.noarch" }, "product_reference": "openshift-ansible-playbooks-0:3.11.394-6.git.0.47ec25d.el7.noarch", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-ansible-roles-0:3.11.394-6.git.0.47ec25d.el7.noarch as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:openshift-ansible-roles-0:3.11.394-6.git.0.47ec25d.el7.noarch" }, "product_reference": "openshift-ansible-roles-0:3.11.394-6.git.0.47ec25d.el7.noarch", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-ansible-test-0:3.11.394-6.git.0.47ec25d.el7.noarch as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:openshift-ansible-test-0:3.11.394-6.git.0.47ec25d.el7.noarch" }, "product_reference": "openshift-ansible-test-0:3.11.394-6.git.0.47ec25d.el7.noarch", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-enterprise-autoheal-0:3.11.394-1.git.218.59eb597.el7.ppc64le as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:openshift-enterprise-autoheal-0:3.11.394-1.git.218.59eb597.el7.ppc64le" }, "product_reference": "openshift-enterprise-autoheal-0:3.11.394-1.git.218.59eb597.el7.ppc64le", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-enterprise-autoheal-0:3.11.394-1.git.218.59eb597.el7.src as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:openshift-enterprise-autoheal-0:3.11.394-1.git.218.59eb597.el7.src" }, "product_reference": "openshift-enterprise-autoheal-0:3.11.394-1.git.218.59eb597.el7.src", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-enterprise-autoheal-0:3.11.394-1.git.218.59eb597.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:openshift-enterprise-autoheal-0:3.11.394-1.git.218.59eb597.el7.x86_64" }, "product_reference": "openshift-enterprise-autoheal-0:3.11.394-1.git.218.59eb597.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-enterprise-cluster-capacity-0:3.11.394-1.git.379.92adfdc.el7.ppc64le as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:openshift-enterprise-cluster-capacity-0:3.11.394-1.git.379.92adfdc.el7.ppc64le" }, "product_reference": "openshift-enterprise-cluster-capacity-0:3.11.394-1.git.379.92adfdc.el7.ppc64le", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-enterprise-cluster-capacity-0:3.11.394-1.git.379.92adfdc.el7.src as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:openshift-enterprise-cluster-capacity-0:3.11.394-1.git.379.92adfdc.el7.src" }, "product_reference": "openshift-enterprise-cluster-capacity-0:3.11.394-1.git.379.92adfdc.el7.src", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-enterprise-cluster-capacity-0:3.11.394-1.git.379.92adfdc.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:openshift-enterprise-cluster-capacity-0:3.11.394-1.git.379.92adfdc.el7.x86_64" }, "product_reference": "openshift-enterprise-cluster-capacity-0:3.11.394-1.git.379.92adfdc.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-kuryr-0:3.11.394-1.git.1490.16ed375.el7.src as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:openshift-kuryr-0:3.11.394-1.git.1490.16ed375.el7.src" }, "product_reference": "openshift-kuryr-0:3.11.394-1.git.1490.16ed375.el7.src", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-kuryr-cni-0:3.11.394-1.git.1490.16ed375.el7.noarch as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:openshift-kuryr-cni-0:3.11.394-1.git.1490.16ed375.el7.noarch" }, "product_reference": "openshift-kuryr-cni-0:3.11.394-1.git.1490.16ed375.el7.noarch", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-kuryr-common-0:3.11.394-1.git.1490.16ed375.el7.noarch as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:openshift-kuryr-common-0:3.11.394-1.git.1490.16ed375.el7.noarch" }, "product_reference": "openshift-kuryr-common-0:3.11.394-1.git.1490.16ed375.el7.noarch", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-kuryr-controller-0:3.11.394-1.git.1490.16ed375.el7.noarch as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:openshift-kuryr-controller-0:3.11.394-1.git.1490.16ed375.el7.noarch" }, "product_reference": "openshift-kuryr-controller-0:3.11.394-1.git.1490.16ed375.el7.noarch", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "prometheus-0:3.11.394-1.git.5026.2c9627f.el7.ppc64le as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:prometheus-0:3.11.394-1.git.5026.2c9627f.el7.ppc64le" }, "product_reference": "prometheus-0:3.11.394-1.git.5026.2c9627f.el7.ppc64le", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "prometheus-0:3.11.394-1.git.5026.2c9627f.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:prometheus-0:3.11.394-1.git.5026.2c9627f.el7.x86_64" }, "product_reference": "prometheus-0:3.11.394-1.git.5026.2c9627f.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "prometheus-alertmanager-0:3.11.394-1.git.0.1fbb64c.el7.ppc64le as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:prometheus-alertmanager-0:3.11.394-1.git.0.1fbb64c.el7.ppc64le" }, "product_reference": "prometheus-alertmanager-0:3.11.394-1.git.0.1fbb64c.el7.ppc64le", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "prometheus-alertmanager-0:3.11.394-1.git.0.1fbb64c.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:prometheus-alertmanager-0:3.11.394-1.git.0.1fbb64c.el7.x86_64" }, "product_reference": "prometheus-alertmanager-0:3.11.394-1.git.0.1fbb64c.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "prometheus-node-exporter-0:3.11.394-1.git.1062.8adc4b8.el7.ppc64le as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:prometheus-node-exporter-0:3.11.394-1.git.1062.8adc4b8.el7.ppc64le" }, "product_reference": "prometheus-node-exporter-0:3.11.394-1.git.1062.8adc4b8.el7.ppc64le", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "prometheus-node-exporter-0:3.11.394-1.git.1062.8adc4b8.el7.x86_64 as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:prometheus-node-exporter-0:3.11.394-1.git.1062.8adc4b8.el7.x86_64" }, "product_reference": "prometheus-node-exporter-0:3.11.394-1.git.1062.8adc4b8.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "python-rsa-0:4.5-3.el7.src as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:python-rsa-0:4.5-3.el7.src" }, "product_reference": "python-rsa-0:4.5-3.el7.src", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "python2-kuryr-kubernetes-0:3.11.394-1.git.1490.16ed375.el7.noarch as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:python2-kuryr-kubernetes-0:3.11.394-1.git.1490.16ed375.el7.noarch" }, "product_reference": "python2-kuryr-kubernetes-0:3.11.394-1.git.1490.16ed375.el7.noarch", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "python2-rsa-0:4.5-3.el7.noarch as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:python2-rsa-0:4.5-3.el7.noarch" }, "product_reference": "python2-rsa-0:4.5-3.el7.noarch", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" } ] }, "vulnerabilities": [ { "cve": "CVE-2020-1945", "cwe": { "id": "CWE-377", "name": "Insecure Temporary File" }, "discovery_date": "2020-05-13T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "7Server-RH7-RHOSE-3.11:atomic-enterprise-service-catalog-1:3.11.394-1.git.1675.fdb6e0b.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-enterprise-service-catalog-1:3.11.394-1.git.1675.fdb6e0b.el7.src", "7Server-RH7-RHOSE-3.11:atomic-enterprise-service-catalog-1:3.11.394-1.git.1675.fdb6e0b.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-enterprise-service-catalog-svcat-1:3.11.394-1.git.1675.fdb6e0b.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-enterprise-service-catalog-svcat-1:3.11.394-1.git.1675.fdb6e0b.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-0:3.11.394-1.git.0.e03a88e.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-0:3.11.394-1.git.0.e03a88e.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-0:3.11.394-1.git.0.e03a88e.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-clients-0:3.11.394-1.git.0.e03a88e.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-clients-0:3.11.394-1.git.0.e03a88e.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-clients-redistributable-0:3.11.394-1.git.0.e03a88e.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-cluster-autoscaler-0:3.11.394-1.git.0.1900c76.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-cluster-autoscaler-0:3.11.394-1.git.0.1900c76.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-cluster-autoscaler-0:3.11.394-1.git.0.1900c76.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-descheduler-0:3.11.394-1.git.299.ad3a3c0.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-descheduler-0:3.11.394-1.git.299.ad3a3c0.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-descheduler-0:3.11.394-1.git.299.ad3a3c0.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-docker-excluder-0:3.11.394-1.git.0.e03a88e.el7.noarch", "7Server-RH7-RHOSE-3.11:atomic-openshift-dockerregistry-0:3.11.394-1.git.481.6e48246.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-dockerregistry-0:3.11.394-1.git.481.6e48246.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-excluder-0:3.11.394-1.git.0.e03a88e.el7.noarch", "7Server-RH7-RHOSE-3.11:atomic-openshift-hyperkube-0:3.11.394-1.git.0.e03a88e.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-hyperkube-0:3.11.394-1.git.0.e03a88e.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-hypershift-0:3.11.394-1.git.0.e03a88e.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-hypershift-0:3.11.394-1.git.0.e03a88e.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-master-0:3.11.394-1.git.0.e03a88e.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-master-0:3.11.394-1.git.0.e03a88e.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-metrics-server-0:3.11.394-1.git.53.3d82586.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-metrics-server-0:3.11.394-1.git.53.3d82586.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-metrics-server-0:3.11.394-1.git.53.3d82586.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-node-0:3.11.394-1.git.0.e03a88e.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-node-0:3.11.394-1.git.0.e03a88e.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-node-problem-detector-0:3.11.394-1.git.263.49acf3a.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-node-problem-detector-0:3.11.394-1.git.263.49acf3a.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-node-problem-detector-0:3.11.394-1.git.263.49acf3a.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-pod-0:3.11.394-1.git.0.e03a88e.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-pod-0:3.11.394-1.git.0.e03a88e.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-sdn-ovs-0:3.11.394-1.git.0.e03a88e.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-sdn-ovs-0:3.11.394-1.git.0.e03a88e.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-service-idler-0:3.11.394-1.git.15.73f73cd.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-service-idler-0:3.11.394-1.git.15.73f73cd.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-service-idler-0:3.11.394-1.git.15.73f73cd.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-template-service-broker-0:3.11.394-1.git.0.e03a88e.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-template-service-broker-0:3.11.394-1.git.0.e03a88e.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-tests-0:3.11.394-1.git.0.e03a88e.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-tests-0:3.11.394-1.git.0.e03a88e.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-web-console-0:3.11.394-1.git.667.08dd2a6.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-web-console-0:3.11.394-1.git.667.08dd2a6.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-web-console-0:3.11.394-1.git.667.08dd2a6.el7.x86_64", "7Server-RH7-RHOSE-3.11:golang-github-openshift-oauth-proxy-0:3.11.394-1.git.439.4c37707.el7.ppc64le", "7Server-RH7-RHOSE-3.11:golang-github-openshift-oauth-proxy-0:3.11.394-1.git.439.4c37707.el7.src", "7Server-RH7-RHOSE-3.11:golang-github-openshift-oauth-proxy-0:3.11.394-1.git.439.4c37707.el7.x86_64", "7Server-RH7-RHOSE-3.11:golang-github-prometheus-alertmanager-0:3.11.394-1.git.0.1fbb64c.el7.src", "7Server-RH7-RHOSE-3.11:golang-github-prometheus-node_exporter-0:3.11.394-1.git.1062.8adc4b8.el7.src", "7Server-RH7-RHOSE-3.11:golang-github-prometheus-prometheus-0:3.11.394-1.git.5026.2c9627f.el7.src", "7Server-RH7-RHOSE-3.11:haproxy-0:1.8.28-1.el7.src", "7Server-RH7-RHOSE-3.11:haproxy-debuginfo-0:1.8.28-1.el7.ppc64le", "7Server-RH7-RHOSE-3.11:haproxy-debuginfo-0:1.8.28-1.el7.x86_64", "7Server-RH7-RHOSE-3.11:haproxy18-0:1.8.28-1.el7.ppc64le", "7Server-RH7-RHOSE-3.11:haproxy18-0:1.8.28-1.el7.x86_64", "7Server-RH7-RHOSE-3.11:jenkins-2-plugins-0:3.11.1612862361-1.el7.noarch", "7Server-RH7-RHOSE-3.11:jenkins-2-plugins-0:3.11.1612862361-1.el7.src", "7Server-RH7-RHOSE-3.11:openshift-ansible-0:3.11.394-6.git.0.47ec25d.el7.noarch", "7Server-RH7-RHOSE-3.11:openshift-ansible-0:3.11.394-6.git.0.47ec25d.el7.src", "7Server-RH7-RHOSE-3.11:openshift-ansible-docs-0:3.11.394-6.git.0.47ec25d.el7.noarch", "7Server-RH7-RHOSE-3.11:openshift-ansible-playbooks-0:3.11.394-6.git.0.47ec25d.el7.noarch", "7Server-RH7-RHOSE-3.11:openshift-ansible-roles-0:3.11.394-6.git.0.47ec25d.el7.noarch", "7Server-RH7-RHOSE-3.11:openshift-ansible-test-0:3.11.394-6.git.0.47ec25d.el7.noarch", "7Server-RH7-RHOSE-3.11:openshift-enterprise-autoheal-0:3.11.394-1.git.218.59eb597.el7.ppc64le", "7Server-RH7-RHOSE-3.11:openshift-enterprise-autoheal-0:3.11.394-1.git.218.59eb597.el7.src", "7Server-RH7-RHOSE-3.11:openshift-enterprise-autoheal-0:3.11.394-1.git.218.59eb597.el7.x86_64", "7Server-RH7-RHOSE-3.11:openshift-enterprise-cluster-capacity-0:3.11.394-1.git.379.92adfdc.el7.ppc64le", "7Server-RH7-RHOSE-3.11:openshift-enterprise-cluster-capacity-0:3.11.394-1.git.379.92adfdc.el7.src", "7Server-RH7-RHOSE-3.11:openshift-enterprise-cluster-capacity-0:3.11.394-1.git.379.92adfdc.el7.x86_64", "7Server-RH7-RHOSE-3.11:openshift-kuryr-0:3.11.394-1.git.1490.16ed375.el7.src", "7Server-RH7-RHOSE-3.11:openshift-kuryr-cni-0:3.11.394-1.git.1490.16ed375.el7.noarch", "7Server-RH7-RHOSE-3.11:openshift-kuryr-common-0:3.11.394-1.git.1490.16ed375.el7.noarch", "7Server-RH7-RHOSE-3.11:openshift-kuryr-controller-0:3.11.394-1.git.1490.16ed375.el7.noarch", "7Server-RH7-RHOSE-3.11:prometheus-0:3.11.394-1.git.5026.2c9627f.el7.ppc64le", "7Server-RH7-RHOSE-3.11:prometheus-0:3.11.394-1.git.5026.2c9627f.el7.x86_64", "7Server-RH7-RHOSE-3.11:prometheus-alertmanager-0:3.11.394-1.git.0.1fbb64c.el7.ppc64le", "7Server-RH7-RHOSE-3.11:prometheus-alertmanager-0:3.11.394-1.git.0.1fbb64c.el7.x86_64", "7Server-RH7-RHOSE-3.11:prometheus-node-exporter-0:3.11.394-1.git.1062.8adc4b8.el7.ppc64le", "7Server-RH7-RHOSE-3.11:prometheus-node-exporter-0:3.11.394-1.git.1062.8adc4b8.el7.x86_64", "7Server-RH7-RHOSE-3.11:python-rsa-0:4.5-3.el7.src", "7Server-RH7-RHOSE-3.11:python2-kuryr-kubernetes-0:3.11.394-1.git.1490.16ed375.el7.noarch", "7Server-RH7-RHOSE-3.11:python2-rsa-0:4.5-3.el7.noarch" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1837444" } ], "notes": [ { "category": "description", "text": "Apache Ant 1.1 to 1.9.14 and 1.10.0 to 1.10.7 uses the default temporary directory identified by the Java system property java.io.tmpdir for several tasks and may thus leak sensitive information. The fixcrlf and replaceregexp tasks also copy files from the temporary directory back into the build tree allowing an attacker to inject modified source files into the build process.", "title": "Vulnerability description" }, { "category": "summary", "text": "ant: insecure temporary file vulnerability", "title": "Vulnerability summary" }, { "category": "other", "text": "In OpenShift Container Platform (OCP), the Hive/Presto/Hadoop components that comprise the OCP Metering stack, ship the vulnerable version of ant package.\nSince the release of OCP 4.6, the Metering product has been deprecated [1], hence the affected components are marked as wontfix.\nThis may be fixed in the future.\n\n[1] https://docs.openshift.com/container-platform/4.6/release_notes/ocp-4-6-release-notes.html#ocp-4-6-metering-operator-deprecated", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RH7-RHOSE-3.11:jenkins-0:2.263.3.1612433584-1.el7.noarch", "7Server-RH7-RHOSE-3.11:jenkins-0:2.263.3.1612433584-1.el7.src" ], "known_not_affected": [ "7Server-RH7-RHOSE-3.11:atomic-enterprise-service-catalog-1:3.11.394-1.git.1675.fdb6e0b.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-enterprise-service-catalog-1:3.11.394-1.git.1675.fdb6e0b.el7.src", "7Server-RH7-RHOSE-3.11:atomic-enterprise-service-catalog-1:3.11.394-1.git.1675.fdb6e0b.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-enterprise-service-catalog-svcat-1:3.11.394-1.git.1675.fdb6e0b.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-enterprise-service-catalog-svcat-1:3.11.394-1.git.1675.fdb6e0b.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-0:3.11.394-1.git.0.e03a88e.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-0:3.11.394-1.git.0.e03a88e.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-0:3.11.394-1.git.0.e03a88e.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-clients-0:3.11.394-1.git.0.e03a88e.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-clients-0:3.11.394-1.git.0.e03a88e.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-clients-redistributable-0:3.11.394-1.git.0.e03a88e.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-cluster-autoscaler-0:3.11.394-1.git.0.1900c76.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-cluster-autoscaler-0:3.11.394-1.git.0.1900c76.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-cluster-autoscaler-0:3.11.394-1.git.0.1900c76.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-descheduler-0:3.11.394-1.git.299.ad3a3c0.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-descheduler-0:3.11.394-1.git.299.ad3a3c0.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-descheduler-0:3.11.394-1.git.299.ad3a3c0.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-docker-excluder-0:3.11.394-1.git.0.e03a88e.el7.noarch", "7Server-RH7-RHOSE-3.11:atomic-openshift-dockerregistry-0:3.11.394-1.git.481.6e48246.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-dockerregistry-0:3.11.394-1.git.481.6e48246.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-excluder-0:3.11.394-1.git.0.e03a88e.el7.noarch", "7Server-RH7-RHOSE-3.11:atomic-openshift-hyperkube-0:3.11.394-1.git.0.e03a88e.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-hyperkube-0:3.11.394-1.git.0.e03a88e.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-hypershift-0:3.11.394-1.git.0.e03a88e.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-hypershift-0:3.11.394-1.git.0.e03a88e.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-master-0:3.11.394-1.git.0.e03a88e.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-master-0:3.11.394-1.git.0.e03a88e.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-metrics-server-0:3.11.394-1.git.53.3d82586.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-metrics-server-0:3.11.394-1.git.53.3d82586.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-metrics-server-0:3.11.394-1.git.53.3d82586.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-node-0:3.11.394-1.git.0.e03a88e.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-node-0:3.11.394-1.git.0.e03a88e.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-node-problem-detector-0:3.11.394-1.git.263.49acf3a.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-node-problem-detector-0:3.11.394-1.git.263.49acf3a.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-node-problem-detector-0:3.11.394-1.git.263.49acf3a.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-pod-0:3.11.394-1.git.0.e03a88e.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-pod-0:3.11.394-1.git.0.e03a88e.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-sdn-ovs-0:3.11.394-1.git.0.e03a88e.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-sdn-ovs-0:3.11.394-1.git.0.e03a88e.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-service-idler-0:3.11.394-1.git.15.73f73cd.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-service-idler-0:3.11.394-1.git.15.73f73cd.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-service-idler-0:3.11.394-1.git.15.73f73cd.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-template-service-broker-0:3.11.394-1.git.0.e03a88e.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-template-service-broker-0:3.11.394-1.git.0.e03a88e.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-tests-0:3.11.394-1.git.0.e03a88e.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-tests-0:3.11.394-1.git.0.e03a88e.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-web-console-0:3.11.394-1.git.667.08dd2a6.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-web-console-0:3.11.394-1.git.667.08dd2a6.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-web-console-0:3.11.394-1.git.667.08dd2a6.el7.x86_64", "7Server-RH7-RHOSE-3.11:golang-github-openshift-oauth-proxy-0:3.11.394-1.git.439.4c37707.el7.ppc64le", "7Server-RH7-RHOSE-3.11:golang-github-openshift-oauth-proxy-0:3.11.394-1.git.439.4c37707.el7.src", "7Server-RH7-RHOSE-3.11:golang-github-openshift-oauth-proxy-0:3.11.394-1.git.439.4c37707.el7.x86_64", "7Server-RH7-RHOSE-3.11:golang-github-prometheus-alertmanager-0:3.11.394-1.git.0.1fbb64c.el7.src", "7Server-RH7-RHOSE-3.11:golang-github-prometheus-node_exporter-0:3.11.394-1.git.1062.8adc4b8.el7.src", "7Server-RH7-RHOSE-3.11:golang-github-prometheus-prometheus-0:3.11.394-1.git.5026.2c9627f.el7.src", "7Server-RH7-RHOSE-3.11:haproxy-0:1.8.28-1.el7.src", "7Server-RH7-RHOSE-3.11:haproxy-debuginfo-0:1.8.28-1.el7.ppc64le", "7Server-RH7-RHOSE-3.11:haproxy-debuginfo-0:1.8.28-1.el7.x86_64", "7Server-RH7-RHOSE-3.11:haproxy18-0:1.8.28-1.el7.ppc64le", "7Server-RH7-RHOSE-3.11:haproxy18-0:1.8.28-1.el7.x86_64", "7Server-RH7-RHOSE-3.11:jenkins-2-plugins-0:3.11.1612862361-1.el7.noarch", "7Server-RH7-RHOSE-3.11:jenkins-2-plugins-0:3.11.1612862361-1.el7.src", "7Server-RH7-RHOSE-3.11:openshift-ansible-0:3.11.394-6.git.0.47ec25d.el7.noarch", "7Server-RH7-RHOSE-3.11:openshift-ansible-0:3.11.394-6.git.0.47ec25d.el7.src", "7Server-RH7-RHOSE-3.11:openshift-ansible-docs-0:3.11.394-6.git.0.47ec25d.el7.noarch", "7Server-RH7-RHOSE-3.11:openshift-ansible-playbooks-0:3.11.394-6.git.0.47ec25d.el7.noarch", "7Server-RH7-RHOSE-3.11:openshift-ansible-roles-0:3.11.394-6.git.0.47ec25d.el7.noarch", "7Server-RH7-RHOSE-3.11:openshift-ansible-test-0:3.11.394-6.git.0.47ec25d.el7.noarch", "7Server-RH7-RHOSE-3.11:openshift-enterprise-autoheal-0:3.11.394-1.git.218.59eb597.el7.ppc64le", "7Server-RH7-RHOSE-3.11:openshift-enterprise-autoheal-0:3.11.394-1.git.218.59eb597.el7.src", "7Server-RH7-RHOSE-3.11:openshift-enterprise-autoheal-0:3.11.394-1.git.218.59eb597.el7.x86_64", "7Server-RH7-RHOSE-3.11:openshift-enterprise-cluster-capacity-0:3.11.394-1.git.379.92adfdc.el7.ppc64le", "7Server-RH7-RHOSE-3.11:openshift-enterprise-cluster-capacity-0:3.11.394-1.git.379.92adfdc.el7.src", "7Server-RH7-RHOSE-3.11:openshift-enterprise-cluster-capacity-0:3.11.394-1.git.379.92adfdc.el7.x86_64", "7Server-RH7-RHOSE-3.11:openshift-kuryr-0:3.11.394-1.git.1490.16ed375.el7.src", "7Server-RH7-RHOSE-3.11:openshift-kuryr-cni-0:3.11.394-1.git.1490.16ed375.el7.noarch", "7Server-RH7-RHOSE-3.11:openshift-kuryr-common-0:3.11.394-1.git.1490.16ed375.el7.noarch", "7Server-RH7-RHOSE-3.11:openshift-kuryr-controller-0:3.11.394-1.git.1490.16ed375.el7.noarch", "7Server-RH7-RHOSE-3.11:prometheus-0:3.11.394-1.git.5026.2c9627f.el7.ppc64le", "7Server-RH7-RHOSE-3.11:prometheus-0:3.11.394-1.git.5026.2c9627f.el7.x86_64", "7Server-RH7-RHOSE-3.11:prometheus-alertmanager-0:3.11.394-1.git.0.1fbb64c.el7.ppc64le", "7Server-RH7-RHOSE-3.11:prometheus-alertmanager-0:3.11.394-1.git.0.1fbb64c.el7.x86_64", "7Server-RH7-RHOSE-3.11:prometheus-node-exporter-0:3.11.394-1.git.1062.8adc4b8.el7.ppc64le", "7Server-RH7-RHOSE-3.11:prometheus-node-exporter-0:3.11.394-1.git.1062.8adc4b8.el7.x86_64", "7Server-RH7-RHOSE-3.11:python-rsa-0:4.5-3.el7.src", "7Server-RH7-RHOSE-3.11:python2-kuryr-kubernetes-0:3.11.394-1.git.1490.16ed375.el7.noarch", "7Server-RH7-RHOSE-3.11:python2-rsa-0:4.5-3.el7.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-1945" }, { "category": "external", "summary": "RHBZ#1837444", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1837444" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-1945", "url": "https://www.cve.org/CVERecord?id=CVE-2020-1945" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-1945", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-1945" } ], "release_date": "2020-05-13T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-03-03T12:28:39+00:00", "details": "Before applying this update, ensure all previously released errata relevant\nto your system is applied.\n\nSee the following documentation, which will be updated shortly for release\n3.11.394, for important instructions on how to upgrade your cluster and fully\napply this asynchronous errata update:\n\nhttps://docs.openshift.com/container-platform/3.11/release_notes/ocp_3_11_release_notes.html\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/articles/11258.", "product_ids": [ "7Server-RH7-RHOSE-3.11:jenkins-0:2.263.3.1612433584-1.el7.noarch", "7Server-RH7-RHOSE-3.11:jenkins-0:2.263.3.1612433584-1.el7.src" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:0637" }, { "category": "workaround", "details": "For versions 1.1 to 1.9.14 and 1.10.0 to 1.10.7, set the java.io.tmpdir system property to a private directory-- only readable and writable by the current user-- before running Ant.\n\nFor versions 1.9.15 and 1.10.8, use the Ant property ant.tmpfile instead. Ant 1.10.8 protects the temporary files if the underlying filesystem allows it, but using a private temporary directory is still recommended.", "product_ids": [ "7Server-RH7-RHOSE-3.11:atomic-enterprise-service-catalog-1:3.11.394-1.git.1675.fdb6e0b.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-enterprise-service-catalog-1:3.11.394-1.git.1675.fdb6e0b.el7.src", "7Server-RH7-RHOSE-3.11:atomic-enterprise-service-catalog-1:3.11.394-1.git.1675.fdb6e0b.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-enterprise-service-catalog-svcat-1:3.11.394-1.git.1675.fdb6e0b.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-enterprise-service-catalog-svcat-1:3.11.394-1.git.1675.fdb6e0b.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-0:3.11.394-1.git.0.e03a88e.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-0:3.11.394-1.git.0.e03a88e.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-0:3.11.394-1.git.0.e03a88e.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-clients-0:3.11.394-1.git.0.e03a88e.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-clients-0:3.11.394-1.git.0.e03a88e.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-clients-redistributable-0:3.11.394-1.git.0.e03a88e.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-cluster-autoscaler-0:3.11.394-1.git.0.1900c76.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-cluster-autoscaler-0:3.11.394-1.git.0.1900c76.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-cluster-autoscaler-0:3.11.394-1.git.0.1900c76.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-descheduler-0:3.11.394-1.git.299.ad3a3c0.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-descheduler-0:3.11.394-1.git.299.ad3a3c0.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-descheduler-0:3.11.394-1.git.299.ad3a3c0.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-docker-excluder-0:3.11.394-1.git.0.e03a88e.el7.noarch", "7Server-RH7-RHOSE-3.11:atomic-openshift-dockerregistry-0:3.11.394-1.git.481.6e48246.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-dockerregistry-0:3.11.394-1.git.481.6e48246.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-excluder-0:3.11.394-1.git.0.e03a88e.el7.noarch", "7Server-RH7-RHOSE-3.11:atomic-openshift-hyperkube-0:3.11.394-1.git.0.e03a88e.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-hyperkube-0:3.11.394-1.git.0.e03a88e.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-hypershift-0:3.11.394-1.git.0.e03a88e.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-hypershift-0:3.11.394-1.git.0.e03a88e.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-master-0:3.11.394-1.git.0.e03a88e.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-master-0:3.11.394-1.git.0.e03a88e.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-metrics-server-0:3.11.394-1.git.53.3d82586.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-metrics-server-0:3.11.394-1.git.53.3d82586.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-metrics-server-0:3.11.394-1.git.53.3d82586.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-node-0:3.11.394-1.git.0.e03a88e.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-node-0:3.11.394-1.git.0.e03a88e.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-node-problem-detector-0:3.11.394-1.git.263.49acf3a.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-node-problem-detector-0:3.11.394-1.git.263.49acf3a.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-node-problem-detector-0:3.11.394-1.git.263.49acf3a.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-pod-0:3.11.394-1.git.0.e03a88e.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-pod-0:3.11.394-1.git.0.e03a88e.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-sdn-ovs-0:3.11.394-1.git.0.e03a88e.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-sdn-ovs-0:3.11.394-1.git.0.e03a88e.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-service-idler-0:3.11.394-1.git.15.73f73cd.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-service-idler-0:3.11.394-1.git.15.73f73cd.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-service-idler-0:3.11.394-1.git.15.73f73cd.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-template-service-broker-0:3.11.394-1.git.0.e03a88e.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-template-service-broker-0:3.11.394-1.git.0.e03a88e.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-tests-0:3.11.394-1.git.0.e03a88e.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-tests-0:3.11.394-1.git.0.e03a88e.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-web-console-0:3.11.394-1.git.667.08dd2a6.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-web-console-0:3.11.394-1.git.667.08dd2a6.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-web-console-0:3.11.394-1.git.667.08dd2a6.el7.x86_64", "7Server-RH7-RHOSE-3.11:golang-github-openshift-oauth-proxy-0:3.11.394-1.git.439.4c37707.el7.ppc64le", "7Server-RH7-RHOSE-3.11:golang-github-openshift-oauth-proxy-0:3.11.394-1.git.439.4c37707.el7.src", "7Server-RH7-RHOSE-3.11:golang-github-openshift-oauth-proxy-0:3.11.394-1.git.439.4c37707.el7.x86_64", "7Server-RH7-RHOSE-3.11:golang-github-prometheus-alertmanager-0:3.11.394-1.git.0.1fbb64c.el7.src", "7Server-RH7-RHOSE-3.11:golang-github-prometheus-node_exporter-0:3.11.394-1.git.1062.8adc4b8.el7.src", "7Server-RH7-RHOSE-3.11:golang-github-prometheus-prometheus-0:3.11.394-1.git.5026.2c9627f.el7.src", "7Server-RH7-RHOSE-3.11:haproxy-0:1.8.28-1.el7.src", "7Server-RH7-RHOSE-3.11:haproxy-debuginfo-0:1.8.28-1.el7.ppc64le", "7Server-RH7-RHOSE-3.11:haproxy-debuginfo-0:1.8.28-1.el7.x86_64", "7Server-RH7-RHOSE-3.11:haproxy18-0:1.8.28-1.el7.ppc64le", "7Server-RH7-RHOSE-3.11:haproxy18-0:1.8.28-1.el7.x86_64", "7Server-RH7-RHOSE-3.11:jenkins-0:2.263.3.1612433584-1.el7.noarch", "7Server-RH7-RHOSE-3.11:jenkins-0:2.263.3.1612433584-1.el7.src", "7Server-RH7-RHOSE-3.11:jenkins-2-plugins-0:3.11.1612862361-1.el7.noarch", "7Server-RH7-RHOSE-3.11:jenkins-2-plugins-0:3.11.1612862361-1.el7.src", "7Server-RH7-RHOSE-3.11:openshift-ansible-0:3.11.394-6.git.0.47ec25d.el7.noarch", "7Server-RH7-RHOSE-3.11:openshift-ansible-0:3.11.394-6.git.0.47ec25d.el7.src", "7Server-RH7-RHOSE-3.11:openshift-ansible-docs-0:3.11.394-6.git.0.47ec25d.el7.noarch", "7Server-RH7-RHOSE-3.11:openshift-ansible-playbooks-0:3.11.394-6.git.0.47ec25d.el7.noarch", "7Server-RH7-RHOSE-3.11:openshift-ansible-roles-0:3.11.394-6.git.0.47ec25d.el7.noarch", "7Server-RH7-RHOSE-3.11:openshift-ansible-test-0:3.11.394-6.git.0.47ec25d.el7.noarch", "7Server-RH7-RHOSE-3.11:openshift-enterprise-autoheal-0:3.11.394-1.git.218.59eb597.el7.ppc64le", "7Server-RH7-RHOSE-3.11:openshift-enterprise-autoheal-0:3.11.394-1.git.218.59eb597.el7.src", "7Server-RH7-RHOSE-3.11:openshift-enterprise-autoheal-0:3.11.394-1.git.218.59eb597.el7.x86_64", "7Server-RH7-RHOSE-3.11:openshift-enterprise-cluster-capacity-0:3.11.394-1.git.379.92adfdc.el7.ppc64le", "7Server-RH7-RHOSE-3.11:openshift-enterprise-cluster-capacity-0:3.11.394-1.git.379.92adfdc.el7.src", "7Server-RH7-RHOSE-3.11:openshift-enterprise-cluster-capacity-0:3.11.394-1.git.379.92adfdc.el7.x86_64", "7Server-RH7-RHOSE-3.11:openshift-kuryr-0:3.11.394-1.git.1490.16ed375.el7.src", "7Server-RH7-RHOSE-3.11:openshift-kuryr-cni-0:3.11.394-1.git.1490.16ed375.el7.noarch", "7Server-RH7-RHOSE-3.11:openshift-kuryr-common-0:3.11.394-1.git.1490.16ed375.el7.noarch", "7Server-RH7-RHOSE-3.11:openshift-kuryr-controller-0:3.11.394-1.git.1490.16ed375.el7.noarch", "7Server-RH7-RHOSE-3.11:prometheus-0:3.11.394-1.git.5026.2c9627f.el7.ppc64le", "7Server-RH7-RHOSE-3.11:prometheus-0:3.11.394-1.git.5026.2c9627f.el7.x86_64", "7Server-RH7-RHOSE-3.11:prometheus-alertmanager-0:3.11.394-1.git.0.1fbb64c.el7.ppc64le", "7Server-RH7-RHOSE-3.11:prometheus-alertmanager-0:3.11.394-1.git.0.1fbb64c.el7.x86_64", "7Server-RH7-RHOSE-3.11:prometheus-node-exporter-0:3.11.394-1.git.1062.8adc4b8.el7.ppc64le", "7Server-RH7-RHOSE-3.11:prometheus-node-exporter-0:3.11.394-1.git.1062.8adc4b8.el7.x86_64", "7Server-RH7-RHOSE-3.11:python-rsa-0:4.5-3.el7.src", "7Server-RH7-RHOSE-3.11:python2-kuryr-kubernetes-0:3.11.394-1.git.1490.16ed375.el7.noarch", "7Server-RH7-RHOSE-3.11:python2-rsa-0:4.5-3.el7.noarch" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 6.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" }, "products": [ "7Server-RH7-RHOSE-3.11:jenkins-0:2.263.3.1612433584-1.el7.noarch", "7Server-RH7-RHOSE-3.11:jenkins-0:2.263.3.1612433584-1.el7.src" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "ant: insecure temporary file vulnerability" }, { "cve": "CVE-2020-2304", "cwe": { "id": "CWE-611", "name": "Improper Restriction of XML External Entity Reference" }, "discovery_date": "2020-11-09T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "7Server-RH7-RHOSE-3.11:atomic-enterprise-service-catalog-1:3.11.394-1.git.1675.fdb6e0b.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-enterprise-service-catalog-1:3.11.394-1.git.1675.fdb6e0b.el7.src", "7Server-RH7-RHOSE-3.11:atomic-enterprise-service-catalog-1:3.11.394-1.git.1675.fdb6e0b.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-enterprise-service-catalog-svcat-1:3.11.394-1.git.1675.fdb6e0b.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-enterprise-service-catalog-svcat-1:3.11.394-1.git.1675.fdb6e0b.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-0:3.11.394-1.git.0.e03a88e.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-0:3.11.394-1.git.0.e03a88e.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-0:3.11.394-1.git.0.e03a88e.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-clients-0:3.11.394-1.git.0.e03a88e.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-clients-0:3.11.394-1.git.0.e03a88e.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-clients-redistributable-0:3.11.394-1.git.0.e03a88e.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-cluster-autoscaler-0:3.11.394-1.git.0.1900c76.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-cluster-autoscaler-0:3.11.394-1.git.0.1900c76.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-cluster-autoscaler-0:3.11.394-1.git.0.1900c76.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-descheduler-0:3.11.394-1.git.299.ad3a3c0.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-descheduler-0:3.11.394-1.git.299.ad3a3c0.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-descheduler-0:3.11.394-1.git.299.ad3a3c0.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-docker-excluder-0:3.11.394-1.git.0.e03a88e.el7.noarch", "7Server-RH7-RHOSE-3.11:atomic-openshift-dockerregistry-0:3.11.394-1.git.481.6e48246.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-dockerregistry-0:3.11.394-1.git.481.6e48246.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-excluder-0:3.11.394-1.git.0.e03a88e.el7.noarch", "7Server-RH7-RHOSE-3.11:atomic-openshift-hyperkube-0:3.11.394-1.git.0.e03a88e.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-hyperkube-0:3.11.394-1.git.0.e03a88e.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-hypershift-0:3.11.394-1.git.0.e03a88e.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-hypershift-0:3.11.394-1.git.0.e03a88e.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-master-0:3.11.394-1.git.0.e03a88e.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-master-0:3.11.394-1.git.0.e03a88e.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-metrics-server-0:3.11.394-1.git.53.3d82586.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-metrics-server-0:3.11.394-1.git.53.3d82586.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-metrics-server-0:3.11.394-1.git.53.3d82586.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-node-0:3.11.394-1.git.0.e03a88e.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-node-0:3.11.394-1.git.0.e03a88e.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-node-problem-detector-0:3.11.394-1.git.263.49acf3a.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-node-problem-detector-0:3.11.394-1.git.263.49acf3a.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-node-problem-detector-0:3.11.394-1.git.263.49acf3a.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-pod-0:3.11.394-1.git.0.e03a88e.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-pod-0:3.11.394-1.git.0.e03a88e.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-sdn-ovs-0:3.11.394-1.git.0.e03a88e.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-sdn-ovs-0:3.11.394-1.git.0.e03a88e.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-service-idler-0:3.11.394-1.git.15.73f73cd.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-service-idler-0:3.11.394-1.git.15.73f73cd.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-service-idler-0:3.11.394-1.git.15.73f73cd.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-template-service-broker-0:3.11.394-1.git.0.e03a88e.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-template-service-broker-0:3.11.394-1.git.0.e03a88e.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-tests-0:3.11.394-1.git.0.e03a88e.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-tests-0:3.11.394-1.git.0.e03a88e.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-web-console-0:3.11.394-1.git.667.08dd2a6.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-web-console-0:3.11.394-1.git.667.08dd2a6.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-web-console-0:3.11.394-1.git.667.08dd2a6.el7.x86_64", "7Server-RH7-RHOSE-3.11:golang-github-openshift-oauth-proxy-0:3.11.394-1.git.439.4c37707.el7.ppc64le", "7Server-RH7-RHOSE-3.11:golang-github-openshift-oauth-proxy-0:3.11.394-1.git.439.4c37707.el7.src", "7Server-RH7-RHOSE-3.11:golang-github-openshift-oauth-proxy-0:3.11.394-1.git.439.4c37707.el7.x86_64", "7Server-RH7-RHOSE-3.11:golang-github-prometheus-alertmanager-0:3.11.394-1.git.0.1fbb64c.el7.src", "7Server-RH7-RHOSE-3.11:golang-github-prometheus-node_exporter-0:3.11.394-1.git.1062.8adc4b8.el7.src", "7Server-RH7-RHOSE-3.11:golang-github-prometheus-prometheus-0:3.11.394-1.git.5026.2c9627f.el7.src", "7Server-RH7-RHOSE-3.11:haproxy-0:1.8.28-1.el7.src", "7Server-RH7-RHOSE-3.11:haproxy-debuginfo-0:1.8.28-1.el7.ppc64le", "7Server-RH7-RHOSE-3.11:haproxy-debuginfo-0:1.8.28-1.el7.x86_64", "7Server-RH7-RHOSE-3.11:haproxy18-0:1.8.28-1.el7.ppc64le", "7Server-RH7-RHOSE-3.11:haproxy18-0:1.8.28-1.el7.x86_64", "7Server-RH7-RHOSE-3.11:jenkins-0:2.263.3.1612433584-1.el7.noarch", "7Server-RH7-RHOSE-3.11:jenkins-0:2.263.3.1612433584-1.el7.src", "7Server-RH7-RHOSE-3.11:openshift-ansible-0:3.11.394-6.git.0.47ec25d.el7.noarch", "7Server-RH7-RHOSE-3.11:openshift-ansible-0:3.11.394-6.git.0.47ec25d.el7.src", "7Server-RH7-RHOSE-3.11:openshift-ansible-docs-0:3.11.394-6.git.0.47ec25d.el7.noarch", "7Server-RH7-RHOSE-3.11:openshift-ansible-playbooks-0:3.11.394-6.git.0.47ec25d.el7.noarch", "7Server-RH7-RHOSE-3.11:openshift-ansible-roles-0:3.11.394-6.git.0.47ec25d.el7.noarch", "7Server-RH7-RHOSE-3.11:openshift-ansible-test-0:3.11.394-6.git.0.47ec25d.el7.noarch", "7Server-RH7-RHOSE-3.11:openshift-enterprise-autoheal-0:3.11.394-1.git.218.59eb597.el7.ppc64le", "7Server-RH7-RHOSE-3.11:openshift-enterprise-autoheal-0:3.11.394-1.git.218.59eb597.el7.src", "7Server-RH7-RHOSE-3.11:openshift-enterprise-autoheal-0:3.11.394-1.git.218.59eb597.el7.x86_64", "7Server-RH7-RHOSE-3.11:openshift-enterprise-cluster-capacity-0:3.11.394-1.git.379.92adfdc.el7.ppc64le", "7Server-RH7-RHOSE-3.11:openshift-enterprise-cluster-capacity-0:3.11.394-1.git.379.92adfdc.el7.src", "7Server-RH7-RHOSE-3.11:openshift-enterprise-cluster-capacity-0:3.11.394-1.git.379.92adfdc.el7.x86_64", "7Server-RH7-RHOSE-3.11:openshift-kuryr-0:3.11.394-1.git.1490.16ed375.el7.src", "7Server-RH7-RHOSE-3.11:openshift-kuryr-cni-0:3.11.394-1.git.1490.16ed375.el7.noarch", "7Server-RH7-RHOSE-3.11:openshift-kuryr-common-0:3.11.394-1.git.1490.16ed375.el7.noarch", "7Server-RH7-RHOSE-3.11:openshift-kuryr-controller-0:3.11.394-1.git.1490.16ed375.el7.noarch", "7Server-RH7-RHOSE-3.11:prometheus-0:3.11.394-1.git.5026.2c9627f.el7.ppc64le", "7Server-RH7-RHOSE-3.11:prometheus-0:3.11.394-1.git.5026.2c9627f.el7.x86_64", "7Server-RH7-RHOSE-3.11:prometheus-alertmanager-0:3.11.394-1.git.0.1fbb64c.el7.ppc64le", "7Server-RH7-RHOSE-3.11:prometheus-alertmanager-0:3.11.394-1.git.0.1fbb64c.el7.x86_64", "7Server-RH7-RHOSE-3.11:prometheus-node-exporter-0:3.11.394-1.git.1062.8adc4b8.el7.ppc64le", "7Server-RH7-RHOSE-3.11:prometheus-node-exporter-0:3.11.394-1.git.1062.8adc4b8.el7.x86_64", "7Server-RH7-RHOSE-3.11:python-rsa-0:4.5-3.el7.src", "7Server-RH7-RHOSE-3.11:python2-kuryr-kubernetes-0:3.11.394-1.git.1490.16ed375.el7.noarch", "7Server-RH7-RHOSE-3.11:python2-rsa-0:4.5-3.el7.noarch" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1895939" } ], "notes": [ { "category": "description", "text": "A flaw was found in the subversion Jenkins plugin. The XML parser is not properly configured to prevent XML external entity (XXE) attacks allowing an attacker the ability to control an agent process and have Jenkins parse a crafted changelog file that uses external entities for extraction of secrets from the Jenkins controller or server-side request forgery. The highest threat from this vulnerability is to data confidentiality.", "title": "Vulnerability description" }, { "category": "summary", "text": "jenkins-2-plugins/subversion: XML parser is not preventing XML external entity (XXE) attacks", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RH7-RHOSE-3.11:jenkins-2-plugins-0:3.11.1612862361-1.el7.noarch", "7Server-RH7-RHOSE-3.11:jenkins-2-plugins-0:3.11.1612862361-1.el7.src" ], "known_not_affected": [ "7Server-RH7-RHOSE-3.11:atomic-enterprise-service-catalog-1:3.11.394-1.git.1675.fdb6e0b.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-enterprise-service-catalog-1:3.11.394-1.git.1675.fdb6e0b.el7.src", "7Server-RH7-RHOSE-3.11:atomic-enterprise-service-catalog-1:3.11.394-1.git.1675.fdb6e0b.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-enterprise-service-catalog-svcat-1:3.11.394-1.git.1675.fdb6e0b.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-enterprise-service-catalog-svcat-1:3.11.394-1.git.1675.fdb6e0b.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-0:3.11.394-1.git.0.e03a88e.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-0:3.11.394-1.git.0.e03a88e.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-0:3.11.394-1.git.0.e03a88e.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-clients-0:3.11.394-1.git.0.e03a88e.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-clients-0:3.11.394-1.git.0.e03a88e.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-clients-redistributable-0:3.11.394-1.git.0.e03a88e.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-cluster-autoscaler-0:3.11.394-1.git.0.1900c76.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-cluster-autoscaler-0:3.11.394-1.git.0.1900c76.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-cluster-autoscaler-0:3.11.394-1.git.0.1900c76.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-descheduler-0:3.11.394-1.git.299.ad3a3c0.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-descheduler-0:3.11.394-1.git.299.ad3a3c0.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-descheduler-0:3.11.394-1.git.299.ad3a3c0.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-docker-excluder-0:3.11.394-1.git.0.e03a88e.el7.noarch", "7Server-RH7-RHOSE-3.11:atomic-openshift-dockerregistry-0:3.11.394-1.git.481.6e48246.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-dockerregistry-0:3.11.394-1.git.481.6e48246.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-excluder-0:3.11.394-1.git.0.e03a88e.el7.noarch", "7Server-RH7-RHOSE-3.11:atomic-openshift-hyperkube-0:3.11.394-1.git.0.e03a88e.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-hyperkube-0:3.11.394-1.git.0.e03a88e.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-hypershift-0:3.11.394-1.git.0.e03a88e.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-hypershift-0:3.11.394-1.git.0.e03a88e.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-master-0:3.11.394-1.git.0.e03a88e.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-master-0:3.11.394-1.git.0.e03a88e.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-metrics-server-0:3.11.394-1.git.53.3d82586.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-metrics-server-0:3.11.394-1.git.53.3d82586.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-metrics-server-0:3.11.394-1.git.53.3d82586.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-node-0:3.11.394-1.git.0.e03a88e.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-node-0:3.11.394-1.git.0.e03a88e.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-node-problem-detector-0:3.11.394-1.git.263.49acf3a.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-node-problem-detector-0:3.11.394-1.git.263.49acf3a.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-node-problem-detector-0:3.11.394-1.git.263.49acf3a.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-pod-0:3.11.394-1.git.0.e03a88e.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-pod-0:3.11.394-1.git.0.e03a88e.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-sdn-ovs-0:3.11.394-1.git.0.e03a88e.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-sdn-ovs-0:3.11.394-1.git.0.e03a88e.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-service-idler-0:3.11.394-1.git.15.73f73cd.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-service-idler-0:3.11.394-1.git.15.73f73cd.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-service-idler-0:3.11.394-1.git.15.73f73cd.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-template-service-broker-0:3.11.394-1.git.0.e03a88e.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-template-service-broker-0:3.11.394-1.git.0.e03a88e.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-tests-0:3.11.394-1.git.0.e03a88e.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-tests-0:3.11.394-1.git.0.e03a88e.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-web-console-0:3.11.394-1.git.667.08dd2a6.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-web-console-0:3.11.394-1.git.667.08dd2a6.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-web-console-0:3.11.394-1.git.667.08dd2a6.el7.x86_64", "7Server-RH7-RHOSE-3.11:golang-github-openshift-oauth-proxy-0:3.11.394-1.git.439.4c37707.el7.ppc64le", "7Server-RH7-RHOSE-3.11:golang-github-openshift-oauth-proxy-0:3.11.394-1.git.439.4c37707.el7.src", "7Server-RH7-RHOSE-3.11:golang-github-openshift-oauth-proxy-0:3.11.394-1.git.439.4c37707.el7.x86_64", "7Server-RH7-RHOSE-3.11:golang-github-prometheus-alertmanager-0:3.11.394-1.git.0.1fbb64c.el7.src", "7Server-RH7-RHOSE-3.11:golang-github-prometheus-node_exporter-0:3.11.394-1.git.1062.8adc4b8.el7.src", "7Server-RH7-RHOSE-3.11:golang-github-prometheus-prometheus-0:3.11.394-1.git.5026.2c9627f.el7.src", "7Server-RH7-RHOSE-3.11:haproxy-0:1.8.28-1.el7.src", "7Server-RH7-RHOSE-3.11:haproxy-debuginfo-0:1.8.28-1.el7.ppc64le", "7Server-RH7-RHOSE-3.11:haproxy-debuginfo-0:1.8.28-1.el7.x86_64", "7Server-RH7-RHOSE-3.11:haproxy18-0:1.8.28-1.el7.ppc64le", "7Server-RH7-RHOSE-3.11:haproxy18-0:1.8.28-1.el7.x86_64", "7Server-RH7-RHOSE-3.11:jenkins-0:2.263.3.1612433584-1.el7.noarch", "7Server-RH7-RHOSE-3.11:jenkins-0:2.263.3.1612433584-1.el7.src", "7Server-RH7-RHOSE-3.11:openshift-ansible-0:3.11.394-6.git.0.47ec25d.el7.noarch", "7Server-RH7-RHOSE-3.11:openshift-ansible-0:3.11.394-6.git.0.47ec25d.el7.src", "7Server-RH7-RHOSE-3.11:openshift-ansible-docs-0:3.11.394-6.git.0.47ec25d.el7.noarch", "7Server-RH7-RHOSE-3.11:openshift-ansible-playbooks-0:3.11.394-6.git.0.47ec25d.el7.noarch", "7Server-RH7-RHOSE-3.11:openshift-ansible-roles-0:3.11.394-6.git.0.47ec25d.el7.noarch", "7Server-RH7-RHOSE-3.11:openshift-ansible-test-0:3.11.394-6.git.0.47ec25d.el7.noarch", "7Server-RH7-RHOSE-3.11:openshift-enterprise-autoheal-0:3.11.394-1.git.218.59eb597.el7.ppc64le", "7Server-RH7-RHOSE-3.11:openshift-enterprise-autoheal-0:3.11.394-1.git.218.59eb597.el7.src", "7Server-RH7-RHOSE-3.11:openshift-enterprise-autoheal-0:3.11.394-1.git.218.59eb597.el7.x86_64", "7Server-RH7-RHOSE-3.11:openshift-enterprise-cluster-capacity-0:3.11.394-1.git.379.92adfdc.el7.ppc64le", "7Server-RH7-RHOSE-3.11:openshift-enterprise-cluster-capacity-0:3.11.394-1.git.379.92adfdc.el7.src", "7Server-RH7-RHOSE-3.11:openshift-enterprise-cluster-capacity-0:3.11.394-1.git.379.92adfdc.el7.x86_64", "7Server-RH7-RHOSE-3.11:openshift-kuryr-0:3.11.394-1.git.1490.16ed375.el7.src", "7Server-RH7-RHOSE-3.11:openshift-kuryr-cni-0:3.11.394-1.git.1490.16ed375.el7.noarch", "7Server-RH7-RHOSE-3.11:openshift-kuryr-common-0:3.11.394-1.git.1490.16ed375.el7.noarch", "7Server-RH7-RHOSE-3.11:openshift-kuryr-controller-0:3.11.394-1.git.1490.16ed375.el7.noarch", "7Server-RH7-RHOSE-3.11:prometheus-0:3.11.394-1.git.5026.2c9627f.el7.ppc64le", "7Server-RH7-RHOSE-3.11:prometheus-0:3.11.394-1.git.5026.2c9627f.el7.x86_64", "7Server-RH7-RHOSE-3.11:prometheus-alertmanager-0:3.11.394-1.git.0.1fbb64c.el7.ppc64le", "7Server-RH7-RHOSE-3.11:prometheus-alertmanager-0:3.11.394-1.git.0.1fbb64c.el7.x86_64", "7Server-RH7-RHOSE-3.11:prometheus-node-exporter-0:3.11.394-1.git.1062.8adc4b8.el7.ppc64le", "7Server-RH7-RHOSE-3.11:prometheus-node-exporter-0:3.11.394-1.git.1062.8adc4b8.el7.x86_64", "7Server-RH7-RHOSE-3.11:python-rsa-0:4.5-3.el7.src", "7Server-RH7-RHOSE-3.11:python2-kuryr-kubernetes-0:3.11.394-1.git.1490.16ed375.el7.noarch", "7Server-RH7-RHOSE-3.11:python2-rsa-0:4.5-3.el7.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-2304" }, { "category": "external", "summary": "RHBZ#1895939", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1895939" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-2304", "url": "https://www.cve.org/CVERecord?id=CVE-2020-2304" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-2304", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-2304" }, { "category": "external", "summary": "https://www.jenkins.io/security/advisory/2020-11-04/#SECURITY-2145", "url": "https://www.jenkins.io/security/advisory/2020-11-04/#SECURITY-2145" } ], "release_date": "2020-11-04T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-03-03T12:28:39+00:00", "details": "Before applying this update, ensure all previously released errata relevant\nto your system is applied.\n\nSee the following documentation, which will be updated shortly for release\n3.11.394, for important instructions on how to upgrade your cluster and fully\napply this asynchronous errata update:\n\nhttps://docs.openshift.com/container-platform/3.11/release_notes/ocp_3_11_release_notes.html\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/articles/11258.", "product_ids": [ "7Server-RH7-RHOSE-3.11:jenkins-2-plugins-0:3.11.1612862361-1.el7.noarch", "7Server-RH7-RHOSE-3.11:jenkins-2-plugins-0:3.11.1612862361-1.el7.src" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:0637" }, { "category": "workaround", "details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update as soon as possible.", "product_ids": [ "7Server-RH7-RHOSE-3.11:atomic-enterprise-service-catalog-1:3.11.394-1.git.1675.fdb6e0b.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-enterprise-service-catalog-1:3.11.394-1.git.1675.fdb6e0b.el7.src", "7Server-RH7-RHOSE-3.11:atomic-enterprise-service-catalog-1:3.11.394-1.git.1675.fdb6e0b.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-enterprise-service-catalog-svcat-1:3.11.394-1.git.1675.fdb6e0b.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-enterprise-service-catalog-svcat-1:3.11.394-1.git.1675.fdb6e0b.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-0:3.11.394-1.git.0.e03a88e.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-0:3.11.394-1.git.0.e03a88e.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-0:3.11.394-1.git.0.e03a88e.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-clients-0:3.11.394-1.git.0.e03a88e.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-clients-0:3.11.394-1.git.0.e03a88e.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-clients-redistributable-0:3.11.394-1.git.0.e03a88e.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-cluster-autoscaler-0:3.11.394-1.git.0.1900c76.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-cluster-autoscaler-0:3.11.394-1.git.0.1900c76.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-cluster-autoscaler-0:3.11.394-1.git.0.1900c76.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-descheduler-0:3.11.394-1.git.299.ad3a3c0.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-descheduler-0:3.11.394-1.git.299.ad3a3c0.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-descheduler-0:3.11.394-1.git.299.ad3a3c0.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-docker-excluder-0:3.11.394-1.git.0.e03a88e.el7.noarch", "7Server-RH7-RHOSE-3.11:atomic-openshift-dockerregistry-0:3.11.394-1.git.481.6e48246.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-dockerregistry-0:3.11.394-1.git.481.6e48246.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-excluder-0:3.11.394-1.git.0.e03a88e.el7.noarch", "7Server-RH7-RHOSE-3.11:atomic-openshift-hyperkube-0:3.11.394-1.git.0.e03a88e.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-hyperkube-0:3.11.394-1.git.0.e03a88e.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-hypershift-0:3.11.394-1.git.0.e03a88e.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-hypershift-0:3.11.394-1.git.0.e03a88e.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-master-0:3.11.394-1.git.0.e03a88e.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-master-0:3.11.394-1.git.0.e03a88e.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-metrics-server-0:3.11.394-1.git.53.3d82586.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-metrics-server-0:3.11.394-1.git.53.3d82586.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-metrics-server-0:3.11.394-1.git.53.3d82586.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-node-0:3.11.394-1.git.0.e03a88e.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-node-0:3.11.394-1.git.0.e03a88e.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-node-problem-detector-0:3.11.394-1.git.263.49acf3a.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-node-problem-detector-0:3.11.394-1.git.263.49acf3a.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-node-problem-detector-0:3.11.394-1.git.263.49acf3a.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-pod-0:3.11.394-1.git.0.e03a88e.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-pod-0:3.11.394-1.git.0.e03a88e.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-sdn-ovs-0:3.11.394-1.git.0.e03a88e.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-sdn-ovs-0:3.11.394-1.git.0.e03a88e.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-service-idler-0:3.11.394-1.git.15.73f73cd.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-service-idler-0:3.11.394-1.git.15.73f73cd.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-service-idler-0:3.11.394-1.git.15.73f73cd.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-template-service-broker-0:3.11.394-1.git.0.e03a88e.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-template-service-broker-0:3.11.394-1.git.0.e03a88e.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-tests-0:3.11.394-1.git.0.e03a88e.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-tests-0:3.11.394-1.git.0.e03a88e.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-web-console-0:3.11.394-1.git.667.08dd2a6.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-web-console-0:3.11.394-1.git.667.08dd2a6.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-web-console-0:3.11.394-1.git.667.08dd2a6.el7.x86_64", "7Server-RH7-RHOSE-3.11:golang-github-openshift-oauth-proxy-0:3.11.394-1.git.439.4c37707.el7.ppc64le", "7Server-RH7-RHOSE-3.11:golang-github-openshift-oauth-proxy-0:3.11.394-1.git.439.4c37707.el7.src", "7Server-RH7-RHOSE-3.11:golang-github-openshift-oauth-proxy-0:3.11.394-1.git.439.4c37707.el7.x86_64", "7Server-RH7-RHOSE-3.11:golang-github-prometheus-alertmanager-0:3.11.394-1.git.0.1fbb64c.el7.src", "7Server-RH7-RHOSE-3.11:golang-github-prometheus-node_exporter-0:3.11.394-1.git.1062.8adc4b8.el7.src", "7Server-RH7-RHOSE-3.11:golang-github-prometheus-prometheus-0:3.11.394-1.git.5026.2c9627f.el7.src", "7Server-RH7-RHOSE-3.11:haproxy-0:1.8.28-1.el7.src", "7Server-RH7-RHOSE-3.11:haproxy-debuginfo-0:1.8.28-1.el7.ppc64le", "7Server-RH7-RHOSE-3.11:haproxy-debuginfo-0:1.8.28-1.el7.x86_64", "7Server-RH7-RHOSE-3.11:haproxy18-0:1.8.28-1.el7.ppc64le", "7Server-RH7-RHOSE-3.11:haproxy18-0:1.8.28-1.el7.x86_64", "7Server-RH7-RHOSE-3.11:jenkins-0:2.263.3.1612433584-1.el7.noarch", "7Server-RH7-RHOSE-3.11:jenkins-0:2.263.3.1612433584-1.el7.src", "7Server-RH7-RHOSE-3.11:jenkins-2-plugins-0:3.11.1612862361-1.el7.noarch", "7Server-RH7-RHOSE-3.11:jenkins-2-plugins-0:3.11.1612862361-1.el7.src", "7Server-RH7-RHOSE-3.11:openshift-ansible-0:3.11.394-6.git.0.47ec25d.el7.noarch", "7Server-RH7-RHOSE-3.11:openshift-ansible-0:3.11.394-6.git.0.47ec25d.el7.src", "7Server-RH7-RHOSE-3.11:openshift-ansible-docs-0:3.11.394-6.git.0.47ec25d.el7.noarch", "7Server-RH7-RHOSE-3.11:openshift-ansible-playbooks-0:3.11.394-6.git.0.47ec25d.el7.noarch", "7Server-RH7-RHOSE-3.11:openshift-ansible-roles-0:3.11.394-6.git.0.47ec25d.el7.noarch", "7Server-RH7-RHOSE-3.11:openshift-ansible-test-0:3.11.394-6.git.0.47ec25d.el7.noarch", "7Server-RH7-RHOSE-3.11:openshift-enterprise-autoheal-0:3.11.394-1.git.218.59eb597.el7.ppc64le", "7Server-RH7-RHOSE-3.11:openshift-enterprise-autoheal-0:3.11.394-1.git.218.59eb597.el7.src", "7Server-RH7-RHOSE-3.11:openshift-enterprise-autoheal-0:3.11.394-1.git.218.59eb597.el7.x86_64", "7Server-RH7-RHOSE-3.11:openshift-enterprise-cluster-capacity-0:3.11.394-1.git.379.92adfdc.el7.ppc64le", "7Server-RH7-RHOSE-3.11:openshift-enterprise-cluster-capacity-0:3.11.394-1.git.379.92adfdc.el7.src", "7Server-RH7-RHOSE-3.11:openshift-enterprise-cluster-capacity-0:3.11.394-1.git.379.92adfdc.el7.x86_64", "7Server-RH7-RHOSE-3.11:openshift-kuryr-0:3.11.394-1.git.1490.16ed375.el7.src", "7Server-RH7-RHOSE-3.11:openshift-kuryr-cni-0:3.11.394-1.git.1490.16ed375.el7.noarch", "7Server-RH7-RHOSE-3.11:openshift-kuryr-common-0:3.11.394-1.git.1490.16ed375.el7.noarch", "7Server-RH7-RHOSE-3.11:openshift-kuryr-controller-0:3.11.394-1.git.1490.16ed375.el7.noarch", "7Server-RH7-RHOSE-3.11:prometheus-0:3.11.394-1.git.5026.2c9627f.el7.ppc64le", "7Server-RH7-RHOSE-3.11:prometheus-0:3.11.394-1.git.5026.2c9627f.el7.x86_64", "7Server-RH7-RHOSE-3.11:prometheus-alertmanager-0:3.11.394-1.git.0.1fbb64c.el7.ppc64le", "7Server-RH7-RHOSE-3.11:prometheus-alertmanager-0:3.11.394-1.git.0.1fbb64c.el7.x86_64", "7Server-RH7-RHOSE-3.11:prometheus-node-exporter-0:3.11.394-1.git.1062.8adc4b8.el7.ppc64le", "7Server-RH7-RHOSE-3.11:prometheus-node-exporter-0:3.11.394-1.git.1062.8adc4b8.el7.x86_64", "7Server-RH7-RHOSE-3.11:python-rsa-0:4.5-3.el7.src", "7Server-RH7-RHOSE-3.11:python2-kuryr-kubernetes-0:3.11.394-1.git.1490.16ed375.el7.noarch", "7Server-RH7-RHOSE-3.11:python2-rsa-0:4.5-3.el7.noarch" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "7Server-RH7-RHOSE-3.11:jenkins-2-plugins-0:3.11.1612862361-1.el7.noarch", "7Server-RH7-RHOSE-3.11:jenkins-2-plugins-0:3.11.1612862361-1.el7.src" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "jenkins-2-plugins/subversion: XML parser is not preventing XML external entity (XXE) attacks" }, { "cve": "CVE-2020-2305", "cwe": { "id": "CWE-611", "name": "Improper Restriction of XML External Entity Reference" }, "discovery_date": "2020-11-09T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "7Server-RH7-RHOSE-3.11:atomic-enterprise-service-catalog-1:3.11.394-1.git.1675.fdb6e0b.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-enterprise-service-catalog-1:3.11.394-1.git.1675.fdb6e0b.el7.src", "7Server-RH7-RHOSE-3.11:atomic-enterprise-service-catalog-1:3.11.394-1.git.1675.fdb6e0b.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-enterprise-service-catalog-svcat-1:3.11.394-1.git.1675.fdb6e0b.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-enterprise-service-catalog-svcat-1:3.11.394-1.git.1675.fdb6e0b.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-0:3.11.394-1.git.0.e03a88e.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-0:3.11.394-1.git.0.e03a88e.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-0:3.11.394-1.git.0.e03a88e.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-clients-0:3.11.394-1.git.0.e03a88e.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-clients-0:3.11.394-1.git.0.e03a88e.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-clients-redistributable-0:3.11.394-1.git.0.e03a88e.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-cluster-autoscaler-0:3.11.394-1.git.0.1900c76.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-cluster-autoscaler-0:3.11.394-1.git.0.1900c76.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-cluster-autoscaler-0:3.11.394-1.git.0.1900c76.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-descheduler-0:3.11.394-1.git.299.ad3a3c0.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-descheduler-0:3.11.394-1.git.299.ad3a3c0.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-descheduler-0:3.11.394-1.git.299.ad3a3c0.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-docker-excluder-0:3.11.394-1.git.0.e03a88e.el7.noarch", "7Server-RH7-RHOSE-3.11:atomic-openshift-dockerregistry-0:3.11.394-1.git.481.6e48246.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-dockerregistry-0:3.11.394-1.git.481.6e48246.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-excluder-0:3.11.394-1.git.0.e03a88e.el7.noarch", "7Server-RH7-RHOSE-3.11:atomic-openshift-hyperkube-0:3.11.394-1.git.0.e03a88e.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-hyperkube-0:3.11.394-1.git.0.e03a88e.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-hypershift-0:3.11.394-1.git.0.e03a88e.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-hypershift-0:3.11.394-1.git.0.e03a88e.