Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2020-28362 (GCVE-0-2020-28362)
Vulnerability from cvelistv5 – Published: 2020-11-18 16:27 – Updated: 2024-08-04 16:33- n/a
| URL | Tags |
|---|---|
| https://lists.apache.org/thread.html/rd02e75766cd… | mailing-listx_refsource_MLIST |
| https://groups.google.com/g/golang-nuts/c/c-ssaaS7RMI | x_refsource_CONFIRM |
| https://lists.fedoraproject.org/archives/list/pac… | vendor-advisoryx_refsource_FEDORA |
| https://security.netapp.com/advisory/ntap-2020120… | x_refsource_CONFIRM |
| https://lists.fedoraproject.org/archives/list/pac… | vendor-advisoryx_refsource_FEDORA |
| https://www.arista.com/en/support/advisories-noti… | x_refsource_MISC |
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-04T16:33:59.119Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "[trafficcontrol-issues] 20201112 [GitHub] [trafficcontrol] zrhoffman opened a new pull request #5278: Update Go version to 1.15.5",
"tags": [
"mailing-list",
"x_refsource_MLIST",
"x_transferred"
],
"url": "https://lists.apache.org/thread.html/rd02e75766cd333a0df417588460f5e4477060633000bfe94955851fd%40%3Cissues.trafficcontrol.apache.org%3E"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://groups.google.com/g/golang-nuts/c/c-ssaaS7RMI"
},
{
"name": "FEDORA-2020-864922e78a",
"tags": [
"vendor-advisory",
"x_refsource_FEDORA",
"x_transferred"
],
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/F3ZSHGNTJWCWYAKY5OLZS2XQQYHSXSUO/"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://security.netapp.com/advisory/ntap-20201202-0004/"
},
{
"name": "FEDORA-2020-e971480183",
"tags": [
"vendor-advisory",
"x_refsource_FEDORA",
"x_transferred"
],
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2W4COUPL3YVTZ6RTEIT6LPBDJUFF3VSP/"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://www.arista.com/en/support/advisories-notices/security-advisories/12166-security-advisory-62"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2020-11-12T00:00:00.000Z",
"descriptions": [
{
"lang": "en",
"value": "Go before 1.14.12 and 1.15.x before 1.15.4 allows Denial of Service."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2021-11-05T09:58:49.000Z",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"name": "[trafficcontrol-issues] 20201112 [GitHub] [trafficcontrol] zrhoffman opened a new pull request #5278: Update Go version to 1.15.5",
"tags": [
"mailing-list",
"x_refsource_MLIST"
],
"url": "https://lists.apache.org/thread.html/rd02e75766cd333a0df417588460f5e4477060633000bfe94955851fd%40%3Cissues.trafficcontrol.apache.org%3E"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://groups.google.com/g/golang-nuts/c/c-ssaaS7RMI"
},
{
"name": "FEDORA-2020-864922e78a",
"tags": [
"vendor-advisory",
"x_refsource_FEDORA"
],
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/F3ZSHGNTJWCWYAKY5OLZS2XQQYHSXSUO/"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://security.netapp.com/advisory/ntap-20201202-0004/"
},
{
"name": "FEDORA-2020-e971480183",
"tags": [
"vendor-advisory",
"x_refsource_FEDORA"
],
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2W4COUPL3YVTZ6RTEIT6LPBDJUFF3VSP/"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "https://www.arista.com/en/support/advisories-notices/security-advisories/12166-security-advisory-62"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2020-28362",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Go before 1.14.12 and 1.15.x before 1.15.4 allows Denial of Service."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "[trafficcontrol-issues] 20201112 [GitHub] [trafficcontrol] zrhoffman opened a new pull request #5278: Update Go version to 1.15.5",
"refsource": "MLIST",
"url": "https://lists.apache.org/thread.html/rd02e75766cd333a0df417588460f5e4477060633000bfe94955851fd@%3Cissues.trafficcontrol.apache.org%3E"
},
{
"name": "https://groups.google.com/g/golang-nuts/c/c-ssaaS7RMI",
"refsource": "CONFIRM",
"url": "https://groups.google.com/g/golang-nuts/c/c-ssaaS7RMI"
},
{
"name": "FEDORA-2020-864922e78a",
"refsource": "FEDORA",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/F3ZSHGNTJWCWYAKY5OLZS2XQQYHSXSUO/"
},
{
"name": "https://security.netapp.com/advisory/ntap-20201202-0004/",
"refsource": "CONFIRM",
"url": "https://security.netapp.com/advisory/ntap-20201202-0004/"
},
{
"name": "FEDORA-2020-e971480183",
"refsource": "FEDORA",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2W4COUPL3YVTZ6RTEIT6LPBDJUFF3VSP/"
},
{
"name": "https://www.arista.com/en/support/advisories-notices/security-advisories/12166-security-advisory-62",
"refsource": "MISC",
"url": "https://www.arista.com/en/support/advisories-notices/security-advisories/12166-security-advisory-62"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2020-28362",
"datePublished": "2020-11-18T16:27:38.000Z",
"dateReserved": "2020-11-09T00:00:00.000Z",
"dateUpdated": "2024-08-04T16:33:59.119Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"epss": {
"cve": "CVE-2020-28362",
"date": "2026-05-21",
"epss": "0.00711",
"percentile": "0.72461"
},
"fkie_nvd": {
"configurations": "[{\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:golang:go:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"1.14.12\", \"matchCriteriaId\": \"A2175A10-2BF6-430A-A90E-C3957B4FF493\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:golang:go:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"1.15\", \"versionEndExcluding\": \"1.15.5\", \"matchCriteriaId\": \"0D85EBF5-35FF-4F02-87AB-16FF644D11F3\"}]}]}, {\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"36D96259-24BD-44E2-96D9-78CE1D41F956\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:fedoraproject:fedora:33:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E460AA51-FCDA-46B9-AE97-E6676AA5E194\"}]}]}, {\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:netapp:cloud_insights_telegraf_agent:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"5DAE7369-EEC5-405E-9D13-858335FDA647\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:netapp:trident:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"5D9A34F5-AC03-4098-A37D-AD50727DDB11\"}]}]}]",
"descriptions": "[{\"lang\": \"en\", \"value\": \"Go before 1.14.12 and 1.15.x before 1.15.4 allows Denial of Service.\"}, {\"lang\": \"es\", \"value\": \"Go versiones anteriores a 1.14.12 y versiones 1.15.x anteriores a 1.15.4, permite una Denegaci\\u00f3n de Servicio\"}]",
"id": "CVE-2020-28362",
"lastModified": "2024-11-21T05:22:39.757",
"metrics": "{\"cvssMetricV31\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"3.1\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H\", \"baseScore\": 7.5, \"baseSeverity\": \"HIGH\", \"attackVector\": \"NETWORK\", \"attackComplexity\": \"LOW\", \"privilegesRequired\": \"NONE\", \"userInteraction\": \"NONE\", \"scope\": \"UNCHANGED\", \"confidentialityImpact\": \"NONE\", \"integrityImpact\": \"NONE\", \"availabilityImpact\": \"HIGH\"}, \"exploitabilityScore\": 3.9, \"impactScore\": 3.6}], \"cvssMetricV2\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"2.0\", \"vectorString\": \"AV:N/AC:L/Au:N/C:N/I:N/A:P\", \"baseScore\": 5.0, \"accessVector\": \"NETWORK\", \"accessComplexity\": \"LOW\", \"authentication\": \"NONE\", \"confidentialityImpact\": \"NONE\", \"integrityImpact\": \"NONE\", \"availabilityImpact\": \"PARTIAL\"}, \"baseSeverity\": \"MEDIUM\", \"exploitabilityScore\": 10.0, \"impactScore\": 2.9, \"acInsufInfo\": false, \"obtainAllPrivilege\": false, \"obtainUserPrivilege\": false, \"obtainOtherPrivilege\": false, \"userInteractionRequired\": false}]}",
"published": "2020-11-18T17:15:11.930",