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-master-0:3.11.394-1.git.0.e03a88e.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-master-0:3.11.394-1.git.0.e03a88e.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-metrics-server-0:3.11.394-1.git.53.3d82586.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-metrics-server-0:3.11.394-1.git.53.3d82586.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-metrics-server-0:3.11.394-1.git.53.3d82586.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-node-0:3.11.394-1.git.0.e03a88e.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-node-0:3.11.394-1.git.0.e03a88e.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-node-problem-detector-0:3.11.394-1.git.263.49acf3a.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-node-problem-detector-0:3.11.394-1.git.263.49acf3a.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-node-problem-detector-0:3.11.394-1.git.263.49acf3a.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-pod-0:3.11.394-1.git.0.e03a88e.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-pod-0:3.11.394-1.git.0.e03a88e.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-sdn-ovs-0:3.11.394-1.git.0.e03a88e.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-sdn-ovs-0:3.11.394-1.git.0.e03a88e.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-service-idler-0:3.11.394-1.git.15.73f73cd.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-service-idler-0:3.11.394-1.git.15.73f73cd.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-service-idler-0:3.11.394-1.git.15.73f73cd.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-template-service-broker-0:3.11.394-1.git.0.e03a88e.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-template-service-broker-0:3.11.394-1.git.0.e03a88e.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-tests-0:3.11.394-1.git.0.e03a88e.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-tests-0:3.11.394-1.git.0.e03a88e.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-web-console-0:3.11.394-1.git.667.08dd2a6.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-web-console-0:3.11.394-1.git.667.08dd2a6.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-web-console-0:3.11.394-1.git.667.08dd2a6.el7.x86_64", "7Server-RH7-RHOSE-3.11:golang-github-openshift-oauth-proxy-0:3.11.394-1.git.439.4c37707.el7.ppc64le", "7Server-RH7-RHOSE-3.11:golang-github-openshift-oauth-proxy-0:3.11.394-1.git.439.4c37707.el7.src", "7Server-RH7-RHOSE-3.11:golang-github-openshift-oauth-proxy-0:3.11.394-1.git.439.4c37707.el7.x86_64", "7Server-RH7-RHOSE-3.11:golang-github-prometheus-alertmanager-0:3.11.394-1.git.0.1fbb64c.el7.src", "7Server-RH7-RHOSE-3.11:golang-github-prometheus-node_exporter-0:3.11.394-1.git.1062.8adc4b8.el7.src", "7Server-RH7-RHOSE-3.11:golang-github-prometheus-prometheus-0:3.11.394-1.git.5026.2c9627f.el7.src", "7Server-RH7-RHOSE-3.11:haproxy-0:1.8.28-1.el7.src", "7Server-RH7-RHOSE-3.11:haproxy-debuginfo-0:1.8.28-1.el7.ppc64le", "7Server-RH7-RHOSE-3.11:haproxy-debuginfo-0:1.8.28-1.el7.x86_64", "7Server-RH7-RHOSE-3.11:haproxy18-0:1.8.28-1.el7.ppc64le", "7Server-RH7-RHOSE-3.11:haproxy18-0:1.8.28-1.el7.x86_64", "7Server-RH7-RHOSE-3.11:jenkins-0:2.263.3.1612433584-1.el7.noarch", "7Server-RH7-RHOSE-3.11:jenkins-0:2.263.3.1612433584-1.el7.src", "7Server-RH7-RHOSE-3.11:openshift-ansible-0:3.11.394-6.git.0.47ec25d.el7.noarch", "7Server-RH7-RHOSE-3.11:openshift-ansible-0:3.11.394-6.git.0.47ec25d.el7.src", "7Server-RH7-RHOSE-3.11:openshift-ansible-docs-0:3.11.394-6.git.0.47ec25d.el7.noarch", "7Server-RH7-RHOSE-3.11:openshift-ansible-playbooks-0:3.11.394-6.git.0.47ec25d.el7.noarch", "7Server-RH7-RHOSE-3.11:openshift-ansible-roles-0:3.11.394-6.git.0.47ec25d.el7.noarch", "7Server-RH7-RHOSE-3.11:openshift-ansible-test-0:3.11.394-6.git.0.47ec25d.el7.noarch", "7Server-RH7-RHOSE-3.11:openshift-enterprise-autoheal-0:3.11.394-1.git.218.59eb597.el7.ppc64le", "7Server-RH7-RHOSE-3.11:openshift-enterprise-autoheal-0:3.11.394-1.git.218.59eb597.el7.src", "7Server-RH7-RHOSE-3.11:openshift-enterprise-autoheal-0:3.11.394-1.git.218.59eb597.el7.x86_64", "7Server-RH7-RHOSE-3.11:openshift-enterprise-cluster-capacity-0:3.11.394-1.git.379.92adfdc.el7.ppc64le", "7Server-RH7-RHOSE-3.11:openshift-enterprise-cluster-capacity-0:3.11.394-1.git.379.92adfdc.el7.src", "7Server-RH7-RHOSE-3.11:openshift-enterprise-cluster-capacity-0:3.11.394-1.git.379.92adfdc.el7.x86_64", "7Server-RH7-RHOSE-3.11:openshift-kuryr-0:3.11.394-1.git.1490.16ed375.el7.src", "7Server-RH7-RHOSE-3.11:openshift-kuryr-cni-0:3.11.394-1.git.1490.16ed375.el7.noarch", "7Server-RH7-RHOSE-3.11:openshift-kuryr-common-0:3.11.394-1.git.1490.16ed375.el7.noarch", "7Server-RH7-RHOSE-3.11:openshift-kuryr-controller-0:3.11.394-1.git.1490.16ed375.el7.noarch", "7Server-RH7-RHOSE-3.11:prometheus-0:3.11.394-1.git.5026.2c9627f.el7.ppc64le", "7Server-RH7-RHOSE-3.11:prometheus-0:3.11.394-1.git.5026.2c9627f.el7.x86_64", "7Server-RH7-RHOSE-3.11:prometheus-alertmanager-0:3.11.394-1.git.0.1fbb64c.el7.ppc64le", "7Server-RH7-RHOSE-3.11:prometheus-alertmanager-0:3.11.394-1.git.0.1fbb64c.el7.x86_64", "7Server-RH7-RHOSE-3.11:prometheus-node-exporter-0:3.11.394-1.git.1062.8adc4b8.el7.ppc64le", "7Server-RH7-RHOSE-3.11:prometheus-node-exporter-0:3.11.394-1.git.1062.8adc4b8.el7.x86_64", "7Server-RH7-RHOSE-3.11:python-rsa-0:4.5-3.el7.src", "7Server-RH7-RHOSE-3.11:python2-kuryr-kubernetes-0:3.11.394-1.git.1490.16ed375.el7.noarch", "7Server-RH7-RHOSE-3.11:python2-rsa-0:4.5-3.el7.noarch" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1895940" } ], "notes": [ { "category": "description", "text": "A flaw was found in the mercurial plugin in Jenkins. The XML changelog parser is not configured to prevent an XML external entity (XXE) attack allowing an attacker the ability to control an agent process to have Jenkins parse a crafted changelog file that uses external entities for extraction of secrets from the Jenkins controller or server-side request forgery. The highest threat from this vulnerability is to data confidentiality.", "title": "Vulnerability description" }, { "category": "summary", "text": "jenkins-2-plugins/mercurial: XML parser is not preventing XML external entity (XXE) attacks", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RH7-RHOSE-3.11:jenkins-2-plugins-0:3.11.1612862361-1.el7.noarch", "7Server-RH7-RHOSE-3.11:jenkins-2-plugins-0:3.11.1612862361-1.el7.src" ], "known_not_affected": [ "7Server-RH7-RHOSE-3.11:atomic-enterprise-service-catalog-1:3.11.394-1.git.1675.fdb6e0b.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-enterprise-service-catalog-1:3.11.394-1.git.1675.fdb6e0b.el7.src", "7Server-RH7-RHOSE-3.11:atomic-enterprise-service-catalog-1:3.11.394-1.git.1675.fdb6e0b.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-enterprise-service-catalog-svcat-1:3.11.394-1.git.1675.fdb6e0b.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-enterprise-service-catalog-svcat-1:3.11.394-1.git.1675.fdb6e0b.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-0:3.11.394-1.git.0.e03a88e.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-0:3.11.394-1.git.0.e03a88e.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-0:3.11.394-1.git.0.e03a88e.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-clients-0:3.11.394-1.git.0.e03a88e.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-clients-0:3.11.394-1.git.0.e03a88e.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-clients-redistributable-0:3.11.394-1.git.0.e03a88e.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-cluster-autoscaler-0:3.11.394-1.git.0.1900c76.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-cluster-autoscaler-0:3.11.394-1.git.0.1900c76.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-cluster-autoscaler-0:3.11.394-1.git.0.1900c76.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-descheduler-0:3.11.394-1.git.299.ad3a3c0.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-descheduler-0:3.11.394-1.git.299.ad3a3c0.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-descheduler-0:3.11.394-1.git.299.ad3a3c0.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-docker-excluder-0:3.11.394-1.git.0.e03a88e.el7.noarch", "7Server-RH7-RHOSE-3.11:atomic-openshift-dockerregistry-0:3.11.394-1.git.481.6e48246.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-dockerregistry-0:3.11.394-1.git.481.6e48246.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-excluder-0:3.11.394-1.git.0.e03a88e.el7.noarch", "7Server-RH7-RHOSE-3.11:atomic-openshift-hyperkube-0:3.11.394-1.git.0.e03a88e.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-hyperkube-0:3.11.394-1.git.0.e03a88e.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-hypershift-0:3.11.394-1.git.0.e03a88e.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-hypershift-0:3.11.394-1.git.0.e03a88e.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-master-0:3.11.394-1.git.0.e03a88e.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-master-0:3.11.394-1.git.0.e03a88e.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-metrics-server-0:3.11.394-1.git.53.3d82586.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-metrics-server-0:3.11.394-1.git.53.3d82586.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-metrics-server-0:3.11.394-1.git.53.3d82586.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-node-0:3.11.394-1.git.0.e03a88e.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-node-0:3.11.394-1.git.0.e03a88e.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-node-problem-detector-0:3.11.394-1.git.263.49acf3a.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-node-problem-detector-0:3.11.394-1.git.263.49acf3a.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-node-problem-detector-0:3.11.394-1.git.263.49acf3a.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-pod-0:3.11.394-1.git.0.e03a88e.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-pod-0:3.11.394-1.git.0.e03a88e.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-sdn-ovs-0:3.11.394-1.git.0.e03a88e.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-sdn-ovs-0:3.11.394-1.git.0.e03a88e.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-service-idler-0:3.11.394-1.git.15.73f73cd.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-service-idler-0:3.11.394-1.git.15.73f73cd.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-service-idler-0:3.11.394-1.git.15.73f73cd.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-template-service-broker-0:3.11.394-1.git.0.e03a88e.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-template-service-broker-0:3.11.394-1.git.0.e03a88e.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-tests-0:3.11.394-1.git.0.e03a88e.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-tests-0:3.11.394-1.git.0.e03a88e.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-web-console-0:3.11.394-1.git.667.08dd2a6.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-web-console-0:3.11.394-1.git.667.08dd2a6.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-web-console-0:3.11.394-1.git.667.08dd2a6.el7.x86_64", "7Server-RH7-RHOSE-3.11:golang-github-openshift-oauth-proxy-0:3.11.394-1.git.439.4c37707.el7.ppc64le", "7Server-RH7-RHOSE-3.11:golang-github-openshift-oauth-proxy-0:3.11.394-1.git.439.4c37707.el7.src", "7Server-RH7-RHOSE-3.11:golang-github-openshift-oauth-proxy-0:3.11.394-1.git.439.4c37707.el7.x86_64", "7Server-RH7-RHOSE-3.11:golang-github-prometheus-alertmanager-0:3.11.394-1.git.0.1fbb64c.el7.src", "7Server-RH7-RHOSE-3.11:golang-github-prometheus-node_exporter-0:3.11.394-1.git.1062.8adc4b8.el7.src", "7Server-RH7-RHOSE-3.11:golang-github-prometheus-prometheus-0:3.11.394-1.git.5026.2c9627f.el7.src", "7Server-RH7-RHOSE-3.11:haproxy-0:1.8.28-1.el7.src", "7Server-RH7-RHOSE-3.11:haproxy-debuginfo-0:1.8.28-1.el7.ppc64le", "7Server-RH7-RHOSE-3.11:haproxy-debuginfo-0:1.8.28-1.el7.x86_64", "7Server-RH7-RHOSE-3.11:haproxy18-0:1.8.28-1.el7.ppc64le", "7Server-RH7-RHOSE-3.11:haproxy18-0:1.8.28-1.el7.x86_64", "7Server-RH7-RHOSE-3.11:jenkins-0:2.263.3.1612433584-1.el7.noarch", "7Server-RH7-RHOSE-3.11:jenkins-0:2.263.3.1612433584-1.el7.src", "7Server-RH7-RHOSE-3.11:openshift-ansible-0:3.11.394-6.git.0.47ec25d.el7.noarch", "7Server-RH7-RHOSE-3.11:openshift-ansible-0:3.11.394-6.git.0.47ec25d.el7.src", "7Server-RH7-RHOSE-3.11:openshift-ansible-docs-0:3.11.394-6.git.0.47ec25d.el7.noarch", "7Server-RH7-RHOSE-3.11:openshift-ansible-playbooks-0:3.11.394-6.git.0.47ec25d.el7.noarch", "7Server-RH7-RHOSE-3.11:openshift-ansible-roles-0:3.11.394-6.git.0.47ec25d.el7.noarch", "7Server-RH7-RHOSE-3.11:openshift-ansible-test-0:3.11.394-6.git.0.47ec25d.el7.noarch", "7Server-RH7-RHOSE-3.11:openshift-enterprise-autoheal-0:3.11.394-1.git.218.59eb597.el7.ppc64le", "7Server-RH7-RHOSE-3.11:openshift-enterprise-autoheal-0:3.11.394-1.git.218.59eb597.el7.src", "7Server-RH7-RHOSE-3.11:openshift-enterprise-autoheal-0:3.11.394-1.git.218.59eb597.el7.x86_64", "7Server-RH7-RHOSE-3.11:openshift-enterprise-cluster-capacity-0:3.11.394-1.git.379.92adfdc.el7.ppc64le", "7Server-RH7-RHOSE-3.11:openshift-enterprise-cluster-capacity-0:3.11.394-1.git.379.92adfdc.el7.src", "7Server-RH7-RHOSE-3.11:openshift-enterprise-cluster-capacity-0:3.11.394-1.git.379.92adfdc.el7.x86_64", "7Server-RH7-RHOSE-3.11:openshift-kuryr-0:3.11.394-1.git.1490.16ed375.el7.src", "7Server-RH7-RHOSE-3.11:openshift-kuryr-cni-0:3.11.394-1.git.1490.16ed375.el7.noarch", "7Server-RH7-RHOSE-3.11:openshift-kuryr-common-0:3.11.394-1.git.1490.16ed375.el7.noarch", "7Server-RH7-RHOSE-3.11:openshift-kuryr-controller-0:3.11.394-1.git.1490.16ed375.el7.noarch", "7Server-RH7-RHOSE-3.11:prometheus-0:3.11.394-1.git.5026.2c9627f.el7.ppc64le", "7Server-RH7-RHOSE-3.11:prometheus-0:3.11.394-1.git.5026.2c9627f.el7.x86_64", "7Server-RH7-RHOSE-3.11:prometheus-alertmanager-0:3.11.394-1.git.0.1fbb64c.el7.ppc64le", "7Server-RH7-RHOSE-3.11:prometheus-alertmanager-0:3.11.394-1.git.0.1fbb64c.el7.x86_64", "7Server-RH7-RHOSE-3.11:prometheus-node-exporter-0:3.11.394-1.git.1062.8adc4b8.el7.ppc64le", "7Server-RH7-RHOSE-3.11:prometheus-node-exporter-0:3.11.394-1.git.1062.8adc4b8.el7.x86_64", "7Server-RH7-RHOSE-3.11:python-rsa-0:4.5-3.el7.src", "7Server-RH7-RHOSE-3.11:python2-kuryr-kubernetes-0:3.11.394-1.git.1490.16ed375.el7.noarch", "7Server-RH7-RHOSE-3.11:python2-rsa-0:4.5-3.el7.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-2305" }, { "category": "external", "summary": "RHBZ#1895940", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1895940" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-2305", "url": "https://www.cve.org/CVERecord?id=CVE-2020-2305" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-2305", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-2305" }, { "category": "external", "summary": "https://www.jenkins.io/security/advisory/2020-11-04/#SECURITY-2115", "url": "https://www.jenkins.io/security/advisory/2020-11-04/#SECURITY-2115" } ], "release_date": "2020-11-04T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-03-03T12:28:39+00:00", "details": "Before applying this update, ensure all previously released errata relevant\nto your system is applied.\n\nSee the following documentation, which will be updated shortly for release\n3.11.394, for important instructions on how to upgrade your cluster and fully\napply this asynchronous errata update:\n\nhttps://docs.openshift.com/container-platform/3.11/release_notes/ocp_3_11_release_notes.html\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/articles/11258.", "product_ids": [ "7Server-RH7-RHOSE-3.11:jenkins-2-plugins-0:3.11.1612862361-1.el7.noarch", "7Server-RH7-RHOSE-3.11:jenkins-2-plugins-0:3.11.1612862361-1.el7.src" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:0637" }, { "category": "workaround", "details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update as soon as possible.", "product_ids": [ "7Server-RH7-RHOSE-3.11:atomic-enterprise-service-catalog-1:3.11.394-1.git.1675.fdb6e0b.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-enterprise-service-catalog-1:3.11.394-1.git.1675.fdb6e0b.el7.src", "7Server-RH7-RHOSE-3.11:atomic-enterprise-service-catalog-1:3.11.394-1.git.1675.fdb6e0b.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-enterprise-service-catalog-svcat-1:3.11.394-1.git.1675.fdb6e0b.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-enterprise-service-catalog-svcat-1:3.11.394-1.git.1675.fdb6e0b.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-0:3.11.394-1.git.0.e03a88e.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-0:3.11.394-1.git.0.e03a88e.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-0:3.11.394-1.git.0.e03a88e.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-clients-0:3.11.394-1.git.0.e03a88e.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-clients-0:3.11.394-1.git.0.e03a88e.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-clients-redistributable-0:3.11.394-1.git.0.e03a88e.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-cluster-autoscaler-0:3.11.394-1.git.0.1900c76.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-cluster-autoscaler-0:3.11.394-1.git.0.1900c76.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-cluster-autoscaler-0:3.11.394-1.git.0.1900c76.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-descheduler-0:3.11.394-1.git.299.ad3a3c0.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-descheduler-0:3.11.394-1.git.299.ad3a3c0.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-descheduler-0:3.11.394-1.git.299.ad3a3c0.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-docker-excluder-0:3.11.394-1.git.0.e03a88e.el7.noarch", "7Server-RH7-RHOSE-3.11:atomic-openshift-dockerregistry-0:3.11.394-1.git.481.6e48246.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-dockerregistry-0:3.11.394-1.git.481.6e48246.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-excluder-0:3.11.394-1.git.0.e03a88e.el7.noarch", "7Server-RH7-RHOSE-3.11:atomic-openshift-hyperkube-0:3.11.394-1.git.0.e03a88e.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-hyperkube-0:3.11.394-1.git.0.e03a88e.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-hypershift-0:3.11.394-1.git.0.e03a88e.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-hypershift-0:3.11.394-1.git.0.e03a88e.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-master-0:3.11.394-1.git.0.e03a88e.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-master-0:3.11.394-1.git.0.e03a88e.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-metrics-server-0:3.11.394-1.git.53.3d82586.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-metrics-server-0:3.11.394-1.git.53.3d82586.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-metrics-server-0:3.11.394-1.git.53.3d82586.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-node-0:3.11.394-1.git.0.e03a88e.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-node-0:3.11.394-1.git.0.e03a88e.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-node-problem-detector-0:3.11.394-1.git.263.49acf3a.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-node-problem-detector-0:3.11.394-1.git.263.49acf3a.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-node-problem-detector-0:3.11.394-1.git.263.49acf3a.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-pod-0:3.11.394-1.git.0.e03a88e.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-pod-0:3.11.394-1.git.0.e03a88e.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-sdn-ovs-0:3.11.394-1.git.0.e03a88e.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-sdn-ovs-0:3.11.394-1.git.0.e03a88e.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-service-idler-0:3.11.394-1.git.15.73f73cd.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-service-idler-0:3.11.394-1.git.15.73f73cd.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-service-idler-0:3.11.394-1.git.15.73f73cd.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-template-service-broker-0:3.11.394-1.git.0.e03a88e.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-template-service-broker-0:3.11.394-1.git.0.e03a88e.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-tests-0:3.11.394-1.git.0.e03a88e.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-tests-0:3.11.394-1.git.0.e03a88e.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-web-console-0:3.11.394-1.git.667.08dd2a6.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-web-console-0:3.11.394-1.git.667.08dd2a6.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-web-console-0:3.11.394-1.git.667.08dd2a6.el7.x86_64", "7Server-RH7-RHOSE-3.11:golang-github-openshift-oauth-proxy-0:3.11.394-1.git.439.4c37707.el7.ppc64le", "7Server-RH7-RHOSE-3.11:golang-github-openshift-oauth-proxy-0:3.11.394-1.git.439.4c37707.el7.src", "7Server-RH7-RHOSE-3.11:golang-github-openshift-oauth-proxy-0:3.11.394-1.git.439.4c37707.el7.x86_64", "7Server-RH7-RHOSE-3.11:golang-github-prometheus-alertmanager-0:3.11.394-1.git.0.1fbb64c.el7.src", "7Server-RH7-RHOSE-3.11:golang-github-prometheus-node_exporter-0:3.11.394-1.git.1062.8adc4b8.el7.src", "7Server-RH7-RHOSE-3.11:golang-github-prometheus-prometheus-0:3.11.394-1.git.5026.2c9627f.el7.src", "7Server-RH7-RHOSE-3.11:haproxy-0:1.8.28-1.el7.src", "7Server-RH7-RHOSE-3.11:haproxy-debuginfo-0:1.8.28-1.el7.ppc64le", "7Server-RH7-RHOSE-3.11:haproxy-debuginfo-0:1.8.28-1.el7.x86_64", "7Server-RH7-RHOSE-3.11:haproxy18-0:1.8.28-1.el7.ppc64le", "7Server-RH7-RHOSE-3.11:haproxy18-0:1.8.28-1.el7.x86_64", "7Server-RH7-RHOSE-3.11:jenkins-0:2.263.3.1612433584-1.el7.noarch", "7Server-RH7-RHOSE-3.11:jenkins-0:2.263.3.1612433584-1.el7.src", "7Server-RH7-RHOSE-3.11:jenkins-2-plugins-0:3.11.1612862361-1.el7.noarch", "7Server-RH7-RHOSE-3.11:jenkins-2-plugins-0:3.11.1612862361-1.el7.src", "7Server-RH7-RHOSE-3.11:openshift-ansible-0:3.11.394-6.git.0.47ec25d.el7.noarch", "7Server-RH7-RHOSE-3.11:openshift-ansible-0:3.11.394-6.git.0.47ec25d.el7.src", "7Server-RH7-RHOSE-3.11:openshift-ansible-docs-0:3.11.394-6.git.0.47ec25d.el7.noarch", "7Server-RH7-RHOSE-3.11:openshift-ansible-playbooks-0:3.11.394-6.git.0.47ec25d.el7.noarch", "7Server-RH7-RHOSE-3.11:openshift-ansible-roles-0:3.11.394-6.git.0.47ec25d.el7.noarch", "7Server-RH7-RHOSE-3.11:openshift-ansible-test-0:3.11.394-6.git.0.47ec25d.el7.noarch", "7Server-RH7-RHOSE-3.11:openshift-enterprise-autoheal-0:3.11.394-1.git.218.59eb597.el7.ppc64le", "7Server-RH7-RHOSE-3.11:openshift-enterprise-autoheal-0:3.11.394-1.git.218.59eb597.el7.src", "7Server-RH7-RHOSE-3.11:openshift-enterprise-autoheal-0:3.11.394-1.git.218.59eb597.el7.x86_64", "7Server-RH7-RHOSE-3.11:openshift-enterprise-cluster-capacity-0:3.11.394-1.git.379.92adfdc.el7.ppc64le", "7Server-RH7-RHOSE-3.11:openshift-enterprise-cluster-capacity-0:3.11.394-1.git.379.92adfdc.el7.src", "7Server-RH7-RHOSE-3.11:openshift-enterprise-cluster-capacity-0:3.11.394-1.git.379.92adfdc.el7.x86_64", "7Server-RH7-RHOSE-3.11:openshift-kuryr-0:3.11.394-1.git.1490.16ed375.el7.src", "7Server-RH7-RHOSE-3.11:openshift-kuryr-cni-0:3.11.394-1.git.1490.16ed375.el7.noarch", "7Server-RH7-RHOSE-3.11:openshift-kuryr-common-0:3.11.394-1.git.1490.16ed375.el7.noarch", "7Server-RH7-RHOSE-3.11:openshift-kuryr-controller-0:3.11.394-1.git.1490.16ed375.el7.noarch", "7Server-RH7-RHOSE-3.11:prometheus-0:3.11.394-1.git.5026.2c9627f.el7.ppc64le", "7Server-RH7-RHOSE-3.11:prometheus-0:3.11.394-1.git.5026.2c9627f.el7.x86_64", "7Server-RH7-RHOSE-3.11:prometheus-alertmanager-0:3.11.394-1.git.0.1fbb64c.el7.ppc64le", "7Server-RH7-RHOSE-3.11:prometheus-alertmanager-0:3.11.394-1.git.0.1fbb64c.el7.x86_64", "7Server-RH7-RHOSE-3.11:prometheus-node-exporter-0:3.11.394-1.git.1062.8adc4b8.el7.ppc64le", "7Server-RH7-RHOSE-3.11:prometheus-node-exporter-0:3.11.394-1.git.1062.8adc4b8.el7.x86_64", "7Server-RH7-RHOSE-3.11:python-rsa-0:4.5-3.el7.src", "7Server-RH7-RHOSE-3.11:python2-kuryr-kubernetes-0:3.11.394-1.git.1490.16ed375.el7.noarch", "7Server-RH7-RHOSE-3.11:python2-rsa-0:4.5-3.el7.noarch" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "7Server-RH7-RHOSE-3.11:jenkins-2-plugins-0:3.11.1612862361-1.el7.noarch", "7Server-RH7-RHOSE-3.11:jenkins-2-plugins-0:3.11.1612862361-1.el7.src" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "jenkins-2-plugins/mercurial: XML parser is not preventing XML external entity (XXE) attacks" }, { "cve": "CVE-2020-2306", "cwe": { "id": "CWE-862", "name": "Missing Authorization" }, "discovery_date": "2020-11-09T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "7Server-RH7-RHOSE-3.11:atomic-enterprise-service-catalog-1:3.11.394-1.git.1675.fdb6e0b.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-enterprise-service-catalog-1:3.11.394-1.git.1675.fdb6e0b.el7.src", "7Server-RH7-RHOSE-3.11:atomic-enterprise-service-catalog-1:3.11.394-1.git.1675.fdb6e0b.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-enterprise-service-catalog-svcat-1:3.11.394-1.git.1675.fdb6e0b.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-enterprise-service-catalog-svcat-1:3.11.394-1.git.1675.fdb6e0b.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-0:3.11.394-1.git.0.e03a88e.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-0:3.11.394-1.git.0.e03a88e.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-0:3.11.394-1.git.0.e03a88e.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-clients-0:3.11.394-1.git.0.e03a88e.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-clients-0:3.11.394-1.git.0.e03a88e.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-clients-redistributable-0:3.11.394-1.git.0.e03a88e.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-cluster-autoscaler-0:3.11.394-1.git.0.1900c76.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-cluster-autoscaler-0:3.11.394-1.git.0.1900c76.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-cluster-autoscaler-0:3.11.394-1.git.0.1900c76.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-descheduler-0:3.11.394-1.git.299.ad3a3c0.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-descheduler-0:3.11.394-1.git.299.ad3a3c0.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-descheduler-0:3.11.394-1.git.299.ad3a3c0.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-docker-excluder-0:3.11.394-1.git.0.e03a88e.el7.noarch", "7Server-RH7-RHOSE-3.11:atomic-openshift-dockerregistry-0:3.11.394-1.git.481.6e48246.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-dockerregistry-0:3.11.394-1.git.481.6e48246.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-excluder-0:3.11.394-1.git.0.e03a88e.el7.noarch", "7Server-RH7-RHOSE-3.11:atomic-openshift-hyperkube-0:3.11.394-1.git.0.e03a88e.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-hyperkube-0:3.11.394-1.git.0.e03a88e.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-hypershift-0:3.11.394-1.git.0.e03a88e.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-hypershift-0:3.11.394-1.git.0.e03a88e.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-master-0:3.11.394-1.git.0.e03a88e.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-master-0:3.11.394-1.git.0.e03a88e.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-metrics-server-0:3.11.394-1.git.53.3d82586.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-metrics-server-0:3.11.394-1.git.53.3d82586.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-metrics-server-0:3.11.394-1.git.53.3d82586.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-node-0:3.11.394-1.git.0.e03a88e.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-node-0:3.11.394-1.git.0.e03a88e.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-node-problem-detector-0:3.11.394-1.git.263.49acf3a.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-node-problem-detector-0:3.11.394-1.git.263.49acf3a.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-node-problem-detector-0:3.11.394-1.git.263.49acf3a.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-pod-0:3.11.394-1.git.0.e03a88e.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-pod-0:3.11.394-1.git.0.e03a88e.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-sdn-ovs-0:3.11.394-1.git.0.e03a88e.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-sdn-ovs-0:3.11.394-1.git.0.e03a88e.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-service-idler-0:3.11.394-1.git.15.73f73cd.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-service-idler-0:3.11.394-1.git.15.73f73cd.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-service-idler-0:3.11.394-1.git.15.73f73cd.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-template-service-broker-0:3.11.394-1.git.0.e03a88e.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-template-service-broker-0:3.11.394-1.git.0.e03a88e.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-tests-0:3.11.394-1.git.0.e03a88e.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-tests-0:3.11.394-1.git.0.e03a88e.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-web-console-0:3.11.394-1.git.667.08dd2a6.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-web-console-0:3.11.394-1.git.667.08dd2a6.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-web-console-0:3.11.394-1.git.667.08dd2a6.el7.x86_64", "7Server-RH7-RHOSE-3.11:golang-github-openshift-oauth-proxy-0:3.11.394-1.git.439.4c37707.el7.ppc64le", "7Server-RH7-RHOSE-3.11:golang-github-openshift-oauth-proxy-0:3.11.394-1.git.439.4c37707.el7.src", "7Server-RH7-RHOSE-3.11:golang-github-openshift-oauth-proxy-0:3.11.394-1.git.439.4c37707.el7.x86_64", "7Server-RH7-RHOSE-3.11:golang-github-prometheus-alertmanager-0:3.11.394-1.git.0.1fbb64c.el7.src", "7Server-RH7-RHOSE-3.11:golang-github-prometheus-node_exporter-0:3.11.394-1.git.1062.8adc4b8.el7.src", "7Server-RH7-RHOSE-3.11:golang-github-prometheus-prometheus-0:3.11.394-1.git.5026.2c9627f.el7.src", "7Server-RH7-RHOSE-3.11:haproxy-0:1.8.28-1.el7.src", "7Server-RH7-RHOSE-3.11:haproxy-debuginfo-0:1.8.28-1.el7.ppc64le", "7Server-RH7-RHOSE-3.11:haproxy-debuginfo-0:1.8.28-1.el7.x86_64", "7Server-RH7-RHOSE-3.11:haproxy18-0:1.8.28-1.el7.ppc64le", "7Server-RH7-RHOSE-3.11:haproxy18-0:1.8.28-1.el7.x86_64", "7Server-RH7-RHOSE-3.11:jenkins-0:2.263.3.1612433584-1.el7.noarch", "7Server-RH7-RHOSE-3.11:jenkins-0:2.263.3.1612433584-1.el7.src", "7Server-RH7-RHOSE-3.11:openshift-ansible-0:3.11.394-6.git.0.47ec25d.el7.noarch", "7Server-RH7-RHOSE-3.11:openshift-ansible-0:3.11.394-6.git.0.47ec25d.el7.src", "7Server-RH7-RHOSE-3.11:openshift-ansible-docs-0:3.11.394-6.git.0.47ec25d.el7.noarch", "7Server-RH7-RHOSE-3.11:openshift-ansible-playbooks-0:3.11.394-6.git.0.47ec25d.el7.noarch", "7Server-RH7-RHOSE-3.11:openshift-ansible-roles-0:3.11.394-6.git.0.47ec25d.el7.noarch", "7Server-RH7-RHOSE-3.11:openshift-ansible-test-0:3.11.394-6.git.0.47ec25d.el7.noarch", "7Server-RH7-RHOSE-3.11:openshift-enterprise-autoheal-0:3.11.394-1.git.218.59eb597.el7.ppc64le", "7Server-RH7-RHOSE-3.11:openshift-enterprise-autoheal-0:3.11.394-1.git.218.59eb597.el7.src", "7Server-RH7-RHOSE-3.11:openshift-enterprise-autoheal-0:3.11.394-1.git.218.59eb597.el7.x86_64", "7Server-RH7-RHOSE-3.11:openshift-enterprise-cluster-capacity-0:3.11.394-1.git.379.92adfdc.el7.ppc64le", "7Server-RH7-RHOSE-3.11:openshift-enterprise-cluster-capacity-0:3.11.394-1.git.379.92adfdc.el7.src", "7Server-RH7-RHOSE-3.11:openshift-enterprise-cluster-capacity-0:3.11.394-1.git.379.92adfdc.el7.x86_64", "7Server-RH7-RHOSE-3.11:openshift-kuryr-0:3.11.394-1.git.1490.16ed375.el7.src", "7Server-RH7-RHOSE-3.11:openshift-kuryr-cni-0:3.11.394-1.git.1490.16ed375.el7.noarch", "7Server-RH7-RHOSE-3.11:openshift-kuryr-common-0:3.11.394-1.git.1490.16ed375.el7.noarch", "7Server-RH7-RHOSE-3.11:openshift-kuryr-controller-0:3.11.394-1.git.1490.16ed375.el7.noarch", "7Server-RH7-RHOSE-3.11:prometheus-0:3.11.394-1.git.5026.2c9627f.el7.ppc64le", "7Server-RH7-RHOSE-3.11:prometheus-0:3.11.394-1.git.5026.2c9627f.el7.x86_64", "7Server-RH7-RHOSE-3.11:prometheus-alertmanager-0:3.11.394-1.git.0.1fbb64c.el7.ppc64le", "7Server-RH7-RHOSE-3.11:prometheus-alertmanager-0:3.11.394-1.git.0.1fbb64c.el7.x86_64", "7Server-RH7-RHOSE-3.11:prometheus-node-exporter-0:3.11.394-1.git.1062.8adc4b8.el7.ppc64le", "7Server-RH7-RHOSE-3.11:prometheus-node-exporter-0:3.11.394-1.git.1062.8adc4b8.el7.x86_64", "7Server-RH7-RHOSE-3.11:python-rsa-0:4.5-3.el7.src", "7Server-RH7-RHOSE-3.11:python2-kuryr-kubernetes-0:3.11.394-1.git.1490.16ed375.el7.noarch", "7Server-RH7-RHOSE-3.11:python2-rsa-0:4.5-3.el7.noarch" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1895941" } ], "notes": [ { "category": "description", "text": "A missing permission check in Jenkins Mercurial Plugin 2.11 and earlier allows attackers with Overall/Read permission to obtain a list of names of configured Mercurial installations.", "title": "Vulnerability description" }, { "category": "summary", "text": "jenkins-2-plugins/mercurial: Missing permission check in an HTTP endpoint could result in information disclosure", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RH7-RHOSE-3.11:jenkins-2-plugins-0:3.11.1612862361-1.el7.noarch", "7Server-RH7-RHOSE-3.11:jenkins-2-plugins-0:3.11.1612862361-1.el7.src" ], "known_not_affected": [ "7Server-RH7-RHOSE-3.11:atomic-enterprise-service-catalog-1:3.11.394-1.git.1675.fdb6e0b.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-enterprise-service-catalog-1:3.11.394-1.git.1675.fdb6e0b.el7.src", "7Server-RH7-RHOSE-3.11:atomic-enterprise-service-catalog-1:3.11.394-1.git.1675.fdb6e0b.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-enterprise-service-catalog-svcat-1:3.11.394-1.git.1675.fdb6e0b.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-enterprise-service-catalog-svcat-1:3.11.394-1.git.1675.fdb6e0b.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-0:3.11.394-1.git.0.e03a88e.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-0:3.11.394-1.git.0.e03a88e.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-0:3.11.394-1.git.0.e03a88e.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-clients-0:3.11.394-1.git.0.e03a88e.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-clients-0:3.11.394-1.git.0.e03a88e.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-clients-redistributable-0:3.11.394-1.git.0.e03a88e.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-cluster-autoscaler-0:3.11.394-1.git.0.1900c76.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-cluster-autoscaler-0:3.11.394-1.git.0.1900c76.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-cluster-autoscaler-0:3.11.394-1.git.0.1900c76.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-descheduler-0:3.11.394-1.git.299.ad3a3c0.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-descheduler-0:3.11.394-1.git.299.ad3a3c0.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-descheduler-0:3.11.394-1.git.299.ad3a3c0.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-docker-excluder-0:3.11.394-1.git.0.e03a88e.el7.noarch", "7Server-RH7-RHOSE-3.11:atomic-openshift-dockerregistry-0:3.11.394-1.git.481.6e48246.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-dockerregistry-0:3.11.394-1.git.481.6e48246.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-excluder-0:3.11.394-1.git.0.e03a88e.el7.noarch", "7Server-RH7-RHOSE-3.11:atomic-openshift-hyperkube-0:3.11.394-1.git.0.e03a88e.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-hyperkube-0:3.11.394-1.git.0.e03a88e.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-hypershift-0:3.11.394-1.git.0.e03a88e.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-hypershift-0:3.11.394-1.git.0.e03a88e.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-master-0:3.11.394-1.git.0.e03a88e.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-master-0:3.11.394-1.git.0.e03a88e.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-metrics-server-0:3.11.394-1.git.53.3d82586.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-metrics-server-0:3.11.394-1.git.53.3d82586.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-metrics-server-0:3.11.394-1.git.53.3d82586.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-node-0:3.11.394-1.git.0.e03a88e.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-node-0:3.11.394-1.git.0.e03a88e.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-node-problem-detector-0:3.11.394-1.git.263.49acf3a.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-node-problem-detector-0:3.11.394-1.git.263.49acf3a.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-node-problem-detector-0:3.11.394-1.git.263.49acf3a.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-pod-0:3.11.394-1.git.0.e03a88e.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-pod-0:3.11.394-1.git.0.e03a88e.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-sdn-ovs-0:3.11.394-1.git.0.e03a88e.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-sdn-ovs-0:3.11.394-1.git.0.e03a88e.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-service-idler-0:3.11.394-1.git.15.73f73cd.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-service-idler-0:3.11.394-1.git.15.73f73cd.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-service-idler-0:3.11.394-1.git.15.73f73cd.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-template-service-broker-0:3.11.394-1.git.0.e03a88e.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-template-service-broker-0:3.11.394-1.git.0.e03a88e.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-tests-0:3.11.394-1.git.0.e03a88e.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-tests-0:3.11.394-1.git.0.e03a88e.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-web-console-0:3.11.394-1.git.667.08dd2a6.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-web-console-0:3.11.394-1.git.667.08dd2a6.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-web-console-0:3.11.394-1.git.667.08dd2a6.el7.x86_64", "7Server-RH7-RHOSE-3.11:golang-github-openshift-oauth-proxy-0:3.11.394-1.git.439.4c37707.el7.ppc64le", "7Server-RH7-RHOSE-3.11:golang-github-openshift-oauth-proxy-0:3.11.394-1.git.439.4c37707.el7.src", "7Server-RH7-RHOSE-3.11:golang-github-openshift-oauth-proxy-0:3.11.394-1.git.439.4c37707.el7.x86_64", "7Server-RH7-RHOSE-3.11:golang-github-prometheus-alertmanager-0:3.11.394-1.git.0.1fbb64c.el7.src", "7Server-RH7-RHOSE-3.11:golang-github-prometheus-node_exporter-0:3.11.394-1.git.1062.8adc4b8.el7.src", "7Server-RH7-RHOSE-3.11:golang-github-prometheus-prometheus-0:3.11.394-1.git.5026.2c9627f.el7.src", "7Server-RH7-RHOSE-3.11:haproxy-0:1.8.28-1.el7.src", "7Server-RH7-RHOSE-3.11:haproxy-debuginfo-0:1.8.28-1.el7.ppc64le", "7Server-RH7-RHOSE-3.11:haproxy-debuginfo-0:1.8.28-1.el7.x86_64", "7Server-RH7-RHOSE-3.11:haproxy18-0:1.8.28-1.el7.ppc64le", "7Server-RH7-RHOSE-3.11:haproxy18-0:1.8.28-1.el7.x86_64", "7Server-RH7-RHOSE-3.11:jenkins-0:2.263.3.1612433584-1.el7.noarch", "7Server-RH7-RHOSE-3.11:jenkins-0:2.263.3.1612433584-1.el7.src", "7Server-RH7-RHOSE-3.11:openshift-ansible-0:3.11.394-6.git.0.47ec25d.el7.noarch", "7Server-RH7-RHOSE-3.11:openshift-ansible-0:3.11.394-6.git.0.47ec25d.el7.src", "7Server-RH7-RHOSE-3.11:openshift-ansible-docs-0:3.11.394-6.git.0.47ec25d.el7.noarch", "7Server-RH7-RHOSE-3.11:openshift-ansible-playbooks-0:3.11.394-6.git.0.47ec25d.el7.noarch", "7Server-RH7-RHOSE-3.11:openshift-ansible-roles-0:3.11.394-6.git.0.47ec25d.el7.noarch", "7Server-RH7-RHOSE-3.11:openshift-ansible-test-0:3.11.394-6.git.0.47ec25d.el7.noarch", "7Server-RH7-RHOSE-3.11:openshift-enterprise-autoheal-0:3.11.394-1.git.218.59eb597.el7.ppc64le", "7Server-RH7-RHOSE-3.11:openshift-enterprise-autoheal-0:3.11.394-1.git.218.59eb597.el7.src", "7Server-RH7-RHOSE-3.11:openshift-enterprise-autoheal-0:3.11.394-1.git.218.59eb597.el7.x86_64", "7Server-RH7-RHOSE-3.11:openshift-enterprise-cluster-capacity-0:3.11.394-1.git.379.92adfdc.el7.ppc64le", "7Server-RH7-RHOSE-3.11:openshift-enterprise-cluster-capacity-0:3.11.394-1.git.379.92adfdc.el7.src", "7Server-RH7-RHOSE-3.11:openshift-enterprise-cluster-capacity-0:3.11.394-1.git.379.92adfdc.el7.x86_64", "7Server-RH7-RHOSE-3.11:openshift-kuryr-0:3.11.394-1.git.1490.16ed375.el7.src", "7Server-RH7-RHOSE-3.11:openshift-kuryr-cni-0:3.11.394-1.git.1490.16ed375.el7.noarch", "7Server-RH7-RHOSE-3.11:openshift-kuryr-common-0:3.11.394-1.git.1490.16ed375.el7.noarch", "7Server-RH7-RHOSE-3.11:openshift-kuryr-controller-0:3.11.394-1.git.1490.16ed375.el7.noarch", "7Server-RH7-RHOSE-3.11:prometheus-0:3.11.394-1.git.5026.2c9627f.el7.ppc64le", "7Server-RH7-RHOSE-3.11:prometheus-0:3.11.394-1.git.5026.2c9627f.el7.x86_64", "7Server-RH7-RHOSE-3.11:prometheus-alertmanager-0:3.11.394-1.git.0.1fbb64c.el7.ppc64le", "7Server-RH7-RHOSE-3.11:prometheus-alertmanager-0:3.11.394-1.git.0.1fbb64c.el7.x86_64", "7Server-RH7-RHOSE-3.11:prometheus-node-exporter-0:3.11.394-1.git.1062.8adc4b8.el7.ppc64le", "7Server-RH7-RHOSE-3.11:prometheus-node-exporter-0:3.11.394-1.git.1062.8adc4b8.el7.x86_64", "7Server-RH7-RHOSE-3.11:python-rsa-0:4.5-3.el7.src", "7Server-RH7-RHOSE-3.11:python2-kuryr-kubernetes-0:3.11.394-1.git.1490.16ed375.el7.noarch", "7Server-RH7-RHOSE-3.11:python2-rsa-0:4.5-3.el7.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-2306" }, { "category": "external", "summary": "RHBZ#1895941", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1895941" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-2306", "url": "https://www.cve.org/CVERecord?id=CVE-2020-2306" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-2306", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-2306" }, { "category": "external", "summary": "https://www.jenkins.io/security/advisory/2020-11-04/#SECURITY-2104", "url": "https://www.jenkins.io/security/advisory/2020-11-04/#SECURITY-2104" } ], "release_date": "2020-11-04T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-03-03T12:28:39+00:00", "details": "Before applying this update, ensure all previously released errata relevant\nto your system is applied.\n\nSee the following documentation, which will be updated shortly for release\n3.11.394, for important instructions on how to upgrade your cluster and fully\napply this asynchronous errata update:\n\nhttps://docs.openshift.com/container-platform/3.11/release_notes/ocp_3_11_release_notes.html\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/articles/11258.", "product_ids": [ "7Server-RH7-RHOSE-3.11:jenkins-2-plugins-0:3.11.1612862361-1.el7.noarch", "7Server-RH7-RHOSE-3.11:jenkins-2-plugins-0:3.11.1612862361-1.el7.src" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:0637" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "7Server-RH7-RHOSE-3.11:jenkins-2-plugins-0:3.11.1612862361-1.el7.noarch", "7Server-RH7-RHOSE-3.11:jenkins-2-plugins-0:3.11.1612862361-1.el7.src" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "jenkins-2-plugins/mercurial: Missing permission check in an HTTP endpoint could result in information disclosure" }, { "cve": "CVE-2020-2307", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "discovery_date": "2020-11-09T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "7Server-RH7-RHOSE-3.11:atomic-enterprise-service-catalog-1:3.11.394-1.git.1675.fdb6e0b.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-enterprise-service-catalog-1:3.11.394-1.git.1675.fdb6e0b.el7.src", "7Server-RH7-RHOSE-3.11:atomic-enterprise-service-catalog-1:3.11.394-1.git.1675.fdb6e0b.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-enterprise-service-catalog-svcat-1:3.11.394-1.git.1675.fdb6e0b.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-enterprise-service-catalog-svcat-1:3.11.394-1.git.1675.fdb6e0b.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-0:3.11.394-1.git.0.e03a88e.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-0:3.11.394-1.git.0.e03a88e.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-0:3.11.394-1.git.0.e03a88e.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-clients-0:3.11.394-1.git.0.e03a88e.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-clients-0:3.11.394-1.git.0.e03a88e.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-clients-redistributable-0:3.11.394-1.git.0.e03a88e.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-cluster-autoscaler-0:3.11.394-1.git.0.1900c76.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-cluster-autoscaler-0:3.11.394-1.git.0.1900c76.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-cluster-autoscaler-0:3.11.394-1.git.0.1900c76.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-descheduler-0:3.11.394-1.git.299.ad3a3c0.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-descheduler-0:3.11.394-1.git.299.ad3a3c0.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-descheduler-0:3.11.394-1.git.299.ad3a3c0.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-docker-excluder-0:3.11.394-1.git.0.e03a88e.el7.noarch", "7Server-RH7-RHOSE-3.11:atomic-openshift-dockerregistry-0:3.11.394-1.git.481.6e48246.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-dockerregistry-0:3.11.394-1.git.481.6e48246.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-excluder-0:3.11.394-1.git.0.e03a88e.el7.noarch", "7Server-RH7-RHOSE-3.11:atomic-openshift-hyperkube-0:3.11.394-1.git.0.e03a88e.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-hyperkube-0:3.11.394-1.git.0.e03a88e.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-hypershift-0:3.11.394-1.git.0.e03a88e.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-hypershift-0:3.11.394-1.git.0.e03a88e.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-master-0:3.11.394-1.git.0.e03a88e.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-master-0:3.11.394-1.git.0.e03a88e.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-metrics-server-0:3.11.394-1.git.53.3d82586.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-metrics-server-0:3.11.394-1.git.53.3d82586.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-metrics-server-0:3.11.394-1.git.53.3d82586.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-node-0:3.11.394-1.git.0.e03a88e.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-node-0:3.11.394-1.git.0.e03a88e.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-node-problem-detector-0:3.11.394-1.git.263.49acf3a.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-node-problem-detector-0:3.11.394-1.git.263.49acf3a.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-node-problem-detector-0:3.11.394-1.git.263.49acf3a.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-pod-0:3.11.394-1.git.0.e03a88e.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-pod-0:3.11.394-1.git.0.e03a88e.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-sdn-ovs-0:3.11.394-1.git.0.e03a88e.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-sdn-ovs-0:3.11.394-1.git.0.e03a88e.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-service-idler-0:3.11.394-1.git.15.73f73cd.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-service-idler-0:3.11.394-1.git.15.73f73cd.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-service-idler-0:3.11.394-1.git.15.73f73cd.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-template-service-broker-0:3.11.394-1.git.0.e03a88e.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-template-service-broker-0:3.11.394-1.git.0.e03a88e.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-tests-0:3.11.394-1.git.0.e03a88e.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-tests-0:3.11.394-1.git.0.e03a88e.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-web-console-0:3.11.394-1.git.667.08dd2a6.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-web-console-0:3.11.394-1.git.667.08dd2a6.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-web-console-0:3.11.394-1.git.667.08dd2a6.el7.x86_64", "7Server-RH7-RHOSE-3.11:golang-github-openshift-oauth-proxy-0:3.11.394-1.git.439.4c37707.el7.ppc64le", "7Server-RH7-RHOSE-3.11:golang-github-openshift-oauth-proxy-0:3.11.394-1.git.439.4c37707.el7.src", "7Server-RH7-RHOSE-3.11:golang-github-openshift-oauth-proxy-0:3.11.394-1.git.439.4c37707.el7.x86_64", "7Server-RH7-RHOSE-3.11:golang-github-prometheus-alertmanager-0:3.11.394-1.git.0.1fbb64c.el7.src", "7Server-RH7-RHOSE-3.11:golang-github-prometheus-node_exporter-0:3.11.394-1.git.1062.8adc4b8.el7.src", "7Server-RH7-RHOSE-3.11:golang-github-prometheus-prometheus-0:3.11.394-1.git.5026.2c9627f.el7.src", "7Server-RH7-RHOSE-3.11:haproxy-0:1.8.28-1.el7.src", "7Server-RH7-RHOSE-3.11:haproxy-debuginfo-0:1.8.28-1.el7.ppc64le", "7Server-RH7-RHOSE-3.11:haproxy-debuginfo-0:1.8.28-1.el7.x86_64", "7Server-RH7-RHOSE-3.11:haproxy18-0:1.8.28-1.el7.ppc64le", "7Server-RH7-RHOSE-3.11:haproxy18-0:1.8.28-1.el7.x86_64", "7Server-RH7-RHOSE-3.11:jenkins-0:2.263.3.1612433584-1.el7.noarch", "7Server-RH7-RHOSE-3.11:jenkins-0:2.263.3.1612433584-1.el7.src", "7Server-RH7-RHOSE-3.11:openshift-ansible-0:3.11.394-6.git.0.47ec25d.el7.noarch", "7Server-RH7-RHOSE-3.11:openshift-ansible-0:3.11.394-6.git.0.47ec25d.el7.src", "7Server-RH7-RHOSE-3.11:openshift-ansible-docs-0:3.11.394-6.git.0.47ec25d.el7.noarch", "7Server-RH7-RHOSE-3.11:openshift-ansible-playbooks-0:3.11.394-6.git.0.47ec25d.el7.noarch", "7Server-RH7-RHOSE-3.11:openshift-ansible-roles-0:3.11.394-6.git.0.47ec25d.el7.noarch", "7Server-RH7-RHOSE-3.11:openshift-ansible-test-0:3.11.394-6.git.0.47ec25d.el7.noarch", "7Server-RH7-RHOSE-3.11:openshift-enterprise-autoheal-0:3.11.394-1.git.218.59eb597.el7.ppc64le", "7Server-RH7-RHOSE-3.11:openshift-enterprise-autoheal-0:3.11.394-1.git.218.59eb597.el7.src", "7Server-RH7-RHOSE-3.11:openshift-enterprise-autoheal-0:3.11.394-1.git.218.59eb597.el7.x86_64", "7Server-RH7-RHOSE-3.11:openshift-enterprise-cluster-capacity-0:3.11.394-1.git.379.92adfdc.el7.ppc64le", "7Server-RH7-RHOSE-3.11:openshift-enterprise-cluster-capacity-0:3.11.394-1.git.379.92adfdc.el7.src", "7Server-RH7-RHOSE-3.11:openshift-enterprise-cluster-capacity-0:3.11.394-1.git.379.92adfdc.el7.x86_64", "7Server-RH7-RHOSE-3.11:openshift-kuryr-0:3.11.394-1.git.1490.16ed375.el7.src", "7Server-RH7-RHOSE-3.11:openshift-kuryr-cni-0:3.11.394-1.git.1490.16ed375.el7.noarch", "7Server-RH7-RHOSE-3.11:openshift-kuryr-common-0:3.11.394-1.git.1490.16ed375.el7.noarch", "7Server-RH7-RHOSE-3.11:openshift-kuryr-controller-0:3.11.394-1.git.1490.16ed375.el7.noarch", "7Server-RH7-RHOSE-3.11:prometheus-0:3.11.394-1.git.5026.2c9627f.el7.ppc64le", "7Server-RH7-RHOSE-3.11:prometheus-0:3.11.394-1.git.5026.2c9627f.el7.x86_64", "7Server-RH7-RHOSE-3.11:prometheus-alertmanager-0:3.11.394-1.git.0.1fbb64c.el7.ppc64le", "7Server-RH7-RHOSE-3.11:prometheus-alertmanager-0:3.11.394-1.git.0.1fbb64c.el7.x86_64", "7Server-RH7-RHOSE-3.11:prometheus-node-exporter-0:3.11.394-1.git.1062.8adc4b8.el7.ppc64le", "7Server-RH7-RHOSE-3.11:prometheus-node-exporter-0:3.11.394-1.git.1062.8adc4b8.el7.x86_64", "7Server-RH7-RHOSE-3.11:python-rsa-0:4.5-3.el7.src", "7Server-RH7-RHOSE-3.11:python2-kuryr-kubernetes-0:3.11.394-1.git.1490.16ed375.el7.noarch", "7Server-RH7-RHOSE-3.11:python2-rsa-0:4.5-3.el7.noarch" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1895945" } ], "notes": [ { "category": "description", "text": "Jenkins Kubernetes Plugin 1.27.3 and earlier allows low-privilege users to access possibly sensitive Jenkins controller environment variables.", "title": "Vulnerability description" }, { "category": "summary", "text": "jenkins-2-plugins/kubernetes: Jenkins controller environment variables are accessible in Kubernetes Plugin", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RH7-RHOSE-3.11:jenkins-2-plugins-0:3.11.1612862361-1.el7.noarch", "7Server-RH7-RHOSE-3.11:jenkins-2-plugins-0:3.11.1612862361-1.el7.src" ], "known_not_affected": [ "7Server-RH7-RHOSE-3.11:atomic-enterprise-service-catalog-1:3.11.394-1.git.1675.fdb6e0b.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-enterprise-service-catalog-1:3.11.394-1.git.1675.fdb6e0b.el7.src", "7Server-RH7-RHOSE-3.11:atomic-enterprise-service-catalog-1:3.11.394-1.git.1675.fdb6e0b.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-enterprise-service-catalog-svcat-1:3.11.394-1.git.1675.fdb6e0b.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-enterprise-service-catalog-svcat-1:3.11.394-1.git.1675.fdb6e0b.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-0:3.11.394-1.git.0.e03a88e.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-0:3.11.394-1.git.0.e03a88e.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-0:3.11.394-1.git.0.e03a88e.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-clients-0:3.11.394-1.git.0.e03a88e.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-clients-0:3.11.394-1.git.0.e03a88e.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-clients-redistributable-0:3.11.394-1.git.0.e03a88e.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-cluster-autoscaler-0:3.11.394-1.git.0.1900c76.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-cluster-autoscaler-0:3.11.394-1.git.0.1900c76.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-cluster-autoscaler-0:3.11.394-1.git.0.1900c76.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-descheduler-0:3.11.394-1.git.299.ad3a3c0.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-descheduler-0:3.11.394-1.git.299.ad3a3c0.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-descheduler-0:3.11.394-1.git.299.ad3a3c0.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-docker-excluder-0:3.11.394-1.git.0.e03a88e.el7.noarch", "7Server-RH7-RHOSE-3.11:atomic-openshift-dockerregistry-0:3.11.394-1.git.481.6e48246.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-dockerregistry-0:3.11.394-1.git.481.6e48246.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-excluder-0:3.11.394-1.git.0.e03a88e.el7.noarch", "7Server-RH7-RHOSE-3.11:atomic-openshift-hyperkube-0:3.11.394-1.git.0.e03a88e.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-hyperkube-0:3.11.394-1.git.0.e03a88e.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-hypershift-0:3.11.394-1.git.0.e03a88e.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-hypershift-0:3.11.394-1.git.0.e03a88e.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-master-0:3.11.394-1.git.0.e03a88e.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-master-0:3.11.394-1.git.0.e03a88e.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-metrics-server-0:3.11.394-1.git.53.3d82586.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-metrics-server-0:3.11.394-1.git.53.3d82586.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-metrics-server-0:3.11.394-1.git.53.3d82586.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-node-0:3.11.394-1.git.0.e03a88e.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-node-0:3.11.394-1.git.0.e03a88e.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-node-problem-detector-0:3.11.394-1.git.263.49acf3a.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-node-problem-detector-0:3.11.394-1.git.263.49acf3a.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-node-problem-detector-0:3.11.394-1.git.263.49acf3a.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-pod-0:3.11.394-1.git.0.e03a88e.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-pod-0:3.11.394-1.git.0.e03a88e.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-sdn-ovs-0:3.11.394-1.git.0.e03a88e.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-sdn-ovs-0:3.11.394-1.git.0.e03a88e.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-service-idler-0:3.11.394-1.git.15.73f73cd.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-service-idler-0:3.11.394-1.git.15.73f73cd.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-service-idler-0:3.11.394-1.git.15.73f73cd.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-template-service-broker-0:3.11.394-1.git.0.e03a88e.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-template-service-broker-0:3.11.394-1.git.0.e03a88e.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-tests-0:3.11.394-1.git.0.e03a88e.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-tests-0:3.11.394-1.git.0.e03a88e.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-web-console-0:3.11.394-1.git.667.08dd2a6.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-web-console-0:3.11.394-1.git.667.08dd2a6.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-web-console-0:3.11.394-1.git.667.08dd2a6.el7.x86_64", "7Server-RH7-RHOSE-3.11:golang-github-openshift-oauth-proxy-0:3.11.394-1.git.439.4c37707.el7.ppc64le", "7Server-RH7-RHOSE-3.11:golang-github-openshift-oauth-proxy-0:3.11.394-1.git.439.4c37707.el7.src", "7Server-RH7-RHOSE-3.11:golang-github-openshift-oauth-proxy-0:3.11.394-1.git.439.4c37707.el7.x86_64", "7Server-RH7-RHOSE-3.11:golang-github-prometheus-alertmanager-0:3.11.394-1.git.0.1fbb64c.el7.src", "7Server-RH7-RHOSE-3.11:golang-github-prometheus-node_exporter-0:3.11.394-1.git.1062.8adc4b8.el7.src", "7Server-RH7-RHOSE-3.11:golang-github-prometheus-prometheus-0:3.11.394-1.git.5026.2c9627f.el7.src", "7Server-RH7-RHOSE-3.11:haproxy-0:1.8.28-1.el7.src", "7Server-RH7-RHOSE-3.11:haproxy-debuginfo-0:1.8.28-1.el7.ppc64le", "7Server-RH7-RHOSE-3.11:haproxy-debuginfo-0:1.8.28-1.el7.x86_64", "7Server-RH7-RHOSE-3.11:haproxy18-0:1.8.28-1.el7.ppc64le", "7Server-RH7-RHOSE-3.11:haproxy18-0:1.8.28-1.el7.x86_64", "7Server-RH7-RHOSE-3.11:jenkins-0:2.263.3.1612433584-1.el7.noarch", "7Server-RH7-RHOSE-3.11:jenkins-0:2.263.3.1612433584-1.el7.src", "7Server-RH7-RHOSE-3.11:openshift-ansible-0:3.11.394-6.git.0.47ec25d.el7.noarch", "7Server-RH7-RHOSE-3.11:openshift-ansible-0:3.11.394-6.git.0.47ec25d.el7.src", "7Server-RH7-RHOSE-3.11:openshift-ansible-docs-0:3.11.394-6.git.0.47ec25d.el7.noarch", "7Server-RH7-RHOSE-3.11:openshift-ansible-playbooks-0:3.11.394-6.git.0.47ec25d.el7.noarch", "7Server-RH7-RHOSE-3.11:openshift-ansible-roles-0:3.11.394-6.git.0.47ec25d.el7.noarch", "7Server-RH7-RHOSE-3.11:openshift-ansible-test-0:3.11.394-6.git.0.47ec25d.el7.noarch", "7Server-RH7-RHOSE-3.11:openshift-enterprise-autoheal-0:3.11.394-1.git.218.59eb597.el7.ppc64le", "7Server-RH7-RHOSE-3.11:openshift-enterprise-autoheal-0:3.11.394-1.git.218.59eb597.el7.src", "7Server-RH7-RHOSE-3.11:openshift-enterprise-autoheal-0:3.11.394-1.git.218.59eb597.el7.x86_64", "7Server-RH7-RHOSE-3.11:openshift-enterprise-cluster-capacity-0:3.11.394-1.git.379.92adfdc.el7.ppc64le", "7Server-RH7-RHOSE-3.11:openshift-enterprise-cluster-capacity-0:3.11.394-1.git.379.92adfdc.el7.src", "7Server-RH7-RHOSE-3.11:openshift-enterprise-cluster-capacity-0:3.11.394-1.git.379.92adfdc.el7.x86_64", "7Server-RH7-RHOSE-3.11:openshift-kuryr-0:3.11.394-1.git.1490.16ed375.el7.src", "7Server-RH7-RHOSE-3.11:openshift-kuryr-cni-0:3.11.394-1.git.1490.16ed375.el7.noarch", "7Server-RH7-RHOSE-3.11:openshift-kuryr-common-0:3.11.394-1.git.1490.16ed375.el7.noarch", "7Server-RH7-RHOSE-3.11:openshift-kuryr-controller-0:3.11.394-1.git.1490.16ed375.el7.noarch", "7Server-RH7-RHOSE-3.11:prometheus-0:3.11.394-1.git.5026.2c9627f.el7.ppc64le", "7Server-RH7-RHOSE-3.11:prometheus-0:3.11.394-1.git.5026.2c9627f.el7.x86_64", "7Server-RH7-RHOSE-3.11:prometheus-alertmanager-0:3.11.394-1.git.0.1fbb64c.el7.ppc64le", "7Server-RH7-RHOSE-3.11:prometheus-alertmanager-0:3.11.394-1.git.0.1fbb64c.el7.x86_64", "7Server-RH7-RHOSE-3.11:prometheus-node-exporter-0:3.11.394-1.git.1062.8adc4b8.el7.ppc64le", "7Server-RH7-RHOSE-3.11:prometheus-node-exporter-0:3.11.394-1.git.1062.8adc4b8.el7.x86_64", "7Server-RH7-RHOSE-3.11:python-rsa-0:4.5-3.el7.src", "7Server-RH7-RHOSE-3.11:python2-kuryr-kubernetes-0:3.11.394-1.git.1490.16ed375.el7.noarch", "7Server-RH7-RHOSE-3.11:python2-rsa-0:4.5-3.el7.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-2307" }, { "category": "external", "summary": "RHBZ#1895945", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1895945" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-2307", "url": "https://www.cve.org/CVERecord?id=CVE-2020-2307" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-2307", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-2307" }, { "category": "external", "summary": "https://www.jenkins.io/security/advisory/2020-11-04/#SECURITY-1646", "url": "https://www.jenkins.io/security/advisory/2020-11-04/#SECURITY-1646" } ], "release_date": "2020-11-04T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-03-03T12:28:39+00:00", "details": "Before applying this update, ensure all previously released errata relevant\nto your system is applied.\n\nSee the following documentation, which will be updated shortly for release\n3.11.394, for important instructions on how to upgrade your cluster and fully\napply this asynchronous errata update:\n\nhttps://docs.openshift.com/container-platform/3.11/release_notes/ocp_3_11_release_notes.html\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/articles/11258.", "product_ids": [ "7Server-RH7-RHOSE-3.11:jenkins-2-plugins-0:3.11.1612862361-1.el7.noarch", "7Server-RH7-RHOSE-3.11:jenkins-2-plugins-0:3.11.1612862361-1.el7.src" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:0637" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "7Server-RH7-RHOSE-3.11:jenkins-2-plugins-0:3.11.1612862361-1.el7.noarch", "7Server-RH7-RHOSE-3.11:jenkins-2-plugins-0:3.11.1612862361-1.el7.src" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "jenkins-2-plugins/kubernetes: Jenkins controller environment variables are accessible in Kubernetes Plugin" }, { "cve": "CVE-2020-2308", "cwe": { "id": "CWE-862", "name": "Missing Authorization" }, "discovery_date": "2020-11-09T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "7Server-RH7-RHOSE-3.11:atomic-enterprise-service-catalog-1:3.11.394-1.git.1675.fdb6e0b.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-enterprise-service-catalog-1:3.11.394-1.git.1675.fdb6e0b.el7.src", "7Server-RH7-RHOSE-3.11:atomic-enterprise-service-catalog-1:3.11.394-1.git.1675.fdb6e0b.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-enterprise-service-catalog-svcat-1:3.11.394-1.git.1675.fdb6e0b.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-enterprise-service-catalog-svcat-1:3.11.394-1.git.1675.fdb6e0b.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-0:3.11.394-1.git.0.e03a88e.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-0:3.11.394-1.git.0.e03a88e.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-0:3.11.394-1.git.0.e03a88e.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-clients-0:3.11.394-1.git.0.e03a88e.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-clients-0:3.11.394-1.git.0.e03a88e.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-clients-redistributable-0:3.11.394-1.git.0.e03a88e.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-cluster-autoscaler-0:3.11.394-1.git.0.1900c76.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-cluster-autoscaler-0:3.11.394-1.git.0.1900c76.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-cluster-autoscaler-0:3.11.394-1.git.0.1900c76.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-descheduler-0:3.11.394-1.git.299.ad3a3c0.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-descheduler-0:3.11.394-1.git.299.ad3a3c0.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-descheduler-0:3.11.394-1.git.299.ad3a3c0.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-docker-excluder-0:3.11.394-1.git.0.e03a88e.el7.noarch", "7Server-RH7-RHOSE-3.11:atomic-openshift-dockerregistry-0:3.11.394-1.git.481.6e48246.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-dockerregistry-0:3.11.394-1.git.481.6e48246.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-excluder-0:3.11.394-1.git.0.e03a88e.el7.noarch", "7Server-RH7-RHOSE-3.11:atomic-openshift-hyperkube-0:3.11.394-1.git.0.e03a88e.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-hyperkube-0:3.11.394-1.git.0.e03a88e.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-hypershift-0:3.11.394-1.git.0.e03a88e.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-hypershift-0:3.11.394-1.git.0.e03a88e.