"references": "[{\"url\": \"https://groups.google.com/g/golang-nuts/c/c-ssaaS7RMI\", \"source\": \"cve@mitre.org\", \"tags\": [\"Release Notes\", \"Third Party Advisory\"]}, {\"url\": \"https://lists.apache.org/thread.html/rd02e75766cd333a0df417588460f5e4477060633000bfe94955851fd%40%3Cissues.trafficcontrol.apache.org%3E\", \"source\": \"cve@mitre.org\"}, {\"url\": \"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2W4COUPL3YVTZ6RTEIT6LPBDJUFF3VSP/\", \"source\": \"cve@mitre.org\"}, {\"url\": \"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/F3ZSHGNTJWCWYAKY5OLZS2XQQYHSXSUO/\", \"source\": \"cve@mitre.org\"}, {\"url\": \"https://security.netapp.com/advisory/ntap-20201202-0004/\", \"source\": \"cve@mitre.org\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://www.arista.com/en/support/advisories-notices/security-advisories/12166-security-advisory-62\", \"source\": \"cve@mitre.org\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://groups.google.com/g/golang-nuts/c/c-ssaaS7RMI\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Release Notes\", \"Third Party Advisory\"]}, {\"url\": \"https://lists.apache.org/thread.html/rd02e75766cd333a0df417588460f5e4477060633000bfe94955851fd%40%3Cissues.trafficcontrol.apache.org%3E\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2W4COUPL3YVTZ6RTEIT6LPBDJUFF3VSP/\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/F3ZSHGNTJWCWYAKY5OLZS2XQQYHSXSUO/\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://security.netapp.com/advisory/ntap-20201202-0004/\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://www.arista.com/en/support/advisories-notices/security-advisories/12166-security-advisory-62\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}]",
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Modified",
"weaknesses": "[{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-295\"}]}]"
},
"nvd": "{\"cve\":{\"id\":\"CVE-2020-28362\",\"sourceIdentifier\":\"cve@mitre.org\",\"published\":\"2020-11-18T17:15:11.930\",\"lastModified\":\"2024-11-21T05:22:39.757\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Go before 1.14.12 and 1.15.x before 1.15.4 allows Denial of Service.\"},{\"lang\":\"es\",\"value\":\"Go versiones anteriores a 1.14.12 y versiones 1.15.x anteriores a 1.15.4, permite una Denegaci\u00f3n de Servicio\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H\",\"baseScore\":7.5,\"baseSeverity\":\"HIGH\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":3.9,\"impactScore\":3.6}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:L/Au:N/C:N/I:N/A:P\",\"baseScore\":5.0,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"PARTIAL\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":10.0,\"impactScore\":2.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-295\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:golang:go:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"1.14.12\",\"matchCriteriaId\":\"A2175A10-2BF6-430A-A90E-C3957B4FF493\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:golang:go:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"1.15\",\"versionEndExcluding\":\"1.15.5\",\"matchCriteriaId\":\"0D85EBF5-35FF-4F02-87AB-16FF644D11F3\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"36D96259-24BD-44E2-96D9-78CE1D41F956\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:fedoraproject:fedora:33:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E460AA51-FCDA-46B9-AE97-E6676AA5E194\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netapp:cloud_insights_telegraf_agent:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5DAE7369-EEC5-405E-9D13-858335FDA647\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netapp:trident:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5D9A34F5-AC03-4098-A37D-AD50727DDB11\"}]}]}],\"references\":[{\"url\":\"https://groups.google.com/g/golang-nuts/c/c-ssaaS7RMI\",\"source\":\"cve@mitre.org\",\"tags\":[\"Release Notes\",\"Third Party Advisory\"]},{\"url\":\"https://lists.apache.org/thread.html/rd02e75766cd333a0df417588460f5e4477060633000bfe94955851fd%40%3Cissues.trafficcontrol.apache.org%3E\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2W4COUPL3YVTZ6RTEIT6LPBDJUFF3VSP/\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/F3ZSHGNTJWCWYAKY5OLZS2XQQYHSXSUO/\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://security.netapp.com/advisory/ntap-20201202-0004/\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://www.arista.com/en/support/advisories-notices/security-advisories/12166-security-advisory-62\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://groups.google.com/g/golang-nuts/c/c-ssaaS7RMI\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Release Notes\",\"Third Party Advisory\"]},{\"url\":\"https://lists.apache.org/thread.html/rd02e75766cd333a0df417588460f5e4477060633000bfe94955851fd%40%3Cissues.trafficcontrol.apache.org%3E\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2W4COUPL3YVTZ6RTEIT6LPBDJUFF3VSP/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/F3ZSHGNTJWCWYAKY5OLZS2XQQYHSXSUO/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://security.netapp.com/advisory/ntap-20201202-0004/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://www.arista.com/en/support/advisories-notices/security-advisories/12166-security-advisory-62\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]}]}}"
}
}
MSRC_CVE-2020-28362
Vulnerability from csaf_microsoft - Published: 2020-11-02 00:00 - Updated: 2026-02-18 01:11| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 19049-16820 | — | ||
| Unresolved product id: 17021-17084 | — | ||
| Unresolved product id: 19696-17084 | — |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 17084-1 | — | ||
| Unresolved product id: 17084-3 | — |
| URL | Category |
|---|---|
| https://msrc.microsoft.com/csaf/vex/2020/msrc_cve… | self |
| https://support.microsoft.com/lifecycle | external |
| https://www.first.org/cvss | external |
| https://msrc.microsoft.com/csaf/vex/2020/msrc_cve… | self |
{
"document": {
"category": "csaf_vex",
"csaf_version": "2.0",
"distribution": {
"text": "Public",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en-US",
"notes": [
{
"category": "general",
"text": "To determine the support lifecycle for your software, see the Microsoft Support Lifecycle: https://support.microsoft.com/lifecycle",
"title": "Additional Resources"
},
{
"category": "legal_disclaimer",
"text": "The information provided in the Microsoft Knowledge Base is provided \\\"as is\\\" without warranty of any kind. Microsoft disclaims all warranties, either express or implied, including the warranties of merchantability and fitness for a particular purpose. In no event shall Microsoft Corporation or its suppliers be liable for any damages whatsoever including direct, indirect, incidental, consequential, loss of business profits or special damages, even if Microsoft Corporation or its suppliers have been advised of the possibility of such damages. Some states do not allow the exclusion or limitation of liability for consequential or incidental damages so the foregoing limitation may not apply.",
"title": "Disclaimer"
}
],
"publisher": {
"category": "vendor",
"contact_details": "secure@microsoft.com",
"name": "Microsoft Security Response Center",
"namespace": "https://msrc.microsoft.com"
},
"references": [
{
"category": "self",
"summary": "CVE-2020-28362 Go before 1.14.12 and 1.15.x before 1.15.4 allows Denial of Service. - VEX",
"url": "https://msrc.microsoft.com/csaf/vex/2020/msrc_cve-2020-28362.json"
},
{
"category": "external",
"summary": "Microsoft Support Lifecycle",
"url": "https://support.microsoft.com/lifecycle"
},
{
"category": "external",
"summary": "Common Vulnerability Scoring System",
"url": "https://www.first.org/cvss"
}
],
"title": "Go before 1.14.12 and 1.15.x before 1.15.4 allows Denial of Service.",
"tracking": {
"current_release_date": "2026-02-18T01:11:30.000Z",
"generator": {
"date": "2026-02-18T14:53:59.821Z",
"engine": {
"name": "MSRC Generator",
"version": "1.0"
}
},
"id": "msrc_CVE-2020-28362",
"initial_release_date": "2020-11-02T00:00:00.000Z",
"revision_history": [
{
"date": "2020-11-19T00:00:00.000Z",
"legacy_version": "1",
"number": "1",
"summary": "Information published."
},
{
"date": "2024-08-29T00:00:00.000Z",
"legacy_version": "1.1",
"number": "2",
"summary": "Information published."
},
{
"date": "2024-08-30T00:00:00.000Z",
"legacy_version": "1.2",
"number": "3",
"summary": "Information published."
},
{
"date": "2024-08-31T00:00:00.000Z",
"legacy_version": "1.3",
"number": "4",
"summary": "Information published."
},
{
"date": "2024-09-01T00:00:00.000Z",
"legacy_version": "1.4",
"number": "5",
"summary": "Information published."
},
{
"date": "2024-09-02T00:00:00.000Z",
"legacy_version": "1.5",
"number": "6",
"summary": "Information published."
},
{
"date": "2024-09-03T00:00:00.000Z",
"legacy_version": "1.6",
"number": "7",
"summary": "Information published."
},
{
"date": "2024-09-05T00:00:00.000Z",
"legacy_version": "1.7",
"number": "8",
"summary": "Information published."
},
{
"date": "2024-09-06T00:00:00.000Z",
"legacy_version": "1.8",
"number": "9",
"summary": "Information published."
},
{
"date": "2024-09-07T00:00:00.000Z",
"legacy_version": "1.9",
"number": "10",
"summary": "Information published."
},
{
"date": "2024-09-08T00:00:00.000Z",
"legacy_version": "2",
"number": "11",
"summary": "Information published."
},
{
"date": "2024-09-11T00:00:00.000Z",
"legacy_version": "2.1",
"number": "12",
"summary": "Information published."
},
{
"date": "2026-02-18T01:11:30.000Z",
"legacy_version": "2.2",
"number": "13",
"summary": "Information published."
}
],
"status": "final",
"version": "13"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "3.0",
"product": {
"name": "Azure Linux 3.0",
"product_id": "17084"
}
},
{
"category": "product_version",
"name": "1.0",
"product": {
"name": "CBL Mariner 1.0",
"product_id": "16820"
}
}
],
"category": "product_name",
"name": "Azure Linux"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003ccm1 golang 1.15.13-1",
"product": {
"name": "\u003ccm1 golang 1.15.13-1",
"product_id": "4"
}
},
{
"category": "product_version",
"name": "cm1 golang 1.15.13-1",
"product": {
"name": "cm1 golang 1.15.13-1",
"product_id": "19049"
}
}
],
"category": "product_name",
"name": "golang"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003cazl3 python-tensorboard 2.16.2-2",
"product": {
"name": "\u003cazl3 python-tensorboard 2.16.2-2",
"product_id": "5"
}
},
{
"category": "product_version",
"name": "azl3 python-tensorboard 2.16.2-2",
"product": {
"name": "azl3 python-tensorboard 2.16.2-2",
"product_id": "17021"
}
},
{
"category": "product_version_range",
"name": "\u003cazl3 python-tensorboard 2.11.0-3",
"product": {
"name": "\u003cazl3 python-tensorboard 2.11.0-3",
"product_id": "2"
}
},
{
"category": "product_version",
"name": "azl3 python-tensorboard 2.11.0-3",
"product": {
"name": "azl3 python-tensorboard 2.11.0-3",
"product_id": "19696"
}
}
],
"category": "product_name",
"name": "python-tensorboard"
},
{
"category": "product_name",
"name": "azl3 golang 1.24.3-1",
"product": {
"name": "azl3 golang 1.24.3-1",
"product_id": "1"
}
},
{
"category": "product_name",
"name": "azl3 golang 1.23.9-1",
"product": {
"name": "azl3 golang 1.23.9-1",
"product_id": "3"
}
}
],
"category": "vendor",
"name": "Microsoft"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "azl3 golang 1.24.3-1 as a component of Azure Linux 3.0",
"product_id": "17084-1"
},
"product_reference": "1",
"relates_to_product_reference": "17084"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "\u003ccm1 golang 1.15.13-1 as a component of CBL Mariner 1.0",
"product_id": "16820-4"
},
"product_reference": "4",
"relates_to_product_reference": "16820"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cm1 golang 1.15.13-1 as a component of CBL Mariner 1.0",
"product_id": "19049-16820"
},
"product_reference": "19049",
"relates_to_product_reference": "16820"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "\u003cazl3 python-tensorboard 2.16.2-2 as a component of Azure Linux 3.0",
"product_id": "17084-5"
},
"product_reference": "5",
"relates_to_product_reference": "17084"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "azl3 python-tensorboard 2.16.2-2 as a component of Azure Linux 3.0",
"product_id": "17021-17084"
},
"product_reference": "17021",
"relates_to_product_reference": "17084"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "azl3 golang 1.23.9-1 as a component of Azure Linux 3.0",
"product_id": "17084-3"
},
"product_reference": "3",
"relates_to_product_reference": "17084"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "\u003cazl3 python-tensorboard 2.11.0-3 as a component of Azure Linux 3.0",
"product_id": "17084-2"
},
"product_reference": "2",
"relates_to_product_reference": "17084"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "azl3 python-tensorboard 2.11.0-3 as a component of Azure Linux 3.0",
"product_id": "19696-17084"
},
"product_reference": "19696",
"relates_to_product_reference": "17084"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2020-28362",
"cwe": {
"id": "CWE-295",
"name": "Improper Certificate Validation"
},
"flags": [
{
"label": "component_not_present",
"product_ids": [
"17084-1",
"17084-3"
]
}
],
"notes": [
{
"category": "general",
"text": "mitre",
"title": "Assigning CNA"
}
],
"product_status": {
"fixed": [
"19049-16820",
"17021-17084",
"19696-17084"
],
"known_affected": [
"16820-4",
"17084-5",
"17084-2"
],
"known_not_affected": [
"17084-1",
"17084-3"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2020-28362 Go before 1.14.12 and 1.15.x before 1.15.4 allows Denial of Service. - VEX",
"url": "https://msrc.microsoft.com/csaf/vex/2020/msrc_cve-2020-28362.json"
}
],
"remediations": [
{
"category": "vendor_fix",
"date": "2020-11-19T00:00:00.000Z",
"details": "1.15.13-1:Security Update:https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade",
"product_ids": [
"16820-4"
],
"url": "https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade"
},
{
"category": "vendor_fix",
"date": "2020-11-19T00:00:00.000Z",
"details": "2.16.2-2:Security Update:https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade",
"product_ids": [
"17084-5",
"17084-2"
],
"url": "https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"environmentalsScore": 0.0,
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"temporalScore": 7.5,
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"16820-4",
"17084-5",
"17084-2"
]
}
],
"title": "Go before 1.14.12 and 1.15.x before 1.15.4 allows Denial of Service."