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-master-0:3.11.394-1.git.0.e03a88e.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-master-0:3.11.394-1.git.0.e03a88e.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-metrics-server-0:3.11.394-1.git.53.3d82586.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-metrics-server-0:3.11.394-1.git.53.3d82586.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-metrics-server-0:3.11.394-1.git.53.3d82586.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-node-0:3.11.394-1.git.0.e03a88e.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-node-0:3.11.394-1.git.0.e03a88e.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-node-problem-detector-0:3.11.394-1.git.263.49acf3a.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-node-problem-detector-0:3.11.394-1.git.263.49acf3a.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-node-problem-detector-0:3.11.394-1.git.263.49acf3a.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-pod-0:3.11.394-1.git.0.e03a88e.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-pod-0:3.11.394-1.git.0.e03a88e.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-sdn-ovs-0:3.11.394-1.git.0.e03a88e.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-sdn-ovs-0:3.11.394-1.git.0.e03a88e.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-service-idler-0:3.11.394-1.git.15.73f73cd.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-service-idler-0:3.11.394-1.git.15.73f73cd.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-service-idler-0:3.11.394-1.git.15.73f73cd.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-template-service-broker-0:3.11.394-1.git.0.e03a88e.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-template-service-broker-0:3.11.394-1.git.0.e03a88e.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-tests-0:3.11.394-1.git.0.e03a88e.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-tests-0:3.11.394-1.git.0.e03a88e.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-web-console-0:3.11.394-1.git.667.08dd2a6.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-web-console-0:3.11.394-1.git.667.08dd2a6.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-web-console-0:3.11.394-1.git.667.08dd2a6.el7.x86_64", "7Server-RH7-RHOSE-3.11:golang-github-openshift-oauth-proxy-0:3.11.394-1.git.439.4c37707.el7.ppc64le", "7Server-RH7-RHOSE-3.11:golang-github-openshift-oauth-proxy-0:3.11.394-1.git.439.4c37707.el7.src", "7Server-RH7-RHOSE-3.11:golang-github-openshift-oauth-proxy-0:3.11.394-1.git.439.4c37707.el7.x86_64", "7Server-RH7-RHOSE-3.11:golang-github-prometheus-alertmanager-0:3.11.394-1.git.0.1fbb64c.el7.src", "7Server-RH7-RHOSE-3.11:golang-github-prometheus-node_exporter-0:3.11.394-1.git.1062.8adc4b8.el7.src", "7Server-RH7-RHOSE-3.11:golang-github-prometheus-prometheus-0:3.11.394-1.git.5026.2c9627f.el7.src", "7Server-RH7-RHOSE-3.11:haproxy-0:1.8.28-1.el7.src", "7Server-RH7-RHOSE-3.11:haproxy-debuginfo-0:1.8.28-1.el7.ppc64le", "7Server-RH7-RHOSE-3.11:haproxy-debuginfo-0:1.8.28-1.el7.x86_64", "7Server-RH7-RHOSE-3.11:haproxy18-0:1.8.28-1.el7.ppc64le", "7Server-RH7-RHOSE-3.11:haproxy18-0:1.8.28-1.el7.x86_64", "7Server-RH7-RHOSE-3.11:jenkins-0:2.263.3.1612433584-1.el7.noarch", "7Server-RH7-RHOSE-3.11:jenkins-0:2.263.3.1612433584-1.el7.src", "7Server-RH7-RHOSE-3.11:openshift-ansible-0:3.11.394-6.git.0.47ec25d.el7.noarch", "7Server-RH7-RHOSE-3.11:openshift-ansible-0:3.11.394-6.git.0.47ec25d.el7.src", "7Server-RH7-RHOSE-3.11:openshift-ansible-docs-0:3.11.394-6.git.0.47ec25d.el7.noarch", "7Server-RH7-RHOSE-3.11:openshift-ansible-playbooks-0:3.11.394-6.git.0.47ec25d.el7.noarch", "7Server-RH7-RHOSE-3.11:openshift-ansible-roles-0:3.11.394-6.git.0.47ec25d.el7.noarch", "7Server-RH7-RHOSE-3.11:openshift-ansible-test-0:3.11.394-6.git.0.47ec25d.el7.noarch", "7Server-RH7-RHOSE-3.11:openshift-enterprise-autoheal-0:3.11.394-1.git.218.59eb597.el7.ppc64le", "7Server-RH7-RHOSE-3.11:openshift-enterprise-autoheal-0:3.11.394-1.git.218.59eb597.el7.src", "7Server-RH7-RHOSE-3.11:openshift-enterprise-autoheal-0:3.11.394-1.git.218.59eb597.el7.x86_64", "7Server-RH7-RHOSE-3.11:openshift-enterprise-cluster-capacity-0:3.11.394-1.git.379.92adfdc.el7.ppc64le", "7Server-RH7-RHOSE-3.11:openshift-enterprise-cluster-capacity-0:3.11.394-1.git.379.92adfdc.el7.src", "7Server-RH7-RHOSE-3.11:openshift-enterprise-cluster-capacity-0:3.11.394-1.git.379.92adfdc.el7.x86_64", "7Server-RH7-RHOSE-3.11:openshift-kuryr-0:3.11.394-1.git.1490.16ed375.el7.src", "7Server-RH7-RHOSE-3.11:openshift-kuryr-cni-0:3.11.394-1.git.1490.16ed375.el7.noarch", "7Server-RH7-RHOSE-3.11:openshift-kuryr-common-0:3.11.394-1.git.1490.16ed375.el7.noarch", "7Server-RH7-RHOSE-3.11:openshift-kuryr-controller-0:3.11.394-1.git.1490.16ed375.el7.noarch", "7Server-RH7-RHOSE-3.11:prometheus-0:3.11.394-1.git.5026.2c9627f.el7.ppc64le", "7Server-RH7-RHOSE-3.11:prometheus-0:3.11.394-1.git.5026.2c9627f.el7.x86_64", "7Server-RH7-RHOSE-3.11:prometheus-alertmanager-0:3.11.394-1.git.0.1fbb64c.el7.ppc64le", "7Server-RH7-RHOSE-3.11:prometheus-alertmanager-0:3.11.394-1.git.0.1fbb64c.el7.x86_64", "7Server-RH7-RHOSE-3.11:prometheus-node-exporter-0:3.11.394-1.git.1062.8adc4b8.el7.ppc64le", "7Server-RH7-RHOSE-3.11:prometheus-node-exporter-0:3.11.394-1.git.1062.8adc4b8.el7.x86_64", "7Server-RH7-RHOSE-3.11:python-rsa-0:4.5-3.el7.src", "7Server-RH7-RHOSE-3.11:python2-kuryr-kubernetes-0:3.11.394-1.git.1490.16ed375.el7.noarch", "7Server-RH7-RHOSE-3.11:python2-rsa-0:4.5-3.el7.noarch" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1895946" } ], "notes": [ { "category": "description", "text": "A missing permission check in Jenkins Kubernetes Plugin 1.27.3 and earlier allows attackers with Overall/Read permission to list global pod template names.", "title": "Vulnerability description" }, { "category": "summary", "text": "jenkins-2-plugins/kubernetes: Missing permission check in Kubernetes Plugin allows listing pod templates", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RH7-RHOSE-3.11:jenkins-2-plugins-0:3.11.1612862361-1.el7.noarch", "7Server-RH7-RHOSE-3.11:jenkins-2-plugins-0:3.11.1612862361-1.el7.src" ], "known_not_affected": [ "7Server-RH7-RHOSE-3.11:atomic-enterprise-service-catalog-1:3.11.394-1.git.1675.fdb6e0b.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-enterprise-service-catalog-1:3.11.394-1.git.1675.fdb6e0b.el7.src", "7Server-RH7-RHOSE-3.11:atomic-enterprise-service-catalog-1:3.11.394-1.git.1675.fdb6e0b.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-enterprise-service-catalog-svcat-1:3.11.394-1.git.1675.fdb6e0b.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-enterprise-service-catalog-svcat-1:3.11.394-1.git.1675.fdb6e0b.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-0:3.11.394-1.git.0.e03a88e.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-0:3.11.394-1.git.0.e03a88e.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-0:3.11.394-1.git.0.e03a88e.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-clients-0:3.11.394-1.git.0.e03a88e.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-clients-0:3.11.394-1.git.0.e03a88e.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-clients-redistributable-0:3.11.394-1.git.0.e03a88e.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-cluster-autoscaler-0:3.11.394-1.git.0.1900c76.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-cluster-autoscaler-0:3.11.394-1.git.0.1900c76.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-cluster-autoscaler-0:3.11.394-1.git.0.1900c76.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-descheduler-0:3.11.394-1.git.299.ad3a3c0.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-descheduler-0:3.11.394-1.git.299.ad3a3c0.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-descheduler-0:3.11.394-1.git.299.ad3a3c0.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-docker-excluder-0:3.11.394-1.git.0.e03a88e.el7.noarch", "7Server-RH7-RHOSE-3.11:atomic-openshift-dockerregistry-0:3.11.394-1.git.481.6e48246.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-dockerregistry-0:3.11.394-1.git.481.6e48246.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-excluder-0:3.11.394-1.git.0.e03a88e.el7.noarch", "7Server-RH7-RHOSE-3.11:atomic-openshift-hyperkube-0:3.11.394-1.git.0.e03a88e.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-hyperkube-0:3.11.394-1.git.0.e03a88e.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-hypershift-0:3.11.394-1.git.0.e03a88e.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-hypershift-0:3.11.394-1.git.0.e03a88e.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-master-0:3.11.394-1.git.0.e03a88e.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-master-0:3.11.394-1.git.0.e03a88e.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-metrics-server-0:3.11.394-1.git.53.3d82586.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-metrics-server-0:3.11.394-1.git.53.3d82586.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-metrics-server-0:3.11.394-1.git.53.3d82586.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-node-0:3.11.394-1.git.0.e03a88e.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-node-0:3.11.394-1.git.0.e03a88e.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-node-problem-detector-0:3.11.394-1.git.263.49acf3a.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-node-problem-detector-0:3.11.394-1.git.263.49acf3a.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-node-problem-detector-0:3.11.394-1.git.263.49acf3a.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-pod-0:3.11.394-1.git.0.e03a88e.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-pod-0:3.11.394-1.git.0.e03a88e.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-sdn-ovs-0:3.11.394-1.git.0.e03a88e.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-sdn-ovs-0:3.11.394-1.git.0.e03a88e.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-service-idler-0:3.11.394-1.git.15.73f73cd.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-service-idler-0:3.11.394-1.git.15.73f73cd.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-service-idler-0:3.11.394-1.git.15.73f73cd.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-template-service-broker-0:3.11.394-1.git.0.e03a88e.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-template-service-broker-0:3.11.394-1.git.0.e03a88e.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-tests-0:3.11.394-1.git.0.e03a88e.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-tests-0:3.11.394-1.git.0.e03a88e.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-web-console-0:3.11.394-1.git.667.08dd2a6.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-web-console-0:3.11.394-1.git.667.08dd2a6.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-web-console-0:3.11.394-1.git.667.08dd2a6.el7.x86_64", "7Server-RH7-RHOSE-3.11:golang-github-openshift-oauth-proxy-0:3.11.394-1.git.439.4c37707.el7.ppc64le", "7Server-RH7-RHOSE-3.11:golang-github-openshift-oauth-proxy-0:3.11.394-1.git.439.4c37707.el7.src", "7Server-RH7-RHOSE-3.11:golang-github-openshift-oauth-proxy-0:3.11.394-1.git.439.4c37707.el7.x86_64", "7Server-RH7-RHOSE-3.11:golang-github-prometheus-alertmanager-0:3.11.394-1.git.0.1fbb64c.el7.src", "7Server-RH7-RHOSE-3.11:golang-github-prometheus-node_exporter-0:3.11.394-1.git.1062.8adc4b8.el7.src", "7Server-RH7-RHOSE-3.11:golang-github-prometheus-prometheus-0:3.11.394-1.git.5026.2c9627f.el7.src", "7Server-RH7-RHOSE-3.11:haproxy-0:1.8.28-1.el7.src", "7Server-RH7-RHOSE-3.11:haproxy-debuginfo-0:1.8.28-1.el7.ppc64le", "7Server-RH7-RHOSE-3.11:haproxy-debuginfo-0:1.8.28-1.el7.x86_64", "7Server-RH7-RHOSE-3.11:haproxy18-0:1.8.28-1.el7.ppc64le", "7Server-RH7-RHOSE-3.11:haproxy18-0:1.8.28-1.el7.x86_64", "7Server-RH7-RHOSE-3.11:jenkins-0:2.263.3.1612433584-1.el7.noarch", "7Server-RH7-RHOSE-3.11:jenkins-0:2.263.3.1612433584-1.el7.src", "7Server-RH7-RHOSE-3.11:openshift-ansible-0:3.11.394-6.git.0.47ec25d.el7.noarch", "7Server-RH7-RHOSE-3.11:openshift-ansible-0:3.11.394-6.git.0.47ec25d.el7.src", "7Server-RH7-RHOSE-3.11:openshift-ansible-docs-0:3.11.394-6.git.0.47ec25d.el7.noarch", "7Server-RH7-RHOSE-3.11:openshift-ansible-playbooks-0:3.11.394-6.git.0.47ec25d.el7.noarch", "7Server-RH7-RHOSE-3.11:openshift-ansible-roles-0:3.11.394-6.git.0.47ec25d.el7.noarch", "7Server-RH7-RHOSE-3.11:openshift-ansible-test-0:3.11.394-6.git.0.47ec25d.el7.noarch", "7Server-RH7-RHOSE-3.11:openshift-enterprise-autoheal-0:3.11.394-1.git.218.59eb597.el7.ppc64le", "7Server-RH7-RHOSE-3.11:openshift-enterprise-autoheal-0:3.11.394-1.git.218.59eb597.el7.src", "7Server-RH7-RHOSE-3.11:openshift-enterprise-autoheal-0:3.11.394-1.git.218.59eb597.el7.x86_64", "7Server-RH7-RHOSE-3.11:openshift-enterprise-cluster-capacity-0:3.11.394-1.git.379.92adfdc.el7.ppc64le", "7Server-RH7-RHOSE-3.11:openshift-enterprise-cluster-capacity-0:3.11.394-1.git.379.92adfdc.el7.src", "7Server-RH7-RHOSE-3.11:openshift-enterprise-cluster-capacity-0:3.11.394-1.git.379.92adfdc.el7.x86_64", "7Server-RH7-RHOSE-3.11:openshift-kuryr-0:3.11.394-1.git.1490.16ed375.el7.src", "7Server-RH7-RHOSE-3.11:openshift-kuryr-cni-0:3.11.394-1.git.1490.16ed375.el7.noarch", "7Server-RH7-RHOSE-3.11:openshift-kuryr-common-0:3.11.394-1.git.1490.16ed375.el7.noarch", "7Server-RH7-RHOSE-3.11:openshift-kuryr-controller-0:3.11.394-1.git.1490.16ed375.el7.noarch", "7Server-RH7-RHOSE-3.11:prometheus-0:3.11.394-1.git.5026.2c9627f.el7.ppc64le", "7Server-RH7-RHOSE-3.11:prometheus-0:3.11.394-1.git.5026.2c9627f.el7.x86_64", "7Server-RH7-RHOSE-3.11:prometheus-alertmanager-0:3.11.394-1.git.0.1fbb64c.el7.ppc64le", "7Server-RH7-RHOSE-3.11:prometheus-alertmanager-0:3.11.394-1.git.0.1fbb64c.el7.x86_64", "7Server-RH7-RHOSE-3.11:prometheus-node-exporter-0:3.11.394-1.git.1062.8adc4b8.el7.ppc64le", "7Server-RH7-RHOSE-3.11:prometheus-node-exporter-0:3.11.394-1.git.1062.8adc4b8.el7.x86_64", "7Server-RH7-RHOSE-3.11:python-rsa-0:4.5-3.el7.src", "7Server-RH7-RHOSE-3.11:python2-kuryr-kubernetes-0:3.11.394-1.git.1490.16ed375.el7.noarch", "7Server-RH7-RHOSE-3.11:python2-rsa-0:4.5-3.el7.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-2308" }, { "category": "external", "summary": "RHBZ#1895946", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1895946" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-2308", "url": "https://www.cve.org/CVERecord?id=CVE-2020-2308" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-2308", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-2308" }, { "category": "external", "summary": "https://www.jenkins.io/security/advisory/2020-11-04/#SECURITY-2102", "url": "https://www.jenkins.io/security/advisory/2020-11-04/#SECURITY-2102" } ], "release_date": "2020-11-04T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-03-03T12:28:39+00:00", "details": "Before applying this update, ensure all previously released errata relevant\nto your system is applied.\n\nSee the following documentation, which will be updated shortly for release\n3.11.394, for important instructions on how to upgrade your cluster and fully\napply this asynchronous errata update:\n\nhttps://docs.openshift.com/container-platform/3.11/release_notes/ocp_3_11_release_notes.html\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/articles/11258.", "product_ids": [ "7Server-RH7-RHOSE-3.11:jenkins-2-plugins-0:3.11.1612862361-1.el7.noarch", "7Server-RH7-RHOSE-3.11:jenkins-2-plugins-0:3.11.1612862361-1.el7.src" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:0637" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "7Server-RH7-RHOSE-3.11:jenkins-2-plugins-0:3.11.1612862361-1.el7.noarch", "7Server-RH7-RHOSE-3.11:jenkins-2-plugins-0:3.11.1612862361-1.el7.src" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "jenkins-2-plugins/kubernetes: Missing permission check in Kubernetes Plugin allows listing pod templates" }, { "cve": "CVE-2020-2309", "cwe": { "id": "CWE-862", "name": "Missing Authorization" }, "discovery_date": "2020-11-09T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "7Server-RH7-RHOSE-3.11:atomic-enterprise-service-catalog-1:3.11.394-1.git.1675.fdb6e0b.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-enterprise-service-catalog-1:3.11.394-1.git.1675.fdb6e0b.el7.src", "7Server-RH7-RHOSE-3.11:atomic-enterprise-service-catalog-1:3.11.394-1.git.1675.fdb6e0b.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-enterprise-service-catalog-svcat-1:3.11.394-1.git.1675.fdb6e0b.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-enterprise-service-catalog-svcat-1:3.11.394-1.git.1675.fdb6e0b.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-0:3.11.394-1.git.0.e03a88e.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-0:3.11.394-1.git.0.e03a88e.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-0:3.11.394-1.git.0.e03a88e.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-clients-0:3.11.394-1.git.0.e03a88e.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-clients-0:3.11.394-1.git.0.e03a88e.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-clients-redistributable-0:3.11.394-1.git.0.e03a88e.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-cluster-autoscaler-0:3.11.394-1.git.0.1900c76.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-cluster-autoscaler-0:3.11.394-1.git.0.1900c76.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-cluster-autoscaler-0:3.11.394-1.git.0.1900c76.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-descheduler-0:3.11.394-1.git.299.ad3a3c0.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-descheduler-0:3.11.394-1.git.299.ad3a3c0.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-descheduler-0:3.11.394-1.git.299.ad3a3c0.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-docker-excluder-0:3.11.394-1.git.0.e03a88e.el7.noarch", "7Server-RH7-RHOSE-3.11:atomic-openshift-dockerregistry-0:3.11.394-1.git.481.6e48246.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-dockerregistry-0:3.11.394-1.git.481.6e48246.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-excluder-0:3.11.394-1.git.0.e03a88e.el7.noarch", "7Server-RH7-RHOSE-3.11:atomic-openshift-hyperkube-0:3.11.394-1.git.0.e03a88e.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-hyperkube-0:3.11.394-1.git.0.e03a88e.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-hypershift-0:3.11.394-1.git.0.e03a88e.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-hypershift-0:3.11.394-1.git.0.e03a88e.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-master-0:3.11.394-1.git.0.e03a88e.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-master-0:3.11.394-1.git.0.e03a88e.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-metrics-server-0:3.11.394-1.git.53.3d82586.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-metrics-server-0:3.11.394-1.git.53.3d82586.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-metrics-server-0:3.11.394-1.git.53.3d82586.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-node-0:3.11.394-1.git.0.e03a88e.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-node-0:3.11.394-1.git.0.e03a88e.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-node-problem-detector-0:3.11.394-1.git.263.49acf3a.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-node-problem-detector-0:3.11.394-1.git.263.49acf3a.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-node-problem-detector-0:3.11.394-1.git.263.49acf3a.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-pod-0:3.11.394-1.git.0.e03a88e.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-pod-0:3.11.394-1.git.0.e03a88e.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-sdn-ovs-0:3.11.394-1.git.0.e03a88e.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-sdn-ovs-0:3.11.394-1.git.0.e03a88e.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-service-idler-0:3.11.394-1.git.15.73f73cd.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-service-idler-0:3.11.394-1.git.15.73f73cd.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-service-idler-0:3.11.394-1.git.15.73f73cd.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-template-service-broker-0:3.11.394-1.git.0.e03a88e.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-template-service-broker-0:3.11.394-1.git.0.e03a88e.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-tests-0:3.11.394-1.git.0.e03a88e.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-tests-0:3.11.394-1.git.0.e03a88e.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-web-console-0:3.11.394-1.git.667.08dd2a6.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-web-console-0:3.11.394-1.git.667.08dd2a6.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-web-console-0:3.11.394-1.git.667.08dd2a6.el7.x86_64", "7Server-RH7-RHOSE-3.11:golang-github-openshift-oauth-proxy-0:3.11.394-1.git.439.4c37707.el7.ppc64le", "7Server-RH7-RHOSE-3.11:golang-github-openshift-oauth-proxy-0:3.11.394-1.git.439.4c37707.el7.src", "7Server-RH7-RHOSE-3.11:golang-github-openshift-oauth-proxy-0:3.11.394-1.git.439.4c37707.el7.x86_64", "7Server-RH7-RHOSE-3.11:golang-github-prometheus-alertmanager-0:3.11.394-1.git.0.1fbb64c.el7.src", "7Server-RH7-RHOSE-3.11:golang-github-prometheus-node_exporter-0:3.11.394-1.git.1062.8adc4b8.el7.src", "7Server-RH7-RHOSE-3.11:golang-github-prometheus-prometheus-0:3.11.394-1.git.5026.2c9627f.el7.src", "7Server-RH7-RHOSE-3.11:haproxy-0:1.8.28-1.el7.src", "7Server-RH7-RHOSE-3.11:haproxy-debuginfo-0:1.8.28-1.el7.ppc64le", "7Server-RH7-RHOSE-3.11:haproxy-debuginfo-0:1.8.28-1.el7.x86_64", "7Server-RH7-RHOSE-3.11:haproxy18-0:1.8.28-1.el7.ppc64le", "7Server-RH7-RHOSE-3.11:haproxy18-0:1.8.28-1.el7.x86_64", "7Server-RH7-RHOSE-3.11:jenkins-0:2.263.3.1612433584-1.el7.noarch", "7Server-RH7-RHOSE-3.11:jenkins-0:2.263.3.1612433584-1.el7.src", "7Server-RH7-RHOSE-3.11:openshift-ansible-0:3.11.394-6.git.0.47ec25d.el7.noarch", "7Server-RH7-RHOSE-3.11:openshift-ansible-0:3.11.394-6.git.0.47ec25d.el7.src", "7Server-RH7-RHOSE-3.11:openshift-ansible-docs-0:3.11.394-6.git.0.47ec25d.el7.noarch", "7Server-RH7-RHOSE-3.11:openshift-ansible-playbooks-0:3.11.394-6.git.0.47ec25d.el7.noarch", "7Server-RH7-RHOSE-3.11:openshift-ansible-roles-0:3.11.394-6.git.0.47ec25d.el7.noarch", "7Server-RH7-RHOSE-3.11:openshift-ansible-test-0:3.11.394-6.git.0.47ec25d.el7.noarch", "7Server-RH7-RHOSE-3.11:openshift-enterprise-autoheal-0:3.11.394-1.git.218.59eb597.el7.ppc64le", "7Server-RH7-RHOSE-3.11:openshift-enterprise-autoheal-0:3.11.394-1.git.218.59eb597.el7.src", "7Server-RH7-RHOSE-3.11:openshift-enterprise-autoheal-0:3.11.394-1.git.218.59eb597.el7.x86_64", "7Server-RH7-RHOSE-3.11:openshift-enterprise-cluster-capacity-0:3.11.394-1.git.379.92adfdc.el7.ppc64le", "7Server-RH7-RHOSE-3.11:openshift-enterprise-cluster-capacity-0:3.11.394-1.git.379.92adfdc.el7.src", "7Server-RH7-RHOSE-3.11:openshift-enterprise-cluster-capacity-0:3.11.394-1.git.379.92adfdc.el7.x86_64", "7Server-RH7-RHOSE-3.11:openshift-kuryr-0:3.11.394-1.git.1490.16ed375.el7.src", "7Server-RH7-RHOSE-3.11:openshift-kuryr-cni-0:3.11.394-1.git.1490.16ed375.el7.noarch", "7Server-RH7-RHOSE-3.11:openshift-kuryr-common-0:3.11.394-1.git.1490.16ed375.el7.noarch", "7Server-RH7-RHOSE-3.11:openshift-kuryr-controller-0:3.11.394-1.git.1490.16ed375.el7.noarch", "7Server-RH7-RHOSE-3.11:prometheus-0:3.11.394-1.git.5026.2c9627f.el7.ppc64le", "7Server-RH7-RHOSE-3.11:prometheus-0:3.11.394-1.git.5026.2c9627f.el7.x86_64", "7Server-RH7-RHOSE-3.11:prometheus-alertmanager-0:3.11.394-1.git.0.1fbb64c.el7.ppc64le", "7Server-RH7-RHOSE-3.11:prometheus-alertmanager-0:3.11.394-1.git.0.1fbb64c.el7.x86_64", "7Server-RH7-RHOSE-3.11:prometheus-node-exporter-0:3.11.394-1.git.1062.8adc4b8.el7.ppc64le", "7Server-RH7-RHOSE-3.11:prometheus-node-exporter-0:3.11.394-1.git.1062.8adc4b8.el7.x86_64", "7Server-RH7-RHOSE-3.11:python-rsa-0:4.5-3.el7.src", "7Server-RH7-RHOSE-3.11:python2-kuryr-kubernetes-0:3.11.394-1.git.1490.16ed375.el7.noarch", "7Server-RH7-RHOSE-3.11:python2-rsa-0:4.5-3.el7.noarch" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1895947" } ], "notes": [ { "category": "description", "text": "A missing/An incorrect permission check in Jenkins Kubernetes Plugin 1.27.3 and earlier allows attackers with Overall/Read permission to enumerate credentials IDs of credentials stored in Jenkins.", "title": "Vulnerability description" }, { "category": "summary", "text": "jenkins-2-plugins/kubernetes: Missing permission check in Kubernetes Plugin allows enumerating credentials IDs", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RH7-RHOSE-3.11:jenkins-2-plugins-0:3.11.1612862361-1.el7.noarch", "7Server-RH7-RHOSE-3.11:jenkins-2-plugins-0:3.11.1612862361-1.el7.src" ], "known_not_affected": [ "7Server-RH7-RHOSE-3.11:atomic-enterprise-service-catalog-1:3.11.394-1.git.1675.fdb6e0b.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-enterprise-service-catalog-1:3.11.394-1.git.1675.fdb6e0b.el7.src", "7Server-RH7-RHOSE-3.11:atomic-enterprise-service-catalog-1:3.11.394-1.git.1675.fdb6e0b.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-enterprise-service-catalog-svcat-1:3.11.394-1.git.1675.fdb6e0b.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-enterprise-service-catalog-svcat-1:3.11.394-1.git.1675.fdb6e0b.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-0:3.11.394-1.git.0.e03a88e.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-0:3.11.394-1.git.0.e03a88e.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-0:3.11.394-1.git.0.e03a88e.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-clients-0:3.11.394-1.git.0.e03a88e.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-clients-0:3.11.394-1.git.0.e03a88e.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-clients-redistributable-0:3.11.394-1.git.0.e03a88e.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-cluster-autoscaler-0:3.11.394-1.git.0.1900c76.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-cluster-autoscaler-0:3.11.394-1.git.0.1900c76.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-cluster-autoscaler-0:3.11.394-1.git.0.1900c76.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-descheduler-0:3.11.394-1.git.299.ad3a3c0.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-descheduler-0:3.11.394-1.git.299.ad3a3c0.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-descheduler-0:3.11.394-1.git.299.ad3a3c0.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-docker-excluder-0:3.11.394-1.git.0.e03a88e.el7.noarch", "7Server-RH7-RHOSE-3.11:atomic-openshift-dockerregistry-0:3.11.394-1.git.481.6e48246.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-dockerregistry-0:3.11.394-1.git.481.6e48246.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-excluder-0:3.11.394-1.git.0.e03a88e.el7.noarch", "7Server-RH7-RHOSE-3.11:atomic-openshift-hyperkube-0:3.11.394-1.git.0.e03a88e.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-hyperkube-0:3.11.394-1.git.0.e03a88e.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-hypershift-0:3.11.394-1.git.0.e03a88e.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-hypershift-0:3.11.394-1.git.0.e03a88e.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-master-0:3.11.394-1.git.0.e03a88e.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-master-0:3.11.394-1.git.0.e03a88e.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-metrics-server-0:3.11.394-1.git.53.3d82586.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-metrics-server-0:3.11.394-1.git.53.3d82586.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-metrics-server-0:3.11.394-1.git.53.3d82586.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-node-0:3.11.394-1.git.0.e03a88e.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-node-0:3.11.394-1.git.0.e03a88e.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-node-problem-detector-0:3.11.394-1.git.263.49acf3a.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-node-problem-detector-0:3.11.394-1.git.263.49acf3a.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-node-problem-detector-0:3.11.394-1.git.263.49acf3a.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-pod-0:3.11.394-1.git.0.e03a88e.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-pod-0:3.11.394-1.git.0.e03a88e.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-sdn-ovs-0:3.11.394-1.git.0.e03a88e.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-sdn-ovs-0:3.11.394-1.git.0.e03a88e.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-service-idler-0:3.11.394-1.git.15.73f73cd.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-service-idler-0:3.11.394-1.git.15.73f73cd.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-service-idler-0:3.11.394-1.git.15.73f73cd.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-template-service-broker-0:3.11.394-1.git.0.e03a88e.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-template-service-broker-0:3.11.394-1.git.0.e03a88e.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-tests-0:3.11.394-1.git.0.e03a88e.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-tests-0:3.11.394-1.git.0.e03a88e.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-web-console-0:3.11.394-1.git.667.08dd2a6.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-web-console-0:3.11.394-1.git.667.08dd2a6.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-web-console-0:3.11.394-1.git.667.08dd2a6.el7.x86_64", "7Server-RH7-RHOSE-3.11:golang-github-openshift-oauth-proxy-0:3.11.394-1.git.439.4c37707.el7.ppc64le", "7Server-RH7-RHOSE-3.11:golang-github-openshift-oauth-proxy-0:3.11.394-1.git.439.4c37707.el7.src", "7Server-RH7-RHOSE-3.11:golang-github-openshift-oauth-proxy-0:3.11.394-1.git.439.4c37707.el7.x86_64", "7Server-RH7-RHOSE-3.11:golang-github-prometheus-alertmanager-0:3.11.394-1.git.0.1fbb64c.el7.src", "7Server-RH7-RHOSE-3.11:golang-github-prometheus-node_exporter-0:3.11.394-1.git.1062.8adc4b8.el7.src", "7Server-RH7-RHOSE-3.11:golang-github-prometheus-prometheus-0:3.11.394-1.git.5026.2c9627f.el7.src", "7Server-RH7-RHOSE-3.11:haproxy-0:1.8.28-1.el7.src", "7Server-RH7-RHOSE-3.11:haproxy-debuginfo-0:1.8.28-1.el7.ppc64le", "7Server-RH7-RHOSE-3.11:haproxy-debuginfo-0:1.8.28-1.el7.x86_64", "7Server-RH7-RHOSE-3.11:haproxy18-0:1.8.28-1.el7.ppc64le", "7Server-RH7-RHOSE-3.11:haproxy18-0:1.8.28-1.el7.x86_64", "7Server-RH7-RHOSE-3.11:jenkins-0:2.263.3.1612433584-1.el7.noarch", "7Server-RH7-RHOSE-3.11:jenkins-0:2.263.3.1612433584-1.el7.src", "7Server-RH7-RHOSE-3.11:openshift-ansible-0:3.11.394-6.git.0.47ec25d.el7.noarch", "7Server-RH7-RHOSE-3.11:openshift-ansible-0:3.11.394-6.git.0.47ec25d.el7.src", "7Server-RH7-RHOSE-3.11:openshift-ansible-docs-0:3.11.394-6.git.0.47ec25d.el7.noarch", "7Server-RH7-RHOSE-3.11:openshift-ansible-playbooks-0:3.11.394-6.git.0.47ec25d.el7.noarch", "7Server-RH7-RHOSE-3.11:openshift-ansible-roles-0:3.11.394-6.git.0.47ec25d.el7.noarch", "7Server-RH7-RHOSE-3.11:openshift-ansible-test-0:3.11.394-6.git.0.47ec25d.el7.noarch", "7Server-RH7-RHOSE-3.11:openshift-enterprise-autoheal-0:3.11.394-1.git.218.59eb597.el7.ppc64le", "7Server-RH7-RHOSE-3.11:openshift-enterprise-autoheal-0:3.11.394-1.git.218.59eb597.el7.src", "7Server-RH7-RHOSE-3.11:openshift-enterprise-autoheal-0:3.11.394-1.git.218.59eb597.el7.x86_64", "7Server-RH7-RHOSE-3.11:openshift-enterprise-cluster-capacity-0:3.11.394-1.git.379.92adfdc.el7.ppc64le", "7Server-RH7-RHOSE-3.11:openshift-enterprise-cluster-capacity-0:3.11.394-1.git.379.92adfdc.el7.src", "7Server-RH7-RHOSE-3.11:openshift-enterprise-cluster-capacity-0:3.11.394-1.git.379.92adfdc.el7.x86_64", "7Server-RH7-RHOSE-3.11:openshift-kuryr-0:3.11.394-1.git.1490.16ed375.el7.src", "7Server-RH7-RHOSE-3.11:openshift-kuryr-cni-0:3.11.394-1.git.1490.16ed375.el7.noarch", "7Server-RH7-RHOSE-3.11:openshift-kuryr-common-0:3.11.394-1.git.1490.16ed375.el7.noarch", "7Server-RH7-RHOSE-3.11:openshift-kuryr-controller-0:3.11.394-1.git.1490.16ed375.el7.noarch", "7Server-RH7-RHOSE-3.11:prometheus-0:3.11.394-1.git.5026.2c9627f.el7.ppc64le", "7Server-RH7-RHOSE-3.11:prometheus-0:3.11.394-1.git.5026.2c9627f.el7.x86_64", "7Server-RH7-RHOSE-3.11:prometheus-alertmanager-0:3.11.394-1.git.0.1fbb64c.el7.ppc64le", "7Server-RH7-RHOSE-3.11:prometheus-alertmanager-0:3.11.394-1.git.0.1fbb64c.el7.x86_64", "7Server-RH7-RHOSE-3.11:prometheus-node-exporter-0:3.11.394-1.git.1062.8adc4b8.el7.ppc64le", "7Server-RH7-RHOSE-3.11:prometheus-node-exporter-0:3.11.394-1.git.1062.8adc4b8.el7.x86_64", "7Server-RH7-RHOSE-3.11:python-rsa-0:4.5-3.el7.src", "7Server-RH7-RHOSE-3.11:python2-kuryr-kubernetes-0:3.11.394-1.git.1490.16ed375.el7.noarch", "7Server-RH7-RHOSE-3.11:python2-rsa-0:4.5-3.el7.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-2309" }, { "category": "external", "summary": "RHBZ#1895947", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1895947" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-2309", "url": "https://www.cve.org/CVERecord?id=CVE-2020-2309" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-2309", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-2309" }, { "category": "external", "summary": "https://www.jenkins.io/security/advisory/2020-11-04/#SECURITY-2103", "url": "https://www.jenkins.io/security/advisory/2020-11-04/#SECURITY-2103" } ], "release_date": "2020-11-04T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-03-03T12:28:39+00:00", "details": "Before applying this update, ensure all previously released errata relevant\nto your system is applied.\n\nSee the following documentation, which will be updated shortly for release\n3.11.394, for important instructions on how to upgrade your cluster and fully\napply this asynchronous errata update:\n\nhttps://docs.openshift.com/container-platform/3.11/release_notes/ocp_3_11_release_notes.html\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/articles/11258.", "product_ids": [ "7Server-RH7-RHOSE-3.11:jenkins-2-plugins-0:3.11.1612862361-1.el7.noarch", "7Server-RH7-RHOSE-3.11:jenkins-2-plugins-0:3.11.1612862361-1.el7.src" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:0637" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "7Server-RH7-RHOSE-3.11:jenkins-2-plugins-0:3.11.1612862361-1.el7.noarch", "7Server-RH7-RHOSE-3.11:jenkins-2-plugins-0:3.11.1612862361-1.el7.src" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "jenkins-2-plugins/kubernetes: Missing permission check in Kubernetes Plugin allows enumerating credentials IDs" }, { "cve": "CVE-2020-11979", "cwe": { "id": "CWE-377", "name": "Insecure Temporary File" }, "discovery_date": "2020-10-02T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "7Server-RH7-RHOSE-3.11:atomic-enterprise-service-catalog-1:3.11.394-1.git.1675.fdb6e0b.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-enterprise-service-catalog-1:3.11.394-1.git.1675.fdb6e0b.el7.src", "7Server-RH7-RHOSE-3.11:atomic-enterprise-service-catalog-1:3.11.394-1.git.1675.fdb6e0b.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-enterprise-service-catalog-svcat-1:3.11.394-1.git.1675.fdb6e0b.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-enterprise-service-catalog-svcat-1:3.11.394-1.git.1675.fdb6e0b.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-0:3.11.394-1.git.0.e03a88e.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-0:3.11.394-1.git.0.e03a88e.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-0:3.11.394-1.git.0.e03a88e.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-clients-0:3.11.394-1.git.0.e03a88e.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-clients-0:3.11.394-1.git.0.e03a88e.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-clients-redistributable-0:3.11.394-1.git.0.e03a88e.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-cluster-autoscaler-0:3.11.394-1.git.0.1900c76.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-cluster-autoscaler-0:3.11.394-1.git.0.1900c76.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-cluster-autoscaler-0:3.11.394-1.git.0.1900c76.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-descheduler-0:3.11.394-1.git.299.ad3a3c0.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-descheduler-0:3.11.394-1.git.299.ad3a3c0.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-descheduler-0:3.11.394-1.git.299.ad3a3c0.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-docker-excluder-0:3.11.394-1.git.0.e03a88e.el7.noarch", "7Server-RH7-RHOSE-3.11:atomic-openshift-dockerregistry-0:3.11.394-1.git.481.6e48246.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-dockerregistry-0:3.11.394-1.git.481.6e48246.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-excluder-0:3.11.394-1.git.0.e03a88e.el7.noarch", "7Server-RH7-RHOSE-3.11:atomic-openshift-hyperkube-0:3.11.394-1.git.0.e03a88e.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-hyperkube-0:3.11.394-1.git.0.e03a88e.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-hypershift-0:3.11.394-1.git.0.e03a88e.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-hypershift-0:3.11.394-1.git.0.e03a88e.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-master-0:3.11.394-1.git.0.e03a88e.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-master-0:3.11.394-1.git.0.e03a88e.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-metrics-server-0:3.11.394-1.git.53.3d82586.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-metrics-server-0:3.11.394-1.git.53.3d82586.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-metrics-server-0:3.11.394-1.git.53.3d82586.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-node-0:3.11.394-1.git.0.e03a88e.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-node-0:3.11.394-1.git.0.e03a88e.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-node-problem-detector-0:3.11.394-1.git.263.49acf3a.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-node-problem-detector-0:3.11.394-1.git.263.49acf3a.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-node-problem-detector-0:3.11.394-1.git.263.49acf3a.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-pod-0:3.11.394-1.git.0.e03a88e.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-pod-0:3.11.394-1.git.0.e03a88e.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-sdn-ovs-0:3.11.394-1.git.0.e03a88e.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-sdn-ovs-0:3.11.394-1.git.0.e03a88e.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-service-idler-0:3.11.394-1.git.15.73f73cd.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-service-idler-0:3.11.394-1.git.15.73f73cd.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-service-idler-0:3.11.394-1.git.15.73f73cd.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-template-service-broker-0:3.11.394-1.git.0.e03a88e.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-template-service-broker-0:3.11.394-1.git.0.e03a88e.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-tests-0:3.11.394-1.git.0.e03a88e.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-tests-0:3.11.394-1.git.0.e03a88e.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-web-console-0:3.11.394-1.git.667.08dd2a6.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-web-console-0:3.11.394-1.git.667.08dd2a6.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-web-console-0:3.11.394-1.git.667.08dd2a6.el7.x86_64", "7Server-RH7-RHOSE-3.11:golang-github-openshift-oauth-proxy-0:3.11.394-1.git.439.4c37707.el7.ppc64le", "7Server-RH7-RHOSE-3.11:golang-github-openshift-oauth-proxy-0:3.11.394-1.git.439.4c37707.el7.src", "7Server-RH7-RHOSE-3.11:golang-github-openshift-oauth-proxy-0:3.11.394-1.git.439.4c37707.el7.x86_64", "7Server-RH7-RHOSE-3.11:golang-github-prometheus-alertmanager-0:3.11.394-1.git.0.1fbb64c.el7.src", "7Server-RH7-RHOSE-3.11:golang-github-prometheus-node_exporter-0:3.11.394-1.git.1062.8adc4b8.el7.src", "7Server-RH7-RHOSE-3.11:golang-github-prometheus-prometheus-0:3.11.394-1.git.5026.2c9627f.el7.src", "7Server-RH7-RHOSE-3.11:haproxy-0:1.8.28-1.el7.src", "7Server-RH7-RHOSE-3.11:haproxy-debuginfo-0:1.8.28-1.el7.ppc64le", "7Server-RH7-RHOSE-3.11:haproxy-debuginfo-0:1.8.28-1.el7.x86_64", "7Server-RH7-RHOSE-3.11:haproxy18-0:1.8.28-1.el7.ppc64le", "7Server-RH7-RHOSE-3.11:haproxy18-0:1.8.28-1.el7.x86_64", "7Server-RH7-RHOSE-3.11:jenkins-2-plugins-0:3.11.1612862361-1.el7.noarch", "7Server-RH7-RHOSE-3.11:jenkins-2-plugins-0:3.11.1612862361-1.el7.src", "7Server-RH7-RHOSE-3.11:openshift-ansible-0:3.11.394-6.git.0.47ec25d.el7.noarch", "7Server-RH7-RHOSE-3.11:openshift-ansible-0:3.11.394-6.git.0.47ec25d.el7.src", "7Server-RH7-RHOSE-3.11:openshift-ansible-docs-0:3.11.394-6.git.0.47ec25d.el7.noarch", "7Server-RH7-RHOSE-3.11:openshift-ansible-playbooks-0:3.11.394-6.git.0.47ec25d.el7.noarch", "7Server-RH7-RHOSE-3.11:openshift-ansible-roles-0:3.11.394-6.git.0.47ec25d.el7.noarch", "7Server-RH7-RHOSE-3.11:openshift-ansible-test-0:3.11.394-6.git.0.47ec25d.el7.noarch", "7Server-RH7-RHOSE-3.11:openshift-enterprise-autoheal-0:3.11.394-1.git.218.59eb597.el7.ppc64le", "7Server-RH7-RHOSE-3.11:openshift-enterprise-autoheal-0:3.11.394-1.git.218.59eb597.el7.src", "7Server-RH7-RHOSE-3.11:openshift-enterprise-autoheal-0:3.11.394-1.git.218.59eb597.el7.x86_64", "7Server-RH7-RHOSE-3.11:openshift-enterprise-cluster-capacity-0:3.11.394-1.git.379.92adfdc.el7.ppc64le", "7Server-RH7-RHOSE-3.11:openshift-enterprise-cluster-capacity-0:3.11.394-1.git.379.92adfdc.el7.src", "7Server-RH7-RHOSE-3.11:openshift-enterprise-cluster-capacity-0:3.11.394-1.git.379.92adfdc.el7.x86_64", "7Server-RH7-RHOSE-3.11:openshift-kuryr-0:3.11.394-1.git.1490.16ed375.el7.src", "7Server-RH7-RHOSE-3.11:openshift-kuryr-cni-0:3.11.394-1.git.1490.16ed375.el7.noarch", "7Server-RH7-RHOSE-3.11:openshift-kuryr-common-0:3.11.394-1.git.1490.16ed375.el7.noarch", "7Server-RH7-RHOSE-3.11:openshift-kuryr-controller-0:3.11.394-1.git.1490.16ed375.el7.noarch", "7Server-RH7-RHOSE-3.11:prometheus-0:3.11.394-1.git.5026.2c9627f.el7.ppc64le", "7Server-RH7-RHOSE-3.11:prometheus-0:3.11.394-1.git.5026.2c9627f.el7.x86_64", "7Server-RH7-RHOSE-3.11:prometheus-alertmanager-0:3.11.394-1.git.0.1fbb64c.el7.ppc64le", "7Server-RH7-RHOSE-3.11:prometheus-alertmanager-0:3.11.394-1.git.0.1fbb64c.el7.x86_64", "7Server-RH7-RHOSE-3.11:prometheus-node-exporter-0:3.11.394-1.git.1062.8adc4b8.el7.ppc64le", "7Server-RH7-RHOSE-3.11:prometheus-node-exporter-0:3.11.394-1.git.1062.8adc4b8.el7.x86_64", "7Server-RH7-RHOSE-3.11:python-rsa-0:4.5-3.el7.src", "7Server-RH7-RHOSE-3.11:python2-kuryr-kubernetes-0:3.11.394-1.git.1490.16ed375.el7.noarch", "7Server-RH7-RHOSE-3.11:python2-rsa-0:4.5-3.el7.noarch" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1903702" } ], "notes": [ { "category": "description", "text": "As mitigation for CVE-2020-1945 Apache Ant 1.10.8 changed the permissions of temporary files it created so that only the current user was allowed to access them. Unfortunately the fixcrlf task deleted the temporary file and created a new one without said protection, effectively nullifying the effort. This would still allow an attacker to inject modified source files into the build process.", "title": "Vulnerability description" }, { "category": "summary", "text": "ant: insecure temporary file", "title": "Vulnerability summary" }, { "category": "other", "text": "ant as shipped in Red Hat Enterprise Linux 8 is not affected by this flaw because this flaw is caused by the patch for CVE-2020-1945, however, it was never applied to ant as shipped in Red Hat Enterprise Linux 8, because the decision was made by Engineering to WONTFIX that flaw.\n\nIn OpenShift Container Platform (OCP), the Hive/Presto/Hadoop components that comprise the OCP Metering stack, ship the vulnerable version of ant package.\nSince the release of OCP 4.6, the Metering product has been deprecated [1], hence the affected components are marked as wontfix.\nThis may be fixed in the future.\n\n[1] https://docs.openshift.com/container-platform/4.6/release_notes/ocp-4-6-release-notes.html#ocp-4-6-metering-operator-deprecated", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RH7-RHOSE-3.11:jenkins-0:2.263.3.1612433584-1.el7.noarch", "7Server-RH7-RHOSE-3.11:jenkins-0:2.263.3.1612433584-1.el7.src" ], "known_not_affected": [ "7Server-RH7-RHOSE-3.11:atomic-enterprise-service-catalog-1:3.11.394-1.git.1675.fdb6e0b.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-enterprise-service-catalog-1:3.11.394-1.git.1675.fdb6e0b.el7.src", "7Server-RH7-RHOSE-3.11:atomic-enterprise-service-catalog-1:3.11.394-1.git.1675.fdb6e0b.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-enterprise-service-catalog-svcat-1:3.11.394-1.git.1675.fdb6e0b.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-enterprise-service-catalog-svcat-1:3.11.394-1.git.1675.fdb6e0b.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-0:3.11.394-1.git.0.e03a88e.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-0:3.11.394-1.git.0.e03a88e.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-0:3.11.394-1.git.0.e03a88e.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-clients-0:3.11.394-1.git.0.e03a88e.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-clients-0:3.11.394-1.git.0.e03a88e.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-clients-redistributable-0:3.11.394-1.git.0.e03a88e.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-cluster-autoscaler-0:3.11.394-1.git.0.1900c76.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-cluster-autoscaler-0:3.11.394-1.git.0.1900c76.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-cluster-autoscaler-0:3.11.394-1.git.0.1900c76.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-descheduler-0:3.11.394-1.git.299.ad3a3c0.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-descheduler-0:3.11.394-1.git.299.ad3a3c0.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-descheduler-0:3.11.394-1.git.299.ad3a3c0.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-docker-excluder-0:3.11.394-1.git.0.e03a88e.el7.noarch", "7Server-RH7-RHOSE-3.11:atomic-openshift-dockerregistry-0:3.11.394-1.git.481.6e48246.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-dockerregistry-0:3.11.394-1.git.481.6e48246.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-excluder-0:3.11.394-1.git.0.e03a88e.el7.noarch", "7Server-RH7-RHOSE-3.11:atomic-openshift-hyperkube-0:3.11.394-1.git.0.e03a88e.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-hyperkube-0:3.11.394-1.git.0.e03a88e.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-hypershift-0:3.11.394-1.git.0.e03a88e.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-hypershift-0:3.11.394-1.git.0.e03a88e.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-master-0:3.11.394-1.git.0.e03a88e.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-master-0:3.11.394-1.git.0.e03a88e.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-metrics-server-0:3.11.394-1.git.53.3d82586.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-metrics-server-0:3.11.394-1.git.53.3d82586.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-metrics-server-0:3.11.394-1.git.53.3d82586.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-node-0:3.11.394-1.git.0.e03a88e.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-node-0:3.11.394-1.git.0.e03a88e.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-node-problem-detector-0:3.11.394-1.git.263.49acf3a.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-node-problem-detector-0:3.11.394-1.git.263.49acf3a.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-node-problem-detector-0:3.11.394-1.git.263.49acf3a.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-pod-0:3.11.394-1.git.0.e03a88e.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-pod-0:3.11.394-1.git.0.e03a88e.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-sdn-ovs-0:3.11.394-1.git.0.e03a88e.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-sdn-ovs-0:3.11.394-1.git.0.e03a88e.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-service-idler-0:3.11.394-1.git.15.73f73cd.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-service-idler-0:3.11.394-1.git.15.73f73cd.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-service-idler-0:3.11.394-1.git.15.73f73cd.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-template-service-broker-0:3.11.394-1.git.0.e03a88e.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-template-service-broker-0:3.11.394-1.git.0.e03a88e.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-tests-0:3.11.394-1.git.0.e03a88e.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-tests-0:3.11.394-1.git.0.e03a88e.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-web-console-0:3.11.394-1.git.667.08dd2a6.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-web-console-0:3.11.394-1.git.667.08dd2a6.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-web-console-0:3.11.394-1.git.667.08dd2a6.el7.x86_64", "7Server-RH7-RHOSE-3.11:golang-github-openshift-oauth-proxy-0:3.11.394-1.git.439.4c37707.el7.ppc64le", "7Server-RH7-RHOSE-3.11:golang-github-openshift-oauth-proxy-0:3.11.394-1.git.439.4c37707.el7.src", "7Server-RH7-RHOSE-3.11:golang-github-openshift-oauth-proxy-0:3.11.394-1.git.439.4c37707.el7.x86_64", "7Server-RH7-RHOSE-3.11:golang-github-prometheus-alertmanager-0:3.11.394-1.git.0.1fbb64c.el7.src", "7Server-RH7-RHOSE-3.11:golang-github-prometheus-node_exporter-0:3.11.394-1.git.1062.8adc4b8.el7.src", "7Server-RH7-RHOSE-3.11:golang-github-prometheus-prometheus-0:3.11.394-1.git.5026.2c9627f.el7.src", "7Server-RH7-RHOSE-3.11:haproxy-0:1.8.28-1.el7.src", "7Server-RH7-RHOSE-3.11:haproxy-debuginfo-0:1.8.28-1.el7.ppc64le", "7Server-RH7-RHOSE-3.11:haproxy-debuginfo-0:1.8.28-1.el7.x86_64", "7Server-RH7-RHOSE-3.11:haproxy18-0:1.8.28-1.el7.ppc64le", "7Server-RH7-RHOSE-3.11:haproxy18-0:1.8.28-1.el7.x86_64", "7Server-RH7-RHOSE-3.11:jenkins-2-plugins-0:3.11.1612862361-1.el7.noarch", "7Server-RH7-RHOSE-3.11:jenkins-2-plugins-0:3.11.1612862361-1.el7.src", "7Server-RH7-RHOSE-3.11:openshift-ansible-0:3.11.394-6.git.0.47ec25d.el7.noarch", "7Server-RH7-RHOSE-3.11:openshift-ansible-0:3.11.394-6.git.0.47ec25d.el7.src", "7Server-RH7-RHOSE-3.11:openshift-ansible-docs-0:3.11.394-6.git.0.47ec25d.el7.noarch", "7Server-RH7-RHOSE-3.11:openshift-ansible-playbooks-0:3.11.394-6.git.0.47ec25d.el7.noarch", "7Server-RH7-RHOSE-3.11:openshift-ansible-roles-0:3.11.394-6.git.0.47ec25d.el7.noarch", "7Server-RH7-RHOSE-3.11:openshift-ansible-test-0:3.11.394-6.git.0.47ec25d.el7.noarch", "7Server-RH7-RHOSE-3.11:openshift-enterprise-autoheal-0:3.11.394-1.git.218.59eb597.el7.ppc64le", "7Server-RH7-RHOSE-3.11:openshift-enterprise-autoheal-0:3.11.394-1.git.218.59eb597.el7.src", "7Server-RH7-RHOSE-3.11:openshift-enterprise-autoheal-0:3.11.394-1.git.218.59eb597.el7.x86_64", "7Server-RH7-RHOSE-3.11:openshift-enterprise-cluster-capacity-0:3.11.394-1.git.379.92adfdc.el7.ppc64le", "7Server-RH7-RHOSE-3.11:openshift-enterprise-cluster-capacity-0:3.11.394-1.git.379.92adfdc.el7.src", "7Server-RH7-RHOSE-3.11:openshift-enterprise-cluster-capacity-0:3.11.394-1.git.379.92adfdc.el7.x86_64", "7Server-RH7-RHOSE-3.11:openshift-kuryr-0:3.11.394-1.git.1490.16ed375.el7.src", "7Server-RH7-RHOSE-3.11:openshift-kuryr-cni-0:3.11.394-1.git.1490.16ed375.el7.noarch", "7Server-RH7-RHOSE-3.11:openshift-kuryr-common-0:3.11.394-1.git.1490.16ed375.el7.noarch", "7Server-RH7-RHOSE-3.11:openshift-kuryr-controller-0:3.11.394-1.git.1490.16ed375.el7.noarch", "7Server-RH7-RHOSE-3.11:prometheus-0:3.11.394-1.git.5026.2c9627f.el7.ppc64le", "7Server-RH7-RHOSE-3.11:prometheus-0:3.11.394-1.git.5026.2c9627f.el7.x86_64", "7Server-RH7-RHOSE-3.11:prometheus-alertmanager-0:3.11.394-1.git.0.1fbb64c.el7.ppc64le", "7Server-RH7-RHOSE-3.11:prometheus-alertmanager-0:3.11.394-1.git.0.1fbb64c.el7.x86_64", "7Server-RH7-RHOSE-3.11:prometheus-node-exporter-0:3.11.394-1.git.1062.8adc4b8.el7.ppc64le", "7Server-RH7-RHOSE-3.11:prometheus-node-exporter-0:3.11.394-1.git.1062.8adc4b8.el7.x86_64", "7Server-RH7-RHOSE-3.11:python-rsa-0:4.5-3.el7.src", "7Server-RH7-RHOSE-3.11:python2-kuryr-kubernetes-0:3.11.394-1.git.1490.16ed375.el7.noarch", "7Server-RH7-RHOSE-3.11:python2-rsa-0:4.5-3.el7.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-11979" }, { "category": "external", "summary": "RHBZ#1903702", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1903702" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-11979", "url": "https://www.cve.org/CVERecord?id=CVE-2020-11979" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-11979", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-11979" }, { "category": "external", "summary": "https://security.gentoo.org/glsa/202011-18", "url": "https://security.gentoo.org/glsa/202011-18" } ], "release_date": "2020-10-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-03-03T12:28:39+00:00", "details": "Before applying this update, ensure all previously released errata relevant\nto your system is applied.\n\nSee the following documentation, which will be updated shortly for release\n3.11.394, for important instructions on how to upgrade your cluster and fully\napply this asynchronous errata update:\n\nhttps://docs.openshift.com/container-platform/3.11/release_notes/ocp_3_11_release_notes.html\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/articles/11258.", "product_ids": [ "7Server-RH7-RHOSE-3.11:jenkins-0:2.263.3.1612433584-1.el7.noarch", "7Server-RH7-RHOSE-3.11:jenkins-0:2.263.3.1612433584-1.el7.src" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:0637" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 6.2, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "7Server-RH7-RHOSE-3.11:jenkins-0:2.263.3.1612433584-1.el7.noarch", "7Server-RH7-RHOSE-3.11:jenkins-0:2.263.3.1612433584-1.el7.src" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "ant: insecure temporary file" }, { "acknowledgments": [ { "names": [ "Hubert Kario" ], "organization": "Red Hat", "summary": "This issue was discovered by Red Hat." } ], "cve": "CVE-2020-25658", "cwe": { "id": "CWE-385", "name": "Covert Timing Channel" }, "discovery_date": "2020-10-21T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "7Server-RH7-RHOSE-3.11:atomic-enterprise-service-catalog-1:3.11.394-1.git.1675.fdb6e0b.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-enterprise-service-catalog-1:3.11.394-1.git.1675.fdb6e0b.el7.src", "7Server-RH7-RHOSE-3.11:atomic-enterprise-service-catalog-1:3.11.394-1.git.1675.fdb6e0b.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-enterprise-service-catalog-svcat-1:3.11.394-1.git.1675.fdb6e0b.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-enterprise-service-catalog-svcat-1:3.11.394-1.git.1675.fdb6e0b.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-0:3.11.394-1.git.0.e03a88e.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-0:3.11.394-1.git.0.e03a88e.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-0:3.11.394-1.git.0.e03a88e.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-clients-0:3.11.394-1.git.0.e03a88e.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-clients-0:3.11.394-1.git.0.e03a88e.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-clients-redistributable-0:3.11.394-1.git.0.e03a88e.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-cluster-autoscaler-0:3.11.394-1.git.0.1900c76.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-cluster-autoscaler-0:3.11.394-1.git.0.1900c76.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-cluster-autoscaler-0:3.11.394-1.git.0.1900c76.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-descheduler-0:3.11.394-1.git.299.ad3a3c0.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-descheduler-0:3.11.394-1.git.299.ad3a3c0.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-descheduler-0:3.11.394-1.git.299.ad3a3c0.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-docker-excluder-0:3.11.394-1.git.0.e03a88e.el7.noarch", "7Server-RH7-RHOSE-3.11:atomic-openshift-dockerregistry-0:3.11.394-1.git.481.6e48246.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-dockerregistry-0:3.11.394-1.git.481.6e48246.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-excluder-0:3.11.394-1.git.0.e03a88e.el7.noarch", "7Server-RH7-RHOSE-3.11:atomic-openshift-hyperkube-0:3.11.394-1.git.0.e03a88e.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-hyperkube-0:3.11.394-1.git.0.e03a88e.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-hypershift-0:3.11.394-1.git.0.e03a88e.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-hypershift-0:3.11.394-1.git.0.e03a88e.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-master-0:3.11.394-1.git.0.e03a88e.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-master-0:3.11.394-1.git.0.e03a88e.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-metrics-server-0:3.11.394-1.git.53.3d82586.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-metrics-server-0:3.11.394-1.git.53.3d82586.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-metrics-server-0:3.11.394-1.git.53.3d82586.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-node-0:3.11.394-1.git.0.e03a88e.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-node-0:3.11.394-1.git.0.e03a88e.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-node-problem-detector-0:3.11.394-1.git.263.49acf3a.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-node-problem-detector-0:3.11.394-1.git.263.49acf3a.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-node-problem-detector-0:3.11.394-1.git.263.49acf3a.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-pod-0:3.11.394-1.git.0.e03a88e.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-pod-0:3.11.394-1.git.0.e03a88e.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-sdn-ovs-0:3.11.394-1.git.0.e03a88e.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-sdn-ovs-0:3.11.394-1.git.0.e03a88e.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-service-idler-0:3.11.394-1.git.15.73f73cd.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-service-idler-0:3.11.394-1.git.15.73f73cd.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-service-idler-0:3.11.394-1.git.15.73f73cd.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-template-service-broker-0:3.11.394-1.git.0.e03a88e.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-template-service-broker-0:3.11.394-1.git.0.e03a88e.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-tests-0:3.11.394-1.git.0.e03a88e.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-tests-0:3.11.394-1.git.0.e03a88e.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-web-console-0:3.11.394-1.git.667.08dd2a6.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-web-console-0:3.11.394-1.git.667.08dd2a6.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-web-console-0:3.11.394-1.git.667.08dd2a6.el7.x86_64", "7Server-RH7-RHOSE-3.11:golang-github-openshift-oauth-proxy-0:3.11.394-1.git.439.4c37707.el7.ppc64le", "7Server-RH7-RHOSE-3.11:golang-github-openshift-oauth-proxy-0:3.11.394-1.git.439.4c37707.el7.src", "7Server-RH7-RHOSE-3.11:golang-github-openshift-oauth-proxy-0:3.11.394-1.git.439.4c37707.el7.x86_64", "7Server-RH7-RHOSE-3.11:golang-github-prometheus-alertmanager-0:3.11.394-1.git.0.1fbb64c.el7.src", "7Server-RH7-RHOSE-3.11:golang-github-prometheus-node_exporter-0:3.11.394-1.git.1062.8adc4b8.el7.src", "7Server-RH7-RHOSE-3.11:golang-github-prometheus-prometheus-0:3.11.394-1.git.5026.2c9627f.el7.src", "7Server-RH7-RHOSE-3.11:haproxy-0:1.8.28-1.el7.src", "7Server-RH7-RHOSE-3.11:haproxy-debuginfo-0:1.8.28-1.el7.ppc64le", "7Server-RH7-RHOSE-3.11:haproxy-debuginfo-0:1.8.28-1.el7.x86_64", "7Server-RH7-RHOSE-3.11:haproxy18-0:1.8.28-1.el7.ppc64le", "7Server-RH7-RHOSE-3.11:haproxy18-0:1.8.28-1.el7.x86_64", "7Server-RH7-RHOSE-3.11:jenkins-0:2.263.3.1612433584-1.el7.noarch", "7Server-RH7-RHOSE-3.11:jenkins-0:2.263.3.1612433584-1.el7.src", "7Server-RH7-RHOSE-3.11:jenkins-2-plugins-0:3.11.1612862361-1.el7.noarch", "7Server-RH7-RHOSE-3.11:jenkins-2-plugins-0:3.11.1612862361-1.el7.src", "7Server-RH7-RHOSE-3.11:openshift-ansible-0:3.11.394-6.git.0.47ec25d.el7.noarch", "7Server-RH7-RHOSE-3.11:openshift-ansible-0:3.11.394-6.git.0.47ec25d.el7.src", "7Server-RH7-RHOSE-3.11:openshift-ansible-docs-0:3.11.394-6.git.0.47ec25d.el7.noarch", "7Server-RH7-RHOSE-3.11:openshift-ansible-playbooks-0:3.11.394-6.git.0.47ec25d.el7.noarch", "7Server-RH7-RHOSE-3.11:openshift-ansible-roles-0:3.11.394-6.git.0.47ec25d.el7.noarch", "7Server-RH7-RHOSE-3.11:openshift-ansible-test-0:3.11.394-6.git.0.47ec25d.el7.noarch", "7Server-RH7-RHOSE-3.11:openshift-enterprise-autoheal-0:3.11.394-1.git.218.59eb597.el7.ppc64le", "7Server-RH7-RHOSE-3.11:openshift-enterprise-autoheal-0:3.11.394-1.git.218.59eb597.el7.src", "7Server-RH7-RHOSE-3.11:openshift-enterprise-autoheal-0:3.11.394-1.git.218.59eb597.el7.x86_64", "7Server-RH7-RHOSE-3.11:openshift-enterprise-cluster-capacity-0:3.11.394-1.git.379.92adfdc.el7.ppc64le", "7Server-RH7-RHOSE-3.11:openshift-enterprise-cluster-capacity-0:3.11.394-1.git.379.92adfdc.el7.src", "7Server-RH7-RHOSE-3.11:openshift-enterprise-cluster-capacity-0:3.11.394-1.git.379.92adfdc.el7.x86_64", "7Server-RH7-RHOSE-3.11:openshift-kuryr-0:3.11.394-1.git.1490.16ed375.el7.src", "7Server-RH7-RHOSE-3.11:openshift-kuryr-cni-0:3.11.394-1.git.1490.16ed375.el7.noarch", "7Server-RH7-RHOSE-3.11:openshift-kuryr-common-0:3.11.394-1.git.1490.16ed375.el7.noarch", "7Server-RH7-RHOSE-3.11:openshift-kuryr-controller-0:3.11.394-1.git.1490.16ed375.el7.noarch", "7Server-RH7-RHOSE-3.11:prometheus-0:3.11.394-1.git.5026.2c9627f.el7.ppc64le", "7Server-RH7-RHOSE-3.11:prometheus-0:3.11.394-1.git.5026.2c9627f.el7.x86_64", "7Server-RH7-RHOSE-3.11:prometheus-alertmanager-0:3.11.394-1.git.0.1fbb64c.el7.ppc64le", "7Server-RH7-RHOSE-3.11:prometheus-alertmanager-0:3.11.394-1.git.0.1fbb64c.el7.x86_64", "7Server-RH7-RHOSE-3.11:prometheus-node-exporter-0:3.11.394-1.git.1062.8adc4b8.el7.ppc64le", "7Server-RH7-RHOSE-3.11:prometheus-node-exporter-0:3.11.394-1.git.1062.8adc4b8.el7.x86_64", "7Server-RH7-RHOSE-3.11:python2-kuryr-kubernetes-0:3.11.394-1.git.1490.16ed375.el7.noarch" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1889972" } ], "notes": [ { "category": "description", "text": "A flaw was found in python-rsa, where it is vulnerable to Bleichenbacher timing attacks. This flaw allows an attacker, via the RSA decryption API, to decrypt parts of the ciphertext encrypted with RSA. The highest threat from this vulnerability is to confidentiality.", "title": "Vulnerability description" }, { "category": "summary", "text": "python-rsa: bleichenbacher timing oracle attack against RSA decryption", "title": "Vulnerability summary" }, { "category": "other", "text": "In Red Hat OpenStack Platform, because the flaw has a lower impact and the fix would require a substantial amount of development, no update will be provided at this time for the RHOSP python-rsa package.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RH7-RHOSE-3.11:python-rsa-0:4.5-3.el7.src", "7Server-RH7-RHOSE-3.11:python2-rsa-0:4.5-3.el7.noarch" ], "known_not_affected": [ "7Server-RH7-RHOSE-3.11:atomic-enterprise-service-catalog-1:3.11.394-1.git.1675.fdb6e0b.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-enterprise-service-catalog-1:3.11.394-1.git.1675.fdb6e0b.el7.src", "7Server-RH7-RHOSE-3.11:atomic-enterprise-service-catalog-1:3.11.394-1.git.1675.fdb6e0b.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-enterprise-service-catalog-svcat-1:3.11.394-1.git.1675.fdb6e0b.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-enterprise-service-catalog-svcat-1:3.11.394-1.git.1675.fdb6e0b.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-0:3.11.394-1.git.0.e03a88e.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-0:3.11.394-1.git.0.e03a88e.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-0:3.11.394-1.git.0.e03a88e.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-clients-0:3.11.394-1.git.0.e03a88e.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-clients-0:3.11.394-1.git.0.e03a88e.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-clients-redistributable-0:3.11.394-1.git.0.e03a88e.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-cluster-autoscaler-0:3.11.394-1.git.0.1900c76.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-cluster-autoscaler-0:3.11.394-1.git.0.1900c76.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-cluster-autoscaler-0:3.11.394-1.git.0.1900c76.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-descheduler-0:3.11.394-1.git.299.ad3a3c0.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-descheduler-0:3.11.394-1.git.299.ad3a3c0.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-descheduler-0:3.11.394-1.git.299.ad3a3c0.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-docker-excluder-0:3.11.394-1.git.0.e03a88e.el7.noarch", "7Server-RH7-RHOSE-3.11:atomic-openshift-dockerregistry-0:3.11.394-1.git.481.6e48246.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-dockerregistry-0:3.11.394-1.git.481.6e48246.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-excluder-0:3.11.394-1.git.0.e03a88e.el7.noarch", "7Server-RH7-RHOSE-3.11:atomic-openshift-hyperkube-0:3.11.394-1.git.0.e03a88e.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-hyperkube-0:3.11.394-1.git.0.e03a88e.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-hypershift-0:3.11.394-1.git.0.e03a88e.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-hypershift-0:3.11.394-1.git.0.e03a88e.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-master-0:3.11.394-1.git.0.e03a88e.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-master-0:3.11.394-1.git.0.e03a88e.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-metrics-server-0:3.11.394-1.git.53.3d82586.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-metrics-server-0:3.11.394-1.git.53.3d82586.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-metrics-server-0:3.11.394-1.git.53.3d82586.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-node-0:3.11.394-1.git.0.e03a88e.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-node-0:3.11.394-1.git.0.e03a88e.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-node-problem-detector-0:3.11.394-1.git.263.49acf3a.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-node-problem-detector-0:3.11.394-1.git.263.49acf3a.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-node-problem-detector-0:3.11.394-1.git.263.49acf3a.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-pod-0:3.11.394-1.git.0.e03a88e.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-pod-0:3.11.394-1.git.0.e03a88e.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-sdn-ovs-0:3.11.394-1.git.0.e03a88e.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-sdn-ovs-0:3.11.394-1.git.0.e03a88e.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-service-idler-0:3.11.394-1.git.15.73f73cd.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-service-idler-0:3.11.394-1.git.15.73f73cd.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-service-idler-0:3.11.394-1.git.15.73f73cd.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-template-service-broker-0:3.11.394-1.git.0.e03a88e.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-template-service-broker-0:3.11.394-1.git.0.e03a88e.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-tests-0:3.11.394-1.git.0.e03a88e.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-tests-0:3.11.394-1.git.0.e03a88e.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-web-console-0:3.11.394-1.git.667.08dd2a6.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-web-console-0:3.11.394-1.git.667.08dd2a6.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-web-console-0:3.11.394-1.git.667.08dd2a6.el7.x86_64", "7Server-RH7-RHOSE-3.11:golang-github-openshift-oauth-proxy-0:3.11.394-1.git.439.4c37707.el7.ppc64le", "7Server-RH7-RHOSE-3.11:golang-github-openshift-oauth-proxy-0:3.11.394-1.git.439.4c37707.el7.src", "7Server-RH7-RHOSE-3.11:golang-github-openshift-oauth-proxy-0:3.11.394-1.git.439.4c37707.el7.x86_64", "7Server-RH7-RHOSE-3.11:golang-github-prometheus-alertmanager-0:3.11.394-1.git.0.1fbb64c.el7.src", "7Server-RH7-RHOSE-3.11:golang-github-prometheus-node_exporter-0:3.11.394-1.git.1062.8adc4b8.el7.src", "7Server-RH7-RHOSE-3.11:golang-github-prometheus-prometheus-0:3.11.394-1.git.5026.2c9627f.el7.src", "7Server-RH7-RHOSE-3.11:haproxy-0:1.8.28-1.el7.src", "7Server-RH7-RHOSE-3.11:haproxy-debuginfo-0:1.8.28-1.el7.ppc64le", "7Server-RH7-RHOSE-3.11:haproxy-debuginfo-0:1.8.28-1.el7.x86_64", "7Server-RH7-RHOSE-3.11:haproxy18-0:1.8.28-1.el7.ppc64le", "7Server-RH7-RHOSE-3.11:haproxy18-0:1.8.28-1.el7.x86_64", "7Server-RH7-RHOSE-3.11:jenkins-0:2.263.3.1612433584-1.el7.noarch", "7Server-RH7-RHOSE-3.11:jenkins-0:2.263.3.1612433584-1.el7.src", "7Server-RH7-RHOSE-3.11:jenkins-2-plugins-0:3.11.1612862361-1.el7.noarch", "7Server-RH7-RHOSE-3.11:jenkins-2-plugins-0:3.11.1612862361-1.el7.src", "7Server-RH7-RHOSE-3.11:openshift-ansible-0:3.11.394-6.git.0.47ec25d.el7.noarch", "7Server-RH7-RHOSE-3.11:openshift-ansible-0:3.11.394-6.git.0.47ec25d.el7.src", "7Server-RH7-RHOSE-3.11:openshift-ansible-docs-0:3.11.394-6.git.0.47ec25d.el7.noarch", "7Server-RH7-RHOSE-3.11:openshift-ansible-playbooks-0:3.11.394-6.git.0.47ec25d.el7.noarch", "7Server-RH7-RHOSE-3.11:openshift-ansible-roles-0:3.11.394-6.git.0.47ec25d.el7.noarch", "7Server-RH7-RHOSE-3.11:openshift-ansible-test-0:3.11.394-6.git.0.47ec25d.el7.noarch", "7Server-RH7-RHOSE-3.11:openshift-enterprise-autoheal-0:3.11.394-1.git.218.59eb597.el7.ppc64le", "7Server-RH7-RHOSE-3.11:openshift-enterprise-autoheal-0:3.11.394-1.git.218.59eb597.el7.src", "7Server-RH7-RHOSE-3.11:openshift-enterprise-autoheal-0:3.11.394-1.git.218.59eb597.el7.x86_64", "7Server-RH7-RHOSE-3.11:openshift-enterprise-cluster-capacity-0:3.11.394-1.git.379.92adfdc.el7.ppc64le", "7Server-RH7-RHOSE-3.11:openshift-enterprise-cluster-capacity-0:3.11.394-1.git.379.92adfdc.el7.src", "7Server-RH7-RHOSE-3.11:openshift-enterprise-cluster-capacity-0:3.11.394-1.git.379.92adfdc.el7.x86_64", "7Server-RH7-RHOSE-3.11:openshift-kuryr-0:3.11.394-1.git.1490.16ed375.el7.src", "7Server-RH7-RHOSE-3.11:openshift-kuryr-cni-0:3.11.394-1.git.1490.16ed375.el7.noarch", "7Server-RH7-RHOSE-3.11:openshift-kuryr-common-0:3.11.394-1.git.1490.16ed375.el7.noarch", "7Server-RH7-RHOSE-3.11:openshift-kuryr-controller-0:3.11.394-1.git.1490.16ed375.el7.noarch", "7Server-RH7-RHOSE-3.11:prometheus-0:3.11.394-1.git.5026.2c9627f.el7.ppc64le", "7Server-RH7-RHOSE-3.11:prometheus-0:3.11.394-1.git.5026.2c9627f.el7.x86_64", "7Server-RH7-RHOSE-3.11:prometheus-alertmanager-0:3.11.394-1.git.0.1fbb64c.el7.ppc64le", "7Server-RH7-RHOSE-3.11:prometheus-alertmanager-0:3.11.394-1.git.0.1fbb64c.el7.x86_64", "7Server-RH7-RHOSE-3.11:prometheus-node-exporter-0:3.11.394-1.git.1062.8adc4b8.el7.ppc64le", "7Server-RH7-RHOSE-3.11:prometheus-node-exporter-0:3.11.394-1.git.1062.8adc4b8.el7.x86_64", "7Server-RH7-RHOSE-3.11:python2-kuryr-kubernetes-0:3.11.394-1.git.1490.16ed375.el7.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-25658" }, { "category": "external", "summary": "RHBZ#1889972", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1889972" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-25658", "url": "https://www.cve.org/CVERecord?id=CVE-2020-25658" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-25658", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-25658" }, { "category": "external", "summary": "https://github.com/sybrenstuvel/python-rsa/issues/165", "url": "https://github.com/sybrenstuvel/python-rsa/issues/165" } ], "release_date": "2020-11-09T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-03-03T12:28:39+00:00", "details": "Before applying this update, ensure all previously released errata relevant\nto your system is applied.\n\nSee the following documentation, which will be updated shortly for release\n3.11.394, for important instructions on how to upgrade your cluster and fully\napply this asynchronous errata update:\n\nhttps://docs.openshift.com/container-platform/3.11/release_notes/ocp_3_11_release_notes.html\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/articles/11258.", "product_ids": [ "7Server-RH7-RHOSE-3.11:python-rsa-0:4.5-3.el7.src", "7Server-RH7-RHOSE-3.11:python2-rsa-0:4.5-3.el7.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:0637" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "7Server-RH7-RHOSE-3.11:python-rsa-0:4.5-3.el7.src", "7Server-RH7-RHOSE-3.11:python2-rsa-0:4.5-3.el7.noarch" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "python-rsa: bleichenbacher timing oracle attack against RSA decryption" }, { "cve": "CVE-2021-21602", "cwe": { "id": "CWE-59", "name": "Improper Link Resolution Before File Access (\u0027Link Following\u0027)" }, "discovery_date": "2021-02-04T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "7Server-RH7-RHOSE-3.11:atomic-enterprise-service-catalog-1:3.11.394-1.git.1675.fdb6e0b.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-enterprise-service-catalog-1:3.11.394-1.git.1675.fdb6e0b.el7.src", "7Server-RH7-RHOSE-3.11:atomic-enterprise-service-catalog-1:3.11.394-1.git.1675.fdb6e0b.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-enterprise-service-catalog-svcat-1:3.11.394-1.git.1675.fdb6e0b.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-enterprise-service-catalog-svcat-1:3.11.394-1.git.1675.fdb6e0b.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-0:3.11.394-1.git.0.e03a88e.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-0:3.11.394-1.git.0.e03a88e.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-0:3.11.394-1.git.0.e03a88e.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-clients-0:3.11.394-1.git.0.e03a88e.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-clients-0:3.11.394-1.git.0.e03a88e.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-clients-redistributable-0:3.11.394-1.git.0.e03a88e.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-cluster-autoscaler-0:3.11.394-1.git.0.1900c76.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-cluster-autoscaler-0:3.11.394-1.git.0.1900c76.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-cluster-autoscaler-0:3.11.394-1.git.0.1900c76.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-descheduler-0:3.11.394-1.git.299.ad3a3c0.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-descheduler-0:3.11.394-1.git.299.ad3a3c0.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-descheduler-0:3.11.394-1.git.299.ad3a3c0.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-docker-excluder-0:3.11.394-1.git.0.e03a88e.el7.noarch", "7Server-RH7-RHOSE-3.11:atomic-openshift-dockerregistry-0:3.11.394-1.git.481.6e48246.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-dockerregistry-0:3.11.394-1.git.481.6e48246.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-excluder-0:3.11.394-1.git.0.e03a88e.el7.noarch", "7Server-RH7-RHOSE-3.11:atomic-openshift-hyperkube-0:3.11.394-1.git.0.e03a88e.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-hyperkube-0:3.11.394-1.git.0.e03a88e.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-hypershift-0:3.11.394-1.git.0.e03a88e.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-hypershift-0:3.11.394-1.git.0.e03a88e.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-master-0:3.11.394-1.git.0.e03a88e.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-master-0:3.11.394-1.git.0.e03a88e.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-metrics-server-0:3.11.394-1.git.53.3d82586.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-metrics-server-0:3.11.394-1.git.53.3d82586.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-metrics-server-0:3.11.394-1.git.53.3d82586.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-node-0:3.11.394-1.git.0.e03a88e.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-node-0:3.11.394-1.git.0.e03a88e.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-node-problem-detector-0:3.11.394-1.git.263.49acf3a.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-node-problem-detector-0:3.11.394-1.git.263.49acf3a.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-node-problem-detector-0:3.11.394-1.git.263.49acf3a.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-pod-0:3.11.394-1.git.0.e03a88e.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-pod-0:3.11.394-1.git.0.e03a88e.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-sdn-ovs-0:3.11.394-1.git.0.e03a88e.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-sdn-ovs-0:3.11.394-1.git.0.e03a88e.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-service-idler-0:3.11.394-1.git.15.73f73cd.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-service-idler-0:3.11.394-1.git.15.73f73cd.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-service-idler-0:3.11.394-1.git.15.73f73cd.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-template-service-broker-0:3.11.394-1.git.0.e03a88e.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-template-service-broker-0:3.11.394-1.git.0.e03a88e.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-tests-0:3.11.394-1.git.0.e03a88e.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-tests-0:3.11.394-1.git.0.e03a88e.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-web-console-0:3.11.394-1.git.667.08dd2a6.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-web-console-0:3.11.394-1.git.667.08dd2a6.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-web-console-0:3.11.394-1.git.667.08dd2a6.el7.x86_64", "7Server-RH7-RHOSE-3.11:golang-github-openshift-oauth-proxy-0:3.11.394-1.git.439.4c37707.el7.ppc64le", "7Server-RH7-RHOSE-3.11:golang-github-openshift-oauth-proxy-0:3.11.394-1.git.439.4c37707.el7.src", "7Server-RH7-RHOSE-3.11:golang-github-openshift-oauth-proxy-0:3.11.394-1.git.439.4c37707.el7.x86_64", "7Server-RH7-RHOSE-3.11:golang-github-prometheus-alertmanager-0:3.11.394-1.git.0.1fbb64c.el7.src", "7Server-RH7-RHOSE-3.11:golang-github-prometheus-node_exporter-0:3.11.394-1.git.1062.8adc4b8.el7.src", "7Server-RH7-RHOSE-3.11:golang-github-prometheus-prometheus-0:3.11.394-1.git.5026.2c9627f.el7.src", "7Server-RH7-RHOSE-3.11:haproxy-0:1.8.28-1.el7.src", "7Server-RH7-RHOSE-3.11:haproxy-debuginfo-0:1.8.28-1.el7.ppc64le", "7Server-RH7-RHOSE-3.11:haproxy-debuginfo-0:1.8.28-1.el7.x86_64", "7Server-RH7-RHOSE-3.11:haproxy18-0:1.8.28-1.el7.ppc64le", "7Server-RH7-RHOSE-3.11:haproxy18-0:1.8.28-1.el7.x86_64", "7Server-RH7-RHOSE-3.11:jenkins-2-plugins-0:3.11.1612862361-1.el7.noarch", "7Server-RH7-RHOSE-3.11:jenkins-2-plugins-0:3.11.1612862361-1.el7.src", "7Server-RH7-RHOSE-3.11:openshift-ansible-0:3.11.394-6.git.0.47ec25d.el7.noarch", "7Server-RH7-RHOSE-3.11:openshift-ansible-0:3.11.394-6.git.0.47ec25d.el7.src", "7Server-RH7-RHOSE-3.11:openshift-ansible-docs-0:3.11.394-6.git.0.47ec25d.el7.noarch", "7Server-RH7-RHOSE-3.11:openshift-ansible-playbooks-0:3.11.394-6.git.0.47ec25d.el7.noarch", "7Server-RH7-RHOSE-3.11:openshift-ansible-roles-0:3.11.394-6.git.0.47ec25d.el7.noarch", "7Server-RH7-RHOSE-3.11:openshift-ansible-test-0:3.11.394-6.git.0.47ec25d.el7.noarch", "7Server-RH7-RHOSE-3.11:openshift-enterprise-autoheal-0:3.11.394-1.git.218.59eb597.el7.ppc64le", "7Server-RH7-RHOSE-3.11:openshift-enterprise-autoheal-0:3.11.394-1.git.218.59eb597.el7.src", "7Server-RH7-RHOSE-3.11:openshift-enterprise-autoheal-0:3.11.394-1.git.218.59eb597.el7.x86_64", "7Server-RH7-RHOSE-3.11:openshift-enterprise-cluster-capacity-0:3.11.394-1.git.379.92adfdc.el7.ppc64le", "7Server-RH7-RHOSE-3.11:openshift-enterprise-cluster-capacity-0:3.11.394-1.git.379.92adfdc.el7.src", "7Server-RH7-RHOSE-3.11:openshift-enterprise-cluster-capacity-0:3.11.394-1.git.379.92adfdc.el7.x86_64", "7Server-RH7-RHOSE-3.11:openshift-kuryr-0:3.11.394-1.git.1490.16ed375.el7.src", "7Server-RH7-RHOSE-3.11:openshift-kuryr-cni-0:3.11.394-1.git.1490.16ed375.el7.noarch", "7Server-RH7-RHOSE-3.11:openshift-kuryr-common-0:3.11.394-1.git.1490.16ed375.el7.noarch", "7Server-RH7-RHOSE-3.11:openshift-kuryr-controller-0:3.11.394-1.git.1490.16ed375.el7.noarch", "7Server-RH7-RHOSE-3.11:prometheus-0:3.11.394-1.git.5026.2c9627f.el7.ppc64le", "7Server-RH7-RHOSE-3.11:prometheus-0:3.11.394-1.git.5026.2c9627f.el7.x86_64", "7Server-RH7-RHOSE-3.11:prometheus-alertmanager-0:3.11.394-1.git.0.1fbb64c.el7.ppc64le", "7Server-RH7-RHOSE-3.11:prometheus-alertmanager-0:3.11.394-1.git.0.1fbb64c.el7.x86_64", "7Server-RH7-RHOSE-3.11:prometheus-node-exporter-0:3.11.394-1.git.1062.8adc4b8.el7.ppc64le", "7Server-RH7-RHOSE-3.11:prometheus-node-exporter-0:3.11.394-1.git.1062.8adc4b8.el7.x86_64", "7Server-RH7-RHOSE-3.11:python-rsa-0:4.5-3.el7.src", "7Server-RH7-RHOSE-3.11:python2-kuryr-kubernetes-0:3.11.394-1.git.1490.16ed375.el7.noarch", "7Server-RH7-RHOSE-3.11:python2-rsa-0:4.5-3.el7.noarch" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1925161" } ], "notes": [ { "category": "description", "text": "Jenkins 2.274 and earlier, LTS 2.263.1 and earlier allows reading arbitrary files using the file browser for workspaces and archived artifacts by following symlinks.", "title": "Vulnerability description" }, { "category": "summary", "text": "jenkins: Arbitrary file read vulnerability in workspace browsers", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RH7-RHOSE-3.11:jenkins-0:2.263.3.1612433584-1.el7.noarch", "7Server-RH7-RHOSE-3.11:jenkins-0:2.263.3.1612433584-1.el7.src" ], "known_not_affected": [ "7Server-RH7-RHOSE-3.11:atomic-enterprise-service-catalog-1:3.11.394-1.git.1675.fdb6e0b.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-enterprise-service-catalog-1:3.11.394-1.git.1675.fdb6e0b.el7.src", "7Server-RH7-RHOSE-3.11:atomic-enterprise-service-catalog-1:3.11.394-1.git.1675.fdb6e0b.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-enterprise-service-catalog-svcat-1:3.11.394-1.git.1675.fdb6e0b.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-enterprise-service-catalog-svcat-1:3.11.394-1.git.1675.fdb6e0b.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-0:3.11.394-1.git.0.e03a88e.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-0:3.11.394-1.git.0.e03a88e.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-0:3.11.394-1.git.0.e03a88e.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-clients-0:3.11.394-1.git.0.e03a88e.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-clients-0:3.11.394-1.git.0.e03a88e.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-clients-redistributable-0:3.11.394-1.git.0.e03a88e.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-cluster-autoscaler-0:3.11.394-1.git.0.1900c76.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-cluster-autoscaler-0:3.11.394-1.git.0.1900c76.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-cluster-autoscaler-0:3.11.394-1.git.0.1900c76.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-descheduler-0:3.11.394-1.git.299.ad3a3c0.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-descheduler-0:3.11.394-1.git.299.ad3a3c0.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-descheduler-0:3.11.394-1.git.299.ad3a3c0.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-docker-excluder-0:3.11.394-1.git.0.e03a88e.el7.noarch", "7Server-RH7-RHOSE-3.11:atomic-openshift-dockerregistry-0:3.11.394-1.git.481.6e48246.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-dockerregistry-0:3.11.394-1.git.481.6e48246.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-excluder-0:3.11.394-1.git.0.e03a88e.el7.noarch", "7Server-RH7-RHOSE-3.11:atomic-openshift-hyperkube-0:3.11.394-1.git.0.e03a88e.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-hyperkube-0:3.11.394-1.git.0.e03a88e.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-hypershift-0:3.11.394-1.git.0.e03a88e.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-hypershift-0:3.11.394-1.git.0.e03a88e.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-master-0:3.11.394-1.git.0.e03a88e.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-master-0:3.11.394-1.git.0.e03a88e.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-metrics-server-0:3.11.394-1.git.53.3d82586.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-metrics-server-0:3.11.394-1.git.53.3d82586.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-metrics-server-0:3.11.394-1.git.53.3d82586.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-node-0:3.11.394-1.git.0.e03a88e.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-node-0:3.11.394-1.git.0.e03a88e.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-node-problem-detector-0:3.11.394-1.git.263.49acf3a.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-node-problem-detector-0:3.11.394-1.git.263.49acf3a.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-node-problem-detector-0:3.11.394-1.git.263.49acf3a.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-pod-0:3.11.394-1.git.0.e03a88e.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-pod-0:3.11.394-1.git.0.e03a88e.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-sdn-ovs-0:3.11.394-1.git.0.e03a88e.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-sdn-ovs-0:3.11.394-1.git.0.e03a88e.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-service-idler-0:3.11.394-1.git.15.73f73cd.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-service-idler-0:3.11.394-1.git.15.73f73cd.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-service-idler-0:3.11.394-1.git.15.73f73cd.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-template-service-broker-0:3.11.394-1.git.0.e03a88e.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-template-service-broker-0:3.11.394-1.git.0.e03a88e.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-tests-0:3.11.394-1.git.0.e03a88e.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-tests-0:3.11.394-1.git.0.e03a88e.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-web-console-0:3.11.394-1.git.667.08dd2a6.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-web-console-0:3.11.394-1.git.667.08dd2a6.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-web-console-0:3.11.394-1.git.667.08dd2a6.el7.x86_64", "7Server-RH7-RHOSE-3.11:golang-github-openshift-oauth-proxy-0:3.11.394-1.git.439.4c37707.el7.ppc64le", "7Server-RH7-RHOSE-3.11:golang-github-openshift-oauth-proxy-0:3.11.394-1.git.439.4c37707.el7.src", "7Server-RH7-RHOSE-3.11:golang-github-openshift-oauth-proxy-0:3.11.394-1.git.439.4c37707.el7.x86_64", "7Server-RH7-RHOSE-3.11:golang-github-prometheus-alertmanager-0:3.11.394-1.git.0.1fbb64c.el7.src", "7Server-RH7-RHOSE-3.11:golang-github-prometheus-node_exporter-0:3.11.394-1.git.1062.8adc4b8.el7.src", "7Server-RH7-RHOSE-3.11:golang-github-prometheus-prometheus-0:3.11.394-1.git.5026.2c9627f.el7.src", "7Server-RH7-RHOSE-3.11:haproxy-0:1.8.28-1.el7.src", "7Server-RH7-RHOSE-3.11:haproxy-debuginfo-0:1.8.28-1.el7.ppc64le", "7Server-RH7-RHOSE-3.11:haproxy-debuginfo-0:1.8.28-1.el7.x86_64", "7Server-RH7-RHOSE-3.11:haproxy18-0:1.8.28-1.el7.ppc64le", "7Server-RH7-RHOSE-3.11:haproxy18-0:1.8.28-1.el7.x86_64", "7Server-RH7-RHOSE-3.11:jenkins-2-plugins-0:3.11.1612862361-1.el7.noarch", "7Server-RH7-RHOSE-3.11:jenkins-2-plugins-0:3.11.1612862361-1.el7.src", "7Server-RH7-RHOSE-3.11:openshift-ansible-0:3.11.394-6.git.0.47ec25d.el7.noarch", "7Server-RH7-RHOSE-3.11:openshift-ansible-0:3.11.394-6.git.0.47ec25d.el7.src", "7Server-RH7-RHOSE-3.11:openshift-ansible-docs-0:3.11.394-6.git.0.47ec25d.el7.noarch", "7Server-RH7-RHOSE-3.11:openshift-ansible-playbooks-0:3.11.394-6.git.0.47ec25d.el7.noarch", "7Server-RH7-RHOSE-3.11:openshift-ansible-roles-0:3.11.394-6.git.0.47ec25d.el7.noarch", "7Server-RH7-RHOSE-3.11:openshift-ansible-test-0:3.11.394-6.git.0.47ec25d.el7.noarch", "7Server-RH7-RHOSE-3.11:openshift-enterprise-autoheal-0:3.11.394-1.git.218.59eb597.el7.ppc64le", "7Server-RH7-RHOSE-3.11:openshift-enterprise-autoheal-0:3.11.394-1.git.218.59eb597.el7.src", "7Server-RH7-RHOSE-3.11:openshift-enterprise-autoheal-0:3.11.394-1.git.218.59eb597.el7.x86_64", "7Server-RH7-RHOSE-3.11:openshift-enterprise-cluster-capacity-0:3.11.394-1.git.379.92adfdc.el7.ppc64le", "7Server-RH7-RHOSE-3.11:openshift-enterprise-cluster-capacity-0:3.11.394-1.git.379.92adfdc.el7.src", "7Server-RH7-RHOSE-3.11:openshift-enterprise-cluster-capacity-0:3.11.394-1.git.379.92adfdc.el7.x86_64", "7Server-RH7-RHOSE-3.11:openshift-kuryr-0:3.11.394-1.git.1490.16ed375.el7.src", "7Server-RH7-RHOSE-3.11:openshift-kuryr-cni-0:3.11.394-1.git.1490.16ed375.el7.noarch", "7Server-RH7-RHOSE-3.11:openshift-kuryr-common-0:3.11.394-1.git.1490.16ed375.el7.noarch", "7Server-RH7-RHOSE-3.11:openshift-kuryr-controller-0:3.11.394-1.git.1490.16ed375.el7.noarch", "7Server-RH7-RHOSE-3.11:prometheus-0:3.11.394-1.git.5026.2c9627f.el7.ppc64le", "7Server-RH7-RHOSE-3.11:prometheus-0:3.11.394-1.git.5026.2c9627f.el7.x86_64", "7Server-RH7-RHOSE-3.11:prometheus-alertmanager-0:3.11.394-1.git.0.1fbb64c.el7.ppc64le", "7Server-RH7-RHOSE-3.11:prometheus-alertmanager-0:3.11.394-1.git.0.1fbb64c.el7.x86_64", "7Server-RH7-RHOSE-3.11:prometheus-node-exporter-0:3.11.394-1.git.1062.8adc4b8.el7.ppc64le", "7Server-RH7-RHOSE-3.11:prometheus-node-exporter-0:3.11.394-1.git.1062.8adc4b8.el7.x86_64", "7Server-RH7-RHOSE-3.11:python-rsa-0:4.5-3.el7.src", "7Server-RH7-RHOSE-3.11:python2-kuryr-kubernetes-0:3.11.394-1.git.1490.16ed375.el7.noarch", "7Server-RH7-RHOSE-3.11:python2-rsa-0:4.5-3.el7.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-21602" }, { "category": "external", "summary": "RHBZ#1925161", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1925161" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-21602", "url": "https://www.cve.org/CVERecord?id=CVE-2021-21602" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-21602", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-21602" } ], "release_date": "2021-01-13T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-03-03T12:28:39+00:00", "details": "Before applying this update, ensure all previously released errata relevant\nto your system is applied.\n\nSee the following documentation, which will be updated shortly for release\n3.11.394, for important instructions on how to upgrade your cluster and fully\napply this asynchronous errata update:\n\nhttps://docs.openshift.com/container-platform/3.11/release_notes/ocp_3_11_release_notes.html\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/articles/11258.", "product_ids": [ "7Server-RH7-RHOSE-3.11:jenkins-0:2.263.3.1612433584-1.el7.noarch", "7Server-RH7-RHOSE-3.11:jenkins-0:2.263.3.1612433584-1.el7.src" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:0637" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "7Server-RH7-RHOSE-3.11:jenkins-0:2.263.3.1612433584-1.el7.noarch", "7Server-RH7-RHOSE-3.11:jenkins-0:2.263.3.1612433584-1.el7.src" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "jenkins: Arbitrary file read vulnerability in workspace browsers" }, { "cve": "CVE-2021-21603", "cwe": { "id": "CWE-79", "name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)" }, "discovery_date": "2021-02-04T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "7Server-RH7-RHOSE-3.11:atomic-enterprise-service-catalog-1:3.11.394-1.git.1675.fdb6e0b.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-enterprise-service-catalog-1:3.11.394-1.git.1675.fdb6e0b.el7.src", "7Server-RH7-RHOSE-3.11:atomic-enterprise-service-catalog-1:3.11.394-1.git.1675.fdb6e0b.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-enterprise-service-catalog-svcat-1:3.11.394-1.git.1675.fdb6e0b.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-enterprise-service-catalog-svcat-1:3.11.394-1.git.1675.fdb6e0b.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-0:3.11.394-1.git.0.e03a88e.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-0:3.11.394-1.git.0.e03a88e.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-0:3.11.394-1.git.0.e03a88e.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-clients-0:3.11.394-1.git.0.e03a88e.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-clients-0:3.11.394-1.git.0.e03a88e.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-clients-redistributable-0:3.11.394-1.git.0.e03a88e.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-cluster-autoscaler-0:3.11.394-1.git.0.1900c76.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-cluster-autoscaler-0:3.11.394-1.git.0.1900c76.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-cluster-autoscaler-0:3.11.394-1.git.0.1900c76.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-descheduler-0:3.11.394-1.git.299.ad3a3c0.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-descheduler-0:3.11.394-1.git.299.ad3a3c0.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-descheduler-0:3.11.394-1.git.299.ad3a3c0.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-docker-excluder-0:3.11.394-1.git.0.e03a88e.el7.noarch", "7Server-RH7-RHOSE-3.11:atomic-openshift-dockerregistry-0:3.11.394-1.git.481.6e48246.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-dockerregistry-0:3.11.394-1.git.481.6e48246.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-excluder-0:3.11.394-1.git.0.e03a88e.el7.noarch", "7Server-RH7-RHOSE-3.11:atomic-openshift-hyperkube-0:3.11.394-1.git.0.e03a88e.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-hyperkube-0:3.11.394-1.git.0.e03a88e.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-hypershift-0:3.11.394-1.git.0.e03a88e.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-hypershift-0:3.11.394-1.git.0.e03a88e.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-master-0:3.11.394-1.git.0.e03a88e.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-master-0:3.11.394-1.git.0.e03a88e.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-metrics-server-0:3.11.394-1.git.53.3d82586.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-metrics-server-0:3.11.394-1.git.53.3d82586.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-metrics-server-0:3.11.394-1.git.53.3d82586.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-node-0:3.11.394-1.git.0.e03a88e.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-node-0:3.11.394-1.git.0.e03a88e.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-node-problem-detector-0:3.11.394-1.git.263.49acf3a.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-node-problem-detector-0:3.11.394-1.git.263.49acf3a.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-node-problem-detector-0:3.11.394-1.git.263.49acf3a.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-pod-0:3.11.394-1.git.0.e03a88e.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-pod-0:3.11.394-1.git.0.e03a88e.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-sdn-ovs-0:3.11.394-1.git.0.e03a88e.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-sdn-ovs-0:3.11.394-1.git.0.e03a88e.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-service-idler-0:3.11.394-1.git.15.73f73cd.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-service-idler-0:3.11.394-1.git.15.73f73cd.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-service-idler-0:3.11.394-1.git.15.73f73cd.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-template-service-broker-0:3.11.394-1.git.0.e03a88e.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-template-service-broker-0:3.11.394-1.git.0.e03a88e.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-tests-0:3.11.394-1.git.0.e03a88e.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-tests-0:3.11.394-1.git.0.e03a88e.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-web-console-0:3.11.394-1.git.667.08dd2a6.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-web-console-0:3.11.394-1.git.667.08dd2a6.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-web-console-0:3.11.394-1.git.667.08dd2a6.el7.x86_64", "7Server-RH7-RHOSE-3.11:golang-github-openshift-oauth-proxy-0:3.11.394-1.git.439.4c37707.el7.ppc64le", "7Server-RH7-RHOSE-3.11:golang-github-openshift-oauth-proxy-0:3.11.394-1.git.439.4c37707.el7.src", "7Server-RH7-RHOSE-3.11:golang-github-openshift-oauth-proxy-0:3.11.394-1.git.439.4c37707.el7.x86_64", "7Server-RH7-RHOSE-3.11:golang-github-prometheus-alertmanager-0:3.11.394-1.git.0.1fbb64c.el7.src", "7Server-RH7-RHOSE-3.11:golang-github-prometheus-node_exporter-0:3.11.394-1.git.1062.8adc4b8.el7.src", "7Server-RH7-RHOSE-3.11:golang-github-prometheus-prometheus-0:3.11.394-1.git.5026.2c9627f.el7.src", "7Server-RH7-RHOSE-3.11:haproxy-0:1.8.28-1.el7.src", "7Server-RH7-RHOSE-3.11:haproxy-debuginfo-0:1.8.28-1.el7.ppc64le", "7Server-RH7-RHOSE-3.11:haproxy-debuginfo-0:1.8.28-1.el7.x86_64", "7Server-RH7-RHOSE-3.11:haproxy18-0:1.8.28-1.el7.ppc64le", "7Server-RH7-RHOSE-3.11:haproxy18-0:1.8.28-1.el7.x86_64", "7Server-RH7-RHOSE-3.11:jenkins-2-plugins-0:3.11.1612862361-1.el7.noarch", "7Server-RH7-RHOSE-3.11:jenkins-2-plugins-0:3.11.1612862361-1.el7.src", "7Server-RH7-RHOSE-3.11:openshift-ansible-0:3.11.394-6.git.0.47ec25d.el7.noarch", "7Server-RH7-RHOSE-3.11:openshift-ansible-0:3.11.394-6.git.0.47ec25d.el7.src", "7Server-RH7-RHOSE-3.11:openshift-ansible-docs-0:3.11.394-6.git.0.47ec25d.el7.noarch", "7Server-RH7-RHOSE-3.11:openshift-ansible-playbooks-0:3.11.394-6.git.0.47ec25d.el7.noarch", "7Server-RH7-RHOSE-3.11:openshift-ansible-roles-0:3.11.394-6.git.0.47ec25d.el7.noarch", "7Server-RH7-RHOSE-3.11:openshift-ansible-test-0:3.11.394-6.git.0.47ec25d.el7.noarch", "7Server-RH7-RHOSE-3.11:openshift-enterprise-autoheal-0:3.11.394-1.git.218.59eb597.el7.ppc64le", "7Server-RH7-RHOSE-3.11:openshift-enterprise-autoheal-0:3.11.394-1.git.218.59eb597.el7.src", "7Server-RH7-RHOSE-3.11:openshift-enterprise-autoheal-0:3.11.394-1.git.218.59eb597.el7.x86_64", "7Server-RH7-RHOSE-3.11:openshift-enterprise-cluster-capacity-0:3.11.394-1.git.379.92adfdc.el7.ppc64le", "7Server-RH7-RHOSE-3.11:openshift-enterprise-cluster-capacity-0:3.11.394-1.git.379.92adfdc.el7.src", "7Server-RH7-RHOSE-3.11:openshift-enterprise-cluster-capacity-0:3.11.394-1.git.379.92adfdc.el7.x86_64", "7Server-RH7-RHOSE-3.11:openshift-kuryr-0:3.11.394-1.git.1490.16ed375.el7.src", "7Server-RH7-RHOSE-3.11:openshift-kuryr-cni-0:3.11.394-1.git.1490.16ed375.el7.noarch", "7Server-RH7-RHOSE-3.11:openshift-kuryr-common-0:3.11.394-1.git.1490.16ed375.el7.noarch", "7Server-RH7-RHOSE-3.11:openshift-kuryr-controller-0:3.11.394-1.git.1490.16ed375.el7.noarch", "7Server-RH7-RHOSE-3.11:prometheus-0:3.11.394-1.git.5026.2c9627f.el7.ppc64le", "7Server-RH7-RHOSE-3.11:prometheus-0:3.11.394-1.git.5026.2c9627f.el7.x86_64", "7Server-RH7-RHOSE-3.11:prometheus-alertmanager-0:3.11.394-1.git.0.1fbb64c.el7.ppc64le", "7Server-RH7-RHOSE-3.11:prometheus-alertmanager-0:3.11.394-1.git.0.1fbb64c.el7.x86_64", "7Server-RH7-RHOSE-3.11:prometheus-node-exporter-0:3.11.394-1.git.1062.8adc4b8.el7.ppc64le", "7Server-RH7-RHOSE-3.11:prometheus-node-exporter-0:3.11.394-1.git.1062.8adc4b8.el7.x86_64", "7Server-RH7-RHOSE-3.11:python-rsa-0:4.5-3.el7.src", "7Server-RH7-RHOSE-3.11:python2-kuryr-kubernetes-0:3.11.394-1.git.1490.16ed375.el7.noarch", "7Server-RH7-RHOSE-3.11:python2-rsa-0:4.5-3.el7.noarch" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1925160" } ], "notes": [ { "category": "description", "text": "A flaw was found in jenkins. A cross-site scripting (XSS) vulnerability is possible due to the contents of the notification bar responses not being properly escaped. The highest threat from this vulnerability is to data confidentiality and integrity.", "title": "Vulnerability description" }, { "category": "summary", "text": "jenkins: XSS vulnerability in notification bar", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RH7-RHOSE-3.11:jenkins-0:2.263.3.1612433584-1.el7.noarch", "7Server-RH7-RHOSE-3.11:jenkins-0:2.263.3.1612433584-1.el7.src" ], "known_not_affected": [ "7Server-RH7-RHOSE-3.11:atomic-enterprise-service-catalog-1:3.11.394-1.git.1675.fdb6e0b.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-enterprise-service-catalog-1:3.11.394-1.git.1675.fdb6e0b.el7.src", "7Server-RH7-RHOSE-3.11:atomic-enterprise-service-catalog-1:3.11.394-1.git.1675.fdb6e0b.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-enterprise-service-catalog-svcat-1:3.11.394-1.git.1675.fdb6e0b.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-enterprise-service-catalog-svcat-1:3.11.394-1.git.1675.fdb6e0b.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-0:3.11.394-1.git.0.e03a88e.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-0:3.11.394-1.git.0.e03a88e.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-0:3.11.394-1.git.0.e03a88e.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-clients-0:3.11.394-1.git.0.e03a88e.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-clients-0:3.11.394-1.git.0.e03a88e.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-clients-redistributable-0:3.11.394-1.git.0.e03a88e.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-cluster-autoscaler-0:3.11.394-1.git.0.1900c76.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-cluster-autoscaler-0:3.11.394-1.git.0.1900c76.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-cluster-autoscaler-0:3.11.394-1.git.0.1900c76.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-descheduler-0:3.11.394-1.git.299.ad3a3c0.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-descheduler-0:3.11.394-1.git.299.ad3a3c0.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-descheduler-0:3.11.394-1.git.299.ad3a3c0.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-docker-excluder-0:3.11.394-1.git.0.e03a88e.el7.noarch", "7Server-RH7-RHOSE-3.11:atomic-openshift-dockerregistry-0:3.11.394-1.git.481.6e48246.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-dockerregistry-0:3.11.394-1.git.481.6e48246.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-excluder-0:3.11.394-1.git.0.e03a88e.el7.noarch", "7Server-RH7-RHOSE-3.11:atomic-openshift-hyperkube-0:3.11.394-1.git.0.e03a88e.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-hyperkube-0:3.11.394-1.git.0.e03a88e.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-hypershift-0:3.11.394-1.git.0.e03a88e.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-hypershift-0:3.11.394-1.git.0.e03a88e.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-master-0:3.11.394-1.git.0.e03a88e.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-master-0:3.11.394-1.git.0.e03a88e.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-metrics-server-0:3.11.394-1.git.53.3d82586.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-metrics-server-0:3.11.394-1.git.53.3d82586.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-metrics-server-0:3.11.394-1.git.53.3d82586.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-node-0:3.11.394-1.git.0.e03a88e.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-node-0:3.11.394-1.git.0.e03a88e.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-node-problem-detector-0:3.11.394-1.git.263.49acf3a.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-node-problem-detector-0:3.11.394-1.git.263.49acf3a.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-node-problem-detector-0:3.11.394-1.git.263.49acf3a.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-pod-0:3.11.394-1.git.0.e03a88e.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-pod-0:3.11.394-1.git.0.e03a88e.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-sdn-ovs-0:3.11.394-1.git.0.e03a88e.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-sdn-ovs-0:3.11.394-1.git.0.e03a88e.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-service-idler-0:3.11.394-1.git.15.73f73cd.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-service-idler-0:3.11.394-1.git.15.73f73cd.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-service-idler-0:3.11.394-1.git.15.73f73cd.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-template-service-broker-0:3.11.394-1.git.0.e03a88e.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-template-service-broker-0:3.11.394-1.git.0.e03a88e.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-tests-0:3.11.394-1.git.0.e03a88e.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-tests-0:3.11.394-1.git.0.e03a88e.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-web-console-0:3.11.394-1.git.667.08dd2a6.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-web-console-0:3.11.394-1.git.667.08dd2a6.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-web-console-0:3.11.394-1.git.667.08dd2a6.el7.x86_64", "7Server-RH7-RHOSE-3.11:golang-github-openshift-oauth-proxy-0:3.11.394-1.git.439.4c37707.el7.ppc64le", "7Server-RH7-RHOSE-3.11:golang-github-openshift-oauth-proxy-0:3.11.394-1.git.439.4c37707.el7.src", "7Server-RH7-RHOSE-3.11:golang-github-openshift-oauth-proxy-0:3.11.394-1.git.439.4c37707.el7.x86_64", "7Server-RH7-RHOSE-3.11:golang-github-prometheus-alertmanager-0:3.11.394-1.git.0.1fbb64c.el7.src", "7Server-RH7-RHOSE-3.11:golang-github-prometheus-node_exporter-0:3.11.394-1.git.1062.8adc4b8.el7.src", "7Server-RH7-RHOSE-3.11:golang-github-prometheus-prometheus-0:3.11.394-1.git.5026.2c9627f.el7.src", "7Server-RH7-RHOSE-3.11:haproxy-0:1.8.28-1.el7.src", "7Server-RH7-RHOSE-3.11:haproxy-debuginfo-0:1.8.28-1.el7.ppc64le", "7Server-RH7-RHOSE-3.11:haproxy-debuginfo-0:1.8.28-1.el7.x86_64", "7Server-RH7-RHOSE-3.11:haproxy18-0:1.8.28-1.el7.ppc64le", "7Server-RH7-RHOSE-3.11:haproxy18-0:1.8.28-1.el7.x86_64", "7Server-RH7-RHOSE-3.11:jenkins-2-plugins-0:3.11.1612862361-1.el7.noarch", "7Server-RH7-RHOSE-3.11:jenkins-2-plugins-0:3.11.1612862361-1.el7.src", "7Server-RH7-RHOSE-3.11:openshift-ansible-0:3.11.394-6.git.0.47ec25d.el7.noarch", "7Server-RH7-RHOSE-3.11:openshift-ansible-0:3.11.394-6.git.0.47ec25d.el7.src", "7Server-RH7-RHOSE-3.11:openshift-ansible-docs-0:3.11.394-6.git.0.47ec25d.el7.noarch", "7Server-RH7-RHOSE-3.11:openshift-ansible-playbooks-0:3.11.394-6.git.0.47ec25d.el7.noarch", "7Server-RH7-RHOSE-3.11:openshift-ansible-roles-0:3.11.394-6.git.0.47ec25d.el7.noarch", "7Server-RH7-RHOSE-3.11:openshift-ansible-test-0:3.11.394-6.git.0.47ec25d.el7.noarch", "7Server-RH7-RHOSE-3.11:openshift-enterprise-autoheal-0:3.11.394-1.git.218.59eb597.el7.ppc64le", "7Server-RH7-RHOSE-3.11:openshift-enterprise-autoheal-0:3.11.394-1.git.218.59eb597.el7.src", "7Server-RH7-RHOSE-3.11:openshift-enterprise-autoheal-0:3.11.394-1.git.218.59eb597.el7.x86_64", "7Server-RH7-RHOSE-3.11:openshift-enterprise-cluster-capacity-0:3.11.394-1.git.379.92adfdc.el7.ppc64le", "7Server-RH7-RHOSE-3.11:openshift-enterprise-cluster-capacity-0:3.11.394-1.git.379.92adfdc.el7.src", "7Server-RH7-RHOSE-3.11:openshift-enterprise-cluster-capacity-0:3.11.394-1.git.379.92adfdc.el7.x86_64", "7Server-RH7-RHOSE-3.11:openshift-kuryr-0:3.11.394-1.git.1490.16ed375.el7.src", "7Server-RH7-RHOSE-3.11:openshift-kuryr-cni-0:3.11.394-1.git.1490.16ed375.el7.noarch", "7Server-RH7-RHOSE-3.11:openshift-kuryr-common-0:3.11.394-1.git.1490.16ed375.el7.noarch", "7Server-RH7-RHOSE-3.11:openshift-kuryr-controller-0:3.11.394-1.git.1490.16ed375.el7.noarch", "7Server-RH7-RHOSE-3.11:prometheus-0:3.11.394-1.git.5026.2c9627f.el7.ppc64le", "7Server-RH7-RHOSE-3.11:prometheus-0:3.11.394-1.git.5026.2c9627f.el7.x86_64", "7Server-RH7-RHOSE-3.11:prometheus-alertmanager-0:3.11.394-1.git.0.1fbb64c.el7.ppc64le", "7Server-RH7-RHOSE-3.11:prometheus-alertmanager-0:3.11.394-1.git.0.1fbb64c.el7.x86_64", "7Server-RH7-RHOSE-3.11:prometheus-node-exporter-0:3.11.394-1.git.1062.8adc4b8.el7.ppc64le", "7Server-RH7-RHOSE-3.11:prometheus-node-exporter-0:3.11.394-1.git.1062.8adc4b8.el7.x86_64", "7Server-RH7-RHOSE-3.11:python-rsa-0:4.5-3.el7.src", "7Server-RH7-RHOSE-3.11:python2-kuryr-kubernetes-0:3.11.394-1.git.1490.16ed375.el7.noarch", "7Server-RH7-RHOSE-3.11:python2-rsa-0:4.5-3.el7.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-21603" }, { "category": "external", "summary": "RHBZ#1925160", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1925160" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-21603", "url": "https://www.cve.org/CVERecord?id=CVE-2021-21603" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-21603", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-21603" } ], "release_date": "2021-01-13T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-03-03T12:28:39+00:00", "details": "Before applying this update, ensure all previously released errata relevant\nto your system is applied.\n\nSee the following documentation, which will be updated shortly for release\n3.11.394, for important instructions on how to upgrade your cluster and fully\napply this asynchronous errata update:\n\nhttps://docs.openshift.com/container-platform/3.11/release_notes/ocp_3_11_release_notes.html\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/articles/11258.", "product_ids": [ "7Server-RH7-RHOSE-3.11:jenkins-0:2.263.3.1612433584-1.el7.noarch", "7Server-RH7-RHOSE-3.11:jenkins-0:2.263.3.1612433584-1.el7.src" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:0637" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "products": [ "7Server-RH7-RHOSE-3.11:jenkins-0:2.263.3.1612433584-1.el7.noarch", "7Server-RH7-RHOSE-3.11:jenkins-0:2.263.3.1612433584-1.el7.src" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "jenkins: XSS vulnerability in notification bar" }, { "cve": "CVE-2021-21604", "cwe": { "id": "CWE-502", "name": "Deserialization of Untrusted Data" }, "discovery_date": "2021-02-04T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "7Server-RH7-RHOSE-3.11:atomic-enterprise-service-catalog-1:3.11.394-1.git.1675.fdb6e0b.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-enterprise-service-catalog-1:3.11.394-1.git.1675.fdb6e0b.el7.src", "7Server-RH7-RHOSE-3.11:atomic-enterprise-service-catalog-1:3.11.394-1.git.1675.fdb6e0b.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-enterprise-service-catalog-svcat-1:3.11.394-1.git.1675.fdb6e0b.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-enterprise-service-catalog-svcat-1:3.11.394-1.git.1675.fdb6e0b.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-0:3.11.394-1.git.0.e03a88e.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-0:3.11.394-1.git.0.e03a88e.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-0:3.11.394-1.git.0.e03a88e.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-clients-0:3.11.394-1.git.0.e03a88e.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-clients-0:3.11.394-1.git.0.e03a88e.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-clients-redistributable-0:3.11.394-1.git.0.e03a88e.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-cluster-autoscaler-0:3.11.394-1.git.0.1900c76.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-cluster-autoscaler-0:3.11.394-1.git.0.1900c76.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-cluster-autoscaler-0:3.11.394-1.git.0.1900c76.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-descheduler-0:3.11.394-1.git.299.ad3a3c0.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-descheduler-0:3.11.394-1.git.299.ad3a3c0.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-descheduler-0:3.11.394-1.git.299.ad3a3c0.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-docker-excluder-0:3.11.394-1.git.0.e03a88e.el7.noarch", "7Server-RH7-RHOSE-3.11:atomic-openshift-dockerregistry-0:3.11.394-1.git.481.6e48246.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-dockerregistry-0:3.11.394-1.git.481.6e48246.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-excluder-0:3.11.394-1.git.0.e03a88e.el7.noarch", "7Server-RH7-RHOSE-3.11:atomic-openshift-hyperkube-0:3.11.394-1.git.0.e03a88e.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-hyperkube-0:3.11.394-1.git.0.e03a88e.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-hypershift-0:3.11.394-1.git.0.e03a88e.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-hypershift-0:3.11.394-1.git.0.e03a88e.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-master-0:3.11.394-1.git.0.e03a88e.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-master-0:3.11.394-1.git.0.e03a88e.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-metrics-server-0:3.11.394-1.git.53.3d82586.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-metrics-server-0:3.11.394-1.git.53.3d82586.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-metrics-server-0:3.11.394-1.git.53.3d82586.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-node-0:3.11.394-1.git.0.e03a88e.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-node-0:3.11.394-1.git.0.e03a88e.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-node-problem-detector-0:3.11.394-1.git.263.49acf3a.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-node-problem-detector-0:3.11.394-1.git.263.49acf3a.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-node-problem-detector-0:3.11.394-1.git.263.49acf3a.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-pod-0:3.11.394-1.git.0.e03a88e.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-pod-0:3.11.394-1.git.0.e03a88e.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-sdn-ovs-0:3.11.394-1.git.0.e03a88e.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-sdn-ovs-0:3.11.394-1.git.0.e03a88e.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-service-idler-0:3.11.394-1.git.15.73f73cd.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-service-idler-0:3.11.394-1.git.15.73f73cd.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-service-idler-0:3.11.394-1.git.15.73f73cd.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-template-service-broker-0:3.11.394-1.git.0.e03a88e.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-template-service-broker-0:3.11.394-1.git.0.e03a88e.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-tests-0:3.11.394-1.git.0.e03a88e.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-tests-0:3.11.394-1.git.0.e03a88e.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-web-console-0:3.11.394-1.git.667.08dd2a6.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-web-console-0:3.11.394-1.git.667.08dd2a6.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-web-console-0:3.11.394-1.git.667.08dd2a6.el7.x86_64", "7Server-RH7-RHOSE-3.11:golang-github-openshift-oauth-proxy-0:3.11.394-1.git.439.4c37707.el7.ppc64le", "7Server-RH7-RHOSE-3.11:golang-github-openshift-oauth-proxy-0:3.11.394-1.git.439.4c37707.el7.src", "7Server-RH7-RHOSE-3.11:golang-github-openshift-oauth-proxy-0:3.11.394-1.git.439.4c37707.el7.x86_64", "7Server-RH7-RHOSE-3.11:golang-github-prometheus-alertmanager-0:3.11.394-1.git.0.1fbb64c.el7.src", "7Server-RH7-RHOSE-3.11:golang-github-prometheus-node_exporter-0:3.11.394-1.git.1062.8adc4b8.el7.src", "7Server-RH7-RHOSE-3.11:golang-github-prometheus-prometheus-0:3.11.394-1.git.5026.2c9627f.el7.src", "7Server-RH7-RHOSE-3.11:haproxy-0:1.8.28-1.el7.src", "7Server-RH7-RHOSE-3.11:haproxy-debuginfo-0:1.8.28-1.el7.ppc64le", "7Server-RH7-RHOSE-3.11:haproxy-debuginfo-0:1.8.28-1.el7.x86_64", "7Server-RH7-RHOSE-3.11:haproxy18-0:1.8.28-1.el7.ppc64le", "7Server-RH7-RHOSE-3.11:haproxy18-0:1.8.28-1.el7.x86_64", "7Server-RH7-RHOSE-3.11:jenkins-2-plugins-0:3.11.1612862361-1.el7.noarch", "7Server-RH7-RHOSE-3.11:jenkins-2-plugins-0:3.11.1612862361-1.el7.src", "7Server-RH7-RHOSE-3.11:openshift-ansible-0:3.11.394-6.git.0.47ec25d.el7.noarch", "7Server-RH7-RHOSE-3.11:openshift-ansible-0:3.11.394-6.git.0.47ec25d.el7.src", "7Server-RH7-RHOSE-3.11:openshift-ansible-docs-0:3.11.394-6.git.0.47ec25d.el7.noarch", "7Server-RH7-RHOSE-3.11:openshift-ansible-playbooks-0:3.11.394-6.git.0.47ec25d.el7.noarch", "7Server-RH7-RHOSE-3.11:openshift-ansible-roles-0:3.11.394-6.git.0.47ec25d.el7.noarch", "7Server-RH7-RHOSE-3.11:openshift-ansible-test-0:3.11.394-6.git.0.47ec25d.el7.noarch", "7Server-RH7-RHOSE-3.11:openshift-enterprise-autoheal-0:3.11.394-1.git.218.59eb597.el7.ppc64le", "7Server-RH7-RHOSE-3.11:openshift-enterprise-autoheal-0:3.11.394-1.git.218.59eb597.el7.src", "7Server-RH7-RHOSE-3.11:openshift-enterprise-autoheal-0:3.11.394-1.git.218.59eb597.el7.x86_64", "7Server-RH7-RHOSE-3.11:openshift-enterprise-cluster-capacity-0:3.11.394-1.git.379.92adfdc.el7.ppc64le", "7Server-RH7-RHOSE-3.11:openshift-enterprise-cluster-capacity-0:3.11.394-1.git.379.92adfdc.el7.src", "7Server-RH7-RHOSE-3.11:openshift-enterprise-cluster-capacity-0:3.11.394-1.git.379.92adfdc.el7.x86_64", "7Server-RH7-RHOSE-3.11:openshift-kuryr-0:3.11.394-1.git.1490.16ed375.el7.src", "7Server-RH7-RHOSE-3.11:openshift-kuryr-cni-0:3.11.394-1.git.1490.16ed375.el7.noarch", "7Server-RH7-RHOSE-3.11:openshift-kuryr-common-0:3.11.394-1.git.1490.16ed375.el7.noarch", "7Server-RH7-RHOSE-3.11:openshift-kuryr-controller-0:3.11.394-1.git.1490.16ed375.el7.noarch", "7Server-RH7-RHOSE-3.11:prometheus-0:3.11.394-1.git.5026.2c9627f.el7.ppc64le", "7Server-RH7-RHOSE-3.11:prometheus-0:3.11.394-1.git.5026.2c9627f.el7.x86_64", "7Server-RH7-RHOSE-3.11:prometheus-alertmanager-0:3.11.394-1.git.0.1fbb64c.el7.ppc64le", "7Server-RH7-RHOSE-3.11:prometheus-alertmanager-0:3.11.394-1.git.0.1fbb64c.el7.x86_64", "7Server-RH7-RHOSE-3.11:prometheus-node-exporter-0:3.11.394-1.git.1062.8adc4b8.el7.ppc64le", "7Server-RH7-RHOSE-3.11:prometheus-node-exporter-0:3.11.394-1.git.1062.8adc4b8.el7.x86_64", "7Server-RH7-RHOSE-3.11:python-rsa-0:4.5-3.el7.src", "7Server-RH7-RHOSE-3.11:python2-kuryr-kubernetes-0:3.11.394-1.git.1490.16ed375.el7.noarch", "7Server-RH7-RHOSE-3.11:python2-rsa-0:4.5-3.el7.noarch" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1925157" } ], "notes": [ { "category": "description", "text": "A flaw was found in jenkins. An attacker with permission to create or configure various objects to inject crafted content into Old Data Monitor can cause the instantiation of potentially unsafe objects once discarded by an administrator. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "jenkins: Improper handling of REST API XML deserialization errors", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RH7-RHOSE-3.11:jenkins-0:2.263.3.1612433584-1.el7.noarch", "7Server-RH7-RHOSE-3.11:jenkins-0:2.263.3.1612433584-1.el7.src" ], "known_not_affected": [ "7Server-RH7-RHOSE-3.11:atomic-enterprise-service-catalog-1:3.11.394-1.git.1675.fdb6e0b.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-enterprise-service-catalog-1:3.11.394-1.git.1675.fdb6e0b.el7.src", "7Server-RH7-RHOSE-3.11:atomic-enterprise-service-catalog-1:3.11.394-1.git.1675.fdb6e0b.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-enterprise-service-catalog-svcat-1:3.11.394-1.git.1675.fdb6e0b.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-enterprise-service-catalog-svcat-1:3.11.394-1.git.1675.fdb6e0b.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-0:3.11.394-1.git.0.e03a88e.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-0:3.11.394-1.git.0.e03a88e.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-0:3.11.394-1.git.0.e03a88e.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-clients-0:3.11.394-1.git.0.e03a88e.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-clients-0:3.11.394-1.git.0.e03a88e.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-clients-redistributable-0:3.11.394-1.git.0.e03a88e.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-cluster-autoscaler-0:3.11.394-1.git.0.1900c76.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-cluster-autoscaler-0:3.11.394-1.git.0.1900c76.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-cluster-autoscaler-0:3.11.394-1.git.0.1900c76.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-descheduler-0:3.11.394-1.git.299.ad3a3c0.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-descheduler-0:3.11.394-1.git.299.ad3a3c0.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-descheduler-0:3.11.394-1.git.299.ad3a3c0.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-docker-excluder-0:3.11.394-1.git.0.e03a88e.el7.noarch", "7Server-RH7-RHOSE-3.11:atomic-openshift-dockerregistry-0:3.11.394-1.git.481.6e48246.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-dockerregistry-0:3.11.394-1.git.481.6e48246.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-excluder-0:3.11.394-1.git.0.e03a88e.el7.noarch", "7Server-RH7-RHOSE-3.11:atomic-openshift-hyperkube-0:3.11.394-1.git.0.e03a88e.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-hyperkube-0:3.11.394-1.git.0.e03a88e.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-hypershift-0:3.11.394-1.git.0.e03a88e.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-hypershift-0:3.11.394-1.git.0.e03a88e.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-master-0:3.11.394-1.git.0.e03a88e.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-master-0:3.11.394-1.git.0.e03a88e.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-metrics-server-0:3.11.394-1.git.53.3d82586.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-metrics-server-0:3.11.394-1.git.53.3d82586.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-metrics-server-0:3.11.394-1.git.53.3d82586.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-node-0:3.11.394-1.git.0.e03a88e.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-node-0:3.11.394-1.git.0.e03a88e.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-node-problem-detector-0:3.11.394-1.git.263.49acf3a.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-node-problem-detector-0:3.11.394-1.git.263.49acf3a.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-node-problem-detector-0:3.11.394-1.git.263.49acf3a.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-pod-0:3.11.394-1.git.0.e03a88e.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-pod-0:3.11.394-1.git.0.e03a88e.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-sdn-ovs-0:3.11.394-1.git.0.e03a88e.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-sdn-ovs-0:3.11.394-1.git.0.e03a88e.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-service-idler-0:3.11.394-1.git.15.73f73cd.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-service-idler-0:3.11.394-1.git.15.73f73cd.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-service-idler-0:3.11.394-1.git.15.73f73cd.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-template-service-broker-0:3.11.394-1.git.0.e03a88e.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-template-service-broker-0:3.11.394-1.git.0.e03a88e.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-tests-0:3.11.394-1.git.0.e03a88e.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-tests-0:3.11.394-1.git.0.e03a88e.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-web-console-0:3.11.394-1.git.667.08dd2a6.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-web-console-0:3.11.394-1.git.667.08dd2a6.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-web-console-0:3.11.394-1.git.667.08dd2a6.el7.x86_64", "7Server-RH7-RHOSE-3.11:golang-github-openshift-oauth-proxy-0:3.11.394-1.git.439.4c37707.el7.ppc64le", "7Server-RH7-RHOSE-3.11:golang-github-openshift-oauth-proxy-0:3.11.394-1.git.439.4c37707.el7.src", "7Server-RH7-RHOSE-3.11:golang-github-openshift-oauth-proxy-0:3.11.394-1.git.439.4c37707.el7.x86_64", "7Server-RH7-RHOSE-3.11:golang-github-prometheus-alertmanager-0:3.11.394-1.git.0.1fbb64c.el7.src", "7Server-RH7-RHOSE-3.11:golang-github-prometheus-node_exporter-0:3.11.394-1.git.1062.8adc4b8.el7.src", "7Server-RH7-RHOSE-3.11:golang-github-prometheus-prometheus-0:3.11.394-1.git.5026.2c9627f.el7.src", "7Server-RH7-RHOSE-3.11:haproxy-0:1.8.28-1.el7.src", "7Server-RH7-RHOSE-3.11:haproxy-debuginfo-0:1.8.28-1.el7.ppc64le", "7Server-RH7-RHOSE-3.11:haproxy-debuginfo-0:1.8.28-1.el7.x86_64", "7Server-RH7-RHOSE-3.11:haproxy18-0:1.8.28-1.el7.ppc64le", "7Server-RH7-RHOSE-3.11:haproxy18-0:1.8.28-1.el7.x86_64", "7Server-RH7-RHOSE-3.11:jenkins-2-plugins-0:3.11.1612862361-1.el7.noarch", "7Server-RH7-RHOSE-3.11:jenkins-2-plugins-0:3.11.1612862361-1.el7.src", "7Server-RH7-RHOSE-3.11:openshift-ansible-0:3.11.394-6.git.0.47ec25d.el7.noarch", "7Server-RH7-RHOSE-3.11:openshift-ansible-0:3.11.394-6.git.0.47ec25d.el7.src", "7Server-RH7-RHOSE-3.11:openshift-ansible-docs-0:3.11.394-6.git.0.47ec25d.el7.noarch", "7Server-RH7-RHOSE-3.11:openshift-ansible-playbooks-0:3.11.394-6.git.0.47ec25d.el7.noarch", "7Server-RH7-RHOSE-3.11:openshift-ansible-roles-0:3.11.394-6.git.0.47ec25d.el7.noarch", "7Server-RH7-RHOSE-3.11:openshift-ansible-test-0:3.11.394-6.git.0.47ec25d.el7.noarch", "7Server-RH7-RHOSE-3.11:openshift-enterprise-autoheal-0:3.11.394-1.git.218.59eb597.el7.ppc64le", "7Server-RH7-RHOSE-3.11:openshift-enterprise-autoheal-0:3.11.394-1.git.218.59eb597.el7.src", "7Server-RH7-RHOSE-3.11:openshift-enterprise-autoheal-0:3.11.394-1.git.218.59eb597.el7.x86_64", "7Server-RH7-RHOSE-3.11:openshift-enterprise-cluster-capacity-0:3.11.394-1.git.379.92adfdc.el7.ppc64le", "7Server-RH7-RHOSE-3.11:openshift-enterprise-cluster-capacity-0:3.11.394-1.git.379.92adfdc.el7.src", "7Server-RH7-RHOSE-3.11:openshift-enterprise-cluster-capacity-0:3.11.394-1.git.379.92adfdc.el7.x86_64", "7Server-RH7-RHOSE-3.11:openshift-kuryr-0:3.11.394-1.git.1490.16ed375.el7.src", "7Server-RH7-RHOSE-3.11:openshift-kuryr-cni-0:3.11.394-1.git.1490.16ed375.el7.noarch", "7Server-RH7-RHOSE-3.11:openshift-kuryr-common-0:3.11.394-1.git.1490.16ed375.el7.noarch", "7Server-RH7-RHOSE-3.11:openshift-kuryr-controller-0:3.11.394-1.git.1490.16ed375.el7.noarch", "7Server-RH7-RHOSE-3.11:prometheus-0:3.11.394-1.git.5026.2c9627f.el7.ppc64le", "7Server-RH7-RHOSE-3.11:prometheus-0:3.11.394-1.git.5026.2c9627f.el7.x86_64", "7Server-RH7-RHOSE-3.11:prometheus-alertmanager-0:3.11.394-1.git.0.1fbb64c.el7.ppc64le", "7Server-RH7-RHOSE-3.11:prometheus-alertmanager-0:3.11.394-1.git.0.1fbb64c.el7.x86_64", "7Server-RH7-RHOSE-3.11:prometheus-node-exporter-0:3.11.394-1.git.1062.8adc4b8.el7.ppc64le", "7Server-RH7-RHOSE-3.11:prometheus-node-exporter-0:3.11.394-1.git.1062.8adc4b8.el7.x86_64", "7Server-RH7-RHOSE-3.11:python-rsa-0:4.5-3.el7.src", "7Server-RH7-RHOSE-3.11:python2-kuryr-kubernetes-0:3.11.394-1.git.1490.16ed375.el7.noarch", "7Server-RH7-RHOSE-3.11:python2-rsa-0:4.5-3.el7.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-21604" }, { "category": "external", "summary": "RHBZ#1925157", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1925157" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-21604", "url": "https://www.cve.org/CVERecord?id=CVE-2021-21604" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-21604", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-21604" } ], "release_date": "2021-01-13T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-03-03T12:28:39+00:00", "details": "Before applying this update, ensure all previously released errata relevant\nto your system is applied.\n\nSee the following documentation, which will be updated shortly for release\n3.11.394, for important instructions on how to upgrade your cluster and fully\napply this asynchronous errata update:\n\nhttps://docs.openshift.com/container-platform/3.11/release_notes/ocp_3_11_release_notes.html\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/articles/11258.", "product_ids": [ "7Server-RH7-RHOSE-3.11:jenkins-0:2.263.3.1612433584-1.el7.noarch", "7Server-RH7-RHOSE-3.11:jenkins-0:2.263.3.1612433584-1.el7.src" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:0637" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.0, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-RH7-RHOSE-3.11:jenkins-0:2.263.3.1612433584-1.el7.noarch", "7Server-RH7-RHOSE-3.11:jenkins-0:2.263.3.1612433584-1.el7.src" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "jenkins: Improper handling of REST API XML deserialization errors" }, { "cve": "CVE-2021-21605", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2021-02-04T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "7Server-RH7-RHOSE-3.11:atomic-enterprise-service-catalog-1:3.11.394-1.git.1675.fdb6e0b.