}
]
}
OPENSUSE-SU-2020:2047-1
Vulnerability from csaf_opensuse - Published: 2020-11-26 17:27 - Updated: 2020-11-26 17:27| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Leap 15.1:go1.14-1.14.12-lp151.22.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:go1.14-doc-1.14.12-lp151.22.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:go1.14-race-1.14.12-lp151.22.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Leap 15.1:go1.14-1.14.12-lp151.22.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:go1.14-doc-1.14.12-lp151.22.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:go1.14-race-1.14.12-lp151.22.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Leap 15.1:go1.14-1.14.12-lp151.22.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:go1.14-doc-1.14.12-lp151.22.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:go1.14-race-1.14.12-lp151.22.1.x86_64 | — |
Vendor Fix
|
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for go1.14",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for go1.14 fixes the following issues:\n\n- go1.14.12 (released 2020-11-12) includes security fixes to the cmd/go and math/big packages.\n * go#42553 math/big: panic during recursive division of very large numbers (bsc#1178750 CVE-2020-28362)\n * go#42560 cmd/go: arbitrary code can be injected into cgo generated files (bsc#1178752 CVE-2020-28367)\n * go#42557 cmd/go: improper validation of cgo flags can lead to remote code execution at build time (bsc#1178753 CVE-2020-28366)\n * go#42155 time: Location interprets wrong timezone (DST) with slim zoneinfo\n * go#42112 x/net/http2: the first write error on a connection will cause all subsequent write requests to fail blindly\n * go#41991 runtime: macOS-only segfault on 1.14+ with \u0027split stack overflow\u0027\n * go#41913 net/http: request.Clone doesn\u0027t deep copy TransferEncoding\n * go#41703 runtime: macOS syscall.Exec can get SIGILL due to preemption signal\n * go#41386 x/net/http2: connection-level flow control not returned if stream errors, causes server hang\n\nThis update was imported from the SUSE:SLE-15:Update update project.",
"title": "Description of the patch"
},
{
"category": "details",
"text": "openSUSE-2020-2047",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2020_2047-1.json"
},
{
"category": "self",
"summary": "URL for openSUSE-SU-2020:2047-1",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/E2QCSRQATMLK7WM4IWLILC7IQJFW7PVI/"
},
{
"category": "self",
"summary": "E-Mail link for openSUSE-SU-2020:2047-1",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/E2QCSRQATMLK7WM4IWLILC7IQJFW7PVI/"
},
{
"category": "self",
"summary": "SUSE Bug 1164903",
"url": "https://bugzilla.suse.com/1164903"
},
{
"category": "self",
"summary": "SUSE Bug 1178750",
"url": "https://bugzilla.suse.com/1178750"
},
{
"category": "self",
"summary": "SUSE Bug 1178752",
"url": "https://bugzilla.suse.com/1178752"
},
{
"category": "self",
"summary": "SUSE Bug 1178753",
"url": "https://bugzilla.suse.com/1178753"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-28362 page",
"url": "https://www.suse.com/security/cve/CVE-2020-28362/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-28366 page",
"url": "https://www.suse.com/security/cve/CVE-2020-28366/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-28367 page",
"url": "https://www.suse.com/security/cve/CVE-2020-28367/"
}
],
"title": "Security update for go1.14",
"tracking": {
"current_release_date": "2020-11-26T17:27:02Z",
"generator": {
"date": "2020-11-26T17:27:02Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "openSUSE-SU-2020:2047-1",
"initial_release_date": "2020-11-26T17:27:02Z",
"revision_history": [
{
"date": "2020-11-26T17:27:02Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "go1.14-1.14.12-lp151.22.1.x86_64",
"product": {
"name": "go1.14-1.14.12-lp151.22.1.x86_64",
"product_id": "go1.14-1.14.12-lp151.22.1.x86_64"
}
},
{
"category": "product_version",
"name": "go1.14-doc-1.14.12-lp151.22.1.x86_64",
"product": {
"name": "go1.14-doc-1.14.12-lp151.22.1.x86_64",
"product_id": "go1.14-doc-1.14.12-lp151.22.1.x86_64"
}
},
{
"category": "product_version",
"name": "go1.14-race-1.14.12-lp151.22.1.x86_64",
"product": {
"name": "go1.14-race-1.14.12-lp151.22.1.x86_64",
"product_id": "go1.14-race-1.14.12-lp151.22.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "openSUSE Leap 15.1",
"product": {
"name": "openSUSE Leap 15.1",
"product_id": "openSUSE Leap 15.1",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:leap:15.1"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.14-1.14.12-lp151.22.1.x86_64 as component of openSUSE Leap 15.1",
"product_id": "openSUSE Leap 15.1:go1.14-1.14.12-lp151.22.1.x86_64"
},
"product_reference": "go1.14-1.14.12-lp151.22.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.14-doc-1.14.12-lp151.22.1.x86_64 as component of openSUSE Leap 15.1",
"product_id": "openSUSE Leap 15.1:go1.14-doc-1.14.12-lp151.22.1.x86_64"
},
"product_reference": "go1.14-doc-1.14.12-lp151.22.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.14-race-1.14.12-lp151.22.1.x86_64 as component of openSUSE Leap 15.1",
"product_id": "openSUSE Leap 15.1:go1.14-race-1.14.12-lp151.22.1.x86_64"
},
"product_reference": "go1.14-race-1.14.12-lp151.22.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.1"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2020-28362",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-28362"
}
],
"notes": [
{
"category": "general",
"text": "Go before 1.14.12 and 1.15.x before 1.15.4 allows Denial of Service.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.1:go1.14-1.14.12-lp151.22.1.x86_64",
"openSUSE Leap 15.1:go1.14-doc-1.14.12-lp151.22.1.x86_64",
"openSUSE Leap 15.1:go1.14-race-1.14.12-lp151.22.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-28362",
"url": "https://www.suse.com/security/cve/CVE-2020-28362"
},
{
"category": "external",
"summary": "SUSE Bug 1178750 for CVE-2020-28362",
"url": "https://bugzilla.suse.com/1178750"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.1:go1.14-1.14.12-lp151.22.1.x86_64",
"openSUSE Leap 15.1:go1.14-doc-1.14.12-lp151.22.1.x86_64",
"openSUSE Leap 15.1:go1.14-race-1.14.12-lp151.22.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.1:go1.14-1.14.12-lp151.22.1.x86_64",
"openSUSE Leap 15.1:go1.14-doc-1.14.12-lp151.22.1.x86_64",
"openSUSE Leap 15.1:go1.14-race-1.14.12-lp151.22.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2020-11-26T17:27:02Z",
"details": "important"
}
],
"title": "CVE-2020-28362"
},
{
"cve": "CVE-2020-28366",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-28366"
}
],
"notes": [
{
"category": "general",
"text": "Code injection in the go command with cgo before Go 1.14.12 and Go 1.15.5 allows arbitrary code execution at build time via a malicious unquoted symbol name in a linked object file.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.1:go1.14-1.14.12-lp151.22.1.x86_64",
"openSUSE Leap 15.1:go1.14-doc-1.14.12-lp151.22.1.x86_64",
"openSUSE Leap 15.1:go1.14-race-1.14.12-lp151.22.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-28366",
"url": "https://www.suse.com/security/cve/CVE-2020-28366"
},
{
"category": "external",
"summary": "SUSE Bug 1178753 for CVE-2020-28366",
"url": "https://bugzilla.suse.com/1178753"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.1:go1.14-1.14.12-lp151.22.1.x86_64",
"openSUSE Leap 15.1:go1.14-doc-1.14.12-lp151.22.1.x86_64",
"openSUSE Leap 15.1:go1.14-race-1.14.12-lp151.22.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.1:go1.14-1.14.12-lp151.22.1.x86_64",
"openSUSE Leap 15.1:go1.14-doc-1.14.12-lp151.22.1.x86_64",
"openSUSE Leap 15.1:go1.14-race-1.14.12-lp151.22.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2020-11-26T17:27:02Z",
"details": "important"
}
],
"title": "CVE-2020-28366"
},
{
"cve": "CVE-2020-28367",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-28367"
}
],
"notes": [
{
"category": "general",
"text": "Code injection in the go command with cgo before Go 1.14.12 and Go 1.15.5 allows arbitrary code execution at build time via malicious gcc flags specified via a #cgo directive.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.1:go1.14-1.14.12-lp151.22.1.x86_64",
"openSUSE Leap 15.1:go1.14-doc-1.14.12-lp151.22.1.x86_64",
"openSUSE Leap 15.1:go1.14-race-1.14.12-lp151.22.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-28367",
"url": "https://www.suse.com/security/cve/CVE-2020-28367"
},
{
"category": "external",
"summary": "SUSE Bug 1178752 for CVE-2020-28367",
"url": "https://bugzilla.suse.com/1178752"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.1:go1.14-1.14.12-lp151.22.1.x86_64",
"openSUSE Leap 15.1:go1.14-doc-1.14.12-lp151.22.1.x86_64",
"openSUSE Leap 15.1:go1.14-race-1.14.12-lp151.22.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.1:go1.14-1.14.12-lp151.22.1.x86_64",
"openSUSE Leap 15.1:go1.14-doc-1.14.12-lp151.22.1.x86_64",
"openSUSE Leap 15.1:go1.14-race-1.14.12-lp151.22.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2020-11-26T17:27:02Z",
"details": "important"
}
],
"title": "CVE-2020-28367"
}
]
}
OPENSUSE-SU-2020:2067-1
Vulnerability from csaf_opensuse - Published: 2020-11-27 05:24 - Updated: 2020-11-27 05:24| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Leap 15.2:go1.14-1.14.12-lp152.2.12.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.2:go1.14-doc-1.14.12-lp152.2.12.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.2:go1.14-race-1.14.12-lp152.2.12.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Leap 15.2:go1.14-1.14.12-lp152.2.12.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.2:go1.14-doc-1.14.12-lp152.2.12.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.2:go1.14-race-1.14.12-lp152.2.12.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Leap 15.2:go1.14-1.14.12-lp152.2.12.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.2:go1.14-doc-1.14.12-lp152.2.12.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.2:go1.14-race-1.14.12-lp152.2.12.1.x86_64 | — |
Vendor Fix
|
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for go1.14",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for go1.14 fixes the following issues:\n\n- go1.14.12 (released 2020-11-12) includes security fixes to the cmd/go and math/big packages.\n * go#42553 math/big: panic during recursive division of very large numbers (bsc#1178750 CVE-2020-28362)\n * go#42560 cmd/go: arbitrary code can be injected into cgo generated files (bsc#1178752 CVE-2020-28367)\n * go#42557 cmd/go: improper validation of cgo flags can lead to remote code execution at build time (bsc#1178753 CVE-2020-28366)\n * go#42155 time: Location interprets wrong timezone (DST) with slim zoneinfo\n * go#42112 x/net/http2: the first write error on a connection will cause all subsequent write requests to fail blindly\n * go#41991 runtime: macOS-only segfault on 1.14+ with \u0027split stack overflow\u0027\n * go#41913 net/http: request.Clone doesn\u0027t deep copy TransferEncoding\n * go#41703 runtime: macOS syscall.Exec can get SIGILL due to preemption signal\n * go#41386 x/net/http2: connection-level flow control not returned if stream errors, causes server hang\n\nThis update was imported from the SUSE:SLE-15:Update update project.",
"title": "Description of the patch"
},
{
"category": "details",
"text": "openSUSE-2020-2067",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2020_2067-1.json"
},
{
"category": "self",
"summary": "URL for openSUSE-SU-2020:2067-1",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IQVUQXAVUQCNNOSHNTQGRCAEYALRL2NA/"
},
{
"category": "self",
"summary": "E-Mail link for openSUSE-SU-2020:2067-1",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IQVUQXAVUQCNNOSHNTQGRCAEYALRL2NA/"
},
{
"category": "self",
"summary": "SUSE Bug 1164903",
"url": "https://bugzilla.suse.com/1164903"
},
{
"category": "self",
"summary": "SUSE Bug 1178750",
"url": "https://bugzilla.suse.com/1178750"
},
{
"category": "self",
"summary": "SUSE Bug 1178752",
"url": "https://bugzilla.suse.com/1178752"
},
{
"category": "self",
"summary": "SUSE Bug 1178753",
"url": "https://bugzilla.suse.com/1178753"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-28362 page",
"url": "https://www.suse.com/security/cve/CVE-2020-28362/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-28366 page",
"url": "https://www.suse.com/security/cve/CVE-2020-28366/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-28367 page",
"url": "https://www.suse.com/security/cve/CVE-2020-28367/"
}
],
"title": "Security update for go1.14",
"tracking": {
"current_release_date": "2020-11-27T05:24:15Z",
"generator": {
"date": "2020-11-27T05:24:15Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "openSUSE-SU-2020:2067-1",
"initial_release_date": "2020-11-27T05:24:15Z",
"revision_history": [
{
"date": "2020-11-27T05:24:15Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "go1.14-1.14.12-lp152.2.12.1.x86_64",
"product": {
"name": "go1.14-1.14.12-lp152.2.12.1.x86_64",
"product_id": "go1.14-1.14.12-lp152.2.12.1.x86_64"
}
},
{
"category": "product_version",
"name": "go1.14-doc-1.14.12-lp152.2.12.1.x86_64",
"product": {
"name": "go1.14-doc-1.14.12-lp152.2.12.1.x86_64",
"product_id": "go1.14-doc-1.14.12-lp152.2.12.1.x86_64"
}
},
{
"category": "product_version",
"name": "go1.14-race-1.14.12-lp152.2.12.1.x86_64",
"product": {
"name": "go1.14-race-1.14.12-lp152.2.12.1.x86_64",
"product_id": "go1.14-race-1.14.12-lp152.2.12.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "openSUSE Leap 15.2",
"product": {
"name": "openSUSE Leap 15.2",
"product_id": "openSUSE Leap 15.2",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:leap:15.2"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.14-1.14.12-lp152.2.12.1.x86_64 as component of openSUSE Leap 15.2",
"product_id": "openSUSE Leap 15.2:go1.14-1.14.12-lp152.2.12.1.x86_64"
},
"product_reference": "go1.14-1.14.12-lp152.2.12.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.14-doc-1.14.12-lp152.2.12.1.x86_64 as component of openSUSE Leap 15.2",
"product_id": "openSUSE Leap 15.2:go1.14-doc-1.14.12-lp152.2.12.1.x86_64"
},
"product_reference": "go1.14-doc-1.14.12-lp152.2.12.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.14-race-1.14.12-lp152.2.12.1.x86_64 as component of openSUSE Leap 15.2",
"product_id": "openSUSE Leap 15.2:go1.14-race-1.14.12-lp152.2.12.1.x86_64"
},
"product_reference": "go1.14-race-1.14.12-lp152.2.12.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.2"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2020-28362",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-28362"
}
],
"notes": [
{
"category": "general",
"text": "Go before 1.14.12 and 1.15.x before 1.15.4 allows Denial of Service.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.2:go1.14-1.14.12-lp152.2.12.1.x86_64",
"openSUSE Leap 15.2:go1.14-doc-1.14.12-lp152.2.12.1.x86_64",
"openSUSE Leap 15.2:go1.14-race-1.14.12-lp152.2.12.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-28362",
"url": "https://www.suse.com/security/cve/CVE-2020-28362"
},
{
"category": "external",
"summary": "SUSE Bug 1178750 for CVE-2020-28362",
"url": "https://bugzilla.suse.com/1178750"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.2:go1.14-1.14.12-lp152.2.12.1.x86_64",
"openSUSE Leap 15.2:go1.14-doc-1.14.12-lp152.2.12.1.x86_64",
"openSUSE Leap 15.2:go1.14-race-1.14.12-lp152.2.12.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.2:go1.14-1.14.12-lp152.2.12.1.x86_64",
"openSUSE Leap 15.2:go1.14-doc-1.14.12-lp152.2.12.1.x86_64",
"openSUSE Leap 15.2:go1.14-race-1.14.12-lp152.2.12.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2020-11-27T05:24:15Z",
"details": "important"
}
],
"title": "CVE-2020-28362"
},
{
"cve": "CVE-2020-28366",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-28366"
}
],
"notes": [
{
"category": "general",
"text": "Code injection in the go command with cgo before Go 1.14.12 and Go 1.15.5 allows arbitrary code execution at build time via a malicious unquoted symbol name in a linked object file.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.2:go1.14-1.14.12-lp152.2.12.1.x86_64",
"openSUSE Leap 15.2:go1.14-doc-1.14.12-lp152.2.12.1.x86_64",
"openSUSE Leap 15.2:go1.14-race-1.14.12-lp152.2.12.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-28366",
"url": "https://www.suse.com/security/cve/CVE-2020-28366"
},
{
"category": "external",
"summary": "SUSE Bug 1178753 for CVE-2020-28366",
"url": "https://bugzilla.suse.com/1178753"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.2:go1.14-1.14.12-lp152.2.12.1.x86_64",
"openSUSE Leap 15.2:go1.14-doc-1.14.12-lp152.2.12.1.x86_64",
"openSUSE Leap 15.2:go1.14-race-1.14.12-lp152.2.12.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.2:go1.14-1.14.12-lp152.2.12.1.x86_64",
"openSUSE Leap 15.2:go1.14-doc-1.14.12-lp152.2.12.1.x86_64",
"openSUSE Leap 15.2:go1.14-race-1.14.12-lp152.2.12.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2020-11-27T05:24:15Z",