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-enterprise-service-catalog-1:3.11.394-1.git.1675.fdb6e0b.el7.src", "7Server-RH7-RHOSE-3.11:atomic-enterprise-service-catalog-1:3.11.394-1.git.1675.fdb6e0b.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-enterprise-service-catalog-svcat-1:3.11.394-1.git.1675.fdb6e0b.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-enterprise-service-catalog-svcat-1:3.11.394-1.git.1675.fdb6e0b.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-0:3.11.394-1.git.0.e03a88e.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-0:3.11.394-1.git.0.e03a88e.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-0:3.11.394-1.git.0.e03a88e.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-clients-0:3.11.394-1.git.0.e03a88e.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-clients-0:3.11.394-1.git.0.e03a88e.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-clients-redistributable-0:3.11.394-1.git.0.e03a88e.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-cluster-autoscaler-0:3.11.394-1.git.0.1900c76.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-cluster-autoscaler-0:3.11.394-1.git.0.1900c76.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-cluster-autoscaler-0:3.11.394-1.git.0.1900c76.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-descheduler-0:3.11.394-1.git.299.ad3a3c0.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-descheduler-0:3.11.394-1.git.299.ad3a3c0.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-descheduler-0:3.11.394-1.git.299.ad3a3c0.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-docker-excluder-0:3.11.394-1.git.0.e03a88e.el7.noarch", "7Server-RH7-RHOSE-3.11:atomic-openshift-dockerregistry-0:3.11.394-1.git.481.6e48246.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-dockerregistry-0:3.11.394-1.git.481.6e48246.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-excluder-0:3.11.394-1.git.0.e03a88e.el7.noarch", "7Server-RH7-RHOSE-3.11:atomic-openshift-hyperkube-0:3.11.394-1.git.0.e03a88e.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-hyperkube-0:3.11.394-1.git.0.e03a88e.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-hypershift-0:3.11.394-1.git.0.e03a88e.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-hypershift-0:3.11.394-1.git.0.e03a88e.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-master-0:3.11.394-1.git.0.e03a88e.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-master-0:3.11.394-1.git.0.e03a88e.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-metrics-server-0:3.11.394-1.git.53.3d82586.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-metrics-server-0:3.11.394-1.git.53.3d82586.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-metrics-server-0:3.11.394-1.git.53.3d82586.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-node-0:3.11.394-1.git.0.e03a88e.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-node-0:3.11.394-1.git.0.e03a88e.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-node-problem-detector-0:3.11.394-1.git.263.49acf3a.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-node-problem-detector-0:3.11.394-1.git.263.49acf3a.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-node-problem-detector-0:3.11.394-1.git.263.49acf3a.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-pod-0:3.11.394-1.git.0.e03a88e.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-pod-0:3.11.394-1.git.0.e03a88e.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-sdn-ovs-0:3.11.394-1.git.0.e03a88e.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-sdn-ovs-0:3.11.394-1.git.0.e03a88e.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-service-idler-0:3.11.394-1.git.15.73f73cd.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-service-idler-0:3.11.394-1.git.15.73f73cd.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-service-idler-0:3.11.394-1.git.15.73f73cd.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-template-service-broker-0:3.11.394-1.git.0.e03a88e.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-template-service-broker-0:3.11.394-1.git.0.e03a88e.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-tests-0:3.11.394-1.git.0.e03a88e.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-tests-0:3.11.394-1.git.0.e03a88e.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-web-console-0:3.11.394-1.git.667.08dd2a6.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-web-console-0:3.11.394-1.git.667.08dd2a6.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-web-console-0:3.11.394-1.git.667.08dd2a6.el7.x86_64", "7Server-RH7-RHOSE-3.11:golang-github-openshift-oauth-proxy-0:3.11.394-1.git.439.4c37707.el7.ppc64le", "7Server-RH7-RHOSE-3.11:golang-github-openshift-oauth-proxy-0:3.11.394-1.git.439.4c37707.el7.src", "7Server-RH7-RHOSE-3.11:golang-github-openshift-oauth-proxy-0:3.11.394-1.git.439.4c37707.el7.x86_64", "7Server-RH7-RHOSE-3.11:golang-github-prometheus-alertmanager-0:3.11.394-1.git.0.1fbb64c.el7.src", "7Server-RH7-RHOSE-3.11:golang-github-prometheus-node_exporter-0:3.11.394-1.git.1062.8adc4b8.el7.src", "7Server-RH7-RHOSE-3.11:golang-github-prometheus-prometheus-0:3.11.394-1.git.5026.2c9627f.el7.src", "7Server-RH7-RHOSE-3.11:haproxy-0:1.8.28-1.el7.src", "7Server-RH7-RHOSE-3.11:haproxy-debuginfo-0:1.8.28-1.el7.ppc64le", "7Server-RH7-RHOSE-3.11:haproxy-debuginfo-0:1.8.28-1.el7.x86_64", "7Server-RH7-RHOSE-3.11:haproxy18-0:1.8.28-1.el7.ppc64le", "7Server-RH7-RHOSE-3.11:haproxy18-0:1.8.28-1.el7.x86_64", "7Server-RH7-RHOSE-3.11:jenkins-2-plugins-0:3.11.1612862361-1.el7.noarch", "7Server-RH7-RHOSE-3.11:jenkins-2-plugins-0:3.11.1612862361-1.el7.src", "7Server-RH7-RHOSE-3.11:openshift-ansible-0:3.11.394-6.git.0.47ec25d.el7.noarch", "7Server-RH7-RHOSE-3.11:openshift-ansible-0:3.11.394-6.git.0.47ec25d.el7.src", "7Server-RH7-RHOSE-3.11:openshift-ansible-docs-0:3.11.394-6.git.0.47ec25d.el7.noarch", "7Server-RH7-RHOSE-3.11:openshift-ansible-playbooks-0:3.11.394-6.git.0.47ec25d.el7.noarch", "7Server-RH7-RHOSE-3.11:openshift-ansible-roles-0:3.11.394-6.git.0.47ec25d.el7.noarch", "7Server-RH7-RHOSE-3.11:openshift-ansible-test-0:3.11.394-6.git.0.47ec25d.el7.noarch", "7Server-RH7-RHOSE-3.11:openshift-enterprise-autoheal-0:3.11.394-1.git.218.59eb597.el7.ppc64le", "7Server-RH7-RHOSE-3.11:openshift-enterprise-autoheal-0:3.11.394-1.git.218.59eb597.el7.src", "7Server-RH7-RHOSE-3.11:openshift-enterprise-autoheal-0:3.11.394-1.git.218.59eb597.el7.x86_64", "7Server-RH7-RHOSE-3.11:openshift-enterprise-cluster-capacity-0:3.11.394-1.git.379.92adfdc.el7.ppc64le", "7Server-RH7-RHOSE-3.11:openshift-enterprise-cluster-capacity-0:3.11.394-1.git.379.92adfdc.el7.src", "7Server-RH7-RHOSE-3.11:openshift-enterprise-cluster-capacity-0:3.11.394-1.git.379.92adfdc.el7.x86_64", "7Server-RH7-RHOSE-3.11:openshift-kuryr-0:3.11.394-1.git.1490.16ed375.el7.src", "7Server-RH7-RHOSE-3.11:openshift-kuryr-cni-0:3.11.394-1.git.1490.16ed375.el7.noarch", "7Server-RH7-RHOSE-3.11:openshift-kuryr-common-0:3.11.394-1.git.1490.16ed375.el7.noarch", "7Server-RH7-RHOSE-3.11:openshift-kuryr-controller-0:3.11.394-1.git.1490.16ed375.el7.noarch", "7Server-RH7-RHOSE-3.11:prometheus-0:3.11.394-1.git.5026.2c9627f.el7.ppc64le", "7Server-RH7-RHOSE-3.11:prometheus-0:3.11.394-1.git.5026.2c9627f.el7.x86_64", "7Server-RH7-RHOSE-3.11:prometheus-alertmanager-0:3.11.394-1.git.0.1fbb64c.el7.ppc64le", "7Server-RH7-RHOSE-3.11:prometheus-alertmanager-0:3.11.394-1.git.0.1fbb64c.el7.x86_64", "7Server-RH7-RHOSE-3.11:prometheus-node-exporter-0:3.11.394-1.git.1062.8adc4b8.el7.ppc64le", "7Server-RH7-RHOSE-3.11:prometheus-node-exporter-0:3.11.394-1.git.1062.8adc4b8.el7.x86_64", "7Server-RH7-RHOSE-3.11:python-rsa-0:4.5-3.el7.src", "7Server-RH7-RHOSE-3.11:python2-kuryr-kubernetes-0:3.11.394-1.git.1490.16ed375.el7.noarch", "7Server-RH7-RHOSE-3.11:python2-rsa-0:4.5-3.el7.noarch" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1925143" } ], "notes": [ { "category": "description", "text": "A flaw was found in jenkins. Users with Agent/Configure permissions can choose agent names that cause an override to the global `config.xml` file. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "jenkins: Path traversal vulnerability in agent names", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RH7-RHOSE-3.11:jenkins-0:2.263.3.1612433584-1.el7.noarch", "7Server-RH7-RHOSE-3.11:jenkins-0:2.263.3.1612433584-1.el7.src" ], "known_not_affected": [ "7Server-RH7-RHOSE-3.11:atomic-enterprise-service-catalog-1:3.11.394-1.git.1675.fdb6e0b.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-enterprise-service-catalog-1:3.11.394-1.git.1675.fdb6e0b.el7.src", "7Server-RH7-RHOSE-3.11:atomic-enterprise-service-catalog-1:3.11.394-1.git.1675.fdb6e0b.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-enterprise-service-catalog-svcat-1:3.11.394-1.git.1675.fdb6e0b.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-enterprise-service-catalog-svcat-1:3.11.394-1.git.1675.fdb6e0b.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-0:3.11.394-1.git.0.e03a88e.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-0:3.11.394-1.git.0.e03a88e.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-0:3.11.394-1.git.0.e03a88e.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-clients-0:3.11.394-1.git.0.e03a88e.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-clients-0:3.11.394-1.git.0.e03a88e.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-clients-redistributable-0:3.11.394-1.git.0.e03a88e.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-cluster-autoscaler-0:3.11.394-1.git.0.1900c76.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-cluster-autoscaler-0:3.11.394-1.git.0.1900c76.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-cluster-autoscaler-0:3.11.394-1.git.0.1900c76.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-descheduler-0:3.11.394-1.git.299.ad3a3c0.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-descheduler-0:3.11.394-1.git.299.ad3a3c0.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-descheduler-0:3.11.394-1.git.299.ad3a3c0.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-docker-excluder-0:3.11.394-1.git.0.e03a88e.el7.noarch", "7Server-RH7-RHOSE-3.11:atomic-openshift-dockerregistry-0:3.11.394-1.git.481.6e48246.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-dockerregistry-0:3.11.394-1.git.481.6e48246.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-excluder-0:3.11.394-1.git.0.e03a88e.el7.noarch", "7Server-RH7-RHOSE-3.11:atomic-openshift-hyperkube-0:3.11.394-1.git.0.e03a88e.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-hyperkube-0:3.11.394-1.git.0.e03a88e.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-hypershift-0:3.11.394-1.git.0.e03a88e.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-hypershift-0:3.11.394-1.git.0.e03a88e.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-master-0:3.11.394-1.git.0.e03a88e.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-master-0:3.11.394-1.git.0.e03a88e.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-metrics-server-0:3.11.394-1.git.53.3d82586.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-metrics-server-0:3.11.394-1.git.53.3d82586.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-metrics-server-0:3.11.394-1.git.53.3d82586.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-node-0:3.11.394-1.git.0.e03a88e.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-node-0:3.11.394-1.git.0.e03a88e.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-node-problem-detector-0:3.11.394-1.git.263.49acf3a.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-node-problem-detector-0:3.11.394-1.git.263.49acf3a.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-node-problem-detector-0:3.11.394-1.git.263.49acf3a.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-pod-0:3.11.394-1.git.0.e03a88e.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-pod-0:3.11.394-1.git.0.e03a88e.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-sdn-ovs-0:3.11.394-1.git.0.e03a88e.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-sdn-ovs-0:3.11.394-1.git.0.e03a88e.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-service-idler-0:3.11.394-1.git.15.73f73cd.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-service-idler-0:3.11.394-1.git.15.73f73cd.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-service-idler-0:3.11.394-1.git.15.73f73cd.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-template-service-broker-0:3.11.394-1.git.0.e03a88e.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-template-service-broker-0:3.11.394-1.git.0.e03a88e.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-tests-0:3.11.394-1.git.0.e03a88e.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-tests-0:3.11.394-1.git.0.e03a88e.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-web-console-0:3.11.394-1.git.667.08dd2a6.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-web-console-0:3.11.394-1.git.667.08dd2a6.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-web-console-0:3.11.394-1.git.667.08dd2a6.el7.x86_64", "7Server-RH7-RHOSE-3.11:golang-github-openshift-oauth-proxy-0:3.11.394-1.git.439.4c37707.el7.ppc64le", "7Server-RH7-RHOSE-3.11:golang-github-openshift-oauth-proxy-0:3.11.394-1.git.439.4c37707.el7.src", "7Server-RH7-RHOSE-3.11:golang-github-openshift-oauth-proxy-0:3.11.394-1.git.439.4c37707.el7.x86_64", "7Server-RH7-RHOSE-3.11:golang-github-prometheus-alertmanager-0:3.11.394-1.git.0.1fbb64c.el7.src", "7Server-RH7-RHOSE-3.11:golang-github-prometheus-node_exporter-0:3.11.394-1.git.1062.8adc4b8.el7.src", "7Server-RH7-RHOSE-3.11:golang-github-prometheus-prometheus-0:3.11.394-1.git.5026.2c9627f.el7.src", "7Server-RH7-RHOSE-3.11:haproxy-0:1.8.28-1.el7.src", "7Server-RH7-RHOSE-3.11:haproxy-debuginfo-0:1.8.28-1.el7.ppc64le", "7Server-RH7-RHOSE-3.11:haproxy-debuginfo-0:1.8.28-1.el7.x86_64", "7Server-RH7-RHOSE-3.11:haproxy18-0:1.8.28-1.el7.ppc64le", "7Server-RH7-RHOSE-3.11:haproxy18-0:1.8.28-1.el7.x86_64", "7Server-RH7-RHOSE-3.11:jenkins-2-plugins-0:3.11.1612862361-1.el7.noarch", "7Server-RH7-RHOSE-3.11:jenkins-2-plugins-0:3.11.1612862361-1.el7.src", "7Server-RH7-RHOSE-3.11:openshift-ansible-0:3.11.394-6.git.0.47ec25d.el7.noarch", "7Server-RH7-RHOSE-3.11:openshift-ansible-0:3.11.394-6.git.0.47ec25d.el7.src", "7Server-RH7-RHOSE-3.11:openshift-ansible-docs-0:3.11.394-6.git.0.47ec25d.el7.noarch", "7Server-RH7-RHOSE-3.11:openshift-ansible-playbooks-0:3.11.394-6.git.0.47ec25d.el7.noarch", "7Server-RH7-RHOSE-3.11:openshift-ansible-roles-0:3.11.394-6.git.0.47ec25d.el7.noarch", "7Server-RH7-RHOSE-3.11:openshift-ansible-test-0:3.11.394-6.git.0.47ec25d.el7.noarch", "7Server-RH7-RHOSE-3.11:openshift-enterprise-autoheal-0:3.11.394-1.git.218.59eb597.el7.ppc64le", "7Server-RH7-RHOSE-3.11:openshift-enterprise-autoheal-0:3.11.394-1.git.218.59eb597.el7.src", "7Server-RH7-RHOSE-3.11:openshift-enterprise-autoheal-0:3.11.394-1.git.218.59eb597.el7.x86_64", "7Server-RH7-RHOSE-3.11:openshift-enterprise-cluster-capacity-0:3.11.394-1.git.379.92adfdc.el7.ppc64le", "7Server-RH7-RHOSE-3.11:openshift-enterprise-cluster-capacity-0:3.11.394-1.git.379.92adfdc.el7.src", "7Server-RH7-RHOSE-3.11:openshift-enterprise-cluster-capacity-0:3.11.394-1.git.379.92adfdc.el7.x86_64", "7Server-RH7-RHOSE-3.11:openshift-kuryr-0:3.11.394-1.git.1490.16ed375.el7.src", "7Server-RH7-RHOSE-3.11:openshift-kuryr-cni-0:3.11.394-1.git.1490.16ed375.el7.noarch", "7Server-RH7-RHOSE-3.11:openshift-kuryr-common-0:3.11.394-1.git.1490.16ed375.el7.noarch", "7Server-RH7-RHOSE-3.11:openshift-kuryr-controller-0:3.11.394-1.git.1490.16ed375.el7.noarch", "7Server-RH7-RHOSE-3.11:prometheus-0:3.11.394-1.git.5026.2c9627f.el7.ppc64le", "7Server-RH7-RHOSE-3.11:prometheus-0:3.11.394-1.git.5026.2c9627f.el7.x86_64", "7Server-RH7-RHOSE-3.11:prometheus-alertmanager-0:3.11.394-1.git.0.1fbb64c.el7.ppc64le", "7Server-RH7-RHOSE-3.11:prometheus-alertmanager-0:3.11.394-1.git.0.1fbb64c.el7.x86_64", "7Server-RH7-RHOSE-3.11:prometheus-node-exporter-0:3.11.394-1.git.1062.8adc4b8.el7.ppc64le", "7Server-RH7-RHOSE-3.11:prometheus-node-exporter-0:3.11.394-1.git.1062.8adc4b8.el7.x86_64", "7Server-RH7-RHOSE-3.11:python-rsa-0:4.5-3.el7.src", "7Server-RH7-RHOSE-3.11:python2-kuryr-kubernetes-0:3.11.394-1.git.1490.16ed375.el7.noarch", "7Server-RH7-RHOSE-3.11:python2-rsa-0:4.5-3.el7.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-21605" }, { "category": "external", "summary": "RHBZ#1925143", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1925143" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-21605", "url": "https://www.cve.org/CVERecord?id=CVE-2021-21605" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-21605", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-21605" } ], "release_date": "2021-01-13T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-03-03T12:28:39+00:00", "details": "Before applying this update, ensure all previously released errata relevant\nto your system is applied.\n\nSee the following documentation, which will be updated shortly for release\n3.11.394, for important instructions on how to upgrade your cluster and fully\napply this asynchronous errata update:\n\nhttps://docs.openshift.com/container-platform/3.11/release_notes/ocp_3_11_release_notes.html\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/articles/11258.", "product_ids": [ "7Server-RH7-RHOSE-3.11:jenkins-0:2.263.3.1612433584-1.el7.noarch", "7Server-RH7-RHOSE-3.11:jenkins-0:2.263.3.1612433584-1.el7.src" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:0637" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.0, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-RH7-RHOSE-3.11:jenkins-0:2.263.3.1612433584-1.el7.noarch", "7Server-RH7-RHOSE-3.11:jenkins-0:2.263.3.1612433584-1.el7.src" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "jenkins: Path traversal vulnerability in agent names" }, { "cve": "CVE-2021-21606", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2021-02-04T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "7Server-RH7-RHOSE-3.11:atomic-enterprise-service-catalog-1:3.11.394-1.git.1675.fdb6e0b.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-enterprise-service-catalog-1:3.11.394-1.git.1675.fdb6e0b.el7.src", "7Server-RH7-RHOSE-3.11:atomic-enterprise-service-catalog-1:3.11.394-1.git.1675.fdb6e0b.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-enterprise-service-catalog-svcat-1:3.11.394-1.git.1675.fdb6e0b.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-enterprise-service-catalog-svcat-1:3.11.394-1.git.1675.fdb6e0b.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-0:3.11.394-1.git.0.e03a88e.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-0:3.11.394-1.git.0.e03a88e.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-0:3.11.394-1.git.0.e03a88e.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-clients-0:3.11.394-1.git.0.e03a88e.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-clients-0:3.11.394-1.git.0.e03a88e.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-clients-redistributable-0:3.11.394-1.git.0.e03a88e.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-cluster-autoscaler-0:3.11.394-1.git.0.1900c76.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-cluster-autoscaler-0:3.11.394-1.git.0.1900c76.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-cluster-autoscaler-0:3.11.394-1.git.0.1900c76.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-descheduler-0:3.11.394-1.git.299.ad3a3c0.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-descheduler-0:3.11.394-1.git.299.ad3a3c0.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-descheduler-0:3.11.394-1.git.299.ad3a3c0.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-docker-excluder-0:3.11.394-1.git.0.e03a88e.el7.noarch", "7Server-RH7-RHOSE-3.11:atomic-openshift-dockerregistry-0:3.11.394-1.git.481.6e48246.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-dockerregistry-0:3.11.394-1.git.481.6e48246.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-excluder-0:3.11.394-1.git.0.e03a88e.el7.noarch", "7Server-RH7-RHOSE-3.11:atomic-openshift-hyperkube-0:3.11.394-1.git.0.e03a88e.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-hyperkube-0:3.11.394-1.git.0.e03a88e.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-hypershift-0:3.11.394-1.git.0.e03a88e.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-hypershift-0:3.11.394-1.git.0.e03a88e.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-master-0:3.11.394-1.git.0.e03a88e.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-master-0:3.11.394-1.git.0.e03a88e.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-metrics-server-0:3.11.394-1.git.53.3d82586.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-metrics-server-0:3.11.394-1.git.53.3d82586.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-metrics-server-0:3.11.394-1.git.53.3d82586.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-node-0:3.11.394-1.git.0.e03a88e.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-node-0:3.11.394-1.git.0.e03a88e.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-node-problem-detector-0:3.11.394-1.git.263.49acf3a.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-node-problem-detector-0:3.11.394-1.git.263.49acf3a.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-node-problem-detector-0:3.11.394-1.git.263.49acf3a.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-pod-0:3.11.394-1.git.0.e03a88e.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-pod-0:3.11.394-1.git.0.e03a88e.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-sdn-ovs-0:3.11.394-1.git.0.e03a88e.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-sdn-ovs-0:3.11.394-1.git.0.e03a88e.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-service-idler-0:3.11.394-1.git.15.73f73cd.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-service-idler-0:3.11.394-1.git.15.73f73cd.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-service-idler-0:3.11.394-1.git.15.73f73cd.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-template-service-broker-0:3.11.394-1.git.0.e03a88e.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-template-service-broker-0:3.11.394-1.git.0.e03a88e.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-tests-0:3.11.394-1.git.0.e03a88e.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-tests-0:3.11.394-1.git.0.e03a88e.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-web-console-0:3.11.394-1.git.667.08dd2a6.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-web-console-0:3.11.394-1.git.667.08dd2a6.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-web-console-0:3.11.394-1.git.667.08dd2a6.el7.x86_64", "7Server-RH7-RHOSE-3.11:golang-github-openshift-oauth-proxy-0:3.11.394-1.git.439.4c37707.el7.ppc64le", "7Server-RH7-RHOSE-3.11:golang-github-openshift-oauth-proxy-0:3.11.394-1.git.439.4c37707.el7.src", "7Server-RH7-RHOSE-3.11:golang-github-openshift-oauth-proxy-0:3.11.394-1.git.439.4c37707.el7.x86_64", "7Server-RH7-RHOSE-3.11:golang-github-prometheus-alertmanager-0:3.11.394-1.git.0.1fbb64c.el7.src", "7Server-RH7-RHOSE-3.11:golang-github-prometheus-node_exporter-0:3.11.394-1.git.1062.8adc4b8.el7.src", "7Server-RH7-RHOSE-3.11:golang-github-prometheus-prometheus-0:3.11.394-1.git.5026.2c9627f.el7.src", "7Server-RH7-RHOSE-3.11:haproxy-0:1.8.28-1.el7.src", "7Server-RH7-RHOSE-3.11:haproxy-debuginfo-0:1.8.28-1.el7.ppc64le", "7Server-RH7-RHOSE-3.11:haproxy-debuginfo-0:1.8.28-1.el7.x86_64", "7Server-RH7-RHOSE-3.11:haproxy18-0:1.8.28-1.el7.ppc64le", "7Server-RH7-RHOSE-3.11:haproxy18-0:1.8.28-1.el7.x86_64", "7Server-RH7-RHOSE-3.11:jenkins-2-plugins-0:3.11.1612862361-1.el7.noarch", "7Server-RH7-RHOSE-3.11:jenkins-2-plugins-0:3.11.1612862361-1.el7.src", "7Server-RH7-RHOSE-3.11:openshift-ansible-0:3.11.394-6.git.0.47ec25d.el7.noarch", "7Server-RH7-RHOSE-3.11:openshift-ansible-0:3.11.394-6.git.0.47ec25d.el7.src", "7Server-RH7-RHOSE-3.11:openshift-ansible-docs-0:3.11.394-6.git.0.47ec25d.el7.noarch", "7Server-RH7-RHOSE-3.11:openshift-ansible-playbooks-0:3.11.394-6.git.0.47ec25d.el7.noarch", "7Server-RH7-RHOSE-3.11:openshift-ansible-roles-0:3.11.394-6.git.0.47ec25d.el7.noarch", "7Server-RH7-RHOSE-3.11:openshift-ansible-test-0:3.11.394-6.git.0.47ec25d.el7.noarch", "7Server-RH7-RHOSE-3.11:openshift-enterprise-autoheal-0:3.11.394-1.git.218.59eb597.el7.ppc64le", "7Server-RH7-RHOSE-3.11:openshift-enterprise-autoheal-0:3.11.394-1.git.218.59eb597.el7.src", "7Server-RH7-RHOSE-3.11:openshift-enterprise-autoheal-0:3.11.394-1.git.218.59eb597.el7.x86_64", "7Server-RH7-RHOSE-3.11:openshift-enterprise-cluster-capacity-0:3.11.394-1.git.379.92adfdc.el7.ppc64le", "7Server-RH7-RHOSE-3.11:openshift-enterprise-cluster-capacity-0:3.11.394-1.git.379.92adfdc.el7.src", "7Server-RH7-RHOSE-3.11:openshift-enterprise-cluster-capacity-0:3.11.394-1.git.379.92adfdc.el7.x86_64", "7Server-RH7-RHOSE-3.11:openshift-kuryr-0:3.11.394-1.git.1490.16ed375.el7.src", "7Server-RH7-RHOSE-3.11:openshift-kuryr-cni-0:3.11.394-1.git.1490.16ed375.el7.noarch", "7Server-RH7-RHOSE-3.11:openshift-kuryr-common-0:3.11.394-1.git.1490.16ed375.el7.noarch", "7Server-RH7-RHOSE-3.11:openshift-kuryr-controller-0:3.11.394-1.git.1490.16ed375.el7.noarch", "7Server-RH7-RHOSE-3.11:prometheus-0:3.11.394-1.git.5026.2c9627f.el7.ppc64le", "7Server-RH7-RHOSE-3.11:prometheus-0:3.11.394-1.git.5026.2c9627f.el7.x86_64", "7Server-RH7-RHOSE-3.11:prometheus-alertmanager-0:3.11.394-1.git.0.1fbb64c.el7.ppc64le", "7Server-RH7-RHOSE-3.11:prometheus-alertmanager-0:3.11.394-1.git.0.1fbb64c.el7.x86_64", "7Server-RH7-RHOSE-3.11:prometheus-node-exporter-0:3.11.394-1.git.1062.8adc4b8.el7.ppc64le", "7Server-RH7-RHOSE-3.11:prometheus-node-exporter-0:3.11.394-1.git.1062.8adc4b8.el7.x86_64", "7Server-RH7-RHOSE-3.11:python-rsa-0:4.5-3.el7.src", "7Server-RH7-RHOSE-3.11:python2-kuryr-kubernetes-0:3.11.394-1.git.1490.16ed375.el7.noarch", "7Server-RH7-RHOSE-3.11:python2-rsa-0:4.5-3.el7.noarch" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1925159" } ], "notes": [ { "category": "description", "text": "Jenkins 2.274 and earlier, LTS 2.263.1 and earlier improperly validates the format of a provided fingerprint ID when checking for its existence allowing an attacker to check for the existence of XML files with a short path.", "title": "Vulnerability description" }, { "category": "summary", "text": "jenkins: Arbitrary file existence check in file fingerprints", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RH7-RHOSE-3.11:jenkins-0:2.263.3.1612433584-1.el7.noarch", "7Server-RH7-RHOSE-3.11:jenkins-0:2.263.3.1612433584-1.el7.src" ], "known_not_affected": [ "7Server-RH7-RHOSE-3.11:atomic-enterprise-service-catalog-1:3.11.394-1.git.1675.fdb6e0b.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-enterprise-service-catalog-1:3.11.394-1.git.1675.fdb6e0b.el7.src", "7Server-RH7-RHOSE-3.11:atomic-enterprise-service-catalog-1:3.11.394-1.git.1675.fdb6e0b.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-enterprise-service-catalog-svcat-1:3.11.394-1.git.1675.fdb6e0b.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-enterprise-service-catalog-svcat-1:3.11.394-1.git.1675.fdb6e0b.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-0:3.11.394-1.git.0.e03a88e.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-0:3.11.394-1.git.0.e03a88e.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-0:3.11.394-1.git.0.e03a88e.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-clients-0:3.11.394-1.git.0.e03a88e.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-clients-0:3.11.394-1.git.0.e03a88e.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-clients-redistributable-0:3.11.394-1.git.0.e03a88e.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-cluster-autoscaler-0:3.11.394-1.git.0.1900c76.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-cluster-autoscaler-0:3.11.394-1.git.0.1900c76.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-cluster-autoscaler-0:3.11.394-1.git.0.1900c76.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-descheduler-0:3.11.394-1.git.299.ad3a3c0.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-descheduler-0:3.11.394-1.git.299.ad3a3c0.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-descheduler-0:3.11.394-1.git.299.ad3a3c0.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-docker-excluder-0:3.11.394-1.git.0.e03a88e.el7.noarch", "7Server-RH7-RHOSE-3.11:atomic-openshift-dockerregistry-0:3.11.394-1.git.481.6e48246.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-dockerregistry-0:3.11.394-1.git.481.6e48246.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-excluder-0:3.11.394-1.git.0.e03a88e.el7.noarch", "7Server-RH7-RHOSE-3.11:atomic-openshift-hyperkube-0:3.11.394-1.git.0.e03a88e.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-hyperkube-0:3.11.394-1.git.0.e03a88e.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-hypershift-0:3.11.394-1.git.0.e03a88e.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-hypershift-0:3.11.394-1.git.0.e03a88e.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-master-0:3.11.394-1.git.0.e03a88e.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-master-0:3.11.394-1.git.0.e03a88e.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-metrics-server-0:3.11.394-1.git.53.3d82586.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-metrics-server-0:3.11.394-1.git.53.3d82586.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-metrics-server-0:3.11.394-1.git.53.3d82586.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-node-0:3.11.394-1.git.0.e03a88e.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-node-0:3.11.394-1.git.0.e03a88e.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-node-problem-detector-0:3.11.394-1.git.263.49acf3a.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-node-problem-detector-0:3.11.394-1.git.263.49acf3a.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-node-problem-detector-0:3.11.394-1.git.263.49acf3a.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-pod-0:3.11.394-1.git.0.e03a88e.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-pod-0:3.11.394-1.git.0.e03a88e.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-sdn-ovs-0:3.11.394-1.git.0.e03a88e.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-sdn-ovs-0:3.11.394-1.git.0.e03a88e.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-service-idler-0:3.11.394-1.git.15.73f73cd.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-service-idler-0:3.11.394-1.git.15.73f73cd.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-service-idler-0:3.11.394-1.git.15.73f73cd.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-template-service-broker-0:3.11.394-1.git.0.e03a88e.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-template-service-broker-0:3.11.394-1.git.0.e03a88e.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-tests-0:3.11.394-1.git.0.e03a88e.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-tests-0:3.11.394-1.git.0.e03a88e.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-web-console-0:3.11.394-1.git.667.08dd2a6.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-web-console-0:3.11.394-1.git.667.08dd2a6.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-web-console-0:3.11.394-1.git.667.08dd2a6.el7.x86_64", "7Server-RH7-RHOSE-3.11:golang-github-openshift-oauth-proxy-0:3.11.394-1.git.439.4c37707.el7.ppc64le", "7Server-RH7-RHOSE-3.11:golang-github-openshift-oauth-proxy-0:3.11.394-1.git.439.4c37707.el7.src", "7Server-RH7-RHOSE-3.11:golang-github-openshift-oauth-proxy-0:3.11.394-1.git.439.4c37707.el7.x86_64", "7Server-RH7-RHOSE-3.11:golang-github-prometheus-alertmanager-0:3.11.394-1.git.0.1fbb64c.el7.src", "7Server-RH7-RHOSE-3.11:golang-github-prometheus-node_exporter-0:3.11.394-1.git.1062.8adc4b8.el7.src", "7Server-RH7-RHOSE-3.11:golang-github-prometheus-prometheus-0:3.11.394-1.git.5026.2c9627f.el7.src", "7Server-RH7-RHOSE-3.11:haproxy-0:1.8.28-1.el7.src", "7Server-RH7-RHOSE-3.11:haproxy-debuginfo-0:1.8.28-1.el7.ppc64le", "7Server-RH7-RHOSE-3.11:haproxy-debuginfo-0:1.8.28-1.el7.x86_64", "7Server-RH7-RHOSE-3.11:haproxy18-0:1.8.28-1.el7.ppc64le", "7Server-RH7-RHOSE-3.11:haproxy18-0:1.8.28-1.el7.x86_64", "7Server-RH7-RHOSE-3.11:jenkins-2-plugins-0:3.11.1612862361-1.el7.noarch", "7Server-RH7-RHOSE-3.11:jenkins-2-plugins-0:3.11.1612862361-1.el7.src", "7Server-RH7-RHOSE-3.11:openshift-ansible-0:3.11.394-6.git.0.47ec25d.el7.noarch", "7Server-RH7-RHOSE-3.11:openshift-ansible-0:3.11.394-6.git.0.47ec25d.el7.src", "7Server-RH7-RHOSE-3.11:openshift-ansible-docs-0:3.11.394-6.git.0.47ec25d.el7.noarch", "7Server-RH7-RHOSE-3.11:openshift-ansible-playbooks-0:3.11.394-6.git.0.47ec25d.el7.noarch", "7Server-RH7-RHOSE-3.11:openshift-ansible-roles-0:3.11.394-6.git.0.47ec25d.el7.noarch", "7Server-RH7-RHOSE-3.11:openshift-ansible-test-0:3.11.394-6.git.0.47ec25d.el7.noarch", "7Server-RH7-RHOSE-3.11:openshift-enterprise-autoheal-0:3.11.394-1.git.218.59eb597.el7.ppc64le", "7Server-RH7-RHOSE-3.11:openshift-enterprise-autoheal-0:3.11.394-1.git.218.59eb597.el7.src", "7Server-RH7-RHOSE-3.11:openshift-enterprise-autoheal-0:3.11.394-1.git.218.59eb597.el7.x86_64", "7Server-RH7-RHOSE-3.11:openshift-enterprise-cluster-capacity-0:3.11.394-1.git.379.92adfdc.el7.ppc64le", "7Server-RH7-RHOSE-3.11:openshift-enterprise-cluster-capacity-0:3.11.394-1.git.379.92adfdc.el7.src", "7Server-RH7-RHOSE-3.11:openshift-enterprise-cluster-capacity-0:3.11.394-1.git.379.92adfdc.el7.x86_64", "7Server-RH7-RHOSE-3.11:openshift-kuryr-0:3.11.394-1.git.1490.16ed375.el7.src", "7Server-RH7-RHOSE-3.11:openshift-kuryr-cni-0:3.11.394-1.git.1490.16ed375.el7.noarch", "7Server-RH7-RHOSE-3.11:openshift-kuryr-common-0:3.11.394-1.git.1490.16ed375.el7.noarch", "7Server-RH7-RHOSE-3.11:openshift-kuryr-controller-0:3.11.394-1.git.1490.16ed375.el7.noarch", "7Server-RH7-RHOSE-3.11:prometheus-0:3.11.394-1.git.5026.2c9627f.el7.ppc64le", "7Server-RH7-RHOSE-3.11:prometheus-0:3.11.394-1.git.5026.2c9627f.el7.x86_64", "7Server-RH7-RHOSE-3.11:prometheus-alertmanager-0:3.11.394-1.git.0.1fbb64c.el7.ppc64le", "7Server-RH7-RHOSE-3.11:prometheus-alertmanager-0:3.11.394-1.git.0.1fbb64c.el7.x86_64", "7Server-RH7-RHOSE-3.11:prometheus-node-exporter-0:3.11.394-1.git.1062.8adc4b8.el7.ppc64le", "7Server-RH7-RHOSE-3.11:prometheus-node-exporter-0:3.11.394-1.git.1062.8adc4b8.el7.x86_64", "7Server-RH7-RHOSE-3.11:python-rsa-0:4.5-3.el7.src", "7Server-RH7-RHOSE-3.11:python2-kuryr-kubernetes-0:3.11.394-1.git.1490.16ed375.el7.noarch", "7Server-RH7-RHOSE-3.11:python2-rsa-0:4.5-3.el7.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-21606" }, { "category": "external", "summary": "RHBZ#1925159", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1925159" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-21606", "url": "https://www.cve.org/CVERecord?id=CVE-2021-21606" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-21606", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-21606" } ], "release_date": "2021-01-13T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-03-03T12:28:39+00:00", "details": "Before applying this update, ensure all previously released errata relevant\nto your system is applied.\n\nSee the following documentation, which will be updated shortly for release\n3.11.394, for important instructions on how to upgrade your cluster and fully\napply this asynchronous errata update:\n\nhttps://docs.openshift.com/container-platform/3.11/release_notes/ocp_3_11_release_notes.html\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/articles/11258.", "product_ids": [ "7Server-RH7-RHOSE-3.11:jenkins-0:2.263.3.1612433584-1.el7.noarch", "7Server-RH7-RHOSE-3.11:jenkins-0:2.263.3.1612433584-1.el7.src" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:0637" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "7Server-RH7-RHOSE-3.11:jenkins-0:2.263.3.1612433584-1.el7.noarch", "7Server-RH7-RHOSE-3.11:jenkins-0:2.263.3.1612433584-1.el7.src" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "jenkins: Arbitrary file existence check in file fingerprints" }, { "cve": "CVE-2021-21607", "cwe": { "id": "CWE-770", "name": "Allocation of Resources Without Limits or Throttling" }, "discovery_date": "2021-02-04T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "7Server-RH7-RHOSE-3.11:atomic-enterprise-service-catalog-1:3.11.394-1.git.1675.fdb6e0b.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-enterprise-service-catalog-1:3.11.394-1.git.1675.fdb6e0b.el7.src", "7Server-RH7-RHOSE-3.11:atomic-enterprise-service-catalog-1:3.11.394-1.git.1675.fdb6e0b.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-enterprise-service-catalog-svcat-1:3.11.394-1.git.1675.fdb6e0b.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-enterprise-service-catalog-svcat-1:3.11.394-1.git.1675.fdb6e0b.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-0:3.11.394-1.git.0.e03a88e.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-0:3.11.394-1.git.0.e03a88e.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-0:3.11.394-1.git.0.e03a88e.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-clients-0:3.11.394-1.git.0.e03a88e.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-clients-0:3.11.394-1.git.0.e03a88e.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-clients-redistributable-0:3.11.394-1.git.0.e03a88e.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-cluster-autoscaler-0:3.11.394-1.git.0.1900c76.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-cluster-autoscaler-0:3.11.394-1.git.0.1900c76.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-cluster-autoscaler-0:3.11.394-1.git.0.1900c76.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-descheduler-0:3.11.394-1.git.299.ad3a3c0.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-descheduler-0:3.11.394-1.git.299.ad3a3c0.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-descheduler-0:3.11.394-1.git.299.ad3a3c0.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-docker-excluder-0:3.11.394-1.git.0.e03a88e.el7.noarch", "7Server-RH7-RHOSE-3.11:atomic-openshift-dockerregistry-0:3.11.394-1.git.481.6e48246.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-dockerregistry-0:3.11.394-1.git.481.6e48246.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-excluder-0:3.11.394-1.git.0.e03a88e.el7.noarch", "7Server-RH7-RHOSE-3.11:atomic-openshift-hyperkube-0:3.11.394-1.git.0.e03a88e.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-hyperkube-0:3.11.394-1.git.0.e03a88e.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-hypershift-0:3.11.394-1.git.0.e03a88e.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-hypershift-0:3.11.394-1.git.0.e03a88e.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-master-0:3.11.394-1.git.0.e03a88e.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-master-0:3.11.394-1.git.0.e03a88e.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-metrics-server-0:3.11.394-1.git.53.3d82586.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-metrics-server-0:3.11.394-1.git.53.3d82586.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-metrics-server-0:3.11.394-1.git.53.3d82586.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-node-0:3.11.394-1.git.0.e03a88e.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-node-0:3.11.394-1.git.0.e03a88e.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-node-problem-detector-0:3.11.394-1.git.263.49acf3a.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-node-problem-detector-0:3.11.394-1.git.263.49acf3a.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-node-problem-detector-0:3.11.394-1.git.263.49acf3a.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-pod-0:3.11.394-1.git.0.e03a88e.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-pod-0:3.11.394-1.git.0.e03a88e.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-sdn-ovs-0:3.11.394-1.git.0.e03a88e.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-sdn-ovs-0:3.11.394-1.git.0.e03a88e.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-service-idler-0:3.11.394-1.git.15.73f73cd.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-service-idler-0:3.11.394-1.git.15.73f73cd.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-service-idler-0:3.11.394-1.git.15.73f73cd.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-template-service-broker-0:3.11.394-1.git.0.e03a88e.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-template-service-broker-0:3.11.394-1.git.0.e03a88e.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-tests-0:3.11.394-1.git.0.e03a88e.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-tests-0:3.11.394-1.git.0.e03a88e.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-web-console-0:3.11.394-1.git.667.08dd2a6.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-web-console-0:3.11.394-1.git.667.08dd2a6.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-web-console-0:3.11.394-1.git.667.08dd2a6.el7.x86_64", "7Server-RH7-RHOSE-3.11:golang-github-openshift-oauth-proxy-0:3.11.394-1.git.439.4c37707.el7.ppc64le", "7Server-RH7-RHOSE-3.11:golang-github-openshift-oauth-proxy-0:3.11.394-1.git.439.4c37707.el7.src", "7Server-RH7-RHOSE-3.11:golang-github-openshift-oauth-proxy-0:3.11.394-1.git.439.4c37707.el7.x86_64", "7Server-RH7-RHOSE-3.11:golang-github-prometheus-alertmanager-0:3.11.394-1.git.0.1fbb64c.el7.src", "7Server-RH7-RHOSE-3.11:golang-github-prometheus-node_exporter-0:3.11.394-1.git.1062.8adc4b8.el7.src", "7Server-RH7-RHOSE-3.11:golang-github-prometheus-prometheus-0:3.11.394-1.git.5026.2c9627f.el7.src", "7Server-RH7-RHOSE-3.11:haproxy-0:1.8.28-1.el7.src", "7Server-RH7-RHOSE-3.11:haproxy-debuginfo-0:1.8.28-1.el7.ppc64le", "7Server-RH7-RHOSE-3.11:haproxy-debuginfo-0:1.8.28-1.el7.x86_64", "7Server-RH7-RHOSE-3.11:haproxy18-0:1.8.28-1.el7.ppc64le", "7Server-RH7-RHOSE-3.11:haproxy18-0:1.8.28-1.el7.x86_64", "7Server-RH7-RHOSE-3.11:jenkins-2-plugins-0:3.11.1612862361-1.el7.noarch", "7Server-RH7-RHOSE-3.11:jenkins-2-plugins-0:3.11.1612862361-1.el7.src", "7Server-RH7-RHOSE-3.11:openshift-ansible-0:3.11.394-6.git.0.47ec25d.el7.noarch", "7Server-RH7-RHOSE-3.11:openshift-ansible-0:3.11.394-6.git.0.47ec25d.el7.src", "7Server-RH7-RHOSE-3.11:openshift-ansible-docs-0:3.11.394-6.git.0.47ec25d.el7.noarch", "7Server-RH7-RHOSE-3.11:openshift-ansible-playbooks-0:3.11.394-6.git.0.47ec25d.el7.noarch", "7Server-RH7-RHOSE-3.11:openshift-ansible-roles-0:3.11.394-6.git.0.47ec25d.el7.noarch", "7Server-RH7-RHOSE-3.11:openshift-ansible-test-0:3.11.394-6.git.0.47ec25d.el7.noarch", "7Server-RH7-RHOSE-3.11:openshift-enterprise-autoheal-0:3.11.394-1.git.218.59eb597.el7.ppc64le", "7Server-RH7-RHOSE-3.11:openshift-enterprise-autoheal-0:3.11.394-1.git.218.59eb597.el7.src", "7Server-RH7-RHOSE-3.11:openshift-enterprise-autoheal-0:3.11.394-1.git.218.59eb597.el7.x86_64", "7Server-RH7-RHOSE-3.11:openshift-enterprise-cluster-capacity-0:3.11.394-1.git.379.92adfdc.el7.ppc64le", "7Server-RH7-RHOSE-3.11:openshift-enterprise-cluster-capacity-0:3.11.394-1.git.379.92adfdc.el7.src", "7Server-RH7-RHOSE-3.11:openshift-enterprise-cluster-capacity-0:3.11.394-1.git.379.92adfdc.el7.x86_64", "7Server-RH7-RHOSE-3.11:openshift-kuryr-0:3.11.394-1.git.1490.16ed375.el7.src", "7Server-RH7-RHOSE-3.11:openshift-kuryr-cni-0:3.11.394-1.git.1490.16ed375.el7.noarch", "7Server-RH7-RHOSE-3.11:openshift-kuryr-common-0:3.11.394-1.git.1490.16ed375.el7.noarch", "7Server-RH7-RHOSE-3.11:openshift-kuryr-controller-0:3.11.394-1.git.1490.16ed375.el7.noarch", "7Server-RH7-RHOSE-3.11:prometheus-0:3.11.394-1.git.5026.2c9627f.el7.ppc64le", "7Server-RH7-RHOSE-3.11:prometheus-0:3.11.394-1.git.5026.2c9627f.el7.x86_64", "7Server-RH7-RHOSE-3.11:prometheus-alertmanager-0:3.11.394-1.git.0.1fbb64c.el7.ppc64le", "7Server-RH7-RHOSE-3.11:prometheus-alertmanager-0:3.11.394-1.git.0.1fbb64c.el7.x86_64", "7Server-RH7-RHOSE-3.11:prometheus-node-exporter-0:3.11.394-1.git.1062.8adc4b8.el7.ppc64le", "7Server-RH7-RHOSE-3.11:prometheus-node-exporter-0:3.11.394-1.git.1062.8adc4b8.el7.x86_64", "7Server-RH7-RHOSE-3.11:python-rsa-0:4.5-3.el7.src", "7Server-RH7-RHOSE-3.11:python2-kuryr-kubernetes-0:3.11.394-1.git.1490.16ed375.el7.noarch", "7Server-RH7-RHOSE-3.11:python2-rsa-0:4.5-3.el7.noarch" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1925156" } ], "notes": [ { "category": "description", "text": "Jenkins 2.274 and earlier, LTS 2.263.1 and earlier does not limit sizes provided as query parameters to graph-rendering URLs, allowing attackers to request crafted URLs that use all available memory in Jenkins, potentially leading to out of memory errors.", "title": "Vulnerability description" }, { "category": "summary", "text": "jenkins: Excessive memory allocation in graph URLs leads to denial of service", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RH7-RHOSE-3.11:jenkins-0:2.263.3.1612433584-1.el7.noarch", "7Server-RH7-RHOSE-3.11:jenkins-0:2.263.3.1612433584-1.el7.src" ], "known_not_affected": [ "7Server-RH7-RHOSE-3.11:atomic-enterprise-service-catalog-1:3.11.394-1.git.1675.fdb6e0b.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-enterprise-service-catalog-1:3.11.394-1.git.1675.fdb6e0b.el7.src", "7Server-RH7-RHOSE-3.11:atomic-enterprise-service-catalog-1:3.11.394-1.git.1675.fdb6e0b.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-enterprise-service-catalog-svcat-1:3.11.394-1.git.1675.fdb6e0b.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-enterprise-service-catalog-svcat-1:3.11.394-1.git.1675.fdb6e0b.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-0:3.11.394-1.git.0.e03a88e.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-0:3.11.394-1.git.0.e03a88e.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-0:3.11.394-1.git.0.e03a88e.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-clients-0:3.11.394-1.git.0.e03a88e.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-clients-0:3.11.394-1.git.0.e03a88e.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-clients-redistributable-0:3.11.394-1.git.0.e03a88e.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-cluster-autoscaler-0:3.11.394-1.git.0.1900c76.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-cluster-autoscaler-0:3.11.394-1.git.0.1900c76.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-cluster-autoscaler-0:3.11.394-1.git.0.1900c76.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-descheduler-0:3.11.394-1.git.299.ad3a3c0.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-descheduler-0:3.11.394-1.git.299.ad3a3c0.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-descheduler-0:3.11.394-1.git.299.ad3a3c0.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-docker-excluder-0:3.11.394-1.git.0.e03a88e.el7.noarch", "7Server-RH7-RHOSE-3.11:atomic-openshift-dockerregistry-0:3.11.394-1.git.481.6e48246.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-dockerregistry-0:3.11.394-1.git.481.6e48246.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-excluder-0:3.11.394-1.git.0.e03a88e.el7.noarch", "7Server-RH7-RHOSE-3.11:atomic-openshift-hyperkube-0:3.11.394-1.git.0.e03a88e.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-hyperkube-0:3.11.394-1.git.0.e03a88e.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-hypershift-0:3.11.394-1.git.0.e03a88e.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-hypershift-0:3.11.394-1.git.0.e03a88e.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-master-0:3.11.394-1.git.0.e03a88e.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-master-0:3.11.394-1.git.0.e03a88e.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-metrics-server-0:3.11.394-1.git.53.3d82586.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-metrics-server-0:3.11.394-1.git.53.3d82586.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-metrics-server-0:3.11.394-1.git.53.3d82586.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-node-0:3.11.394-1.git.0.e03a88e.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-node-0:3.11.394-1.git.0.e03a88e.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-node-problem-detector-0:3.11.394-1.git.263.49acf3a.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-node-problem-detector-0:3.11.394-1.git.263.49acf3a.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-node-problem-detector-0:3.11.394-1.git.263.49acf3a.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-pod-0:3.11.394-1.git.0.e03a88e.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-pod-0:3.11.394-1.git.0.e03a88e.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-sdn-ovs-0:3.11.394-1.git.0.e03a88e.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-sdn-ovs-0:3.11.394-1.git.0.e03a88e.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-service-idler-0:3.11.394-1.git.15.73f73cd.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-service-idler-0:3.11.394-1.git.15.73f73cd.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-service-idler-0:3.11.394-1.git.15.73f73cd.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-template-service-broker-0:3.11.394-1.git.0.e03a88e.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-template-service-broker-0:3.11.394-1.git.0.e03a88e.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-tests-0:3.11.394-1.git.0.e03a88e.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-tests-0:3.11.394-1.git.0.e03a88e.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-web-console-0:3.11.394-1.git.667.08dd2a6.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-web-console-0:3.11.394-1.git.667.08dd2a6.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-web-console-0:3.11.394-1.git.667.08dd2a6.el7.x86_64", "7Server-RH7-RHOSE-3.11:golang-github-openshift-oauth-proxy-0:3.11.394-1.git.439.4c37707.el7.ppc64le", "7Server-RH7-RHOSE-3.11:golang-github-openshift-oauth-proxy-0:3.11.394-1.git.439.4c37707.el7.src", "7Server-RH7-RHOSE-3.11:golang-github-openshift-oauth-proxy-0:3.11.394-1.git.439.4c37707.el7.x86_64", "7Server-RH7-RHOSE-3.11:golang-github-prometheus-alertmanager-0:3.11.394-1.git.0.1fbb64c.el7.src", "7Server-RH7-RHOSE-3.11:golang-github-prometheus-node_exporter-0:3.11.394-1.git.1062.8adc4b8.el7.src", "7Server-RH7-RHOSE-3.11:golang-github-prometheus-prometheus-0:3.11.394-1.git.5026.2c9627f.el7.src", "7Server-RH7-RHOSE-3.11:haproxy-0:1.8.28-1.el7.src", "7Server-RH7-RHOSE-3.11:haproxy-debuginfo-0:1.8.28-1.el7.ppc64le", "7Server-RH7-RHOSE-3.11:haproxy-debuginfo-0:1.8.28-1.el7.x86_64", "7Server-RH7-RHOSE-3.11:haproxy18-0:1.8.28-1.el7.ppc64le", "7Server-RH7-RHOSE-3.11:haproxy18-0:1.8.28-1.el7.x86_64", "7Server-RH7-RHOSE-3.11:jenkins-2-plugins-0:3.11.1612862361-1.el7.noarch", "7Server-RH7-RHOSE-3.11:jenkins-2-plugins-0:3.11.1612862361-1.el7.src", "7Server-RH7-RHOSE-3.11:openshift-ansible-0:3.11.394-6.git.0.47ec25d.el7.noarch", "7Server-RH7-RHOSE-3.11:openshift-ansible-0:3.11.394-6.git.0.47ec25d.el7.src", "7Server-RH7-RHOSE-3.11:openshift-ansible-docs-0:3.11.394-6.git.0.47ec25d.el7.noarch", "7Server-RH7-RHOSE-3.11:openshift-ansible-playbooks-0:3.11.394-6.git.0.47ec25d.el7.noarch", "7Server-RH7-RHOSE-3.11:openshift-ansible-roles-0:3.11.394-6.git.0.47ec25d.el7.noarch", "7Server-RH7-RHOSE-3.11:openshift-ansible-test-0:3.11.394-6.git.0.47ec25d.el7.noarch", "7Server-RH7-RHOSE-3.11:openshift-enterprise-autoheal-0:3.11.394-1.git.218.59eb597.el7.ppc64le", "7Server-RH7-RHOSE-3.11:openshift-enterprise-autoheal-0:3.11.394-1.git.218.59eb597.el7.src", "7Server-RH7-RHOSE-3.11:openshift-enterprise-autoheal-0:3.11.394-1.git.218.59eb597.el7.x86_64", "7Server-RH7-RHOSE-3.11:openshift-enterprise-cluster-capacity-0:3.11.394-1.git.379.92adfdc.el7.ppc64le", "7Server-RH7-RHOSE-3.11:openshift-enterprise-cluster-capacity-0:3.11.394-1.git.379.92adfdc.el7.src", "7Server-RH7-RHOSE-3.11:openshift-enterprise-cluster-capacity-0:3.11.394-1.git.379.92adfdc.el7.x86_64", "7Server-RH7-RHOSE-3.11:openshift-kuryr-0:3.11.394-1.git.1490.16ed375.el7.src", "7Server-RH7-RHOSE-3.11:openshift-kuryr-cni-0:3.11.394-1.git.1490.16ed375.el7.noarch", "7Server-RH7-RHOSE-3.11:openshift-kuryr-common-0:3.11.394-1.git.1490.16ed375.el7.noarch", "7Server-RH7-RHOSE-3.11:openshift-kuryr-controller-0:3.11.394-1.git.1490.16ed375.el7.noarch", "7Server-RH7-RHOSE-3.11:prometheus-0:3.11.394-1.git.5026.2c9627f.el7.ppc64le", "7Server-RH7-RHOSE-3.11:prometheus-0:3.11.394-1.git.5026.2c9627f.el7.x86_64", "7Server-RH7-RHOSE-3.11:prometheus-alertmanager-0:3.11.394-1.git.0.1fbb64c.el7.ppc64le", "7Server-RH7-RHOSE-3.11:prometheus-alertmanager-0:3.11.394-1.git.0.1fbb64c.el7.x86_64", "7Server-RH7-RHOSE-3.11:prometheus-node-exporter-0:3.11.394-1.git.1062.8adc4b8.el7.ppc64le", "7Server-RH7-RHOSE-3.11:prometheus-node-exporter-0:3.11.394-1.git.1062.8adc4b8.el7.x86_64", "7Server-RH7-RHOSE-3.11:python-rsa-0:4.5-3.el7.src", "7Server-RH7-RHOSE-3.11:python2-kuryr-kubernetes-0:3.11.394-1.git.1490.16ed375.el7.noarch", "7Server-RH7-RHOSE-3.11:python2-rsa-0:4.5-3.el7.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-21607" }, { "category": "external", "summary": "RHBZ#1925156", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1925156" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-21607", "url": "https://www.cve.org/CVERecord?id=CVE-2021-21607" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-21607", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-21607" } ], "release_date": "2021-01-13T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-03-03T12:28:39+00:00", "details": "Before applying this update, ensure all previously released errata relevant\nto your system is applied.\n\nSee the following documentation, which will be updated shortly for release\n3.11.394, for important instructions on how to upgrade your cluster and fully\napply this asynchronous errata update:\n\nhttps://docs.openshift.com/container-platform/3.11/release_notes/ocp_3_11_release_notes.html\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/articles/11258.", "product_ids": [ "7Server-RH7-RHOSE-3.11:jenkins-0:2.263.3.1612433584-1.el7.noarch", "7Server-RH7-RHOSE-3.11:jenkins-0:2.263.3.1612433584-1.el7.src" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:0637" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "7Server-RH7-RHOSE-3.11:jenkins-0:2.263.3.1612433584-1.el7.noarch", "7Server-RH7-RHOSE-3.11:jenkins-0:2.263.3.1612433584-1.el7.src" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "jenkins: Excessive memory allocation in graph URLs leads to denial of service" }, { "cve": "CVE-2021-21608", "cwe": { "id": "CWE-79", "name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)" }, "discovery_date": "2021-02-04T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "7Server-RH7-RHOSE-3.11:atomic-enterprise-service-catalog-1:3.11.394-1.git.1675.fdb6e0b.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-enterprise-service-catalog-1:3.11.394-1.git.1675.fdb6e0b.el7.src", "7Server-RH7-RHOSE-3.11:atomic-enterprise-service-catalog-1:3.11.394-1.git.1675.fdb6e0b.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-enterprise-service-catalog-svcat-1:3.11.394-1.git.1675.fdb6e0b.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-enterprise-service-catalog-svcat-1:3.11.394-1.git.1675.fdb6e0b.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-0:3.11.394-1.git.0.e03a88e.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-0:3.11.394-1.git.0.e03a88e.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-0:3.11.394-1.git.0.e03a88e.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-clients-0:3.11.394-1.git.0.e03a88e.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-clients-0:3.11.394-1.git.0.e03a88e.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-clients-redistributable-0:3.11.394-1.git.0.e03a88e.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-cluster-autoscaler-0:3.11.394-1.git.0.1900c76.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-cluster-autoscaler-0:3.11.394-1.git.0.1900c76.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-cluster-autoscaler-0:3.11.394-1.git.0.1900c76.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-descheduler-0:3.11.394-1.git.299.ad3a3c0.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-descheduler-0:3.11.394-1.git.299.ad3a3c0.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-descheduler-0:3.11.394-1.git.299.ad3a3c0.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-docker-excluder-0:3.11.394-1.git.0.e03a88e.el7.noarch", "7Server-RH7-RHOSE-3.11:atomic-openshift-dockerregistry-0:3.11.394-1.git.481.6e48246.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-dockerregistry-0:3.11.394-1.git.481.6e48246.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-excluder-0:3.11.394-1.git.0.e03a88e.el7.noarch", "7Server-RH7-RHOSE-3.11:atomic-openshift-hyperkube-0:3.11.394-1.git.0.e03a88e.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-hyperkube-0:3.11.394-1.git.0.e03a88e.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-hypershift-0:3.11.394-1.git.0.e03a88e.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-hypershift-0:3.11.394-1.git.0.e03a88e.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-master-0:3.11.394-1.git.0.e03a88e.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-master-0:3.11.394-1.git.0.e03a88e.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-metrics-server-0:3.11.394-1.git.53.3d82586.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-metrics-server-0:3.11.394-1.git.53.3d82586.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-metrics-server-0:3.11.394-1.git.53.3d82586.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-node-0:3.11.394-1.git.0.e03a88e.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-node-0:3.11.394-1.git.0.e03a88e.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-node-problem-detector-0:3.11.394-1.git.263.49acf3a.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-node-problem-detector-0:3.11.394-1.git.263.49acf3a.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-node-problem-detector-0:3.11.394-1.git.263.49acf3a.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-pod-0:3.11.394-1.git.0.e03a88e.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-pod-0:3.11.394-1.git.0.e03a88e.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-sdn-ovs-0:3.11.394-1.git.0.e03a88e.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-sdn-ovs-0:3.11.394-1.git.0.e03a88e.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-service-idler-0:3.11.394-1.git.15.73f73cd.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-service-idler-0:3.11.394-1.git.15.73f73cd.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-service-idler-0:3.11.394-1.git.15.73f73cd.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-template-service-broker-0:3.11.394-1.git.0.e03a88e.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-template-service-broker-0:3.11.394-1.git.0.e03a88e.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-tests-0:3.11.394-1.git.0.e03a88e.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-tests-0:3.11.394-1.git.0.e03a88e.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-web-console-0:3.11.394-1.git.667.08dd2a6.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-web-console-0:3.11.394-1.git.667.08dd2a6.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-web-console-0:3.11.394-1.git.667.08dd2a6.el7.x86_64", "7Server-RH7-RHOSE-3.11:golang-github-openshift-oauth-proxy-0:3.11.394-1.git.439.4c37707.el7.ppc64le", "7Server-RH7-RHOSE-3.11:golang-github-openshift-oauth-proxy-0:3.11.394-1.git.439.4c37707.el7.src", "7Server-RH7-RHOSE-3.11:golang-github-openshift-oauth-proxy-0:3.11.394-1.git.439.4c37707.el7.x86_64", "7Server-RH7-RHOSE-3.11:golang-github-prometheus-alertmanager-0:3.11.394-1.git.0.1fbb64c.el7.src", "7Server-RH7-RHOSE-3.11:golang-github-prometheus-node_exporter-0:3.11.394-1.git.1062.8adc4b8.el7.src", "7Server-RH7-RHOSE-3.11:golang-github-prometheus-prometheus-0:3.11.394-1.git.5026.2c9627f.el7.src", "7Server-RH7-RHOSE-3.11:haproxy-0:1.8.28-1.el7.src", "7Server-RH7-RHOSE-3.11:haproxy-debuginfo-0:1.8.28-1.el7.ppc64le", "7Server-RH7-RHOSE-3.11:haproxy-debuginfo-0:1.8.28-1.el7.x86_64", "7Server-RH7-RHOSE-3.11:haproxy18-0:1.8.28-1.el7.ppc64le", "7Server-RH7-RHOSE-3.11:haproxy18-0:1.8.28-1.el7.x86_64", "7Server-RH7-RHOSE-3.11:jenkins-2-plugins-0:3.11.1612862361-1.el7.noarch", "7Server-RH7-RHOSE-3.11:jenkins-2-plugins-0:3.11.1612862361-1.el7.src", "7Server-RH7-RHOSE-3.11:openshift-ansible-0:3.11.394-6.git.0.47ec25d.el7.noarch", "7Server-RH7-RHOSE-3.11:openshift-ansible-0:3.11.394-6.git.0.47ec25d.el7.src", "7Server-RH7-RHOSE-3.11:openshift-ansible-docs-0:3.11.394-6.git.0.47ec25d.el7.noarch", "7Server-RH7-RHOSE-3.11:openshift-ansible-playbooks-0:3.11.394-6.git.0.47ec25d.el7.noarch", "7Server-RH7-RHOSE-3.11:openshift-ansible-roles-0:3.11.394-6.git.0.47ec25d.el7.noarch", "7Server-RH7-RHOSE-3.11:openshift-ansible-test-0:3.11.394-6.git.0.47ec25d.el7.noarch", "7Server-RH7-RHOSE-3.11:openshift-enterprise-autoheal-0:3.11.394-1.git.218.59eb597.el7.ppc64le", "7Server-RH7-RHOSE-3.11:openshift-enterprise-autoheal-0:3.11.394-1.git.218.59eb597.el7.src", "7Server-RH7-RHOSE-3.11:openshift-enterprise-autoheal-0:3.11.394-1.git.218.59eb597.el7.x86_64", "7Server-RH7-RHOSE-3.11:openshift-enterprise-cluster-capacity-0:3.11.394-1.git.379.92adfdc.el7.ppc64le", "7Server-RH7-RHOSE-3.11:openshift-enterprise-cluster-capacity-0:3.11.394-1.git.379.92adfdc.el7.src", "7Server-RH7-RHOSE-3.11:openshift-enterprise-cluster-capacity-0:3.11.394-1.git.379.92adfdc.el7.x86_64", "7Server-RH7-RHOSE-3.11:openshift-kuryr-0:3.11.394-1.git.1490.16ed375.el7.src", "7Server-RH7-RHOSE-3.11:openshift-kuryr-cni-0:3.11.394-1.git.1490.16ed375.el7.noarch", "7Server-RH7-RHOSE-3.11:openshift-kuryr-common-0:3.11.394-1.git.1490.16ed375.el7.noarch", "7Server-RH7-RHOSE-3.11:openshift-kuryr-controller-0:3.11.394-1.git.1490.16ed375.el7.noarch", "7Server-RH7-RHOSE-3.11:prometheus-0:3.11.394-1.git.5026.2c9627f.el7.ppc64le", "7Server-RH7-RHOSE-3.11:prometheus-0:3.11.394-1.git.5026.2c9627f.el7.x86_64", "7Server-RH7-RHOSE-3.11:prometheus-alertmanager-0:3.11.394-1.git.0.1fbb64c.el7.ppc64le", "7Server-RH7-RHOSE-3.11:prometheus-alertmanager-0:3.11.394-1.git.0.1fbb64c.el7.x86_64", "7Server-RH7-RHOSE-3.11:prometheus-node-exporter-0:3.11.394-1.git.1062.8adc4b8.el7.ppc64le", "7Server-RH7-RHOSE-3.11:prometheus-node-exporter-0:3.11.394-1.git.1062.8adc4b8.el7.x86_64", "7Server-RH7-RHOSE-3.11:python-rsa-0:4.5-3.el7.src", "7Server-RH7-RHOSE-3.11:python2-kuryr-kubernetes-0:3.11.394-1.git.1490.16ed375.el7.noarch", "7Server-RH7-RHOSE-3.11:python2-rsa-0:4.5-3.el7.noarch" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1925140" } ], "notes": [ { "category": "description", "text": "A flaw was found in jenkins. A cross-site scripting (XSS) vulnerability, due to the button labels not being properly escaped, can allow an attacker to control button labels. The highest threat from this vulnerability is to data confidentiality and integrity.", "title": "Vulnerability description" }, { "category": "summary", "text": "jenkins: Stored XSS vulnerability in button labels", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RH7-RHOSE-3.11:jenkins-0:2.263.3.1612433584-1.el7.noarch", "7Server-RH7-RHOSE-3.11:jenkins-0:2.263.3.1612433584-1.el7.src" ], "known_not_affected": [ "7Server-RH7-RHOSE-3.11:atomic-enterprise-service-catalog-1:3.11.394-1.git.1675.fdb6e0b.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-enterprise-service-catalog-1:3.11.394-1.git.1675.fdb6e0b.el7.src", "7Server-RH7-RHOSE-3.11:atomic-enterprise-service-catalog-1:3.11.394-1.git.1675.fdb6e0b.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-enterprise-service-catalog-svcat-1:3.11.394-1.git.1675.fdb6e0b.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-enterprise-service-catalog-svcat-1:3.11.394-1.git.1675.fdb6e0b.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-0:3.11.394-1.git.0.e03a88e.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-0:3.11.394-1.git.0.e03a88e.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-0:3.11.394-1.git.0.e03a88e.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-clients-0:3.11.394-1.git.0.e03a88e.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-clients-0:3.11.394-1.git.0.e03a88e.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-clients-redistributable-0:3.11.394-1.git.0.e03a88e.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-cluster-autoscaler-0:3.11.394-1.git.0.1900c76.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-cluster-autoscaler-0:3.11.394-1.git.0.1900c76.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-cluster-autoscaler-0:3.11.394-1.git.0.1900c76.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-descheduler-0:3.11.394-1.git.299.ad3a3c0.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-descheduler-0:3.11.394-1.git.299.ad3a3c0.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-descheduler-0:3.11.394-1.git.299.ad3a3c0.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-docker-excluder-0:3.11.394-1.git.0.e03a88e.el7.noarch", "7Server-RH7-RHOSE-3.11:atomic-openshift-dockerregistry-0:3.11.394-1.git.481.6e48246.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-dockerregistry-0:3.11.394-1.git.481.6e48246.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-excluder-0:3.11.394-1.git.0.e03a88e.el7.noarch", "7Server-RH7-RHOSE-3.11:atomic-openshift-hyperkube-0:3.11.394-1.git.0.e03a88e.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-hyperkube-0:3.11.394-1.git.0.e03a88e.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-hypershift-0:3.11.394-1.git.0.e03a88e.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-hypershift-0:3.11.394-1.git.0.e03a88e.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-master-0:3.11.394-1.git.0.e03a88e.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-master-0:3.11.394-1.git.0.e03a88e.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-metrics-server-0:3.11.394-1.git.53.3d82586.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-metrics-server-0:3.11.394-1.git.53.3d82586.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-metrics-server-0:3.11.394-1.git.53.3d82586.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-node-0:3.11.394-1.git.0.e03a88e.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-node-0:3.11.394-1.git.0.e03a88e.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-node-problem-detector-0:3.11.394-1.git.263.49acf3a.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-node-problem-detector-0:3.11.394-1.git.263.49acf3a.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-node-problem-detector-0:3.11.394-1.git.263.49acf3a.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-pod-0:3.11.394-1.git.0.e03a88e.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-pod-0:3.11.394-1.git.0.e03a88e.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-sdn-ovs-0:3.11.394-1.git.0.e03a88e.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-sdn-ovs-0:3.11.394-1.git.0.e03a88e.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-service-idler-0:3.11.394-1.git.15.73f73cd.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-service-idler-0:3.11.394-1.git.15.73f73cd.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-service-idler-0:3.11.394-1.git.15.73f73cd.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-template-service-broker-0:3.11.394-1.git.0.e03a88e.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-template-service-broker-0:3.11.394-1.git.0.e03a88e.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-tests-0:3.11.394-1.git.0.e03a88e.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-tests-0:3.11.394-1.git.0.e03a88e.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-web-console-0:3.11.394-1.git.667.08dd2a6.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-web-console-0:3.11.394-1.git.667.08dd2a6.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-web-console-0:3.11.394-1.git.667.08dd2a6.el7.x86_64", "7Server-RH7-RHOSE-3.11:golang-github-openshift-oauth-proxy-0:3.11.394-1.git.439.4c37707.el7.ppc64le", "7Server-RH7-RHOSE-3.11:golang-github-openshift-oauth-proxy-0:3.11.394-1.git.439.4c37707.el7.src", "7Server-RH7-RHOSE-3.11:golang-github-openshift-oauth-proxy-0:3.11.394-1.git.439.4c37707.el7.x86_64", "7Server-RH7-RHOSE-3.11:golang-github-prometheus-alertmanager-0:3.11.394-1.git.0.1fbb64c.el7.src", "7Server-RH7-RHOSE-3.11:golang-github-prometheus-node_exporter-0:3.11.394-1.git.1062.8adc4b8.el7.src", "7Server-RH7-RHOSE-3.11:golang-github-prometheus-prometheus-0:3.11.394-1.git.5026.2c9627f.el7.src", "7Server-RH7-RHOSE-3.11:haproxy-0:1.8.28-1.el7.src", "7Server-RH7-RHOSE-3.11:haproxy-debuginfo-0:1.8.28-1.el7.ppc64le", "7Server-RH7-RHOSE-3.11:haproxy-debuginfo-0:1.8.28-1.el7.x86_64", "7Server-RH7-RHOSE-3.11:haproxy18-0:1.8.28-1.el7.ppc64le", "7Server-RH7-RHOSE-3.11:haproxy18-0:1.8.28-1.el7.x86_64", "7Server-RH7-RHOSE-3.11:jenkins-2-plugins-0:3.11.1612862361-1.el7.noarch", "7Server-RH7-RHOSE-3.11:jenkins-2-plugins-0:3.11.1612862361-1.el7.src", "7Server-RH7-RHOSE-3.11:openshift-ansible-0:3.11.394-6.git.0.47ec25d.el7.noarch", "7Server-RH7-RHOSE-3.11:openshift-ansible-0:3.11.394-6.git.0.47ec25d.el7.src", "7Server-RH7-RHOSE-3.11:openshift-ansible-docs-0:3.11.394-6.git.0.47ec25d.el7.noarch", "7Server-RH7-RHOSE-3.11:openshift-ansible-playbooks-0:3.11.394-6.git.0.47ec25d.el7.noarch", "7Server-RH7-RHOSE-3.11:openshift-ansible-roles-0:3.11.394-6.git.0.47ec25d.el7.noarch", "7Server-RH7-RHOSE-3.11:openshift-ansible-test-0:3.11.394-6.git.0.47ec25d.el7.noarch", "7Server-RH7-RHOSE-3.11:openshift-enterprise-autoheal-0:3.11.394-1.git.218.59eb597.el7.ppc64le", "7Server-RH7-RHOSE-3.11:openshift-enterprise-autoheal-0:3.11.394-1.git.218.59eb597.el7.src", "7Server-RH7-RHOSE-3.11:openshift-enterprise-autoheal-0:3.11.394-1.git.218.59eb597.el7.x86_64", "7Server-RH7-RHOSE-3.11:openshift-enterprise-cluster-capacity-0:3.11.394-1.git.379.92adfdc.el7.ppc64le", "7Server-RH7-RHOSE-3.11:openshift-enterprise-cluster-capacity-0:3.11.394-1.git.379.92adfdc.el7.src", "7Server-RH7-RHOSE-3.11:openshift-enterprise-cluster-capacity-0:3.11.394-1.git.379.92adfdc.el7.x86_64", "7Server-RH7-RHOSE-3.11:openshift-kuryr-0:3.11.394-1.git.1490.16ed375.el7.src", "7Server-RH7-RHOSE-3.11:openshift-kuryr-cni-0:3.11.394-1.git.1490.16ed375.el7.noarch", "7Server-RH7-RHOSE-3.11:openshift-kuryr-common-0:3.11.394-1.git.1490.16ed375.el7.noarch", "7Server-RH7-RHOSE-3.11:openshift-kuryr-controller-0:3.11.394-1.git.1490.16ed375.el7.noarch", "7Server-RH7-RHOSE-3.11:prometheus-0:3.11.394-1.git.5026.2c9627f.el7.ppc64le", "7Server-RH7-RHOSE-3.11:prometheus-0:3.11.394-1.git.5026.2c9627f.el7.x86_64", "7Server-RH7-RHOSE-3.11:prometheus-alertmanager-0:3.11.394-1.git.0.1fbb64c.el7.ppc64le", "7Server-RH7-RHOSE-3.11:prometheus-alertmanager-0:3.11.394-1.git.0.1fbb64c.el7.x86_64", "7Server-RH7-RHOSE-3.11:prometheus-node-exporter-0:3.11.394-1.git.1062.8adc4b8.el7.ppc64le", "7Server-RH7-RHOSE-3.11:prometheus-node-exporter-0:3.11.394-1.git.1062.8adc4b8.el7.x86_64", "7Server-RH7-RHOSE-3.11:python-rsa-0:4.5-3.el7.src", "7Server-RH7-RHOSE-3.11:python2-kuryr-kubernetes-0:3.11.394-1.git.1490.16ed375.el7.noarch", "7Server-RH7-RHOSE-3.11:python2-rsa-0:4.5-3.el7.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-21608" }, { "category": "external", "summary": "RHBZ#1925140", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1925140" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-21608", "url": "https://www.cve.org/CVERecord?id=CVE-2021-21608" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-21608", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-21608" } ], "release_date": "2021-01-13T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-03-03T12:28:39+00:00", "details": "Before applying this update, ensure all previously released errata relevant\nto your system is applied.\n\nSee the following documentation, which will be updated shortly for release\n3.11.394, for important instructions on how to upgrade your cluster and fully\napply this asynchronous errata update:\n\nhttps://docs.openshift.com/container-platform/3.11/release_notes/ocp_3_11_release_notes.html\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/articles/11258.", "product_ids": [ "7Server-RH7-RHOSE-3.11:jenkins-0:2.263.3.1612433584-1.el7.noarch", "7Server-RH7-RHOSE-3.11:jenkins-0:2.263.3.1612433584-1.el7.src" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:0637" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "products": [ "7Server-RH7-RHOSE-3.11:jenkins-0:2.263.3.1612433584-1.el7.noarch", "7Server-RH7-RHOSE-3.11:jenkins-0:2.263.3.1612433584-1.el7.src" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "jenkins: Stored XSS vulnerability in button labels" }, { "cve": "CVE-2021-21609", "cwe": { "id": "CWE-863", "name": "Incorrect Authorization" }, "discovery_date": "2021-02-04T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "7Server-RH7-RHOSE-3.11:atomic-enterprise-service-catalog-1:3.11.394-1.git.1675.fdb6e0b.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-enterprise-service-catalog-1:3.11.394-1.git.1675.fdb6e0b.el7.src", "7Server-RH7-RHOSE-3.11:atomic-enterprise-service-catalog-1:3.11.394-1.git.1675.fdb6e0b.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-enterprise-service-catalog-svcat-1:3.11.394-1.git.1675.fdb6e0b.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-enterprise-service-catalog-svcat-1:3.11.394-1.git.1675.fdb6e0b.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-0:3.11.394-1.git.0.e03a88e.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-0:3.11.394-1.git.0.e03a88e.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-0:3.11.394-1.git.0.e03a88e.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-clients-0:3.11.394-1.git.0.e03a88e.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-clients-0:3.11.394-1.git.0.e03a88e.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-clients-redistributable-0:3.11.394-1.git.0.e03a88e.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-cluster-autoscaler-0:3.11.394-1.git.0.1900c76.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-cluster-autoscaler-0:3.11.394-1.git.0.1900c76.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-cluster-autoscaler-0:3.11.394-1.git.0.1900c76.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-descheduler-0:3.11.394-1.git.299.ad3a3c0.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-descheduler-0:3.11.394-1.git.299.ad3a3c0.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-descheduler-0:3.11.394-1.git.299.ad3a3c0.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-docker-excluder-0:3.11.394-1.git.0.e03a88e.el7.noarch", "7Server-RH7-RHOSE-3.11:atomic-openshift-dockerregistry-0:3.11.394-1.git.481.6e48246.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-dockerregistry-0:3.11.394-1.git.481.6e48246.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-excluder-0:3.11.394-1.git.0.e03a88e.el7.noarch", "7Server-RH7-RHOSE-3.11:atomic-openshift-hyperkube-0:3.11.394-1.git.0.e03a88e.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-hyperkube-0:3.11.394-1.git.0.e03a88e.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-hypershift-0:3.11.394-1.git.0.e03a88e.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-hypershift-0:3.11.394-1.git.0.e03a88e.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-master-0:3.11.394-1.git.0.e03a88e.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-master-0:3.11.394-1.git.0.e03a88e.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-metrics-server-0:3.11.394-1.git.53.3d82586.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-metrics-server-0:3.11.394-1.git.53.3d82586.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-metrics-server-0:3.11.394-1.git.53.3d82586.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-node-0:3.11.394-1.git.0.e03a88e.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-node-0:3.11.394-1.git.0.e03a88e.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-node-problem-detector-0:3.11.394-1.git.263.49acf3a.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-node-problem-detector-0:3.11.394-1.git.263.49acf3a.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-node-problem-detector-0:3.11.394-1.git.263.49acf3a.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-pod-0:3.11.394-1.git.0.e03a88e.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-pod-0:3.11.394-1.git.0.e03a88e.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-sdn-ovs-0:3.11.394-1.git.0.e03a88e.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-sdn-ovs-0:3.11.394-1.git.0.e03a88e.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-service-idler-0:3.11.394-1.git.15.73f73cd.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-service-idler-0:3.11.394-1.git.15.73f73cd.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-service-idler-0:3.11.394-1.git.15.73f73cd.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-template-service-broker-0:3.11.394-1.git.0.e03a88e.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-template-service-broker-0:3.11.394-1.git.0.e03a88e.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-tests-0:3.11.394-1.git.0.e03a88e.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-tests-0:3.11.394-1.git.0.e03a88e.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-web-console-0:3.11.394-1.git.667.08dd2a6.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-web-console-0:3.11.394-1.git.667.08dd2a6.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-web-console-0:3.11.394-1.git.667.08dd2a6.el7.x86_64", "7Server-RH7-RHOSE-3.11:golang-github-openshift-oauth-proxy-0:3.11.394-1.git.439.4c37707.el7.ppc64le", "7Server-RH7-RHOSE-3.11:golang-github-openshift-oauth-proxy-0:3.11.394-1.git.439.4c37707.el7.src", "7Server-RH7-RHOSE-3.11:golang-github-openshift-oauth-proxy-0:3.11.394-1.git.439.4c37707.el7.x86_64", "7Server-RH7-RHOSE-3.11:golang-github-prometheus-alertmanager-0:3.11.394-1.git.0.1fbb64c.el7.src", "7Server-RH7-RHOSE-3.11:golang-github-prometheus-node_exporter-0:3.11.394-1.git.1062.8adc4b8.el7.src", "7Server-RH7-RHOSE-3.11:golang-github-prometheus-prometheus-0:3.11.394-1.git.5026.2c9627f.el7.src", "7Server-RH7-RHOSE-3.11:haproxy-0:1.8.28-1.el7.src", "7Server-RH7-RHOSE-3.11:haproxy-debuginfo-0:1.8.28-1.el7.ppc64le", "7Server-RH7-RHOSE-3.11:haproxy-debuginfo-0:1.8.28-1.el7.x86_64", "7Server-RH7-RHOSE-3.11:haproxy18-0:1.8.28-1.el7.ppc64le", "7Server-RH7-RHOSE-3.11:haproxy18-0:1.8.28-1.el7.x86_64", "7Server-RH7-RHOSE-3.11:jenkins-2-plugins-0:3.11.1612862361-1.el7.noarch", "7Server-RH7-RHOSE-3.11:jenkins-2-plugins-0:3.11.1612862361-1.el7.src", "7Server-RH7-RHOSE-3.11:openshift-ansible-0:3.11.394-6.git.0.47ec25d.el7.noarch", "7Server-RH7-RHOSE-3.11:openshift-ansible-0:3.11.394-6.git.0.47ec25d.el7.src", "7Server-RH7-RHOSE-3.11:openshift-ansible-docs-0:3.11.394-6.git.0.47ec25d.el7.noarch", "7Server-RH7-RHOSE-3.11:openshift-ansible-playbooks-0:3.11.394-6.git.0.47ec25d.el7.noarch", "7Server-RH7-RHOSE-3.11:openshift-ansible-roles-0:3.11.394-6.git.0.47ec25d.el7.noarch", "7Server-RH7-RHOSE-3.11:openshift-ansible-test-0:3.11.394-6.git.0.47ec25d.el7.noarch", "7Server-RH7-RHOSE-3.11:openshift-enterprise-autoheal-0:3.11.394-1.git.218.59eb597.el7.ppc64le", "7Server-RH7-RHOSE-3.11:openshift-enterprise-autoheal-0:3.11.394-1.git.218.59eb597.el7.src", "7Server-RH7-RHOSE-3.11:openshift-enterprise-autoheal-0:3.11.394-1.git.218.59eb597.el7.x86_64", "7Server-RH7-RHOSE-3.11:openshift-enterprise-cluster-capacity-0:3.11.394-1.git.379.92adfdc.el7.ppc64le", "7Server-RH7-RHOSE-3.11:openshift-enterprise-cluster-capacity-0:3.11.394-1.git.379.92adfdc.el7.src", "7Server-RH7-RHOSE-3.11:openshift-enterprise-cluster-capacity-0:3.11.394-1.git.379.92adfdc.el7.x86_64", "7Server-RH7-RHOSE-3.11:openshift-kuryr-0:3.11.394-1.git.1490.16ed375.el7.src", "7Server-RH7-RHOSE-3.11:openshift-kuryr-cni-0:3.11.394-1.git.1490.16ed375.el7.noarch", "7Server-RH7-RHOSE-3.11:openshift-kuryr-common-0:3.11.394-1.git.1490.16ed375.el7.noarch", "7Server-RH7-RHOSE-3.11:openshift-kuryr-controller-0:3.11.394-1.git.1490.16ed375.el7.noarch", "7Server-RH7-RHOSE-3.11:prometheus-0:3.11.394-1.git.5026.2c9627f.el7.ppc64le", "7Server-RH7-RHOSE-3.11:prometheus-0:3.11.394-1.git.5026.2c9627f.el7.x86_64", "7Server-RH7-RHOSE-3.11:prometheus-alertmanager-0:3.11.394-1.git.0.1fbb64c.el7.ppc64le", "7Server-RH7-RHOSE-3.11:prometheus-alertmanager-0:3.11.394-1.git.0.1fbb64c.el7.x86_64", "7Server-RH7-RHOSE-3.11:prometheus-node-exporter-0:3.11.394-1.git.1062.8adc4b8.el7.ppc64le", "7Server-RH7-RHOSE-3.11:prometheus-node-exporter-0:3.11.394-1.git.1062.8adc4b8.el7.x86_64", "7Server-RH7-RHOSE-3.11:python-rsa-0:4.5-3.el7.src", "7Server-RH7-RHOSE-3.11:python2-kuryr-kubernetes-0:3.11.394-1.git.1490.16ed375.el7.noarch", "7Server-RH7-RHOSE-3.11:python2-rsa-0:4.5-3.el7.noarch" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1925141" } ], "notes": [ { "category": "description", "text": "Jenkins 2.274 and earlier, LTS 2.263.1 and earlier does not correctly match requested URLs to the list of always accessible paths, allowing attackers without Overall/Read permission to access some URLs as if they did have Overall/Read permission.", "title": "Vulnerability description" }, { "category": "summary", "text": "jenkins: Missing permission check for paths with specific prefix", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RH7-RHOSE-3.11:jenkins-0:2.263.3.1612433584-1.el7.noarch", "7Server-RH7-RHOSE-3.11:jenkins-0:2.263.3.1612433584-1.el7.src" ], "known_not_affected": [ "7Server-RH7-RHOSE-3.11:atomic-enterprise-service-catalog-1:3.11.394-1.git.1675.fdb6e0b.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-enterprise-service-catalog-1:3.11.394-1.git.1675.fdb6e0b.el7.src", "7Server-RH7-RHOSE-3.11:atomic-enterprise-service-catalog-1:3.11.394-1.git.1675.fdb6e0b.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-enterprise-service-catalog-svcat-1:3.11.394-1.git.1675.fdb6e0b.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-enterprise-service-catalog-svcat-1:3.11.394-1.git.1675.fdb6e0b.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-0:3.11.394-1.git.0.e03a88e.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-0:3.11.394-1.git.0.e03a88e.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-0:3.11.394-1.git.0.e03a88e.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-clients-0:3.11.394-1.git.0.e03a88e.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-clients-0:3.11.394-1.git.0.e03a88e.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-clients-redistributable-0:3.11.394-1.git.0.e03a88e.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-cluster-autoscaler-0:3.11.394-1.git.0.1900c76.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-cluster-autoscaler-0:3.11.394-1.git.0.1900c76.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-cluster-autoscaler-0:3.11.394-1.git.0.1900c76.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-descheduler-0:3.11.394-1.git.299.ad3a3c0.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-descheduler-0:3.11.394-1.git.299.ad3a3c0.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-descheduler-0:3.11.394-1.git.299.ad3a3c0.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-docker-excluder-0:3.11.394-1.git.0.e03a88e.el7.noarch", "7Server-RH7-RHOSE-3.11:atomic-openshift-dockerregistry-0:3.11.394-1.git.481.6e48246.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-dockerregistry-0:3.11.394-1.git.481.6e48246.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-excluder-0:3.11.394-1.git.0.e03a88e.el7.noarch", "7Server-RH7-RHOSE-3.11:atomic-openshift-hyperkube-0:3.11.394-1.git.0.e03a88e.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-hyperkube-0:3.11.394-1.git.0.e03a88e.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-hypershift-0:3.11.394-1.git.0.e03a88e.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-hypershift-0:3.11.394-1.git.0.e03a88e.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-master-0:3.11.394-1.git.0.e03a88e.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-master-0:3.11.394-1.git.0.e03a88e.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-metrics-server-0:3.11.394-1.git.53.3d82586.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-metrics-server-0:3.11.394-1.git.53.3d82586.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-metrics-server-0:3.11.394-1.git.53.3d82586.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-node-0:3.11.394-1.git.0.e03a88e.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-node-0:3.11.394-1.git.0.e03a88e.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-node-problem-detector-0:3.11.394-1.git.263.49acf3a.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-node-problem-detector-0:3.11.394-1.git.263.49acf3a.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-node-problem-detector-0:3.11.394-1.git.263.49acf3a.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-pod-0:3.11.394-1.git.0.e03a88e.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-pod-0:3.11.394-1.git.0.e03a88e.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-sdn-ovs-0:3.11.394-1.git.0.e03a88e.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-sdn-ovs-0:3.11.394-1.git.0.e03a88e.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-service-idler-0:3.11.394-1.git.15.73f73cd.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-service-idler-0:3.11.394-1.git.15.73f73cd.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-service-idler-0:3.11.394-1.git.15.73f73cd.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-template-service-broker-0:3.11.394-1.git.0.e03a88e.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-template-service-broker-0:3.11.394-1.git.0.e03a88e.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-tests-0:3.11.394-1.git.0.e03a88e.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-tests-0:3.11.394-1.git.0.e03a88e.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-web-console-0:3.11.394-1.git.667.08dd2a6.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-web-console-0:3.11.394-1.git.667.08dd2a6.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-web-console-0:3.11.394-1.git.667.08dd2a6.el7.x86_64", "7Server-RH7-RHOSE-3.11:golang-github-openshift-oauth-proxy-0:3.11.394-1.git.439.4c37707.el7.ppc64le", "7Server-RH7-RHOSE-3.11:golang-github-openshift-oauth-proxy-0:3.11.394-1.git.439.4c37707.el7.src", "7Server-RH7-RHOSE-3.11:golang-github-openshift-oauth-proxy-0:3.11.394-1.git.439.4c37707.el7.x86_64", "7Server-RH7-RHOSE-3.11:golang-github-prometheus-alertmanager-0:3.11.394-1.git.0.1fbb64c.el7.src", "7Server-RH7-RHOSE-3.11:golang-github-prometheus-node_exporter-0:3.11.394-1.git.1062.8adc4b8.el7.src", "7Server-RH7-RHOSE-3.11:golang-github-prometheus-prometheus-0:3.11.394-1.git.5026.2c9627f.el7.src", "7Server-RH7-RHOSE-3.11:haproxy-0:1.8.28-1.el7.src", "7Server-RH7-RHOSE-3.11:haproxy-debuginfo-0:1.8.28-1.el7.ppc64le", "7Server-RH7-RHOSE-3.11:haproxy-debuginfo-0:1.8.28-1.el7.x86_64", "7Server-RH7-RHOSE-3.11:haproxy18-0:1.8.28-1.el7.ppc64le", "7Server-RH7-RHOSE-3.11:haproxy18-0:1.8.28-1.el7.x86_64", "7Server-RH7-RHOSE-3.11:jenkins-2-plugins-0:3.11.1612862361-1.el7.noarch", "7Server-RH7-RHOSE-3.11:jenkins-2-plugins-0:3.11.1612862361-1.el7.src", "7Server-RH7-RHOSE-3.11:openshift-ansible-0:3.11.394-6.git.0.47ec25d.el7.noarch", "7Server-RH7-RHOSE-3.11:openshift-ansible-0:3.11.394-6.git.0.47ec25d.el7.src", "7Server-RH7-RHOSE-3.11:openshift-ansible-docs-0:3.11.394-6.git.0.47ec25d.el7.noarch", "7Server-RH7-RHOSE-3.11:openshift-ansible-playbooks-0:3.11.394-6.git.0.47ec25d.el7.noarch", "7Server-RH7-RHOSE-3.11:openshift-ansible-roles-0:3.11.394-6.git.0.47ec25d.el7.noarch", "7Server-RH7-RHOSE-3.11:openshift-ansible-test-0:3.11.394-6.git.0.47ec25d.el7.noarch", "7Server-RH7-RHOSE-3.11:openshift-enterprise-autoheal-0:3.11.394-1.git.218.59eb597.el7.ppc64le", "7Server-RH7-RHOSE-3.11:openshift-enterprise-autoheal-0:3.11.394-1.git.218.59eb597.el7.src", "7Server-RH7-RHOSE-3.11:openshift-enterprise-autoheal-0:3.11.394-1.git.218.59eb597.el7.x86_64", "7Server-RH7-RHOSE-3.11:openshift-enterprise-cluster-capacity-0:3.11.394-1.git.379.92adfdc.el7.ppc64le", "7Server-RH7-RHOSE-3.11:openshift-enterprise-cluster-capacity-0:3.11.394-1.git.379.92adfdc.el7.src", "7Server-RH7-RHOSE-3.11:openshift-enterprise-cluster-capacity-0:3.11.394-1.git.379.92adfdc.el7.x86_64", "7Server-RH7-RHOSE-3.11:openshift-kuryr-0:3.11.394-1.git.1490.16ed375.el7.src", "7Server-RH7-RHOSE-3.11:openshift-kuryr-cni-0:3.11.394-1.git.1490.16ed375.el7.noarch", "7Server-RH7-RHOSE-3.11:openshift-kuryr-common-0:3.11.394-1.git.1490.16ed375.el7.noarch", "7Server-RH7-RHOSE-3.11:openshift-kuryr-controller-0:3.11.394-1.git.1490.16ed375.el7.noarch", "7Server-RH7-RHOSE-3.11:prometheus-0:3.11.394-1.git.5026.2c9627f.el7.ppc64le", "7Server-RH7-RHOSE-3.11:prometheus-0:3.11.394-1.git.5026.2c9627f.el7.x86_64", "7Server-RH7-RHOSE-3.11:prometheus-alertmanager-0:3.11.394-1.git.0.1fbb64c.el7.ppc64le", "7Server-RH7-RHOSE-3.11:prometheus-alertmanager-0:3.11.394-1.git.0.1fbb64c.el7.x86_64", "7Server-RH7-RHOSE-3.11:prometheus-node-exporter-0:3.11.394-1.git.1062.8adc4b8.el7.ppc64le", "7Server-RH7-RHOSE-3.11:prometheus-node-exporter-0:3.11.394-1.git.1062.8adc4b8.el7.x86_64", "7Server-RH7-RHOSE-3.11:python-rsa-0:4.5-3.el7.src", "7Server-RH7-RHOSE-3.11:python2-kuryr-kubernetes-0:3.11.394-1.git.1490.16ed375.el7.noarch", "7Server-RH7-RHOSE-3.11:python2-rsa-0:4.5-3.el7.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-21609" }, { "category": "external", "summary": "RHBZ#1925141", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1925141" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-21609", "url": "https://www.cve.org/CVERecord?id=CVE-2021-21609" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-21609", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-21609" } ], "release_date": "2021-01-13T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-03-03T12:28:39+00:00", "details": "Before applying this update, ensure all previously released errata relevant\nto your system is applied.\n\nSee the following documentation, which will be updated shortly for release\n3.11.394, for important instructions on how to upgrade your cluster and fully\napply this asynchronous errata update:\n\nhttps://docs.openshift.com/container-platform/3.11/release_notes/ocp_3_11_release_notes.html\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/articles/11258.", "product_ids": [ "7Server-RH7-RHOSE-3.11:jenkins-0:2.263.3.1612433584-1.el7.noarch", "7Server-RH7-RHOSE-3.11:jenkins-0:2.263.3.1612433584-1.el7.src" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:0637" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "7Server-RH7-RHOSE-3.11:jenkins-0:2.263.3.1612433584-1.el7.noarch", "7Server-RH7-RHOSE-3.11:jenkins-0:2.263.3.1612433584-1.el7.src" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "jenkins: Missing permission check for paths with specific prefix" }, { "cve": "CVE-2021-21610", "cwe": { "id": "CWE-79", "name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)" }, "discovery_date": "2021-02-04T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "7Server-RH7-RHOSE-3.11:atomic-enterprise-service-catalog-1:3.11.394-1.git.1675.fdb6e0b.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-enterprise-service-catalog-1:3.11.394-1.git.1675.fdb6e0b.el7.src", "7Server-RH7-RHOSE-3.11:atomic-enterprise-service-catalog-1:3.11.394-1.git.1675.fdb6e0b.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-enterprise-service-catalog-svcat-1:3.11.394-1.git.1675.fdb6e0b.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-enterprise-service-catalog-svcat-1:3.11.394-1.git.1675.fdb6e0b.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-0:3.11.394-1.git.0.e03a88e.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-0:3.11.394-1.git.0.e03a88e.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-0:3.11.394-1.git.0.e03a88e.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-clients-0:3.11.394-1.git.0.e03a88e.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-clients-0:3.11.394-1.git.0.e03a88e.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-clients-redistributable-0:3.11.394-1.git.0.e03a88e.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-cluster-autoscaler-0:3.11.394-1.git.0.1900c76.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-cluster-autoscaler-0:3.11.394-1.git.0.1900c76.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-cluster-autoscaler-0:3.11.394-1.git.0.1900c76.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-descheduler-0:3.11.394-1.git.299.ad3a3c0.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-descheduler-0:3.11.394-1.git.299.ad3a3c0.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-descheduler-0:3.11.394-1.git.299.ad3a3c0.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-docker-excluder-0:3.11.394-1.git.0.e03a88e.el7.noarch", "7Server-RH7-RHOSE-3.11:atomic-openshift-dockerregistry-0:3.11.394-1.git.481.6e48246.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-dockerregistry-0:3.11.394-1.git.481.6e48246.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-excluder-0:3.11.394-1.git.0.e03a88e.el7.noarch", "7Server-RH7-RHOSE-3.11:atomic-openshift-hyperkube-0:3.11.394-1.git.0.e03a88e.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-hyperkube-0:3.11.394-1.git.0.e03a88e.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-hypershift-0:3.11.394-1.git.0.e03a88e.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-hypershift-0:3.11.394-1.git.0.e03a88e.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-master-0:3.11.394-1.git.0.e03a88e.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-master-0:3.11.394-1.git.0.e03a88e.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-metrics-server-0:3.11.394-1.git.53.3d82586.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-metrics-server-0:3.11.394-1.git.53.3d82586.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-metrics-server-0:3.11.394-1.git.53.3d82586.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-node-0:3.11.394-1.git.0.e03a88e.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-node-0:3.11.394-1.git.0.e03a88e.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-node-problem-detector-0:3.11.394-1.git.263.49acf3a.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-node-problem-detector-0:3.11.394-1.git.263.49acf3a.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-node-problem-detector-0:3.11.394-1.git.263.49acf3a.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-pod-0:3.11.394-1.git.0.e03a88e.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-pod-0:3.11.394-1.git.0.e03a88e.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-sdn-ovs-0:3.11.394-1.git.0.e03a88e.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-sdn-ovs-0:3.11.394-1.git.0.e03a88e.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-service-idler-0:3.11.394-1.git.15.73f73cd.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-service-idler-0:3.11.394-1.git.15.73f73cd.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-service-idler-0:3.11.394-1.git.15.73f73cd.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-template-service-broker-0:3.11.394-1.git.0.e03a88e.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-template-service-broker-0:3.11.394-1.git.0.e03a88e.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-tests-0:3.11.394-1.git.0.e03a88e.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-tests-0:3.11.394-1.git.0.e03a88e.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-web-console-0:3.11.394-1.git.667.08dd2a6.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-web-console-0:3.11.394-1.git.667.08dd2a6.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-web-console-0:3.11.394-1.git.667.08dd2a6.el7.x86_64", "7Server-RH7-RHOSE-3.11:golang-github-openshift-oauth-proxy-0:3.11.394-1.git.439.4c37707.el7.ppc64le", "7Server-RH7-RHOSE-3.11:golang-github-openshift-oauth-proxy-0:3.11.394-1.git.439.4c37707.el7.src", "7Server-RH7-RHOSE-3.11:golang-github-openshift-oauth-proxy-0:3.11.394-1.git.439.4c37707.el7.x86_64", "7Server-RH7-RHOSE-3.11:golang-github-prometheus-alertmanager-0:3.11.394-1.git.0.1fbb64c.el7.src", "7Server-RH7-RHOSE-3.11:golang-github-prometheus-node_exporter-0:3.11.394-1.git.1062.8adc4b8.el7.src", "7Server-RH7-RHOSE-3.11:golang-github-prometheus-prometheus-0:3.11.394-1.git.5026.2c9627f.el7.src", "7Server-RH7-RHOSE-3.11:haproxy-0:1.8.28-1.el7.src", "7Server-RH7-RHOSE-3.11:haproxy-debuginfo-0:1.8.28-1.el7.ppc64le", "7Server-RH7-RHOSE-3.11:haproxy-debuginfo-0:1.8.28-1.el7.x86_64", "7Server-RH7-RHOSE-3.11:haproxy18-0:1.8.28-1.el7.ppc64le", "7Server-RH7-RHOSE-3.11:haproxy18-0:1.8.28-1.el7.x86_64", "7Server-RH7-RHOSE-3.11:jenkins-2-plugins-0:3.11.1612862361-1.el7.noarch", "7Server-RH7-RHOSE-3.11:jenkins-2-plugins-0:3.11.1612862361-1.el7.src", "7Server-RH7-RHOSE-3.11:openshift-ansible-0:3.11.394-6.git.0.47ec25d.el7.noarch", "7Server-RH7-RHOSE-3.11:openshift-ansible-0:3.11.394-6.git.0.47ec25d.el7.src", "7Server-RH7-RHOSE-3.11:openshift-ansible-docs-0:3.11.394-6.git.0.47ec25d.el7.noarch", "7Server-RH7-RHOSE-3.11:openshift-ansible-playbooks-0:3.11.394-6.git.0.47ec25d.el7.noarch", "7Server-RH7-RHOSE-3.11:openshift-ansible-roles-0:3.11.394-6.git.0.47ec25d.el7.noarch", "7Server-RH7-RHOSE-3.11:openshift-ansible-test-0:3.11.394-6.git.0.47ec25d.el7.noarch", "7Server-RH7-RHOSE-3.11:openshift-enterprise-autoheal-0:3.11.394-1.git.218.59eb597.el7.ppc64le", "7Server-RH7-RHOSE-3.11:openshift-enterprise-autoheal-0:3.11.394-1.git.218.59eb597.el7.src", "7Server-RH7-RHOSE-3.11:openshift-enterprise-autoheal-0:3.11.394-1.git.218.59eb597.el7.x86_64", "7Server-RH7-RHOSE-3.11:openshift-enterprise-cluster-capacity-0:3.11.394-1.git.379.92adfdc.el7.ppc64le", "7Server-RH7-RHOSE-3.11:openshift-enterprise-cluster-capacity-0:3.11.394-1.git.379.92adfdc.el7.src", "7Server-RH7-RHOSE-3.11:openshift-enterprise-cluster-capacity-0:3.11.394-1.git.379.92adfdc.el7.x86_64", "7Server-RH7-RHOSE-3.11:openshift-kuryr-0:3.11.394-1.git.1490.16ed375.el7.src", "7Server-RH7-RHOSE-3.11:openshift-kuryr-cni-0:3.11.394-1.git.1490.16ed375.el7.noarch", "7Server-RH7-RHOSE-3.11:openshift-kuryr-common-0:3.11.394-1.git.1490.16ed375.el7.noarch", "7Server-RH7-RHOSE-3.11:openshift-kuryr-controller-0:3.11.394-1.git.1490.16ed375.el7.noarch", "7Server-RH7-RHOSE-3.11:prometheus-0:3.11.394-1.git.5026.2c9627f.el7.ppc64le", "7Server-RH7-RHOSE-3.11:prometheus-0:3.11.394-1.git.5026.2c9627f.el7.x86_64", "7Server-RH7-RHOSE-3.11:prometheus-alertmanager-0:3.11.394-1.git.0.1fbb64c.el7.ppc64le", "7Server-RH7-RHOSE-3.11:prometheus-alertmanager-0:3.11.394-1.git.0.1fbb64c.el7.x86_64", "7Server-RH7-RHOSE-3.11:prometheus-node-exporter-0:3.11.394-1.git.1062.8adc4b8.el7.ppc64le", "7Server-RH7-RHOSE-3.11:prometheus-node-exporter-0:3.11.394-1.git.1062.8adc4b8.el7.x86_64", "7Server-RH7-RHOSE-3.11:python-rsa-0:4.5-3.el7.src", "7Server-RH7-RHOSE-3.11:python2-kuryr-kubernetes-0:3.11.394-1.git.1490.16ed375.el7.noarch", "7Server-RH7-RHOSE-3.11:python2-rsa-0:4.5-3.el7.noarch" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1925151" } ], "notes": [ { "category": "description", "text": "A flaw was found in jenkins. A cross-site scripting (XSS) vulnerability is possible due to the lack of restrictions in URL rendering in the formatted previews of markup passed as a query parameter if the configured markup formatter does not prohibit unsafe elements in the markup. The highest threat from this vulnerability is to data confidentiality and integrity.", "title": "Vulnerability description" }, { "category": "summary", "text": "jenkins: Reflected XSS vulnerability in markup formatter preview", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RH7-RHOSE-3.11:jenkins-0:2.263.3.1612433584-1.el7.noarch", "7Server-RH7-RHOSE-3.11:jenkins-0:2.263.3.1612433584-1.el7.src" ], "known_not_affected": [ "7Server-RH7-RHOSE-3.11:atomic-enterprise-service-catalog-1:3.11.394-1.git.1675.fdb6e0b.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-enterprise-service-catalog-1:3.11.394-1.git.1675.fdb6e0b.el7.src", "7Server-RH7-RHOSE-3.11:atomic-enterprise-service-catalog-1:3.11.394-1.git.1675.fdb6e0b.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-enterprise-service-catalog-svcat-1:3.11.394-1.git.1675.fdb6e0b.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-enterprise-service-catalog-svcat-1:3.11.394-1.git.1675.fdb6e0b.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-0:3.11.394-1.git.0.e03a88e.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-0:3.11.394-1.git.0.e03a88e.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-0:3.11.394-1.git.0.e03a88e.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-clients-0:3.11.394-1.git.0.e03a88e.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-clients-0:3.11.394-1.git.0.e03a88e.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-clients-redistributable-0:3.11.394-1.git.0.e03a88e.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-cluster-autoscaler-0:3.11.394-1.git.0.1900c76.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-cluster-autoscaler-0:3.11.394-1.git.0.1900c76.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-cluster-autoscaler-0:3.11.394-1.git.0.1900c76.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-descheduler-0:3.11.394-1.git.299.ad3a3c0.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-descheduler-0:3.11.394-1.git.299.ad3a3c0.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-descheduler-0:3.11.394-1.git.299.ad3a3c0.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-docker-excluder-0:3.11.394-1.git.0.e03a88e.el7.noarch", "7Server-RH7-RHOSE-3.11:atomic-openshift-dockerregistry-0:3.11.394-1.git.481.6e48246.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-dockerregistry-0:3.11.394-1.git.481.6e48246.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-excluder-0:3.11.394-1.git.0.e03a88e.el7.noarch", "7Server-RH7-RHOSE-3.11:atomic-openshift-hyperkube-0:3.11.394-1.git.0.e03a88e.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-hyperkube-0:3.11.394-1.git.0.e03a88e.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-hypershift-0:3.11.394-1.git.0.e03a88e.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-hypershift-0:3.11.394-1.git.0.e03a88e.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-master-0:3.11.394-1.git.0.e03a88e.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-master-0:3.11.394-1.git.0.e03a88e.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-metrics-server-0:3.11.394-1.git.53.3d82586.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-metrics-server-0:3.11.394-1.git.53.3d82586.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-metrics-server-0:3.11.394-1.git.53.3d82586.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-node-0:3.11.394-1.git.0.e03a88e.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-node-0:3.11.394-1.git.0.e03a88e.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-node-problem-detector-0:3.11.394-1.git.263.49acf3a.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-node-problem-detector-0:3.11.394-1.git.263.49acf3a.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-node-problem-detector-0:3.11.394-1.git.263.49acf3a.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-pod-0:3.11.394-1.git.0.e03a88e.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-pod-0:3.11.394-1.git.0.e03a88e.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-sdn-ovs-0:3.11.394-1.git.0.e03a88e.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-sdn-ovs-0:3.11.394-1.git.0.e03a88e.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-service-idler-0:3.11.394-1.git.15.73f73cd.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-service-idler-0:3.11.394-1.git.15.73f73cd.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-service-idler-0:3.11.394-1.git.15.73f73cd.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-template-service-broker-0:3.11.394-1.git.0.e03a88e.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-template-service-broker-0:3.11.394-1.git.0.e03a88e.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-tests-0:3.11.394-1.git.0.e03a88e.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-tests-0:3.11.394-1.git.0.e03a88e.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-web-console-0:3.11.394-1.git.667.08dd2a6.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-web-console-0:3.11.394-1.git.667.08dd2a6.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-web-console-0:3.11.394-1.git.667.08dd2a6.el7.x86_64", "7Server-RH7-RHOSE-3.11:golang-github-openshift-oauth-proxy-0:3.11.394-1.git.439.4c37707.el7.ppc64le", "7Server-RH7-RHOSE-3.11:golang-github-openshift-oauth-proxy-0:3.11.394-1.git.439.4c37707.el7.src", "7Server-RH7-RHOSE-3.11:golang-github-openshift-oauth-proxy-0:3.11.394-1.git.439.4c37707.el7.x86_64", "7Server-RH7-RHOSE-3.11:golang-github-prometheus-alertmanager-0:3.11.394-1.git.0.1fbb64c.el7.src", "7Server-RH7-RHOSE-3.11:golang-github-prometheus-node_exporter-0:3.11.394-1.git.1062.8adc4b8.el7.src", "7Server-RH7-RHOSE-3.11:golang-github-prometheus-prometheus-0:3.11.394-1.git.5026.2c9627f.el7.src", "7Server-RH7-RHOSE-3.11:haproxy-0:1.8.28-1.el7.src", "7Server-RH7-RHOSE-3.11:haproxy-debuginfo-0:1.8.28-1.el7.ppc64le", "7Server-RH7-RHOSE-3.11:haproxy-debuginfo-0:1.8.28-1.el7.x86_64", "7Server-RH7-RHOSE-3.11:haproxy18-0:1.8.28-1.el7.ppc64le", "7Server-RH7-RHOSE-3.11:haproxy18-0:1.8.28-1.el7.x86_64", "7Server-RH7-RHOSE-3.11:jenkins-2-plugins-0:3.11.1612862361-1.el7.noarch", "7Server-RH7-RHOSE-3.11:jenkins-2-plugins-0:3.11.1612862361-1.el7.src", "7Server-RH7-RHOSE-3.11:openshift-ansible-0:3.11.394-6.git.0.47ec25d.el7.noarch", "7Server-RH7-RHOSE-3.11:openshift-ansible-0:3.11.394-6.git.0.47ec25d.el7.src", "7Server-RH7-RHOSE-3.11:openshift-ansible-docs-0:3.11.394-6.git.0.47ec25d.el7.noarch", "7Server-RH7-RHOSE-3.11:openshift-ansible-playbooks-0:3.11.394-6.git.0.47ec25d.el7.noarch", "7Server-RH7-RHOSE-3.11:openshift-ansible-roles-0:3.11.394-6.git.0.47ec25d.el7.noarch", "7Server-RH7-RHOSE-3.11:openshift-ansible-test-0:3.11.394-6.git.0.47ec25d.el7.noarch", "7Server-RH7-RHOSE-3.11:openshift-enterprise-autoheal-0:3.11.394-1.git.218.59eb597.el7.ppc64le", "7Server-RH7-RHOSE-3.11:openshift-enterprise-autoheal-0:3.11.394-1.git.218.59eb597.el7.src", "7Server-RH7-RHOSE-3.11:openshift-enterprise-autoheal-0:3.11.394-1.git.218.59eb597.el7.x86_64", "7Server-RH7-RHOSE-3.11:openshift-enterprise-cluster-capacity-0:3.11.394-1.git.379.92adfdc.el7.ppc64le", "7Server-RH7-RHOSE-3.11:openshift-enterprise-cluster-capacity-0:3.11.394-1.git.379.92adfdc.el7.src", "7Server-RH7-RHOSE-3.11:openshift-enterprise-cluster-capacity-0:3.11.394-1.git.379.92adfdc.el7.x86_64", "7Server-RH7-RHOSE-3.11:openshift-kuryr-0:3.11.394-1.git.1490.16ed375.el7.src", "7Server-RH7-RHOSE-3.11:openshift-kuryr-cni-0:3.11.394-1.git.1490.16ed375.el7.noarch", "7Server-RH7-RHOSE-3.11:openshift-kuryr-common-0:3.11.394-1.git.1490.16ed375.el7.noarch", "7Server-RH7-RHOSE-3.11:openshift-kuryr-controller-0:3.11.394-1.git.1490.16ed375.el7.noarch", "7Server-RH7-RHOSE-3.11:prometheus-0:3.11.394-1.git.5026.2c9627f.el7.ppc64le", "7Server-RH7-RHOSE-3.11:prometheus-0:3.11.394-1.git.5026.2c9627f.el7.x86_64", "7Server-RH7-RHOSE-3.11:prometheus-alertmanager-0:3.11.394-1.git.0.1fbb64c.el7.ppc64le", "7Server-RH7-RHOSE-3.11:prometheus-alertmanager-0:3.11.394-1.git.0.1fbb64c.el7.x86_64", "7Server-RH7-RHOSE-3.11:prometheus-node-exporter-0:3.11.394-1.git.1062.8adc4b8.el7.ppc64le", "7Server-RH7-RHOSE-3.11:prometheus-node-exporter-0:3.11.394-1.git.1062.8adc4b8.el7.x86_64", "7Server-RH7-RHOSE-3.11:python-rsa-0:4.5-3.el7.src", "7Server-RH7-RHOSE-3.11:python2-kuryr-kubernetes-0:3.11.394-1.git.1490.16ed375.el7.noarch", "7Server-RH7-RHOSE-3.11:python2-rsa-0:4.5-3.el7.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-21610" }, { "category": "external", "summary": "RHBZ#1925151", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1925151" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-21610", "url": "https://www.cve.org/CVERecord?id=CVE-2021-21610" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-21610", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-21610" } ], "release_date": "2021-01-13T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-03-03T12:28:39+00:00", "details": "Before applying this update, ensure all previously released errata relevant\nto your system is applied.\n\nSee the following documentation, which will be updated shortly for release\n3.11.394, for important instructions on how to upgrade your cluster and fully\napply this asynchronous errata update:\n\nhttps://docs.openshift.com/container-platform/3.11/release_notes/ocp_3_11_release_notes.html\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/articles/11258.", "product_ids": [ "7Server-RH7-RHOSE-3.11:jenkins-0:2.263.3.1612433584-1.el7.noarch", "7Server-RH7-RHOSE-3.11:jenkins-0:2.263.3.1612433584-1.el7.src" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:0637" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "products": [ "7Server-RH7-RHOSE-3.11:jenkins-0:2.263.3.1612433584-1.el7.noarch", "7Server-RH7-RHOSE-3.11:jenkins-0:2.263.3.1612433584-1.el7.src" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "jenkins: Reflected XSS vulnerability in markup formatter preview" }, { "cve": "CVE-2021-21611", "cwe": { "id": "CWE-79", "name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)" }, "discovery_date": "2021-02-04T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "7Server-RH7-RHOSE-3.11:atomic-enterprise-service-catalog-1:3.11.394-1.git.1675.fdb6e0b.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-enterprise-service-catalog-1:3.11.394-1.git.1675.fdb6e0b.el7.src", "7Server-RH7-RHOSE-3.11:atomic-enterprise-service-catalog-1:3.11.394-1.git.1675.fdb6e0b.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-enterprise-service-catalog-svcat-1:3.11.394-1.git.1675.fdb6e0b.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-enterprise-service-catalog-svcat-1:3.11.394-1.git.1675.fdb6e0b.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-0:3.11.394-1.git.0.e03a88e.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-0:3.11.394-1.git.0.e03a88e.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-0:3.11.394-1.git.0.e03a88e.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-clients-0:3.11.394-1.git.0.e03a88e.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-clients-0:3.11.394-1.git.0.e03a88e.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-clients-redistributable-0:3.11.394-1.git.0.e03a88e.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-cluster-autoscaler-0:3.11.394-1.git.0.1900c76.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-cluster-autoscaler-0:3.11.394-1.git.0.1900c76.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-cluster-autoscaler-0:3.11.394-1.git.0.1900c76.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-descheduler-0:3.11.394-1.git.299.ad3a3c0.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-descheduler-0:3.11.394-1.git.299.ad3a3c0.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-descheduler-0:3.11.394-1.git.299.ad3a3c0.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-docker-excluder-0:3.11.394-1.git.0.e03a88e.el7.noarch", "7Server-RH7-RHOSE-3.11:atomic-openshift-dockerregistry-0:3.11.394-1.git.481.6e48246.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-dockerregistry-0:3.11.394-1.git.481.6e48246.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-excluder-0:3.11.394-1.git.0.e03a88e.el7.noarch", "7Server-RH7-RHOSE-3.11:atomic-openshift-hyperkube-0:3.11.394-1.git.0.e03a88e.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-hyperkube-0:3.11.394-1.git.0.e03a88e.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-hypershift-0:3.11.394-1.git.0.e03a88e.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-hypershift-0:3.11.394-1.git.0.e03a88e.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-master-0:3.11.394-1.git.0.e03a88e.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-master-0:3.11.394-1.git.0.e03a88e.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-metrics-server-0:3.11.394-1.git.53.3d82586.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-metrics-server-0:3.11.394-1.git.53.3d82586.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-metrics-server-0:3.11.394-1.git.53.3d82586.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-node-0:3.11.394-1.git.0.e03a88e.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-node-0:3.11.394-1.git.0.e03a88e.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-node-problem-detector-0:3.11.394-1.git.263.49acf3a.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-node-problem-detector-0:3.11.394-1.git.263.49acf3a.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-node-problem-detector-0:3.11.394-1.git.263.49acf3a.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-pod-0:3.11.394-1.git.0.e03a88e.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-pod-0:3.11.394-1.git.0.e03a88e.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-sdn-ovs-0:3.11.394-1.git.0.e03a88e.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-sdn-ovs-0:3.11.394-1.git.0.e03a88e.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-service-idler-0:3.11.394-1.git.15.73f73cd.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-service-idler-0:3.11.394-1.git.15.73f73cd.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-service-idler-0:3.11.394-1.git.15.73f73cd.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-template-service-broker-0:3.11.394-1.git.0.e03a88e.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-template-service-broker-0:3.11.394-1.git.0.e03a88e.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-tests-0:3.11.394-1.git.0.e03a88e.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-tests-0:3.11.394-1.git.0.e03a88e.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-web-console-0:3.11.394-1.git.667.08dd2a6.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-web-console-0:3.11.394-1.git.667.08dd2a6.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-web-console-0:3.11.394-1.git.667.08dd2a6.el7.x86_64", "7Server-RH7-RHOSE-3.11:golang-github-openshift-oauth-proxy-0:3.11.394-1.git.439.4c37707.el7.ppc64le", "7Server-RH7-RHOSE-3.11:golang-github-openshift-oauth-proxy-0:3.11.394-1.git.439.4c37707.el7.src", "7Server-RH7-RHOSE-3.11:golang-github-openshift-oauth-proxy-0:3.11.394-1.git.439.4c37707.el7.x86_64", "7Server-RH7-RHOSE-3.11:golang-github-prometheus-alertmanager-0:3.11.394-1.git.0.1fbb64c.el7.src", "7Server-RH7-RHOSE-3.11:golang-github-prometheus-node_exporter-0:3.11.394-1.git.1062.8adc4b8.el7.src", "7Server-RH7-RHOSE-3.11:golang-github-prometheus-prometheus-0:3.11.394-1.git.5026.2c9627f.el7.src", "7Server-RH7-RHOSE-3.11:haproxy-0:1.8.28-1.el7.src", "7Server-RH7-RHOSE-3.11:haproxy-debuginfo-0:1.8.28-1.el7.ppc64le", "7Server-RH7-RHOSE-3.11:haproxy-debuginfo-0:1.8.28-1.el7.x86_64", "7Server-RH7-RHOSE-3.11:haproxy18-0:1.8.28-1.el7.ppc64le", "7Server-RH7-RHOSE-3.11:haproxy18-0:1.8.28-1.el7.x86_64", "7Server-RH7-RHOSE-3.11:jenkins-2-plugins-0:3.11.1612862361-1.el7.noarch", "7Server-RH7-RHOSE-3.11:jenkins-2-plugins-0:3.11.1612862361-1.el7.src", "7Server-RH7-RHOSE-3.11:openshift-ansible-0:3.11.394-6.git.0.47ec25d.el7.noarch", "7Server-RH7-RHOSE-3.11:openshift-ansible-0:3.11.394-6.git.0.47ec25d.el7.src", "7Server-RH7-RHOSE-3.11:openshift-ansible-docs-0:3.11.394-6.git.0.47ec25d.el7.noarch", "7Server-RH7-RHOSE-3.11:openshift-ansible-playbooks-0:3.11.394-6.git.0.47ec25d.el7.noarch", "7Server-RH7-RHOSE-3.11:openshift-ansible-roles-0:3.11.394-6.git.0.47ec25d.el7.noarch", "7Server-RH7-RHOSE-3.11:openshift-ansible-test-0:3.11.394-6.git.0.47ec25d.el7.noarch", "7Server-RH7-RHOSE-3.11:openshift-enterprise-autoheal-0:3.11.394-1.git.218.59eb597.el7.ppc64le", "7Server-RH7-RHOSE-3.11:openshift-enterprise-autoheal-0:3.11.394-1.git.218.59eb597.el7.src", "7Server-RH7-RHOSE-3.11:openshift-enterprise-autoheal-0:3.11.394-1.git.218.59eb597.el7.x86_64", "7Server-RH7-RHOSE-3.11:openshift-enterprise-cluster-capacity-0:3.11.394-1.git.379.92adfdc.el7.ppc64le", "7Server-RH7-RHOSE-3.11:openshift-enterprise-cluster-capacity-0:3.11.394-1.git.379.92adfdc.el7.src", "7Server-RH7-RHOSE-3.11:openshift-enterprise-cluster-capacity-0:3.11.394-1.git.379.92adfdc.el7.x86_64", "7Server-RH7-RHOSE-3.11:openshift-kuryr-0:3.11.394-1.git.1490.16ed375.el7.src", "7Server-RH7-RHOSE-3.11:openshift-kuryr-cni-0:3.11.394-1.git.1490.16ed375.el7.noarch", "7Server-RH7-RHOSE-3.11:openshift-kuryr-common-0:3.11.394-1.git.1490.16ed375.el7.noarch", "7Server-RH7-RHOSE-3.11:openshift-kuryr-controller-0:3.11.394-1.git.1490.16ed375.el7.noarch", "7Server-RH7-RHOSE-3.11:prometheus-0:3.11.394-1.git.5026.2c9627f.el7.ppc64le", "7Server-RH7-RHOSE-3.11:prometheus-0:3.11.394-1.git.5026.2c9627f.el7.x86_64", "7Server-RH7-RHOSE-3.11:prometheus-alertmanager-0:3.11.394-1.git.0.1fbb64c.el7.ppc64le", "7Server-RH7-RHOSE-3.11:prometheus-alertmanager-0:3.11.394-1.git.0.1fbb64c.el7.x86_64", "7Server-RH7-RHOSE-3.11:prometheus-node-exporter-0:3.11.394-1.git.1062.8adc4b8.el7.ppc64le", "7Server-RH7-RHOSE-3.11:prometheus-node-exporter-0:3.11.394-1.git.1062.8adc4b8.el7.x86_64", "7Server-RH7-RHOSE-3.11:python-rsa-0:4.5-3.el7.src", "7Server-RH7-RHOSE-3.11:python2-kuryr-kubernetes-0:3.11.394-1.git.1490.16ed375.el7.noarch", "7Server-RH7-RHOSE-3.11:python2-rsa-0:4.5-3.el7.noarch" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1925145" } ], "notes": [ { "category": "description", "text": "A flaw was found in jenkins. A cross-site scripting (XSS) vulnerability is possible due to display names and IDs of item types shown on the New Item page not being properly escaped. The highest threat from this vulnerability is to data confidentiality and integrity.", "title": "Vulnerability description" }, { "category": "summary", "text": "jenkins: Stored XSS vulnerability on new item page", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RH7-RHOSE-3.11:jenkins-0:2.263.3.1612433584-1.el7.noarch", "7Server-RH7-RHOSE-3.11:jenkins-0:2.263.3.1612433584-1.el7.src" ], "known_not_affected": [ "7Server-RH7-RHOSE-3.11:atomic-enterprise-service-catalog-1:3.11.394-1.git.1675.fdb6e0b.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-enterprise-service-catalog-1:3.11.394-1.git.1675.fdb6e0b.el7.src", "7Server-RH7-RHOSE-3.11:atomic-enterprise-service-catalog-1:3.11.394-1.git.1675.fdb6e0b.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-enterprise-service-catalog-svcat-1:3.11.394-1.git.1675.fdb6e0b.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-enterprise-service-catalog-svcat-1:3.11.394-1.git.1675.fdb6e0b.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-0:3.11.394-1.git.0.e03a88e.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-0:3.11.394-1.git.0.e03a88e.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-0:3.11.394-1.git.0.e03a88e.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-clients-0:3.11.394-1.git.0.e03a88e.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-clients-0:3.11.394-1.git.0.e03a88e.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-clients-redistributable-0:3.11.394-1.git.0.e03a88e.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-cluster-autoscaler-0:3.11.394-1.git.0.1900c76.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-cluster-autoscaler-0:3.11.394-1.git.0.1900c76.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-cluster-autoscaler-0:3.11.394-1.git.0.1900c76.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-descheduler-0:3.11.394-1.git.299.ad3a3c0.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-descheduler-0:3.11.394-1.git.299.ad3a3c0.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-descheduler-0:3.11.394-1.git.299.ad3a3c0.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-docker-excluder-0:3.11.394-1.git.0.e03a88e.el7.noarch", "7Server-RH7-RHOSE-3.11:atomic-openshift-dockerregistry-0:3.11.394-1.git.481.6e48246.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-dockerregistry-0:3.11.394-1.git.481.6e48246.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-excluder-0:3.11.394-1.git.0.e03a88e.el7.noarch", "7Server-RH7-RHOSE-3.11:atomic-openshift-hyperkube-0:3.11.394-1.git.0.e03a88e.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-hyperkube-0:3.11.394-1.git.0.e03a88e.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-hypershift-0:3.11.394-1.git.0.e03a88e.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-hypershift-0:3.11.394-1.git.0.e03a88e.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-master-0:3.11.394-1.git.0.e03a88e.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-master-0:3.11.394-1.git.0.e03a88e.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-metrics-server-0:3.11.394-1.git.53.3d82586.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-metrics-server-0:3.11.394-1.git.53.3d82586.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-metrics-server-0:3.11.394-1.git.53.3d82586.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-node-0:3.11.394-1.git.0.e03a88e.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-node-0:3.11.394-1.git.0.e03a88e.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-node-problem-detector-0:3.11.394-1.git.263.49acf3a.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-node-problem-detector-0:3.11.394-1.git.263.49acf3a.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-node-problem-detector-0:3.11.394-1.git.263.49acf3a.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-pod-0:3.11.394-1.git.0.e03a88e.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-pod-0:3.11.394-1.git.0.e03a88e.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-sdn-ovs-0:3.11.394-1.git.0.e03a88e.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-sdn-ovs-0:3.11.394-1.git.0.e03a88e.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-service-idler-0:3.11.394-1.git.15.73f73cd.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-service-idler-0:3.11.394-1.git.15.73f73cd.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-service-idler-0:3.11.394-1.git.15.73f73cd.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-template-service-broker-0:3.11.394-1.git.0.e03a88e.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-template-service-broker-0:3.11.394-1.git.0.e03a88e.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-tests-0:3.11.394-1.git.0.e03a88e.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-tests-0:3.11.394-1.git.0.e03a88e.el7.x86_64", "7Server-RH7-RHOSE-3.11:atomic-openshift-web-console-0:3.11.394-1.git.667.08dd2a6.el7.ppc64le", "7Server-RH7-RHOSE-3.11:atomic-openshift-web-console-0:3.11.394-1.git.667.08dd2a6.el7.src", "7Server-RH7-RHOSE-3.11:atomic-openshift-web-console-0:3.11.394-1.git.667.08dd2a6.el7.x86_64", "7Server-RH7-RHOSE-3.11:golang-github-openshift-oauth-proxy-0:3.11.394-1.git.439.4c37707.el7.ppc64le", "7Server-RH7-RHOSE-3.11:golang-github-openshift-oauth-proxy-0:3.11.394-1.git.439.4c37707.el7.src", "7Server-RH7-RHOSE-3.11:golang-github-openshift-oauth-proxy-0:3.11.394-1.git.439.4c37707.el7.x86_64", "7Server-RH7-RHOSE-3.11:golang-github-prometheus-alertmanager-0:3.11.394-1.git.0.1fbb64c.el7.src", "7Server-RH7-RHOSE-3.11:golang-github-prometheus-node_exporter-0:3.11.394-1.git.1062.8adc4b8.el7.src", "7Server-RH7-RHOSE-3.11:golang-github-prometheus-prometheus-0:3.11.394-1.git.5026.2c9627f.el7.src", "7Server-RH7-RHOSE-3.11:haproxy-0:1.8.28-1.el7.src", "7Server-RH7-RHOSE-3.11:haproxy-debuginfo-0:1.8.28-1.el7.ppc64le", "7Server-RH7-RHOSE-3.11:haproxy-debuginfo-0:1.8.28-1.el7.x86_64", "7Server-RH7-RHOSE-3.11:haproxy18-0:1.8.28-1.el7.ppc64le", "7Server-RH7-RHOSE-3.11:haproxy18-0:1.8.28-1.el7.x86_64", "7Server-RH7-RHOSE-3.11:jenkins-2-plugins-0:3.11.1612862361-1.el7.noarch", "7Server-RH7-RHOSE-3.11:jenkins-2-plugins-0:3.11.1612862361-1.el7.src", "7Server-RH7-RHOSE-3.11:openshift-ansible-0:3.11.394-6.git.0.47ec25d.el7.noarch", "7Server-RH7-RHOSE-3.11:openshift-ansible-0:3.11.394-6.git.0.47ec25d.el7.src", "7Server-RH7-RHOSE-3.11:openshift-ansible-docs-0:3.11.394-6.git.0.47ec25d.el7.noarch", "7Server-RH7-RHOSE-3.11:openshift-ansible-playbooks-0:3.11.394-6.git.0.47ec25d.el7.noarch", "7Server-RH7-RHOSE-3.11:openshift-ansible-roles-0:3.11.394-6.git.0.47ec25d.el7.noarch", "7Server-RH7-RHOSE-3.11:openshift-ansible-test-0:3.11.394-6.git.0.47ec25d.el7.noarch", "7Server-RH7-RHOSE-3.11:openshift-enterprise-autoheal-0:3.11.394-1.git.218.59eb597.el7.ppc64le", "7Server-RH7-RHOSE-3.11:openshift-enterprise-autoheal-0:3.11.394-1.git.218.59eb597.el7.src", "7Server-RH7-RHOSE-3.11:openshift-enterprise-autoheal-0:3.11.394-1.git.218.59eb597.el7.x86_64", "7Server-RH7-RHOSE-3.11:openshift-enterprise-cluster-capacity-0:3.11.394-1.git.379.92adfdc.el7.ppc64le", "7Server-RH7-RHOSE-3.11:openshift-enterprise-cluster-capacity-0:3.11.394-1.git.379.92adfdc.el7.src", "7Server-RH7-RHOSE-3.11:openshift-enterprise-cluster-capacity-0:3.11.394-1.git.379.92adfdc.el7.x86_64", "7Server-RH7-RHOSE-3.11:openshift-kuryr-0:3.11.394-1.git.1490.16ed375.el7.src", "7Server-RH7-RHOSE-3.11:openshift-kuryr-cni-0:3.11.394-1.git.1490.16ed375.el7.noarch", "7Server-RH7-RHOSE-3.11:openshift-kuryr-common-0:3.11.394-1.git.1490.16ed375.el7.noarch", "7Server-RH7-RHOSE-3.11:openshift-kuryr-controller-0:3.11.394-1.git.1490.16ed375.el7.noarch", "7Server-RH7-RHOSE-3.11:prometheus-0:3.11.394-1.git.5026.2c9627f.el7.ppc64le", "7Server-RH7-RHOSE-3.11:prometheus-0:3.11.394-1.git.5026.2c9627f.el7.x86_64", "7Server-RH7-RHOSE-3.11:prometheus-alertmanager-0:3.11.394-1.git.0.1fbb64c.el7.ppc64le", "7Server-RH7-RHOSE-3.11:prometheus-alertmanager-0:3.11.394-1.git.0.1fbb64c.el7.x86_64", "7Server-RH7-RHOSE-3.11:prometheus-node-exporter-0:3.11.394-1.git.1062.8adc4b8.el7.ppc64le", "7Server-RH7-RHOSE-3.11:prometheus-node-exporter-0:3.11.394-1.git.1062.8adc4b8.el7.x86_64", "7Server-RH7-RHOSE-3.11:python-rsa-0:4.5-3.el7.src", "7Server-RH7-RHOSE-3.11:python2-kuryr-kubernetes-0:3.11.394-1.git.1490.16ed375.el7.noarch", "7Server-RH7-RHOSE-3.11:python2-rsa-0:4.5-3.el7.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-21611" }, { "category": "external", "summary": "RHBZ#1925145", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1925145" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-21611", "url": "https://www.cve.org/CVERecord?id=CVE-2021-21611" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-21611", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-21611" } ], "release_date": "2021-01-13T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-03-03T12:28:39+00:00", "details": "Before applying this update, ensure all previously released errata relevant\nto your system is applied.\n\nSee the following documentation, which will be updated shortly for release\n3.11.394, for important instructions on how to upgrade your cluster and fully\napply this asynchronous errata update:\n\nhttps://docs.openshift.com/container-platform/3.11/release_notes/ocp_3_11_release_notes.html\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/articles/11258.", "product_ids": [ "7Server-RH7-RHOSE-3.11:jenkins-0:2.263.3.1612433584-1.el7.noarch", "7Server-RH7-RHOSE-3.11:jenkins-0:2.263.3.1612433584-1.el7.src" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:0637" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "products": [ "7Server-RH7-RHOSE-3.11:jenkins-0:2.263.3.1612433584-1.el7.noarch", "7Server-RH7-RHOSE-3.11:jenkins-0:2.263.3.1612433584-1.el7.src" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "jenkins: Stored XSS vulnerability on new item page" } ] }