"details": "important"
}
],
"title": "CVE-2020-28366"
},
{
"cve": "CVE-2020-28367",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-28367"
}
],
"notes": [
{
"category": "general",
"text": "Code injection in the go command with cgo before Go 1.14.12 and Go 1.15.5 allows arbitrary code execution at build time via malicious gcc flags specified via a #cgo directive.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.2:go1.14-1.14.12-lp152.2.12.1.x86_64",
"openSUSE Leap 15.2:go1.14-doc-1.14.12-lp152.2.12.1.x86_64",
"openSUSE Leap 15.2:go1.14-race-1.14.12-lp152.2.12.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-28367",
"url": "https://www.suse.com/security/cve/CVE-2020-28367"
},
{
"category": "external",
"summary": "SUSE Bug 1178752 for CVE-2020-28367",
"url": "https://bugzilla.suse.com/1178752"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.2:go1.14-1.14.12-lp152.2.12.1.x86_64",
"openSUSE Leap 15.2:go1.14-doc-1.14.12-lp152.2.12.1.x86_64",
"openSUSE Leap 15.2:go1.14-race-1.14.12-lp152.2.12.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.2:go1.14-1.14.12-lp152.2.12.1.x86_64",
"openSUSE Leap 15.2:go1.14-doc-1.14.12-lp152.2.12.1.x86_64",
"openSUSE Leap 15.2:go1.14-race-1.14.12-lp152.2.12.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2020-11-27T05:24:15Z",
"details": "important"
}
],
"title": "CVE-2020-28367"
}
]
}
OPENSUSE-SU-2020:2139-1
Vulnerability from csaf_opensuse - Published: 2020-12-01 11:24 - Updated: 2020-12-01 11:24| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Leap 15.2:go1.15-1.15.5-lp152.2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.2:go1.15-doc-1.15.5-lp152.2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.2:go1.15-race-1.15.5-lp152.2.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Leap 15.2:go1.15-1.15.5-lp152.2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.2:go1.15-doc-1.15.5-lp152.2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.2:go1.15-race-1.15.5-lp152.2.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Leap 15.2:go1.15-1.15.5-lp152.2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.2:go1.15-doc-1.15.5-lp152.2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.2:go1.15-race-1.15.5-lp152.2.1.x86_64 | — |
Vendor Fix
|
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for go1.15",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for go1.15 fixes the following issues:\n\n- go1.15.5 (released 2020-11-12) includes security fixes to the cmd/go and math/big packages.\n * go#42553 math/big: panic during recursive division of very large numbers (bsc#1178750 CVE-2020-28362)\n * go#42560 cmd/go: arbitrary code can be injected into cgo generated files (bsc#1178752 CVE-2020-28367)\n * go#42557 cmd/go: improper validation of cgo flags can lead to remote code execution at build time (bsc#1178753 CVE-2020-28366)\n * go#42169 cmd/compile, runtime, reflect: pointers to go:notinheap types must be stored indirectly in interfaces\n * go#42151 cmd/cgo: opaque struct pointers are broken since Go 1.15.3\n * go#42138 time: Location interprets wrong timezone (DST) with slim zoneinfo\n * go#42113 x/net/http2: the first write error on a connection will cause all subsequent write requests to fail blindly\n * go#41914 net/http: request.Clone doesn\u0027t deep copy TransferEncoding\n * go#41704 runtime: macOS syscall.Exec can get SIGILL due to preemption signal\n * go#41463 compress/flate: deflatefast produces corrupted output\n * go#41387 x/net/http2: connection-level flow control not returned if stream errors, causes server hang\n * go#40974 cmd/link: sectionForAddress(0xA9D67F) address not in any section file\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "openSUSE-2020-2139",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2020_2139-1.json"
},
{
"category": "self",
"summary": "URL for openSUSE-SU-2020:2139-1",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5HGUG34M7TVN5CJXWIHJF454FAT7TTWY/"
},
{
"category": "self",
"summary": "E-Mail link for openSUSE-SU-2020:2139-1",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5HGUG34M7TVN5CJXWIHJF454FAT7TTWY/"
},
{
"category": "self",
"summary": "SUSE Bug 1175132",
"url": "https://bugzilla.suse.com/1175132"
},
{
"category": "self",
"summary": "SUSE Bug 1178750",
"url": "https://bugzilla.suse.com/1178750"
},
{
"category": "self",
"summary": "SUSE Bug 1178752",
"url": "https://bugzilla.suse.com/1178752"
},
{
"category": "self",
"summary": "SUSE Bug 1178753",
"url": "https://bugzilla.suse.com/1178753"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-28362 page",
"url": "https://www.suse.com/security/cve/CVE-2020-28362/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-28366 page",
"url": "https://www.suse.com/security/cve/CVE-2020-28366/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-28367 page",
"url": "https://www.suse.com/security/cve/CVE-2020-28367/"
}
],
"title": "Security update for go1.15",
"tracking": {
"current_release_date": "2020-12-01T11:24:50Z",
"generator": {
"date": "2020-12-01T11:24:50Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "openSUSE-SU-2020:2139-1",
"initial_release_date": "2020-12-01T11:24:50Z",
"revision_history": [
{
"date": "2020-12-01T11:24:50Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "go1.15-1.15.5-lp152.2.1.x86_64",
"product": {
"name": "go1.15-1.15.5-lp152.2.1.x86_64",
"product_id": "go1.15-1.15.5-lp152.2.1.x86_64"
}
},
{
"category": "product_version",
"name": "go1.15-doc-1.15.5-lp152.2.1.x86_64",
"product": {
"name": "go1.15-doc-1.15.5-lp152.2.1.x86_64",
"product_id": "go1.15-doc-1.15.5-lp152.2.1.x86_64"
}
},
{
"category": "product_version",
"name": "go1.15-race-1.15.5-lp152.2.1.x86_64",
"product": {
"name": "go1.15-race-1.15.5-lp152.2.1.x86_64",
"product_id": "go1.15-race-1.15.5-lp152.2.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "openSUSE Leap 15.2",
"product": {
"name": "openSUSE Leap 15.2",
"product_id": "openSUSE Leap 15.2",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:leap:15.2"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.15-1.15.5-lp152.2.1.x86_64 as component of openSUSE Leap 15.2",
"product_id": "openSUSE Leap 15.2:go1.15-1.15.5-lp152.2.1.x86_64"
},
"product_reference": "go1.15-1.15.5-lp152.2.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.15-doc-1.15.5-lp152.2.1.x86_64 as component of openSUSE Leap 15.2",
"product_id": "openSUSE Leap 15.2:go1.15-doc-1.15.5-lp152.2.1.x86_64"
},
"product_reference": "go1.15-doc-1.15.5-lp152.2.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.15-race-1.15.5-lp152.2.1.x86_64 as component of openSUSE Leap 15.2",
"product_id": "openSUSE Leap 15.2:go1.15-race-1.15.5-lp152.2.1.x86_64"
},
"product_reference": "go1.15-race-1.15.5-lp152.2.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.2"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2020-28362",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-28362"
}
],
"notes": [
{
"category": "general",
"text": "Go before 1.14.12 and 1.15.x before 1.15.4 allows Denial of Service.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.2:go1.15-1.15.5-lp152.2.1.x86_64",
"openSUSE Leap 15.2:go1.15-doc-1.15.5-lp152.2.1.x86_64",
"openSUSE Leap 15.2:go1.15-race-1.15.5-lp152.2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-28362",
"url": "https://www.suse.com/security/cve/CVE-2020-28362"
},
{
"category": "external",
"summary": "SUSE Bug 1178750 for CVE-2020-28362",
"url": "https://bugzilla.suse.com/1178750"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.2:go1.15-1.15.5-lp152.2.1.x86_64",
"openSUSE Leap 15.2:go1.15-doc-1.15.5-lp152.2.1.x86_64",
"openSUSE Leap 15.2:go1.15-race-1.15.5-lp152.2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.2:go1.15-1.15.5-lp152.2.1.x86_64",
"openSUSE Leap 15.2:go1.15-doc-1.15.5-lp152.2.1.x86_64",
"openSUSE Leap 15.2:go1.15-race-1.15.5-lp152.2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2020-12-01T11:24:50Z",
"details": "important"
}
],
"title": "CVE-2020-28362"
},
{
"cve": "CVE-2020-28366",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-28366"
}
],
"notes": [
{
"category": "general",
"text": "Code injection in the go command with cgo before Go 1.14.12 and Go 1.15.5 allows arbitrary code execution at build time via a malicious unquoted symbol name in a linked object file.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.2:go1.15-1.15.5-lp152.2.1.x86_64",
"openSUSE Leap 15.2:go1.15-doc-1.15.5-lp152.2.1.x86_64",