wid-sec-w-2022-0456
Vulnerability from csaf_certbund
Published
2022-06-23 22:00
Modified
2022-12-07 23:00
Summary
tribe29 checkmk: Mehrere Schwachstellen ermöglichen nicht spezifizierten Angriff
Notes
Das BSI ist als Anbieter für die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch dafür verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgfältig im Einzelfall zu prüfen.
Produktbeschreibung
Checkmk ist eine IT-Monitoring-Software.
Angriff
Ein Angreifer kann mehrere Schwachstellen in tribe29 checkmk ausnutzen, um einen nicht näher spezifizierten Angriff durchzuführen.
Betroffene Betriebssysteme
- UNIX
- Linux
{ "document": { "aggregate_severity": { "text": "hoch" }, "category": "csaf_base", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "de-DE", "notes": [ { "category": "legal_disclaimer", "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen." }, { "category": "description", "text": "Checkmk ist eine IT-Monitoring-Software.", "title": "Produktbeschreibung" }, { "category": "summary", "text": "Ein Angreifer kann mehrere Schwachstellen in tribe29 checkmk ausnutzen, um einen nicht n\u00e4her spezifizierten Angriff durchzuf\u00fchren.", "title": "Angriff" }, { "category": "general", "text": "- UNIX\n- Linux", "title": "Betroffene Betriebssysteme" } ], "publisher": { "category": "other", "contact_details": "csaf-provider@cert-bund.de", "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik", "namespace": "https://www.bsi.bund.de" }, "references": [ { "category": "self", "summary": "WID-SEC-W-2022-0456 - CSAF Version", "url": "https://wid.cert-bund.de/.well-known/csaf/white/2022/wid-sec-w-2022-0456.json" }, { "category": "self", "summary": "WID-SEC-2022-0456 - Portal Version", "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2022-0456" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2022:8861 vom 2022-12-08", "url": "https://access.redhat.com/errata/RHSA-2022:8861" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2022:8852 vom 2022-12-08", "url": "https://access.redhat.com/errata/RHSA-2022:8852" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2022:3932-1 vom 2022-11-10", "url": "https://lists.suse.com/pipermail/sle-security-updates/2022-November/012870.html" }, { "category": "external", "summary": "CheckMK Werk #13904: Update vulnerable Python dependencies vom 2022-06-23", "url": "https://checkmk.com/de/werk/13904" }, { "category": "external", "summary": "Ubuntu Security Notice USN-5526-1 vom 2022-07-20", "url": "https://ubuntu.com/security/notices/USN-5526-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-5526-2 vom 2022-08-17", "url": "https://ubuntu.com/security/notices/USN-5526-2" } ], "source_lang": "en-US", "title": "tribe29 checkmk: Mehrere Schwachstellen erm\u00f6glichen nicht spezifizierten Angriff", "tracking": { "current_release_date": "2022-12-07T23:00:00.000+00:00", "generator": { "date": "2024-02-15T16:50:00.353+00:00", "engine": { "name": "BSI-WID", "version": "1.3.0" } }, "id": "WID-SEC-W-2022-0456", "initial_release_date": "2022-06-23T22:00:00.000+00:00", "revision_history": [ { "date": "2022-06-23T22:00:00.000+00:00", "number": "1", "summary": "Initiale Fassung" }, { "date": "2022-07-05T22:00:00.000+00:00", "number": "2", "summary": "CHECKMK Referenz aufgenommen" }, { "date": "2022-07-19T22:00:00.000+00:00", "number": "3", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2022-08-16T22:00:00.000+00:00", "number": "4", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2022-11-10T23:00:00.000+00:00", "number": "5", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2022-12-07T23:00:00.000+00:00", "number": "6", "summary": "Neue Updates von Red Hat aufgenommen" } ], "status": "final", "version": "6" } }, "product_tree": { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux", "product": { "name": "Red Hat Enterprise Linux", "product_id": "67646", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:-" } } } ], "category": "vendor", "name": "Red Hat" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux", "product": { "name": "SUSE Linux", "product_id": "T002207", "product_identification_helper": { "cpe": "cpe:/o:suse:suse_linux:-" } } } ], "category": "vendor", "name": "SUSE" }, { "branches": [ { "category": "product_name", "name": "Ubuntu Linux", "product": { "name": "Ubuntu Linux", "product_id": "T000126", "product_identification_helper": { "cpe": "cpe:/o:canonical:ubuntu_linux:-" } } } ], "category": "vendor", "name": "Ubuntu" }, { "branches": [ { "branches": [ { "category": "product_name", "name": "tribe29 checkmk \u003c 2.0.0p27", "product": { "name": "tribe29 checkmk \u003c 2.0.0p27", "product_id": "T023613", "product_identification_helper": { "cpe": "cpe:/a:tribe29:checkmk:2.0.0p27" } } }, { "category": "product_name", "name": "tribe29 checkmk \u003c 2.2.0i1", "product": { "name": "tribe29 checkmk \u003c 2.2.0i1", "product_id": "T023614", "product_identification_helper": { "cpe": "cpe:/a:tribe29:checkmk:2.2.0i1" } } }, { "category": "product_name", "name": "tribe29 checkmk \u003c 2.1.0p4", "product": { "name": "tribe29 checkmk \u003c 2.1.0p4", "product_id": "T023615", "product_identification_helper": { "cpe": "cpe:/a:tribe29:checkmk:2.1.0p4" } } } ], "category": "product_name", "name": "checkmk" } ], "category": "vendor", "name": "tribe29" } ] }, "vulnerabilities": [ { "cve": "CVE-2020-25658", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in tribe29 checkmk, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T002207", "67646", "T000126" ] }, "release_date": "2022-06-23T22:00:00Z", "title": "CVE-2020-25658" }, { "cve": "CVE-2021-34141", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in tribe29 checkmk, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T002207", "67646", "T000126" ] }, "release_date": "2022-06-23T22:00:00Z", "title": "CVE-2021-34141" }, { "cve": "CVE-2021-41495", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in tribe29 checkmk, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T002207", "67646", "T000126" ] }, "release_date": "2022-06-23T22:00:00Z", "title": "CVE-2021-41495" }, { "cve": "CVE-2021-41496", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in tribe29 checkmk, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T002207", "67646", "T000126" ] }, "release_date": "2022-06-23T22:00:00Z", "title": "CVE-2021-41496" }, { "cve": "CVE-2022-29217", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in tribe29 checkmk, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T002207", "67646", "T000126" ] }, "release_date": "2022-06-23T22:00:00Z", "title": "CVE-2022-29217" }, { "cve": "CVE-2022-29361", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in tribe29 checkmk, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T002207", "67646", "T000126" ] }, "release_date": "2022-06-23T22:00:00Z", "title": "CVE-2022-29361" }, { "cve": "CVE-2022-30595", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in tribe29 checkmk, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T002207", "67646", "T000126" ] }, "release_date": "2022-06-23T22:00:00Z", "title": "CVE-2022-30595" } ] }
wid-sec-w-2024-0794
Vulnerability from csaf_certbund
Published
2024-04-04 22:00
Modified
2024-04-04 22:00
Summary
Dell ECS: Mehrere Schwachstellen
Notes
Das BSI ist als Anbieter für die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch dafür verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgfältig im Einzelfall zu prüfen.
Produktbeschreibung
Dell ECS ist ein Objektspeichersystem.
Angriff
Ein Angreifer kann mehrere Schwachstellen in Dell ECS ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.
Betroffene Betriebssysteme
- Linux
- UNIX
- Windows
{ "document": { "aggregate_severity": { "text": "hoch" }, "category": "csaf_base", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "de-DE", "notes": [ { "category": "legal_disclaimer", "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen." }, { "category": "description", "text": "Dell ECS ist ein Objektspeichersystem.", "title": "Produktbeschreibung" }, { "category": "summary", "text": "Ein Angreifer kann mehrere Schwachstellen in Dell ECS ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren.", "title": "Angriff" }, { "category": "general", "text": "- Linux\n- UNIX\n- Windows", "title": "Betroffene Betriebssysteme" } ], "publisher": { "category": "other", "contact_details": "csaf-provider@cert-bund.de", "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik", "namespace": "https://www.bsi.bund.de" }, "references": [ { "category": "self", "summary": "WID-SEC-W-2024-0794 - CSAF Version", "url": "https://wid.cert-bund.de/.well-known/csaf/white/2024/wid-sec-w-2024-0794.json" }, { "category": "self", "summary": "WID-SEC-2024-0794 - Portal Version", "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2024-0794" }, { "category": "external", "summary": "Dell Security Advisory DSA-2024-141 vom 2024-04-04", "url": "https://www.dell.com/support/kbdoc/000223839/dsa-2024-=" } ], "source_lang": "en-US", "title": "Dell ECS: Mehrere Schwachstellen", "tracking": { "current_release_date": "2024-04-04T22:00:00.000+00:00", "generator": { "date": "2024-04-05T09:37:24.604+00:00", "engine": { "name": "BSI-WID", "version": "1.3.0" } }, "id": "WID-SEC-W-2024-0794", "initial_release_date": "2024-04-04T22:00:00.000+00:00", "revision_history": [ { "date": "2024-04-04T22:00:00.000+00:00", "number": "1", "summary": "Initiale Fassung" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version_range", "name": "\u003c 3.8.1.0", "product": { "name": "Dell ECS \u003c 3.8.1.0", "product_id": "T033919", "product_identification_helper": { "cpe": "cpe:/h:dell:ecs:3.8.1.0" } } } ], "category": "product_name", "name": "ECS" } ], "category": "vendor", "name": "Dell" } ] }, "vulnerabilities": [ { "cve": "CVE-2018-18074", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2018-18074" }, { "cve": "CVE-2020-10663", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-10663" }, { "cve": "CVE-2020-10672", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-10672" }, { "cve": "CVE-2020-10673", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-10673" }, { "cve": "CVE-2020-10735", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-10735" }, { "cve": "CVE-2020-10968", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-10968" }, { "cve": "CVE-2020-10969", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-10969" }, { "cve": "CVE-2020-11111", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-11111" }, { "cve": "CVE-2020-11112", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-11112" }, { "cve": "CVE-2020-11113", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-11113" }, { "cve": "CVE-2020-11612", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-11612" }, { "cve": "CVE-2020-11619", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-11619" }, { "cve": "CVE-2020-11620", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-11620" }, { "cve": "CVE-2020-11979", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-11979" }, { "cve": "CVE-2020-12762", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-12762" }, { "cve": "CVE-2020-12825", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-12825" }, { "cve": "CVE-2020-13956", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-13956" }, { "cve": "CVE-2020-14060", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-14060" }, { "cve": "CVE-2020-14061", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-14061" }, { "cve": "CVE-2020-14062", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-14062" }, { "cve": "CVE-2020-14195", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-14195" }, { "cve": "CVE-2020-15250", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-15250" }, { "cve": "CVE-2020-1945", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-1945" }, { "cve": "CVE-2020-1967", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-1967" }, { "cve": "CVE-2020-1971", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-1971" }, { "cve": "CVE-2020-24616", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-24616" }, { "cve": "CVE-2020-24750", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-24750" }, { "cve": "CVE-2020-25649", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-25649" }, { "cve": "CVE-2020-25658", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-25658" }, { "cve": "CVE-2020-26116", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-26116" }, { "cve": "CVE-2020-26137", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-26137" }, { "cve": "CVE-2020-26541", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-26541" }, { "cve": "CVE-2020-27216", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-27216" }, { "cve": "CVE-2020-27218", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-27218" }, { "cve": "CVE-2020-27223", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-27223" }, { "cve": "CVE-2020-28366", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-28366" }, { "cve": "CVE-2020-28493", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-28493" }, { "cve": "CVE-2020-29509", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-29509" }, { "cve": "CVE-2020-29511", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-29511" }, { "cve": "CVE-2020-29582", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-29582" }, { "cve": "CVE-2020-29651", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-29651" }, { "cve": "CVE-2020-35490", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-35490" }, { "cve": "CVE-2020-35491", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-35491" }, { "cve": "CVE-2020-35728", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-35728" }, { "cve": "CVE-2020-36179", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-36179" }, { "cve": "CVE-2020-36180", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-36180" }, { "cve": "CVE-2020-36181", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-36181" }, { "cve": "CVE-2020-36182", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-36182" }, { "cve": "CVE-2020-36183", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-36183" }, { "cve": "CVE-2020-36184", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-36184" }, { "cve": "CVE-2020-36185", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-36185" }, { "cve": "CVE-2020-36186", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-36186" }, { "cve": "CVE-2020-36187", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-36187" }, { "cve": "CVE-2020-36188", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-36188" }, { "cve": "CVE-2020-36189", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-36189" }, { "cve": "CVE-2020-36516", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-36516" }, { "cve": "CVE-2020-36518", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-36518" }, { "cve": "CVE-2020-36557", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-36557" }, { "cve": "CVE-2020-36558", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-36558" }, { "cve": "CVE-2020-36691", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-36691" }, { "cve": "CVE-2020-7238", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-7238" }, { "cve": "CVE-2020-8840", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-8840" }, { "cve": "CVE-2020-8908", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-8908" }, { "cve": "CVE-2020-8911", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-8911" }, { "cve": "CVE-2020-8912", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-8912" }, { "cve": "CVE-2020-9488", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-9488" }, { "cve": "CVE-2020-9493", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-9493" }, { "cve": "CVE-2020-9546", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-9546" }, { "cve": "CVE-2020-9547", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-9547" }, { "cve": "CVE-2020-9548", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-9548" }, { "cve": "CVE-2021-20190", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-20190" }, { "cve": "CVE-2021-20323", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-20323" }, { "cve": "CVE-2021-21290", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-21290" }, { "cve": "CVE-2021-21295", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-21295" }, { "cve": "CVE-2021-21409", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-21409" }, { "cve": "CVE-2021-23840", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-23840" }, { "cve": "CVE-2021-23841", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-23841" }, { "cve": "CVE-2021-2471", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-2471" }, { "cve": "CVE-2021-25642", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-25642" }, { "cve": "CVE-2021-26341", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-26341" }, { "cve": "CVE-2021-27918", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-27918" }, { "cve": "CVE-2021-28153", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-28153" }, { "cve": "CVE-2021-28165", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-28165" }, { "cve": "CVE-2021-28169", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-28169" }, { "cve": "CVE-2021-28861", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-28861" }, { "cve": "CVE-2021-29425", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-29425" }, { "cve": "CVE-2021-30560", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-30560" }, { "cve": "CVE-2021-3114", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-3114" }, { "cve": "CVE-2021-33036", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-33036" }, { "cve": "CVE-2021-33194", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-33194" }, { "cve": "CVE-2021-33195", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-33195" }, { "cve": "CVE-2021-33196", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-33196" }, { "cve": "CVE-2021-33197", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-33197" }, { "cve": "CVE-2021-33503", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-33503" }, { "cve": "CVE-2021-33655", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-33655" }, { "cve": "CVE-2021-33656", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-33656" }, { "cve": "CVE-2021-3424", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-3424" }, { "cve": "CVE-2021-34428", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-34428" }, { "cve": "CVE-2021-3449", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-3449" }, { "cve": "CVE-2021-3450", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-3450" }, { "cve": "CVE-2021-3530", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-3530" }, { "cve": "CVE-2021-36221", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-36221" }, { "cve": "CVE-2021-36373", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-36373" }, { "cve": "CVE-2021-36374", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-36374" }, { "cve": "CVE-2021-3648", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-3648" }, { "cve": "CVE-2021-36690", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-36690" }, { "cve": "CVE-2021-3711", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-3711" }, { "cve": "CVE-2021-3712", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-3712" }, { "cve": "CVE-2021-37136", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-37136" }, { "cve": "CVE-2021-37137", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-37137" }, { "cve": "CVE-2021-37404", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-37404" }, { "cve": "CVE-2021-37533", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-37533" }, { "cve": "CVE-2021-3754", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-3754" }, { "cve": "CVE-2021-3778", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-3778" }, { "cve": "CVE-2021-3796", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-3796" }, { "cve": "CVE-2021-3826", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-3826" }, { "cve": "CVE-2021-3827", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-3827" }, { "cve": "CVE-2021-38297", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-38297" }, { "cve": "CVE-2021-3872", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-3872" }, { "cve": "CVE-2021-3875", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-3875" }, { "cve": "CVE-2021-3903", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-3903" }, { "cve": "CVE-2021-3923", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-3923" }, { "cve": "CVE-2021-3927", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-3927" }, { "cve": "CVE-2021-3928", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-3928" }, { "cve": "CVE-2021-3968", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-3968" }, { "cve": "CVE-2021-3973", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-3973" }, { "cve": "CVE-2021-3974", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-3974" }, { "cve": "CVE-2021-3984", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-3984" }, { "cve": "CVE-2021-4019", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-4019" }, { "cve": "CVE-2021-4037", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-4037" }, { "cve": "CVE-2021-4069", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-4069" }, { "cve": "CVE-2021-4104", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-4104" }, { "cve": "CVE-2021-4136", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-4136" }, { "cve": "CVE-2021-4157", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-4157" }, { "cve": "CVE-2021-4166", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-4166" }, { "cve": "CVE-2021-41771", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-41771" }, { "cve": "CVE-2021-4192", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-4192" }, { "cve": "CVE-2021-4193", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-4193" }, { "cve": "CVE-2021-4203", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-4203" }, { "cve": "CVE-2021-42567", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-42567" }, { "cve": "CVE-2021-43797", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-43797" }, { "cve": "CVE-2021-44531", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-44531" }, { "cve": "CVE-2021-44532", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-44532" }, { "cve": "CVE-2021-44533", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-44533" }, { "cve": "CVE-2021-44716", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-44716" }, { "cve": "CVE-2021-44878", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-44878" }, { "cve": "CVE-2021-45078", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-45078" }, { "cve": "CVE-2021-46195", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-46195" }, { "cve": "CVE-2021-46828", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-46828" }, { "cve": "CVE-2021-46848", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-46848" }, { "cve": "CVE-2022-0128", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-0128" }, { "cve": "CVE-2022-0213", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-0213" }, { "cve": "CVE-2022-0225", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-0225" }, { "cve": "CVE-2022-0261", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-0261" }, { "cve": "CVE-2022-0318", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-0318" }, { "cve": "CVE-2022-0319", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-0319" }, { "cve": "CVE-2022-0351", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-0351" }, { "cve": "CVE-2022-0359", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-0359" }, { "cve": "CVE-2022-0361", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-0361" }, { "cve": "CVE-2022-0392", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-0392" }, { "cve": "CVE-2022-0407", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-0407" }, { "cve": "CVE-2022-0413", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-0413" }, { "cve": "CVE-2022-0561", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-0561" }, { "cve": "CVE-2022-0696", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-0696" }, { "cve": "CVE-2022-0778", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-0778" }, { "cve": "CVE-2022-1184", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-1184" }, { "cve": "CVE-2022-1245", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-1245" }, { "cve": "CVE-2022-1271", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-1271" }, { "cve": "CVE-2022-1292", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-1292" }, { "cve": "CVE-2022-1381", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-1381" }, { "cve": "CVE-2022-1420", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-1420" }, { "cve": "CVE-2022-1462", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-1462" }, { "cve": "CVE-2022-1466", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-1466" }, { "cve": "CVE-2022-1471", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-1471" }, { "cve": "CVE-2022-1586", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-1586" }, { "cve": "CVE-2022-1587", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-1587" }, { "cve": "CVE-2022-1616", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-1616" }, { "cve": "CVE-2022-1619", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-1619" }, { "cve": "CVE-2022-1620", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-1620" }, { "cve": "CVE-2022-1679", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-1679" }, { "cve": "CVE-2022-1705", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-1705" }, { "cve": "CVE-2022-1720", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-1720" }, { "cve": "CVE-2022-1729", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-1729" }, { "cve": "CVE-2022-1733", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-1733" }, { "cve": "CVE-2022-1735", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-1735" }, { "cve": "CVE-2022-1771", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-1771" }, { "cve": "CVE-2022-1785", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-1785" }, { "cve": "CVE-2022-1796", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-1796" }, { "cve": "CVE-2022-1851", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-1851" }, { "cve": "CVE-2022-1897", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-1897" }, { "cve": "CVE-2022-1898", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-1898" }, { "cve": "CVE-2022-1927", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-1927" }, { "cve": "CVE-2022-1962", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-1962" }, { "cve": "CVE-2022-1968", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-1968" }, { "cve": "CVE-2022-1974", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-1974" }, { "cve": "CVE-2022-1975", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-1975" }, { "cve": "CVE-2022-20132", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-20132" }, { "cve": "CVE-2022-20141", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-20141" }, { "cve": "CVE-2022-20154", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-20154" }, { "cve": "CVE-2022-20166", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-20166" }, { "cve": "CVE-2022-20368", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-20368" }, { "cve": "CVE-2022-20369", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-20369" }, { "cve": "CVE-2022-2047", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2047" }, { "cve": "CVE-2022-2048", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2048" }, { "cve": "CVE-2022-20567", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-20567" }, { "cve": "CVE-2022-2068", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2068" }, { "cve": "CVE-2022-2097", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2097" }, { "cve": "CVE-2022-21216", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-21216" }, { "cve": "CVE-2022-21233", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-21233" }, { "cve": "CVE-2022-2124", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2124" }, { "cve": "CVE-2022-2125", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2125" }, { "cve": "CVE-2022-2126", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2126" }, { "cve": "CVE-2022-2129", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2129" }, { "cve": "CVE-2022-21363", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-21363" }, { "cve": "CVE-2022-21385", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-21385" }, { "cve": "CVE-2022-21499", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-21499" }, { "cve": "CVE-2022-2153", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2153" }, { "cve": "CVE-2022-21540", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-21540" }, { "cve": "CVE-2022-21541", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-21541" }, { "cve": "CVE-2022-21549", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-21549" }, { "cve": "CVE-2022-21618", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-21618" }, { "cve": "CVE-2022-21619", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-21619" }, { "cve": "CVE-2022-21624", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-21624" }, { "cve": "CVE-2022-21626", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-21626" }, { "cve": "CVE-2022-21628", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-21628" }, { "cve": "CVE-2022-21702", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-21702" }, { "cve": "CVE-2022-2175", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2175" }, { "cve": "CVE-2022-2182", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2182" }, { "cve": "CVE-2022-2183", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2183" }, { "cve": "CVE-2022-2206", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2206" }, { "cve": "CVE-2022-2207", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2207" }, { "cve": "CVE-2022-2208", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2208" }, { "cve": "CVE-2022-2210", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2210" }, { "cve": "CVE-2022-2231", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2231" }, { "cve": "CVE-2022-2256", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2256" }, { "cve": "CVE-2022-2257", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2257" }, { "cve": "CVE-2022-2264", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2264" }, { "cve": "CVE-2022-2284", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2284" }, { "cve": "CVE-2022-2285", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2285" }, { "cve": "CVE-2022-2286", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2286" }, { "cve": "CVE-2022-2287", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2287" }, { "cve": "CVE-2022-22976", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-22976" }, { "cve": "CVE-2022-22978", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-22978" }, { "cve": "CVE-2022-2304", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2304" }, { "cve": "CVE-2022-2318", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2318" }, { "cve": "CVE-2022-23302", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-23302" }, { "cve": "CVE-2022-23305", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-23305" }, { "cve": "CVE-2022-23307", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-23307" }, { "cve": "CVE-2022-2343", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2343" }, { "cve": "CVE-2022-2344", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2344" }, { "cve": "CVE-2022-2345", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2345" }, { "cve": "CVE-2022-23471", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-23471" }, { "cve": "CVE-2022-23521", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-23521" }, { "cve": "CVE-2022-23772", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-23772" }, { "cve": "CVE-2022-23773", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-23773" }, { "cve": "CVE-2022-24302", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-24302" }, { "cve": "CVE-2022-24329", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-24329" }, { "cve": "CVE-2022-24823", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-24823" }, { "cve": "CVE-2022-24903", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-24903" }, { "cve": "CVE-2022-2503", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2503" }, { "cve": "CVE-2022-25147", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-25147" }, { "cve": "CVE-2022-25168", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-25168" }, { "cve": "CVE-2022-2519", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2519" }, { "cve": "CVE-2022-2520", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2520" }, { "cve": "CVE-2022-2521", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2521" }, { "cve": "CVE-2022-2522", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2522" }, { "cve": "CVE-2022-25647", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-25647" }, { "cve": "CVE-2022-2571", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2571" }, { "cve": "CVE-2022-2580", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2580" }, { "cve": "CVE-2022-2581", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2581" }, { "cve": "CVE-2022-25857", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-25857" }, { "cve": "CVE-2022-2588", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2588" }, { "cve": "CVE-2022-2598", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2598" }, { "cve": "CVE-2022-26148", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-26148" }, { "cve": "CVE-2022-26365", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-26365" }, { "cve": "CVE-2022-26373", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-26373" }, { "cve": "CVE-2022-2639", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2639" }, { "cve": "CVE-2022-26612", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-26612" }, { "cve": "CVE-2022-2663", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2663" }, { "cve": "CVE-2022-27781", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-27781" }, { "cve": "CVE-2022-27782", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-27782" }, { "cve": "CVE-2022-27943", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-27943" }, { "cve": "CVE-2022-2795", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2795" }, { "cve": "CVE-2022-28131", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-28131" }, { "cve": "CVE-2022-2816", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2816" }, { "cve": "CVE-2022-2817", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2817" }, { "cve": "CVE-2022-2819", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2819" }, { "cve": "CVE-2022-28327", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-28327" }, { "cve": "CVE-2022-2845", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2845" }, { "cve": "CVE-2022-2849", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2849" }, { "cve": "CVE-2022-2862", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2862" }, { "cve": "CVE-2022-2867", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2867" }, { "cve": "CVE-2022-2868", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2868" }, { "cve": "CVE-2022-2869", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2869" }, { "cve": "CVE-2022-28693", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-28693" }, { "cve": "CVE-2022-2874", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2874" }, { "cve": "CVE-2022-28748", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-28748" }, { "cve": "CVE-2022-2880", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2880" }, { "cve": "CVE-2022-2889", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2889" }, { "cve": "CVE-2022-29162", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-29162" }, { "cve": "CVE-2022-29187", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-29187" }, { "cve": "CVE-2022-2923", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2923" }, { "cve": "CVE-2022-2946", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2946" }, { "cve": "CVE-2022-29526", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-29526" }, { "cve": "CVE-2022-29583", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-29583" }, { "cve": "CVE-2022-2964", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2964" }, { "cve": "CVE-2022-2977", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2977" }, { "cve": "CVE-2022-2980", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2980" }, { "cve": "CVE-2022-2982", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2982" }, { "cve": "CVE-2022-29900", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-29900" }, { "cve": "CVE-2022-29901", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-29901" }, { "cve": "CVE-2022-2991", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2991" }, { "cve": "CVE-2022-3016", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3016" }, { "cve": "CVE-2022-3028", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3028" }, { "cve": "CVE-2022-3037", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3037" }, { "cve": "CVE-2022-30580", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-30580" }, { "cve": "CVE-2022-30630", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-30630" }, { "cve": "CVE-2022-30631", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-30631" }, { "cve": "CVE-2022-30632", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-30632" }, { "cve": "CVE-2022-30633", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-30633" }, { "cve": "CVE-2022-3099", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3099" }, { "cve": "CVE-2022-31030", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-31030" }, { "cve": "CVE-2022-31159", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-31159" }, { "cve": "CVE-2022-3134", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3134" }, { "cve": "CVE-2022-3153", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3153" }, { "cve": "CVE-2022-3169", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3169" }, { "cve": "CVE-2022-31690", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-31690" }, { "cve": "CVE-2022-32148", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-32148" }, { "cve": "CVE-2022-32149", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-32149" }, { "cve": "CVE-2022-32206", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-32206" }, { "cve": "CVE-2022-32208", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-32208" }, { "cve": "CVE-2022-32221", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-32221" }, { "cve": "CVE-2022-3234", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3234" }, { "cve": "CVE-2022-3235", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3235" }, { "cve": "CVE-2022-3239", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3239" }, { "cve": "CVE-2022-3278", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3278" }, { "cve": "CVE-2022-3296", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3296" }, { "cve": "CVE-2022-3297", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3297" }, { "cve": "CVE-2022-33196", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-33196" }, { "cve": "CVE-2022-3324", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3324" }, { "cve": "CVE-2022-3352", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3352" }, { "cve": "CVE-2022-33740", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-33740" }, { "cve": "CVE-2022-33741", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-33741" }, { "cve": "CVE-2022-33742", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-33742" }, { "cve": "CVE-2022-33972", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-33972" }, { "cve": "CVE-2022-33981", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-33981" }, { "cve": "CVE-2022-34169", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-34169" }, { "cve": "CVE-2022-3424", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3424" }, { "cve": "CVE-2022-34266", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-34266" }, { "cve": "CVE-2022-34526", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-34526" }, { "cve": "CVE-2022-34903", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-34903" }, { "cve": "CVE-2022-3491", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3491" }, { "cve": "CVE-2022-3515", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3515" }, { "cve": "CVE-2022-3520", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3520" }, { "cve": "CVE-2022-3521", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3521" }, { "cve": "CVE-2022-3524", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3524" }, { "cve": "CVE-2022-35252", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-35252" }, { "cve": "CVE-2022-3542", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3542" }, { "cve": "CVE-2022-3545", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3545" }, { "cve": "CVE-2022-3564", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3564" }, { "cve": "CVE-2022-3565", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3565" }, { "cve": "CVE-2022-3566", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3566" }, { "cve": "CVE-2022-3567", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3567" }, { "cve": "CVE-2022-35737", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-35737" }, { "cve": "CVE-2022-3586", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3586" }, { "cve": "CVE-2022-3591", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3591" }, { "cve": "CVE-2022-3594", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3594" }, { "cve": "CVE-2022-3597", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3597" }, { "cve": "CVE-2022-3599", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3599" }, { "cve": "CVE-2022-36109", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-36109" }, { "cve": "CVE-2022-3621", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3621" }, { "cve": "CVE-2022-3626", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3626" }, { "cve": "CVE-2022-3627", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3627" }, { "cve": "CVE-2022-3628", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3628" }, { "cve": "CVE-2022-36280", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-36280" }, { "cve": "CVE-2022-3629", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3629" }, { "cve": "CVE-2022-3635", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3635" }, { "cve": "CVE-2022-3643", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3643" }, { "cve": "CVE-2022-36437", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-36437" }, { "cve": "CVE-2022-3646", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3646" }, { "cve": "CVE-2022-3649", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3649" }, { "cve": "CVE-2022-36760", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-36760" }, { "cve": "CVE-2022-36879", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-36879" }, { "cve": "CVE-2022-36946", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-36946" }, { "cve": "CVE-2022-3705", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3705" }, { "cve": "CVE-2022-37434", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-37434" }, { "cve": "CVE-2022-37436", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-37436" }, { "cve": "CVE-2022-37865", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-37865" }, { "cve": "CVE-2022-37866", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-37866" }, { "cve": "CVE-2022-38090", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-38090" }, { "cve": "CVE-2022-38096", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-38096" }, { "cve": "CVE-2022-38126", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-38126" }, { "cve": "CVE-2022-38127", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-38127" }, { "cve": "CVE-2022-38177", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-38177" }, { "cve": "CVE-2022-38178", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-38178" }, { "cve": "CVE-2022-3821", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3821" }, { "cve": "CVE-2022-38533", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-38533" }, { "cve": "CVE-2022-38749", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-38749" }, { "cve": "CVE-2022-38750", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-38750" }, { "cve": "CVE-2022-38751", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-38751" }, { "cve": "CVE-2022-38752", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-38752" }, { "cve": "CVE-2022-39028", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-39028" }, { "cve": "CVE-2022-3903", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3903" }, { "cve": "CVE-2022-39188", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-39188" }, { "cve": "CVE-2022-39399", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-39399" }, { "cve": "CVE-2022-3970", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3970" }, { "cve": "CVE-2022-40149", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-40149" }, { "cve": "CVE-2022-40150", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-40150" }, { "cve": "CVE-2022-40151", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-40151" }, { "cve": "CVE-2022-40152", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-40152" }, { "cve": "CVE-2022-40153", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-40153" }, { "cve": "CVE-2022-40303", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-40303" }, { "cve": "CVE-2022-40304", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-40304" }, { "cve": "CVE-2022-40307", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-40307" }, { "cve": "CVE-2022-40674", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-40674" }, { "cve": "CVE-2022-40768", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-40768" }, { "cve": "CVE-2022-40899", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-40899" }, { "cve": "CVE-2022-4095", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-4095" }, { "cve": "CVE-2022-41218", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-41218" }, { "cve": "CVE-2022-4129", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-4129" }, { "cve": "CVE-2022-4141", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-4141" }, { "cve": "CVE-2022-41717", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-41717" }, { "cve": "CVE-2022-41721", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-41721" }, { "cve": "CVE-2022-41848", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-41848" }, { "cve": "CVE-2022-41850", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-41850" }, { "cve": "CVE-2022-41854", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-41854" }, { "cve": "CVE-2022-41858", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-41858" }, { "cve": "CVE-2022-41881", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-41881" }, { "cve": "CVE-2022-41903", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-41903" }, { "cve": "CVE-2022-41915", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-41915" }, { "cve": "CVE-2022-41966", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-41966" }, { "cve": "CVE-2022-41974", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-41974" }, { "cve": "CVE-2022-42003", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-42003" }, { "cve": "CVE-2022-42004", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-42004" }, { "cve": "CVE-2022-42010", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-42010" }, { "cve": "CVE-2022-42011", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-42011" }, { "cve": "CVE-2022-42012", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-42012" }, { "cve": "CVE-2022-42328", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-42328" }, { "cve": "CVE-2022-42329", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-42329" }, { "cve": "CVE-2022-42703", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-42703" }, { "cve": "CVE-2022-42889", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-42889" }, { "cve": "CVE-2022-42895", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-42895" }, { "cve": "CVE-2022-42896", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-42896" }, { "cve": "CVE-2022-42898", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-42898" }, { "cve": "CVE-2022-4292", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-4292" }, { "cve": "CVE-2022-4293", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-4293" }, { "cve": "CVE-2022-42969", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-42969" }, { "cve": "CVE-2022-4304", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-4304" }, { "cve": "CVE-2022-43552", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-43552" }, { "cve": "CVE-2022-43680", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-43680" }, { "cve": "CVE-2022-43750", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-43750" }, { "cve": "CVE-2022-4378", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-4378" }, { "cve": "CVE-2022-43945", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-43945" }, { "cve": "CVE-2022-43995", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-43995" }, { "cve": "CVE-2022-4415", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-4415" }, { "cve": "CVE-2022-4450", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-4450" }, { "cve": "CVE-2022-44638", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-44638" }, { "cve": "CVE-2022-45061", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-45061" }, { "cve": "CVE-2022-45688", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-45688" }, { "cve": "CVE-2022-45884", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-45884" }, { "cve": "CVE-2022-45885", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-45885" }, { "cve": "CVE-2022-45886", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-45886" }, { "cve": "CVE-2022-45887", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-45887" }, { "cve": "CVE-2022-45919", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-45919" }, { "cve": "CVE-2022-45934", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-45934" }, { "cve": "CVE-2022-45939", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-45939" }, { "cve": "CVE-2022-4662", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-4662" }, { "cve": "CVE-2022-46751", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-46751" }, { "cve": "CVE-2022-46908", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-46908" }, { "cve": "CVE-2022-47629", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-47629" }, { "cve": "CVE-2022-47929", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-47929" }, { "cve": "CVE-2022-48281", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-48281" }, { "cve": "CVE-2022-48337", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-48337" }, { "cve": "CVE-2022-48339", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-48339" }, { "cve": "CVE-2023-0045", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-0045" }, { "cve": "CVE-2023-0049", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-0049" }, { "cve": "CVE-2023-0051", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-0051" }, { "cve": "CVE-2023-0054", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-0054" }, { "cve": "CVE-2023-0215", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-0215" }, { "cve": "CVE-2023-0286", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-0286" }, { "cve": "CVE-2023-0288", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-0288" }, { "cve": "CVE-2023-0433", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-0433" }, { "cve": "CVE-2023-0464", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-0464" }, { "cve": "CVE-2023-0465", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-0465" }, { "cve": "CVE-2023-0466", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-0466" }, { "cve": "CVE-2023-0512", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-0512" }, { "cve": "CVE-2023-0590", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-0590" }, { "cve": "CVE-2023-0597", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-0597" }, { "cve": "CVE-2023-0833", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-0833" }, { "cve": "CVE-2023-1076", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-1076" }, { "cve": "CVE-2023-1095", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-1095" }, { "cve": "CVE-2023-1118", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-1118" }, { "cve": "CVE-2023-1127", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-1127" }, { "cve": "CVE-2023-1170", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-1170" }, { "cve": "CVE-2023-1175", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-1175" }, { "cve": "CVE-2023-1370", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-1370" }, { "cve": "CVE-2023-1380", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-1380" }, { "cve": "CVE-2023-1390", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-1390" }, { "cve": "CVE-2023-1436", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-1436" }, { "cve": "CVE-2023-1513", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-1513" }, { "cve": "CVE-2023-1611", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-1611" }, { "cve": "CVE-2023-1670", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-1670" }, { "cve": "CVE-2023-1855", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-1855" }, { "cve": "CVE-2023-1989", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-1989" }, { "cve": "CVE-2023-1990", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-1990" }, { "cve": "CVE-2023-1998", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-1998" }, { "cve": "CVE-2023-20862", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-20862" }, { "cve": "CVE-2023-2124", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-2124" }, { "cve": "CVE-2023-2162", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-2162" }, { "cve": "CVE-2023-2176", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-2176" }, { "cve": "CVE-2023-21830", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-21830" }, { "cve": "CVE-2023-21835", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-21835" }, { "cve": "CVE-2023-21843", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-21843" }, { "cve": "CVE-2023-21930", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-21930" }, { "cve": "CVE-2023-21937", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-21937" }, { "cve": "CVE-2023-21938", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-21938" }, { "cve": "CVE-2023-21939", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-21939" }, { "cve": "CVE-2023-2194", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-2194" }, { "cve": "CVE-2023-21954", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-21954" }, { "cve": "CVE-2023-21967", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-21967" }, { "cve": "CVE-2023-21968", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-21968" }, { "cve": "CVE-2023-22490", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-22490" }, { "cve": "CVE-2023-2253", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-2253" }, { "cve": "CVE-2023-22809", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-22809" }, { "cve": "CVE-2023-23454", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-23454" }, { "cve": "CVE-2023-23455", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-23455" }, { "cve": "CVE-2023-23559", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-23559" }, { "cve": "CVE-2023-23916", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-23916" }, { "cve": "CVE-2023-23946", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-23946" }, { "cve": "CVE-2023-24329", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-24329" }, { "cve": "CVE-2023-24532", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-24532" }, { "cve": "CVE-2023-24534", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-24534" }, { "cve": "CVE-2023-2483", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-2483" }, { "cve": "CVE-2023-24998", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-24998" }, { "cve": "CVE-2023-2513", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-2513" }, { "cve": "CVE-2023-25193", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-25193" }, { "cve": "CVE-2023-25652", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-25652" }, { "cve": "CVE-2023-25690", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-25690" }, { "cve": "CVE-2023-25809", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-25809" }, { "cve": "CVE-2023-25815", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-25815" }, { "cve": "CVE-2023-26048", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-26048" }, { "cve": "CVE-2023-26049", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-26049" }, { "cve": "CVE-2023-2650", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-2650" }, { "cve": "CVE-2023-26545", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-26545" }, { "cve": "CVE-2023-26604", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-26604" }, { "cve": "CVE-2023-27533", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-27533" }, { "cve": "CVE-2023-27534", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-27534" }, { "cve": "CVE-2023-27535", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-27535" }, { "cve": "CVE-2023-27536", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-27536" }, { "cve": "CVE-2023-27538", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-27538" }, { "cve": "CVE-2023-27561", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-27561" }, { "cve": "CVE-2023-2828", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-2828" }, { "cve": "CVE-2023-28320", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-28320" }, { "cve": "CVE-2023-28321", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-28321" }, { "cve": "CVE-2023-28322", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-28322" }, { "cve": "CVE-2023-28328", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-28328" }, { "cve": "CVE-2023-28464", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-28464" }, { "cve": "CVE-2023-28486", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-28486" }, { "cve": "CVE-2023-28487", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-28487" }, { "cve": "CVE-2023-28642", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-28642" }, { "cve": "CVE-2023-28772", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-28772" }, { "cve": "CVE-2023-28840", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-28840" }, { "cve": "CVE-2023-28841", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-28841" }, { "cve": "CVE-2023-28842", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-28842" }, { "cve": "CVE-2023-29007", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-29007" }, { "cve": "CVE-2023-29383", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-29383" }, { "cve": "CVE-2023-29402", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-29402" }, { "cve": "CVE-2023-29406", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-29406" }, { "cve": "CVE-2023-29409", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-29409" }, { "cve": "CVE-2023-2976", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-2976" }, { "cve": "CVE-2023-30630", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-30630" }, { "cve": "CVE-2023-30772", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-30772" }, { "cve": "CVE-2023-31084", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-31084" }, { "cve": "CVE-2023-3138", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-3138" }, { "cve": "CVE-2023-31436", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-31436" }, { "cve": "CVE-2023-31484", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-31484" }, { "cve": "CVE-2023-32269", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-32269" }, { "cve": "CVE-2023-32697", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-32697" }, { "cve": "CVE-2023-33264", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-33264" }, { "cve": "CVE-2023-34034", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-34034" }, { "cve": "CVE-2023-34035", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-34035" }, { "cve": "CVE-2023-34453", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-34453" }, { "cve": "CVE-2023-34454", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-34454" }, { "cve": "CVE-2023-34455", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-34455" }, { "cve": "CVE-2023-34462", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-34462" }, { "cve": "CVE-2023-35116", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-35116" }, { "cve": "CVE-2023-3635", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-3635" }, { "cve": "CVE-2023-36479", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-36479" }, { "cve": "CVE-2023-39533", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-39533" }, { "cve": "CVE-2023-40167", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-40167" }, { "cve": "CVE-2023-40217", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-40217" }, { "cve": "CVE-2023-41105", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-41105" }, { "cve": "CVE-2023-41900", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-41900" }, { "cve": "CVE-2023-43642", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-43642" }, { "cve": "CVE-2023-43804", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-43804" }, { "cve": "CVE-2023-44487", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-44487" }, { "cve": "CVE-2023-45803", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-45803" }, { "cve": "CVE-2024-21626", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2024-21626" } ] }
WID-SEC-W-2024-0794
Vulnerability from csaf_certbund
Published
2024-04-04 22:00
Modified
2024-04-04 22:00
Summary
Dell ECS: Mehrere Schwachstellen
Notes
Das BSI ist als Anbieter für die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch dafür verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgfältig im Einzelfall zu prüfen.