"openSUSE Leap 15.2:go1.15-race-1.15.5-lp152.2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-28366",
"url": "https://www.suse.com/security/cve/CVE-2020-28366"
},
{
"category": "external",
"summary": "SUSE Bug 1178753 for CVE-2020-28366",
"url": "https://bugzilla.suse.com/1178753"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.2:go1.15-1.15.5-lp152.2.1.x86_64",
"openSUSE Leap 15.2:go1.15-doc-1.15.5-lp152.2.1.x86_64",
"openSUSE Leap 15.2:go1.15-race-1.15.5-lp152.2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.2:go1.15-1.15.5-lp152.2.1.x86_64",
"openSUSE Leap 15.2:go1.15-doc-1.15.5-lp152.2.1.x86_64",
"openSUSE Leap 15.2:go1.15-race-1.15.5-lp152.2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2020-12-01T11:24:50Z",
"details": "important"
}
],
"title": "CVE-2020-28366"
},
{
"cve": "CVE-2020-28367",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-28367"
}
],
"notes": [
{
"category": "general",
"text": "Code injection in the go command with cgo before Go 1.14.12 and Go 1.15.5 allows arbitrary code execution at build time via malicious gcc flags specified via a #cgo directive.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.2:go1.15-1.15.5-lp152.2.1.x86_64",
"openSUSE Leap 15.2:go1.15-doc-1.15.5-lp152.2.1.x86_64",
"openSUSE Leap 15.2:go1.15-race-1.15.5-lp152.2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-28367",
"url": "https://www.suse.com/security/cve/CVE-2020-28367"
},
{
"category": "external",
"summary": "SUSE Bug 1178752 for CVE-2020-28367",
"url": "https://bugzilla.suse.com/1178752"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.2:go1.15-1.15.5-lp152.2.1.x86_64",
"openSUSE Leap 15.2:go1.15-doc-1.15.5-lp152.2.1.x86_64",
"openSUSE Leap 15.2:go1.15-race-1.15.5-lp152.2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.2:go1.15-1.15.5-lp152.2.1.x86_64",
"openSUSE Leap 15.2:go1.15-doc-1.15.5-lp152.2.1.x86_64",
"openSUSE Leap 15.2:go1.15-race-1.15.5-lp152.2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2020-12-01T11:24:50Z",
"details": "important"
}
],
"title": "CVE-2020-28367"
}
]
}
OPENSUSE-SU-2024:10807-1
Vulnerability from csaf_opensuse - Published: 2024-06-15 00:00 - Updated: 2024-06-15 00:00| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:go1.14-1.14.15-1.6.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:go1.14-1.14.15-1.6.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:go1.14-1.14.15-1.6.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:go1.14-1.14.15-1.6.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:go1.14-doc-1.14.15-1.6.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:go1.14-doc-1.14.15-1.6.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:go1.14-doc-1.14.15-1.6.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:go1.14-doc-1.14.15-1.6.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:go1.14-race-1.14.15-1.6.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:go1.14-race-1.14.15-1.6.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:go1.14-race-1.14.15-1.6.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:go1.14-race-1.14.15-1.6.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:go1.14-1.14.15-1.6.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:go1.14-1.14.15-1.6.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:go1.14-1.14.15-1.6.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:go1.14-1.14.15-1.6.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:go1.14-doc-1.14.15-1.6.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:go1.14-doc-1.14.15-1.6.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:go1.14-doc-1.14.15-1.6.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:go1.14-doc-1.14.15-1.6.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:go1.14-race-1.14.15-1.6.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:go1.14-race-1.14.15-1.6.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:go1.14-race-1.14.15-1.6.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:go1.14-race-1.14.15-1.6.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:go1.14-1.14.15-1.6.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:go1.14-1.14.15-1.6.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:go1.14-1.14.15-1.6.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:go1.14-1.14.15-1.6.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:go1.14-doc-1.14.15-1.6.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:go1.14-doc-1.14.15-1.6.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:go1.14-doc-1.14.15-1.6.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:go1.14-doc-1.14.15-1.6.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:go1.14-race-1.14.15-1.6.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:go1.14-race-1.14.15-1.6.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:go1.14-race-1.14.15-1.6.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:go1.14-race-1.14.15-1.6.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:go1.14-1.14.15-1.6.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:go1.14-1.14.15-1.6.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:go1.14-1.14.15-1.6.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:go1.14-1.14.15-1.6.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:go1.14-doc-1.14.15-1.6.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:go1.14-doc-1.14.15-1.6.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:go1.14-doc-1.14.15-1.6.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:go1.14-doc-1.14.15-1.6.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:go1.14-race-1.14.15-1.6.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:go1.14-race-1.14.15-1.6.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:go1.14-race-1.14.15-1.6.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:go1.14-race-1.14.15-1.6.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:go1.14-1.14.15-1.6.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:go1.14-1.14.15-1.6.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:go1.14-1.14.15-1.6.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:go1.14-1.14.15-1.6.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:go1.14-doc-1.14.15-1.6.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:go1.14-doc-1.14.15-1.6.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:go1.14-doc-1.14.15-1.6.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:go1.14-doc-1.14.15-1.6.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:go1.14-race-1.14.15-1.6.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:go1.14-race-1.14.15-1.6.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:go1.14-race-1.14.15-1.6.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:go1.14-race-1.14.15-1.6.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:go1.14-1.14.15-1.6.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:go1.14-1.14.15-1.6.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:go1.14-1.14.15-1.6.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:go1.14-1.14.15-1.6.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:go1.14-doc-1.14.15-1.6.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:go1.14-doc-1.14.15-1.6.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:go1.14-doc-1.14.15-1.6.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:go1.14-doc-1.14.15-1.6.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:go1.14-race-1.14.15-1.6.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:go1.14-race-1.14.15-1.6.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:go1.14-race-1.14.15-1.6.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:go1.14-race-1.14.15-1.6.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:go1.14-1.14.15-1.6.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:go1.14-1.14.15-1.6.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:go1.14-1.14.15-1.6.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:go1.14-1.14.15-1.6.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:go1.14-doc-1.14.15-1.6.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:go1.14-doc-1.14.15-1.6.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:go1.14-doc-1.14.15-1.6.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:go1.14-doc-1.14.15-1.6.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:go1.14-race-1.14.15-1.6.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:go1.14-race-1.14.15-1.6.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:go1.14-race-1.14.15-1.6.