Produktbeschreibung
Dell ECS ist ein Objektspeichersystem.
Angriff
Ein Angreifer kann mehrere Schwachstellen in Dell ECS ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.
Betroffene Betriebssysteme
- Linux
- UNIX
- Windows
{ "document": { "aggregate_severity": { "text": "hoch" }, "category": "csaf_base", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "de-DE", "notes": [ { "category": "legal_disclaimer", "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen." }, { "category": "description", "text": "Dell ECS ist ein Objektspeichersystem.", "title": "Produktbeschreibung" }, { "category": "summary", "text": "Ein Angreifer kann mehrere Schwachstellen in Dell ECS ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren.", "title": "Angriff" }, { "category": "general", "text": "- Linux\n- UNIX\n- Windows", "title": "Betroffene Betriebssysteme" } ], "publisher": { "category": "other", "contact_details": "csaf-provider@cert-bund.de", "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik", "namespace": "https://www.bsi.bund.de" }, "references": [ { "category": "self", "summary": "WID-SEC-W-2024-0794 - CSAF Version", "url": "https://wid.cert-bund.de/.well-known/csaf/white/2024/wid-sec-w-2024-0794.json" }, { "category": "self", "summary": "WID-SEC-2024-0794 - Portal Version", "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2024-0794" }, { "category": "external", "summary": "Dell Security Advisory DSA-2024-141 vom 2024-04-04", "url": "https://www.dell.com/support/kbdoc/000223839/dsa-2024-=" } ], "source_lang": "en-US", "title": "Dell ECS: Mehrere Schwachstellen", "tracking": { "current_release_date": "2024-04-04T22:00:00.000+00:00", "generator": { "date": "2024-04-05T09:37:24.604+00:00", "engine": { "name": "BSI-WID", "version": "1.3.0" } }, "id": "WID-SEC-W-2024-0794", "initial_release_date": "2024-04-04T22:00:00.000+00:00", "revision_history": [ { "date": "2024-04-04T22:00:00.000+00:00", "number": "1", "summary": "Initiale Fassung" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version_range", "name": "\u003c 3.8.1.0", "product": { "name": "Dell ECS \u003c 3.8.1.0", "product_id": "T033919", "product_identification_helper": { "cpe": "cpe:/h:dell:ecs:3.8.1.0" } } } ], "category": "product_name", "name": "ECS" } ], "category": "vendor", "name": "Dell" } ] }, "vulnerabilities": [ { "cve": "CVE-2018-18074", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2018-18074" }, { "cve": "CVE-2020-10663", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-10663" }, { "cve": "CVE-2020-10672", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-10672" }, { "cve": "CVE-2020-10673", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-10673" }, { "cve": "CVE-2020-10735", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-10735" }, { "cve": "CVE-2020-10968", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-10968" }, { "cve": "CVE-2020-10969", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-10969" }, { "cve": "CVE-2020-11111", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-11111" }, { "cve": "CVE-2020-11112", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-11112" }, { "cve": "CVE-2020-11113", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-11113" }, { "cve": "CVE-2020-11612", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-11612" }, { "cve": "CVE-2020-11619", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-11619" }, { "cve": "CVE-2020-11620", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-11620" }, { "cve": "CVE-2020-11979", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-11979" }, { "cve": "CVE-2020-12762", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-12762" }, { "cve": "CVE-2020-12825", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-12825" }, { "cve": "CVE-2020-13956", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-13956" }, { "cve": "CVE-2020-14060", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-14060" }, { "cve": "CVE-2020-14061", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-14061" }, { "cve": "CVE-2020-14062", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-14062" }, { "cve": "CVE-2020-14195", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-14195" }, { "cve": "CVE-2020-15250", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-15250" }, { "cve": "CVE-2020-1945", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-1945" }, { "cve": "CVE-2020-1967", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-1967" }, { "cve": "CVE-2020-1971", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-1971" }, { "cve": "CVE-2020-24616", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-24616" }, { "cve": "CVE-2020-24750", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-24750" }, { "cve": "CVE-2020-25649", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-25649" }, { "cve": "CVE-2020-25658", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-25658" }, { "cve": "CVE-2020-26116", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-26116" }, { "cve": "CVE-2020-26137", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-26137" }, { "cve": "CVE-2020-26541", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-26541" }, { "cve": "CVE-2020-27216", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-27216" }, { "cve": "CVE-2020-27218", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-27218" }, { "cve": "CVE-2020-27223", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-27223" }, { "cve": "CVE-2020-28366", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-28366" }, { "cve": "CVE-2020-28493", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-28493" }, { "cve": "CVE-2020-29509", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-29509" }, { "cve": "CVE-2020-29511", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-29511" }, { "cve": "CVE-2020-29582", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-29582" }, { "cve": "CVE-2020-29651", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-29651" }, { "cve": "CVE-2020-35490", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-35490" }, { "cve": "CVE-2020-35491", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-35491" }, { "cve": "CVE-2020-35728", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-35728" }, { "cve": "CVE-2020-36179", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-36179" }, { "cve": "CVE-2020-36180", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-36180" }, { "cve": "CVE-2020-36181", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-36181" }, { "cve": "CVE-2020-36182", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-36182" }, { "cve": "CVE-2020-36183", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-36183" }, { "cve": "CVE-2020-36184", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-36184" }, { "cve": "CVE-2020-36185", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-36185" }, { "cve": "CVE-2020-36186", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-36186" }, { "cve": "CVE-2020-36187", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-36187" }, { "cve": "CVE-2020-36188", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-36188" }, { "cve": "CVE-2020-36189", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-36189" }, { "cve": "CVE-2020-36516", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-36516" }, { "cve": "CVE-2020-36518", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-36518" }, { "cve": "CVE-2020-36557", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-36557" }, { "cve": "CVE-2020-36558", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-36558" }, { "cve": "CVE-2020-36691", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-36691" }, { "cve": "CVE-2020-7238", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-7238" }, { "cve": "CVE-2020-8840", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-8840" }, { "cve": "CVE-2020-8908", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-8908" }, { "cve": "CVE-2020-8911", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-8911" }, { "cve": "CVE-2020-8912", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-8912" }, { "cve": "CVE-2020-9488", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-9488" }, { "cve": "CVE-2020-9493", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-9493" }, { "cve": "CVE-2020-9546", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-9546" }, { "cve": "CVE-2020-9547", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-9547" }, { "cve": "CVE-2020-9548", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-9548" }, { "cve": "CVE-2021-20190", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-20190" }, { "cve": "CVE-2021-20323", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-20323" }, { "cve": "CVE-2021-21290", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-21290" }, { "cve": "CVE-2021-21295", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-21295" }, { "cve": "CVE-2021-21409", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-21409" }, { "cve": "CVE-2021-23840", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-23840" }, { "cve": "CVE-2021-23841", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-23841" }, { "cve": "CVE-2021-2471", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-2471" }, { "cve": "CVE-2021-25642", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-25642" }, { "cve": "CVE-2021-26341", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-26341" }, { "cve": "CVE-2021-27918", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-27918" }, { "cve": "CVE-2021-28153", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-28153" }, { "cve": "CVE-2021-28165", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-28165" }, { "cve": "CVE-2021-28169", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-28169" }, { "cve": "CVE-2021-28861", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-28861" }, { "cve": "CVE-2021-29425", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-29425" }, { "cve": "CVE-2021-30560", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-30560" }, { "cve": "CVE-2021-3114", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-3114" }, { "cve": "CVE-2021-33036", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-33036" }, { "cve": "CVE-2021-33194", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-33194" }, { "cve": "CVE-2021-33195", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-33195" }, { "cve": "CVE-2021-33196", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-33196" }, { "cve": "CVE-2021-33197", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-33197" }, { "cve": "CVE-2021-33503", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-33503" }, { "cve": "CVE-2021-33655", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-33655" }, { "cve": "CVE-2021-33656", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-33656" }, { "cve": "CVE-2021-3424", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-3424" }, { "cve": "CVE-2021-34428", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-34428" }, { "cve": "CVE-2021-3449", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-3449" }, { "cve": "CVE-2021-3450", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-3450" }, { "cve": "CVE-2021-3530", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-3530" }, { "cve": "CVE-2021-36221", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-36221" }, { "cve": "CVE-2021-36373", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-36373" }, { "cve": "CVE-2021-36374", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-36374" }, { "cve": "CVE-2021-3648", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-3648" }, { "cve": "CVE-2021-36690", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-36690" }, { "cve": "CVE-2021-3711", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-3711" }, { "cve": "CVE-2021-3712", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-3712" }, { "cve": "CVE-2021-37136", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-37136" }, { "cve": "CVE-2021-37137", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-37137" }, { "cve": "CVE-2021-37404", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-37404" }, { "cve": "CVE-2021-37533", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-37533" }, { "cve": "CVE-2021-3754", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-3754" }, { "cve": "CVE-2021-3778", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-3778" }, { "cve": "CVE-2021-3796", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-3796" }, { "cve": "CVE-2021-3826", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-3826" }, { "cve": "CVE-2021-3827", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-3827" }, { "cve": "CVE-2021-38297", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-38297" }, { "cve": "CVE-2021-3872", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-3872" }, { "cve": "CVE-2021-3875", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-3875" }, { "cve": "CVE-2021-3903", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-3903" }, { "cve": "CVE-2021-3923", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-3923" }, { "cve": "CVE-2021-3927", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-3927" }, { "cve": "CVE-2021-3928", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-3928" }, { "cve": "CVE-2021-3968", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-3968" }, { "cve": "CVE-2021-3973", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-3973" }, { "cve": "CVE-2021-3974", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-3974" }, { "cve": "CVE-2021-3984", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-3984" }, { "cve": "CVE-2021-4019", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-4019" }, { "cve": "CVE-2021-4037", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-4037" }, { "cve": "CVE-2021-4069", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-4069" }, { "cve": "CVE-2021-4104", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-4104" }, { "cve": "CVE-2021-4136", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-4136" }, { "cve": "CVE-2021-4157", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-4157" }, { "cve": "CVE-2021-4166", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-4166" }, { "cve": "CVE-2021-41771", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-41771" }, { "cve": "CVE-2021-4192", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-4192" }, { "cve": "CVE-2021-4193", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-4193" }, { "cve": "CVE-2021-4203", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-4203" }, { "cve": "CVE-2021-42567", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-42567" }, { "cve": "CVE-2021-43797", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-43797" }, { "cve": "CVE-2021-44531", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-44531" }, { "cve": "CVE-2021-44532", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-44532" }, { "cve": "CVE-2021-44533", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-44533" }, { "cve": "CVE-2021-44716", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-44716" }, { "cve": "CVE-2021-44878", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-44878" }, { "cve": "CVE-2021-45078", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-45078" }, { "cve": "CVE-2021-46195", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-46195" }, { "cve": "CVE-2021-46828", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-46828" }, { "cve": "CVE-2021-46848", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-46848" }, { "cve": "CVE-2022-0128", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-0128" }, { "cve": "CVE-2022-0213", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-0213" }, { "cve": "CVE-2022-0225", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-0225" }, { "cve": "CVE-2022-0261", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-0261" }, { "cve": "CVE-2022-0318", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-0318" }, { "cve": "CVE-2022-0319", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-0319" }, { "cve": "CVE-2022-0351", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-0351" }, { "cve": "CVE-2022-0359", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-0359" }, { "cve": "CVE-2022-0361", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-0361" }, { "cve": "CVE-2022-0392", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-0392" }, { "cve": "CVE-2022-0407", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-0407" }, { "cve": "CVE-2022-0413", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-0413" }, { "cve": "CVE-2022-0561", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-0561" }, { "cve": "CVE-2022-0696", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-0696" }, { "cve": "CVE-2022-0778", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-0778" }, { "cve": "CVE-2022-1184", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-1184" }, { "cve": "CVE-2022-1245", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-1245" }, { "cve": "CVE-2022-1271", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-1271" }, { "cve": "CVE-2022-1292", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-1292" }, { "cve": "CVE-2022-1381", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-1381" }, { "cve": "CVE-2022-1420", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-1420" }, { "cve": "CVE-2022-1462", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-1462" }, { "cve": "CVE-2022-1466", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-1466" }, { "cve": "CVE-2022-1471", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-1471" }, { "cve": "CVE-2022-1586", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-1586" }, { "cve": "CVE-2022-1587", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-1587" }, { "cve": "CVE-2022-1616", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-1616" }, { "cve": "CVE-2022-1619", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-1619" }, { "cve": "CVE-2022-1620", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-1620" }, { "cve": "CVE-2022-1679", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-1679" }, { "cve": "CVE-2022-1705", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-1705" }, { "cve": "CVE-2022-1720", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-1720" }, { "cve": "CVE-2022-1729", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-1729" }, { "cve": "CVE-2022-1733", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-1733" }, { "cve": "CVE-2022-1735", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-1735" }, { "cve": "CVE-2022-1771", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-1771" }, { "cve": "CVE-2022-1785", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-1785" }, { "cve": "CVE-2022-1796", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-1796" }, { "cve": "CVE-2022-1851", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-1851" }, { "cve": "CVE-2022-1897", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-1897" }, { "cve": "CVE-2022-1898", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-1898" }, { "cve": "CVE-2022-1927", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-1927" }, { "cve": "CVE-2022-1962", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-1962" }, { "cve": "CVE-2022-1968", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-1968" }, { "cve": "CVE-2022-1974", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-1974" }, { "cve": "CVE-2022-1975", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-1975" }, { "cve": "CVE-2022-20132", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-20132" }, { "cve": "CVE-2022-20141", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-20141" }, { "cve": "CVE-2022-20154", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-20154" }, { "cve": "CVE-2022-20166", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-20166" }, { "cve": "CVE-2022-20368", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-20368" }, { "cve": "CVE-2022-20369", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-20369" }, { "cve": "CVE-2022-2047", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2047" }, { "cve": "CVE-2022-2048", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2048" }, { "cve": "CVE-2022-20567", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-20567" }, { "cve": "CVE-2022-2068", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2068" }, { "cve": "CVE-2022-2097", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2097" }, { "cve": "CVE-2022-21216", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-21216" }, { "cve": "CVE-2022-21233", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-21233" }, { "cve": "CVE-2022-2124", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2124" }, { "cve": "CVE-2022-2125", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2125" }, { "cve": "CVE-2022-2126", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2126" }, { "cve": "CVE-2022-2129", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2129" }, { "cve": "CVE-2022-21363", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-21363" }, { "cve": "CVE-2022-21385", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-21385" }, { "cve": "CVE-2022-21499", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-21499" }, { "cve": "CVE-2022-2153", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2153" }, { "cve": "CVE-2022-21540", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-21540" }, { "cve": "CVE-2022-21541", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-21541" }, { "cve": "CVE-2022-21549", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-21549" }, { "cve": "CVE-2022-21618", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-21618" }, { "cve": "CVE-2022-21619", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-21619" }, { "cve": "CVE-2022-21624", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-21624" }, { "cve": "CVE-2022-21626", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-21626" }, { "cve": "CVE-2022-21628", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-21628" }, { "cve": "CVE-2022-21702", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-21702" }, { "cve": "CVE-2022-2175", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2175" }, { "cve": "CVE-2022-2182", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2182" }, { "cve": "CVE-2022-2183", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2183" }, { "cve": "CVE-2022-2206", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2206" }, { "cve": "CVE-2022-2207", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2207" }, { "cve": "CVE-2022-2208", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2208" }, { "cve": "CVE-2022-2210", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2210" }, { "cve": "CVE-2022-2231", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2231" }, { "cve": "CVE-2022-2256", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2256" }, { "cve": "CVE-2022-2257", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2257" }, { "cve": "CVE-2022-2264", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2264" }, { "cve": "CVE-2022-2284", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2284" }, { "cve": "CVE-2022-2285", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2285" }, { "cve": "CVE-2022-2286", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2286" }, { "cve": "CVE-2022-2287", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2287" }, { "cve": "CVE-2022-22976", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-22976" }, { "cve": "CVE-2022-22978", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-22978" }, { "cve": "CVE-2022-2304", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2304" }, { "cve": "CVE-2022-2318", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2318" }, { "cve": "CVE-2022-23302", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-23302" }, { "cve": "CVE-2022-23305", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-23305" }, { "cve": "CVE-2022-23307", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-23307" }, { "cve": "CVE-2022-2343", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2343" }, { "cve": "CVE-2022-2344", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2344" }, { "cve": "CVE-2022-2345", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2345" }, { "cve": "CVE-2022-23471", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-23471" }, { "cve": "CVE-2022-23521", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-23521" }, { "cve": "CVE-2022-23772", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-23772" }, { "cve": "CVE-2022-23773", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-23773" }, { "cve": "CVE-2022-24302", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-24302" }, { "cve": "CVE-2022-24329", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-24329" }, { "cve": "CVE-2022-24823", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-24823" }, { "cve": "CVE-2022-24903", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-24903" }, { "cve": "CVE-2022-2503", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2503" }, { "cve": "CVE-2022-25147", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-25147" }, { "cve": "CVE-2022-25168", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-25168" }, { "cve": "CVE-2022-2519", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2519" }, { "cve": "CVE-2022-2520", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2520" }, { "cve": "CVE-2022-2521", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2521" }, { "cve": "CVE-2022-2522", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2522" }, { "cve": "CVE-2022-25647", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-25647" }, { "cve": "CVE-2022-2571", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2571" }, { "cve": "CVE-2022-2580", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2580" }, { "cve": "CVE-2022-2581", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2581" }, { "cve": "CVE-2022-25857", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-25857" }, { "cve": "CVE-2022-2588", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2588" }, { "cve": "CVE-2022-2598", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2598" }, { "cve": "CVE-2022-26148", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-26148" }, { "cve": "CVE-2022-26365", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-26365" }, { "cve": "CVE-2022-26373", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-26373" }, { "cve": "CVE-2022-2639", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2639" }, { "cve": "CVE-2022-26612", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-26612" }, { "cve": "CVE-2022-2663", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2663" }, { "cve": "CVE-2022-27781", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-27781" }, { "cve": "CVE-2022-27782", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-27782" }, { "cve": "CVE-2022-27943", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-27943" }, { "cve": "CVE-2022-2795", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2795" }, { "cve": "CVE-2022-28131", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-28131" }, { "cve": "CVE-2022-2816", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2816" }, { "cve": "CVE-2022-2817", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2817" }, { "cve": "CVE-2022-2819", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2819" }, { "cve": "CVE-2022-28327", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-28327" }, { "cve": "CVE-2022-2845", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2845" }, { "cve": "CVE-2022-2849", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2849" }, { "cve": "CVE-2022-2862", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2862" }, { "cve": "CVE-2022-2867", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2867" }, { "cve": "CVE-2022-2868", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2868" }, { "cve": "CVE-2022-2869", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2869" }, { "cve": "CVE-2022-28693", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-28693" }, { "cve": "CVE-2022-2874", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2874" }, { "cve": "CVE-2022-28748", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-28748" }, { "cve": "CVE-2022-2880", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2880" }, { "cve": "CVE-2022-2889", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2889" }, { "cve": "CVE-2022-29162", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-29162" }, { "cve": "CVE-2022-29187", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-29187" }, { "cve": "CVE-2022-2923", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2923" }, { "cve": "CVE-2022-2946", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2946" }, { "cve": "CVE-2022-29526", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-29526" }, { "cve": "CVE-2022-29583", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-29583" }, { "cve": "CVE-2022-2964", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2964" }, { "cve": "CVE-2022-2977", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2977" }, { "cve": "CVE-2022-2980", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2980" }, { "cve": "CVE-2022-2982", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2982" }, { "cve": "CVE-2022-29900", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-29900" }, { "cve": "CVE-2022-29901", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-29901" }, { "cve": "CVE-2022-2991", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2991" }, { "cve": "CVE-2022-3016", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3016" }, { "cve": "CVE-2022-3028", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3028" }, { "cve": "CVE-2022-3037", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3037" }, { "cve": "CVE-2022-30580", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-30580" }, { "cve": "CVE-2022-30630", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-30630" }, { "cve": "CVE-2022-30631", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-30631" }, { "cve": "CVE-2022-30632", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-30632" }, { "cve": "CVE-2022-30633", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-30633" }, { "cve": "CVE-2022-3099", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3099" }, { "cve": "CVE-2022-31030", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-31030" }, { "cve": "CVE-2022-31159", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-31159" }, { "cve": "CVE-2022-3134", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3134" }, { "cve": "CVE-2022-3153", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3153" }, { "cve": "CVE-2022-3169", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3169" }, { "cve": "CVE-2022-31690", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-31690" }, { "cve": "CVE-2022-32148", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-32148" }, { "cve": "CVE-2022-32149", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-32149" }, { "cve": "CVE-2022-32206", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-32206" }, { "cve": "CVE-2022-32208", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-32208" }, { "cve": "CVE-2022-32221", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-32221" }, { "cve": "CVE-2022-3234", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3234" }, { "cve": "CVE-2022-3235", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3235" }, { "cve": "CVE-2022-3239", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3239" }, { "cve": "CVE-2022-3278", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3278" }, { "cve": "CVE-2022-3296", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3296" }, { "cve": "CVE-2022-3297", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3297" }, { "cve": "CVE-2022-33196", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-33196" }, { "cve": "CVE-2022-3324", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3324" }, { "cve": "CVE-2022-3352", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3352" }, { "cve": "CVE-2022-33740", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-33740" }, { "cve": "CVE-2022-33741", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-33741" }, { "cve": "CVE-2022-33742", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-33742" }, { "cve": "CVE-2022-33972", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-33972" }, { "cve": "CVE-2022-33981", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-33981" }, { "cve": "CVE-2022-34169", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-34169" }, { "cve": "CVE-2022-3424", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3424" }, { "cve": "CVE-2022-34266", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-34266" }, { "cve": "CVE-2022-34526", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-34526" }, { "cve": "CVE-2022-34903", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-34903" }, { "cve": "CVE-2022-3491", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3491" }, { "cve": "CVE-2022-3515", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3515" }, { "cve": "CVE-2022-3520", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3520" }, { "cve": "CVE-2022-3521", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3521" }, { "cve": "CVE-2022-3524", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3524" }, { "cve": "CVE-2022-35252", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-35252" }, { "cve": "CVE-2022-3542", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3542" }, { "cve": "CVE-2022-3545", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3545" }, { "cve": "CVE-2022-3564", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3564" }, { "cve": "CVE-2022-3565", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3565" }, { "cve": "CVE-2022-3566", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3566" }, { "cve": "CVE-2022-3567", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3567" }, { "cve": "CVE-2022-35737", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-35737" }, { "cve": "CVE-2022-3586", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3586" }, { "cve": "CVE-2022-3591", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3591" }, { "cve": "CVE-2022-3594", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3594" }, { "cve": "CVE-2022-3597", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3597" }, { "cve": "CVE-2022-3599", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3599" }, { "cve": "CVE-2022-36109", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-36109" }, { "cve": "CVE-2022-3621", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3621" }, { "cve": "CVE-2022-3626", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3626" }, { "cve": "CVE-2022-3627", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3627" }, { "cve": "CVE-2022-3628", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3628" }, { "cve": "CVE-2022-36280", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-36280" }, { "cve": "CVE-2022-3629", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3629" }, { "cve": "CVE-2022-3635", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3635" }, { "cve": "CVE-2022-3643", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3643" }, { "cve": "CVE-2022-36437", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-36437" }, { "cve": "CVE-2022-3646", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3646" }, { "cve": "CVE-2022-3649", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3649" }, { "cve": "CVE-2022-36760", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-36760" }, { "cve": "CVE-2022-36879", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-36879" }, { "cve": "CVE-2022-36946", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-36946" }, { "cve": "CVE-2022-3705", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3705" }, { "cve": "CVE-2022-37434", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-37434" }, { "cve": "CVE-2022-37436", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-37436" }, { "cve": "CVE-2022-37865", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-37865" }, { "cve": "CVE-2022-37866", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-37866" }, { "cve": "CVE-2022-38090", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-38090" }, { "cve": "CVE-2022-38096", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-38096" }, { "cve": "CVE-2022-38126", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-38126" }, { "cve": "CVE-2022-38127", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-38127" }, { "cve": "CVE-2022-38177", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-38177" }, { "cve": "CVE-2022-38178", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-38178" }, { "cve": "CVE-2022-3821", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3821" }, { "cve": "CVE-2022-38533", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-38533" }, { "cve": "CVE-2022-38749", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-38749" }, { "cve": "CVE-2022-38750", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-38750" }, { "cve": "CVE-2022-38751", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-38751" }, { "cve": "CVE-2022-38752", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-38752" }, { "cve": "CVE-2022-39028", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-39028" }, { "cve": "CVE-2022-3903", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3903" }, { "cve": "CVE-2022-39188", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-39188" }, { "cve": "CVE-2022-39399", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-39399" }, { "cve": "CVE-2022-3970", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3970" }, { "cve": "CVE-2022-40149", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-40149" }, { "cve": "CVE-2022-40150", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-40150" }, { "cve": "CVE-2022-40151", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-40151" }, { "cve": "CVE-2022-40152", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-40152" }, { "cve": "CVE-2022-40153", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-40153" }, { "cve": "CVE-2022-40303", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-40303" }, { "cve": "CVE-2022-40304", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-40304" }, { "cve": "CVE-2022-40307", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-40307" }, { "cve": "CVE-2022-40674", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-40674" }, { "cve": "CVE-2022-40768", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-40768" }, { "cve": "CVE-2022-40899", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-40899" }, { "cve": "CVE-2022-4095", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-4095" }, { "cve": "CVE-2022-41218", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-41218" }, { "cve": "CVE-2022-4129", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-4129" }, { "cve": "CVE-2022-4141", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-4141" }, { "cve": "CVE-2022-41717", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-41717" }, { "cve": "CVE-2022-41721", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-41721" }, { "cve": "CVE-2022-41848", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-41848" }, { "cve": "CVE-2022-41850", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-41850" }, { "cve": "CVE-2022-41854", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-41854" }, { "cve": "CVE-2022-41858", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-41858" }, { "cve": "CVE-2022-41881", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-41881" }, { "cve": "CVE-2022-41903", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-41903" }, { "cve": "CVE-2022-41915", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-41915" }, { "cve": "CVE-2022-41966", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-41966" }, { "cve": "CVE-2022-41974", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-41974" }, { "cve": "CVE-2022-42003", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-42003" }, { "cve": "CVE-2022-42004", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-42004" }, { "cve": "CVE-2022-42010", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-42010" }, { "cve": "CVE-2022-42011", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-42011" }, { "cve": "CVE-2022-42012", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-42012" }, { "cve": "CVE-2022-42328", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-42328" }, { "cve": "CVE-2022-42329", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-42329" }, { "cve": "CVE-2022-42703", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-42703" }, { "cve": "CVE-2022-42889", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-42889" }, { "cve": "CVE-2022-42895", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-42895" }, { "cve": "CVE-2022-42896", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-42896" }, { "cve": "CVE-2022-42898", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-42898" }, { "cve": "CVE-2022-4292", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-4292" }, { "cve": "CVE-2022-4293", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-4293" }, { "cve": "CVE-2022-42969", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-42969" }, { "cve": "CVE-2022-4304", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-4304" }, { "cve": "CVE-2022-43552", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-43552" }, { "cve": "CVE-2022-43680", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-43680" }, { "cve": "CVE-2022-43750", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-43750" }, { "cve": "CVE-2022-4378", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-4378" }, { "cve": "CVE-2022-43945", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-43945" }, { "cve": "CVE-2022-43995", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-43995" }, { "cve": "CVE-2022-4415", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-4415" }, { "cve": "CVE-2022-4450", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-4450" }, { "cve": "CVE-2022-44638", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-44638" }, { "cve": "CVE-2022-45061", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-45061" }, { "cve": "CVE-2022-45688", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-45688" }, { "cve": "CVE-2022-45884", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-45884" }, { "cve": "CVE-2022-45885", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-45885" }, { "cve": "CVE-2022-45886", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-45886" }, { "cve": "CVE-2022-45887", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-45887" }, { "cve": "CVE-2022-45919", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-45919" }, { "cve": "CVE-2022-45934", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-45934" }, { "cve": "CVE-2022-45939", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-45939" }, { "cve": "CVE-2022-4662", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-4662" }, { "cve": "CVE-2022-46751", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-46751" }, { "cve": "CVE-2022-46908", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-46908" }, { "cve": "CVE-2022-47629", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-47629" }, { "cve": "CVE-2022-47929", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-47929" }, { "cve": "CVE-2022-48281", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-48281" }, { "cve": "CVE-2022-48337", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-48337" }, { "cve": "CVE-2022-48339", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-48339" }, { "cve": "CVE-2023-0045", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-0045" }, { "cve": "CVE-2023-0049", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-0049" }, { "cve": "CVE-2023-0051", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-0051" }, { "cve": "CVE-2023-0054", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-0054" }, { "cve": "CVE-2023-0215", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-0215" }, { "cve": "CVE-2023-0286", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-0286" }, { "cve": "CVE-2023-0288", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-0288" }, { "cve": "CVE-2023-0433", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-0433" }, { "cve": "CVE-2023-0464", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-0464" }, { "cve": "CVE-2023-0465", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-0465" }, { "cve": "CVE-2023-0466", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-0466" }, { "cve": "CVE-2023-0512", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-0512" }, { "cve": "CVE-2023-0590", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-0590" }, { "cve": "CVE-2023-0597", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-0597" }, { "cve": "CVE-2023-0833", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-0833" }, { "cve": "CVE-2023-1076", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-1076" }, { "cve": "CVE-2023-1095", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-1095" }, { "cve": "CVE-2023-1118", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-1118" }, { "cve": "CVE-2023-1127", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-1127" }, { "cve": "CVE-2023-1170", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-1170" }, { "cve": "CVE-2023-1175", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-1175" }, { "cve": "CVE-2023-1370", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-1370" }, { "cve": "CVE-2023-1380", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-1380" }, { "cve": "CVE-2023-1390", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-1390" }, { "cve": "CVE-2023-1436", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-1436" }, { "cve": "CVE-2023-1513", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-1513" }, { "cve": "CVE-2023-1611", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-1611" }, { "cve": "CVE-2023-1670", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-1670" }, { "cve": "CVE-2023-1855", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-1855" }, { "cve": "CVE-2023-1989", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-1989" }, { "cve": "CVE-2023-1990", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-1990" }, { "cve": "CVE-2023-1998", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-1998" }, { "cve": "CVE-2023-20862", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-20862" }, { "cve": "CVE-2023-2124", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-2124" }, { "cve": "CVE-2023-2162", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-2162" }, { "cve": "CVE-2023-2176", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-2176" }, { "cve": "CVE-2023-21830", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-21830" }, { "cve": "CVE-2023-21835", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-21835" }, { "cve": "CVE-2023-21843", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-21843" }, { "cve": "CVE-2023-21930", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-21930" }, { "cve": "CVE-2023-21937", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-21937" }, { "cve": "CVE-2023-21938", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-21938" }, { "cve": "CVE-2023-21939", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-21939" }, { "cve": "CVE-2023-2194", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-2194" }, { "cve": "CVE-2023-21954", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-21954" }, { "cve": "CVE-2023-21967", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-21967" }, { "cve": "CVE-2023-21968", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-21968" }, { "cve": "CVE-2023-22490", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-22490" }, { "cve": "CVE-2023-2253", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-2253" }, { "cve": "CVE-2023-22809", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-22809" }, { "cve": "CVE-2023-23454", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-23454" }, { "cve": "CVE-2023-23455", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-23455" }, { "cve": "CVE-2023-23559", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-23559" }, { "cve": "CVE-2023-23916", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-23916" }, { "cve": "CVE-2023-23946", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-23946" }, { "cve": "CVE-2023-24329", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-24329" }, { "cve": "CVE-2023-24532", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-24532" }, { "cve": "CVE-2023-24534", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-24534" }, { "cve": "CVE-2023-2483", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-2483" }, { "cve": "CVE-2023-24998", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-24998" }, { "cve": "CVE-2023-2513", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-2513" }, { "cve": "CVE-2023-25193", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-25193" }, { "cve": "CVE-2023-25652", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-25652" }, { "cve": "CVE-2023-25690", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-25690" }, { "cve": "CVE-2023-25809", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-25809" }, { "cve": "CVE-2023-25815", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-25815" }, { "cve": "CVE-2023-26048", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-26048" }, { "cve": "CVE-2023-26049", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-26049" }, { "cve": "CVE-2023-2650", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-2650" }, { "cve": "CVE-2023-26545", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-26545" }, { "cve": "CVE-2023-26604", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-26604" }, { "cve": "CVE-2023-27533", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-27533" }, { "cve": "CVE-2023-27534", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-27534" }, { "cve": "CVE-2023-27535", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-27535" }, { "cve": "CVE-2023-27536", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-27536" }, { "cve": "CVE-2023-27538", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-27538" }, { "cve": "CVE-2023-27561", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-27561" }, { "cve": "CVE-2023-2828", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-2828" }, { "cve": "CVE-2023-28320", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-28320" }, { "cve": "CVE-2023-28321", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-28321" }, { "cve": "CVE-2023-28322", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-28322" }, { "cve": "CVE-2023-28328", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-28328" }, { "cve": "CVE-2023-28464", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-28464" }, { "cve": "CVE-2023-28486", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-28486" }, { "cve": "CVE-2023-28487", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-28487" }, { "cve": "CVE-2023-28642", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-28642" }, { "cve": "CVE-2023-28772", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-28772" }, { "cve": "CVE-2023-28840", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-28840" }, { "cve": "CVE-2023-28841", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-28841" }, { "cve": "CVE-2023-28842", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-28842" }, { "cve": "CVE-2023-29007", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-29007" }, { "cve": "CVE-2023-29383", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-29383" }, { "cve": "CVE-2023-29402", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-29402" }, { "cve": "CVE-2023-29406", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-29406" }, { "cve": "CVE-2023-29409", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-29409" }, { "cve": "CVE-2023-2976", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-2976" }, { "cve": "CVE-2023-30630", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-30630" }, { "cve": "CVE-2023-30772", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-30772" }, { "cve": "CVE-2023-31084", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-31084" }, { "cve": "CVE-2023-3138", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-3138" }, { "cve": "CVE-2023-31436", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-31436" }, { "cve": "CVE-2023-31484", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-31484" }, { "cve": "CVE-2023-32269", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-32269" }, { "cve": "CVE-2023-32697", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-32697" }, { "cve": "CVE-2023-33264", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-33264" }, { "cve": "CVE-2023-34034", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-34034" }, { "cve": "CVE-2023-34035", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-34035" }, { "cve": "CVE-2023-34453", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-34453" }, { "cve": "CVE-2023-34454", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-34454" }, { "cve": "CVE-2023-34455", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-34455" }, { "cve": "CVE-2023-34462", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-34462" }, { "cve": "CVE-2023-35116", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-35116" }, { "cve": "CVE-2023-3635", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-3635" }, { "cve": "CVE-2023-36479", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-36479" }, { "cve": "CVE-2023-39533", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-39533" }, { "cve": "CVE-2023-40167", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-40167" }, { "cve": "CVE-2023-40217", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-40217" }, { "cve": "CVE-2023-41105", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-41105" }, { "cve": "CVE-2023-41900", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-41900" }, { "cve": "CVE-2023-43642", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-43642" }, { "cve": "CVE-2023-43804", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-43804" }, { "cve": "CVE-2023-44487", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-44487" }, { "cve": "CVE-2023-45803", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-45803" }, { "cve": "CVE-2024-21626", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2024-21626" } ] }
WID-SEC-W-2022-0456
Vulnerability from csaf_certbund
Published
2022-06-23 22:00
Modified
2022-12-07 23:00
Summary
tribe29 checkmk: Mehrere Schwachstellen ermöglichen nicht spezifizierten Angriff
Notes
Das BSI ist als Anbieter für die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch dafür verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgfältig im Einzelfall zu prüfen.
Produktbeschreibung
Checkmk ist eine IT-Monitoring-Software.
Angriff
Ein Angreifer kann mehrere Schwachstellen in tribe29 checkmk ausnutzen, um einen nicht näher spezifizierten Angriff durchzuführen.
Betroffene Betriebssysteme
- UNIX
- Linux
{ "document": { "aggregate_severity": { "text": "hoch" }, "category": "csaf_base", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "de-DE", "notes": [ { "category": "legal_disclaimer", "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen." }, { "category": "description", "text": "Checkmk ist eine IT-Monitoring-Software.", "title": "Produktbeschreibung" }, { "category": "summary", "text": "Ein Angreifer kann mehrere Schwachstellen in tribe29 checkmk ausnutzen, um einen nicht n\u00e4her spezifizierten Angriff durchzuf\u00fchren.", "title": "Angriff" }, { "category": "general", "text": "- UNIX\n- Linux", "title": "Betroffene Betriebssysteme" } ], "publisher": { "category": "other", "contact_details": "csaf-provider@cert-bund.de", "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik", "namespace": "https://www.bsi.bund.de" }, "references": [ { "category": "self", "summary": "WID-SEC-W-2022-0456 - CSAF Version", "url": "https://wid.cert-bund.de/.well-known/csaf/white/2022/wid-sec-w-2022-0456.json" }, { "category": "self", "summary": "WID-SEC-2022-0456 - Portal Version", "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2022-0456" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2022:8861 vom 2022-12-08", "url": "https://access.redhat.com/errata/RHSA-2022:8861" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2022:8852 vom 2022-12-08", "url": "https://access.redhat.com/errata/RHSA-2022:8852" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2022:3932-1 vom 2022-11-10", "url": "https://lists.suse.com/pipermail/sle-security-updates/2022-November/012870.html" }, { "category": "external", "summary": "CheckMK Werk #13904: Update vulnerable Python dependencies vom 2022-06-23", "url": "https://checkmk.com/de/werk/13904" }, { "category": "external", "summary": "Ubuntu Security Notice USN-5526-1 vom 2022-07-20", "url": "https://ubuntu.com/security/notices/USN-5526-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-5526-2 vom 2022-08-17", "url": "https://ubuntu.com/security/notices/USN-5526-2" } ], "source_lang": "en-US", "title": "tribe29 checkmk: Mehrere Schwachstellen erm\u00f6glichen nicht spezifizierten Angriff", "tracking": { "current_release_date": "2022-12-07T23:00:00.000+00:00", "generator": { "date": "2024-02-15T16:50:00.353+00:00", "engine": { "name": "BSI-WID", "version": "1.3.0" } }, "id": "WID-SEC-W-2022-0456", "initial_release_date": "2022-06-23T22:00:00.000+00:00", "revision_history": [ { "date": "2022-06-23T22:00:00.000+00:00", "number": "1", "summary": "Initiale Fassung" }, { "date": "2022-07-05T22:00:00.000+00:00", "number": "2", "summary": "CHECKMK Referenz aufgenommen" }, { "date": "2022-07-19T22:00:00.000+00:00", "number": "3", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2022-08-16T22:00:00.000+00:00", "number": "4", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2022-11-10T23:00:00.000+00:00", "number": "5", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2022-12-07T23:00:00.000+00:00", "number": "6", "summary": "Neue Updates von Red Hat aufgenommen" } ], "status": "final", "version": "6" } }, "product_tree": { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux", "product": { "name": "Red Hat Enterprise Linux", "product_id": "67646", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:-" } } } ], "category": "vendor", "name": "Red Hat" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux", "product": { "name": "SUSE Linux", "product_id": "T002207", "product_identification_helper": { "cpe": "cpe:/o:suse:suse_linux:-" } } } ], "category": "vendor", "name": "SUSE" }, { "branches": [ { "category": "product_name", "name": "Ubuntu Linux", "product": { "name": "Ubuntu Linux", "product_id": "T000126", "product_identification_helper": { "cpe": "cpe:/o:canonical:ubuntu_linux:-" } } } ], "category": "vendor", "name": "Ubuntu" }, { "branches": [ { "branches": [ { "category": "product_name", "name": "tribe29 checkmk \u003c 2.0.0p27", "product": { "name": "tribe29 checkmk \u003c 2.0.0p27", "product_id": "T023613", "product_identification_helper": { "cpe": "cpe:/a:tribe29:checkmk:2.0.0p27" } } }, { "category": "product_name", "name": "tribe29 checkmk \u003c 2.2.0i1", "product": { "name": "tribe29 checkmk \u003c 2.2.0i1", "product_id": "T023614", "product_identification_helper": { "cpe": "cpe:/a:tribe29:checkmk:2.2.0i1" } } }, { "category": "product_name", "name": "tribe29 checkmk \u003c 2.1.0p4", "product": { "name": "tribe29 checkmk \u003c 2.1.0p4", "product_id": "T023615", "product_identification_helper": { "cpe": "cpe:/a:tribe29:checkmk:2.1.0p4" } } } ], "category": "product_name", "name": "checkmk" } ], "category": "vendor", "name": "tribe29" } ] }, "vulnerabilities": [ { "cve": "CVE-2020-25658", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in tribe29 checkmk, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T002207", "67646", "T000126" ] }, "release_date": "2022-06-23T22:00:00Z", "title": "CVE-2020-25658" }, { "cve": "CVE-2021-34141", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in tribe29 checkmk, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T002207", "67646", "T000126" ] }, "release_date": "2022-06-23T22:00:00Z", "title": "CVE-2021-34141" }, { "cve": "CVE-2021-41495", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in tribe29 checkmk, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T002207", "67646", "T000126" ] }, "release_date": "2022-06-23T22:00:00Z", "title": "CVE-2021-41495" }, { "cve": "CVE-2021-41496", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in tribe29 checkmk, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T002207", "67646", "T000126" ] }, "release_date": "2022-06-23T22:00:00Z", "title": "CVE-2021-41496" }, { "cve": "CVE-2022-29217", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in tribe29 checkmk, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T002207", "67646", "T000126" ] }, "release_date": "2022-06-23T22:00:00Z", "title": "CVE-2022-29217" }, { "cve": "CVE-2022-29361", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in tribe29 checkmk, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T002207", "67646", "T000126" ] }, "release_date": "2022-06-23T22:00:00Z", "title": "CVE-2022-29361" }, { "cve": "CVE-2022-30595", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in tribe29 checkmk, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T002207", "67646", "T000126" ] }, "release_date": "2022-06-23T22:00:00Z", "title": "CVE-2022-30595" } ] }
pysec-2020-100
Vulnerability from pysec
Published
2020-11-12 14:15
Modified
2021-11-11 23:07
Details
It was found that python-rsa is vulnerable to Bleichenbacher timing attacks. An attacker can use this flaw via the RSA decryption API to decrypt parts of the cipher text encrypted with RSA.
Aliases
{ "affected": [ { "package": { "ecosystem": "PyPI", "name": "rsa", "purl": "pkg:pypi/rsa" }, "ranges": [ { "events": [ { "introduced": "2.1" }, { "fixed": "4.7" } ], "type": "ECOSYSTEM" } ], "versions": [ "3.0", "3.0.1", "3.1", "3.1.1", "3.1.2", "3.1.3", "3.1.4", "3.2", "3.2.1", "3.2.2", "3.2.3", "3.3", "3.4", "3.4.1", "3.4.2", "4.0", "4.1", "4.1.1", "4.2", "4.3", "4.4", "4.4.1", "4.5", "4.6" ] } ], "aliases": [ "CVE-2020-25658", "GHSA-xrx6-fmxq-rjj2" ], "details": "It was found that python-rsa is vulnerable to Bleichenbacher timing attacks. An attacker can use this flaw via the RSA decryption API to decrypt parts of the cipher text encrypted with RSA.", "id": "PYSEC-2020-100", "modified": "2021-11-11T23:07:45.968611Z", "published": "2020-11-12T14:15:00Z", "references": [ { "type": "REPORT", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-25658" }, { "type": "REPORT", "url": "https://github.com/sybrenstuvel/python-rsa/issues/165" }, { "type": "ADVISORY", "url": "https://github.com/advisories/GHSA-xrx6-fmxq-rjj2" } ] }
ghsa-xrx6-fmxq-rjj2
Vulnerability from github
Published
2021-04-30 17:35
Modified
2024-10-26 22:33
Severity ?
5.9 (Medium) - CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
8.2 (High) - CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N
8.2 (High) - CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N
Summary
Timing attacks in python-rsa
Details
It was found that python-rsa is vulnerable to Bleichenbacher timing attacks. An attacker can use this flaw via the RSA decryption API to decrypt parts of the cipher text encrypted with RSA
{ "affected": [ { "package": { "ecosystem": "PyPI", "name": "rsa" }, "ranges": [ { "events": [ { "introduced": "2.1" }, { "fixed": "4.7" } ], "type": "ECOSYSTEM" } ] } ], "aliases": [ "CVE-2020-25658" ], "database_specific": { "cwe_ids": [ "CWE-327", "CWE-385" ], "github_reviewed": true, "github_reviewed_at": "2021-04-20T17:11:41Z", "nvd_published_at": "2020-11-12T14:15:00Z", "severity": "HIGH" }, "details": "It was found that python-rsa is vulnerable to Bleichenbacher timing attacks. An attacker can use this flaw via the RSA decryption API to decrypt parts of the cipher text encrypted with RSA", "id": "GHSA-xrx6-fmxq-rjj2", "modified": "2024-10-26T22:33:21Z", "published": "2021-04-30T17:35:15Z", "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-25658" }, { "type": "WEB", "url": "https://github.com/sybrenstuvel/python-rsa/issues/165" }, { "type": "WEB", "url": "https://github.com/sybrenstuvel/python-rsa/commit/dae8ce0d85478e16f2368b2341632775313d41ed" }, { "type": "WEB", "url": "https://access.redhat.com/security/cve/CVE-2020-25658" }, { "type": "WEB", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1889972" }, { "type": "WEB", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-25658" }, { "type": "ADVISORY", "url": "https://github.com/advisories/GHSA-xrx6-fmxq-rjj2" }, { "type": "WEB", "url": "https://github.com/pypa/advisory-database/tree/main/vulns/rsa/PYSEC-2020-100.yaml" }, { "type": "PACKAGE", "url": "https://github.com/sybrenstuvel/python-rsa" }, { "type": "WEB", "url": "https://access.redhat.com/errata/RHSA-2022:1716" }, { "type": "WEB", "url": "https://access.redhat.com/errata/RHSA-2021:0637" }, { "type": "WEB", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2SAF67KDGSOHLVFTRDOHNEAFDRSSYIWA" }, { "type": "WEB", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/APF364QJ2IYLPDNVFBOEJ24QP2WLVLJP" }, { "type": "WEB", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/QY4PJWTYSOV7ZEYZVMYIF6XRU73CY6O7" }, { "type": "WEB", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2SAF67KDGSOHLVFTRDOHNEAFDRSSYIWA" }, { "type": "WEB", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/APF364QJ2IYLPDNVFBOEJ24QP2WLVLJP" }, { "type": "WEB", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QY4PJWTYSOV7ZEYZVMYIF6XRU73CY6O7" }, { "type": "WEB", "url": "https://access.redhat.com/errata/RHSA-2020:5634" } ], "schema_version": "1.4.0", "severity": [ { "score": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", "type": "CVSS_V3" }, { "score": "CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N", "type": "CVSS_V4" } ], "summary": "Timing attacks in python-rsa" }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.