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:go1.14-race-1.14.15-1.6.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:go1.14-1.14.15-1.6.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:go1.14-1.14.15-1.6.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:go1.14-1.14.15-1.6.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:go1.14-1.14.15-1.6.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:go1.14-doc-1.14.15-1.6.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:go1.14-doc-1.14.15-1.6.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:go1.14-doc-1.14.15-1.6.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:go1.14-doc-1.14.15-1.6.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:go1.14-race-1.14.15-1.6.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:go1.14-race-1.14.15-1.6.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:go1.14-race-1.14.15-1.6.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:go1.14-race-1.14.15-1.6.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:go1.14-1.14.15-1.6.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:go1.14-1.14.15-1.6.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:go1.14-1.14.15-1.6.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:go1.14-1.14.15-1.6.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:go1.14-doc-1.14.15-1.6.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:go1.14-doc-1.14.15-1.6.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:go1.14-doc-1.14.15-1.6.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:go1.14-doc-1.14.15-1.6.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:go1.14-race-1.14.15-1.6.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:go1.14-race-1.14.15-1.6.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:go1.14-race-1.14.15-1.6.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:go1.14-race-1.14.15-1.6.x86_64 | — |
Vendor Fix
|
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "go1.14-1.14.15-1.6 on GA media",
"title": "Title of the patch"
},
{
"category": "description",
"text": "These are all security issues fixed in the go1.14-1.14.15-1.6 package on the GA media of openSUSE Tumbleweed.",
"title": "Description of the patch"
},
{
"category": "details",
"text": "openSUSE-Tumbleweed-2024-10807",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2024_10807-1.json"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-14039 page",
"url": "https://www.suse.com/security/cve/CVE-2020-14039/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-15586 page",
"url": "https://www.suse.com/security/cve/CVE-2020-15586/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-16845 page",
"url": "https://www.suse.com/security/cve/CVE-2020-16845/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-24553 page",
"url": "https://www.suse.com/security/cve/CVE-2020-24553/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-28362 page",
"url": "https://www.suse.com/security/cve/CVE-2020-28362/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-28366 page",
"url": "https://www.suse.com/security/cve/CVE-2020-28366/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-28367 page",
"url": "https://www.suse.com/security/cve/CVE-2020-28367/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-3114 page",
"url": "https://www.suse.com/security/cve/CVE-2021-3114/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-3115 page",
"url": "https://www.suse.com/security/cve/CVE-2021-3115/"
}
],
"title": "go1.14-1.14.15-1.6 on GA media",
"tracking": {
"current_release_date": "2024-06-15T00:00:00Z",
"generator": {
"date": "2024-06-15T00:00:00Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "openSUSE-SU-2024:10807-1",
"initial_release_date": "2024-06-15T00:00:00Z",
"revision_history": [
{
"date": "2024-06-15T00:00:00Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "go1.14-1.14.15-1.6.aarch64",
"product": {
"name": "go1.14-1.14.15-1.6.aarch64",
"product_id": "go1.14-1.14.15-1.6.aarch64"
}
},
{
"category": "product_version",
"name": "go1.14-doc-1.14.15-1.6.aarch64",
"product": {
"name": "go1.14-doc-1.14.15-1.6.aarch64",
"product_id": "go1.14-doc-1.14.15-1.6.aarch64"
}
},
{
"category": "product_version",
"name": "go1.14-race-1.14.15-1.6.aarch64",
"product": {
"name": "go1.14-race-1.14.15-1.6.aarch64",
"product_id": "go1.14-race-1.14.15-1.6.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "go1.14-1.14.15-1.6.ppc64le",
"product": {
"name": "go1.14-1.14.15-1.6.ppc64le",
"product_id": "go1.14-1.14.15-1.6.ppc64le"
}
},
{
"category": "product_version",
"name": "go1.14-doc-1.14.15-1.6.ppc64le",
"product": {
"name": "go1.14-doc-1.14.15-1.6.ppc64le",
"product_id": "go1.14-doc-1.14.15-1.6.ppc64le"
}
},
{
"category": "product_version",
"name": "go1.14-race-1.14.15-1.6.ppc64le",
"product": {
"name": "go1.14-race-1.14.15-1.6.ppc64le",
"product_id": "go1.14-race-1.14.15-1.6.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "go1.14-1.14.15-1.6.s390x",
"product": {
"name": "go1.14-1.14.15-1.6.s390x",
"product_id": "go1.14-1.14.15-1.6.s390x"
}
},
{
"category": "product_version",
"name": "go1.14-doc-1.14.15-1.6.s390x",
"product": {
"name": "go1.14-doc-1.14.15-1.6.s390x",
"product_id": "go1.14-doc-1.14.15-1.6.s390x"
}
},
{
"category": "product_version",
"name": "go1.14-race-1.14.15-1.6.s390x",
"product": {
"name": "go1.14-race-1.14.15-1.6.s390x",
"product_id": "go1.14-race-1.14.15-1.6.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "go1.14-1.14.15-1.6.x86_64",
"product": {
"name": "go1.14-1.14.15-1.6.x86_64",
"product_id": "go1.14-1.14.15-1.6.x86_64"
}
},
{
"category": "product_version",
"name": "go1.14-doc-1.14.15-1.6.x86_64",
"product": {
"name": "go1.14-doc-1.14.15-1.6.x86_64",
"product_id": "go1.14-doc-1.14.15-1.6.x86_64"
}
},
{
"category": "product_version",
"name": "go1.14-race-1.14.15-1.6.x86_64",
"product": {
"name": "go1.14-race-1.14.15-1.6.x86_64",
"product_id": "go1.14-race-1.14.15-1.6.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "openSUSE Tumbleweed",
"product": {
"name": "openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:tumbleweed"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.14-1.14.15-1.6.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:go1.14-1.14.15-1.6.aarch64"
},
"product_reference": "go1.14-1.14.15-1.6.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.14-1.14.15-1.6.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:go1.14-1.14.15-1.6.ppc64le"
},
"product_reference": "go1.14-1.14.15-1.6.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.14-1.14.15-1.6.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:go1.14-1.14.15-1.6.s390x"
},
"product_reference": "go1.14-1.14.15-1.6.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.14-1.14.15-1.6.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:go1.14-1.14.15-1.6.x86_64"
},
"product_reference": "go1.14-1.14.15-1.6.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.14-doc-1.14.15-1.6.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:go1.14-doc-1.14.15-1.6.aarch64"
},
"product_reference": "go1.14-doc-1.14.15-1.6.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.14-doc-1.14.15-1.6.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:go1.14-doc-1.14.15-1.6.ppc64le"
},
"product_reference": "go1.14-doc-1.14.15-1.6.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.14-doc-1.14.15-1.6.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:go1.14-doc-1.14.15-1.6.s390x"
},
"product_reference": "go1.14-doc-1.14.15-1.6.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.14-doc-1.14.15-1.6.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:go1.14-doc-1.14.15-1.6.x86_64"
},
"product_reference": "go1.14-doc-1.14.15-1.6.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.14-race-1.14.15-1.6.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:go1.14-race-1.14.15-1.6.aarch64"
},
"product_reference": "go1.14-race-1.14.15-1.6.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.14-race-1.14.15-1.6.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:go1.14-race-1.14.15-1.6.ppc64le"
},
"product_reference": "go1.14-race-1.14.15-1.6.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.14-race-1.14.15-1.6.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:go1.14-race-1.14.15-1.6.s390x"
},
"product_reference": "go1.14-race-1.14.15-1.6.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.14-race-1.14.15-1.6.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:go1.14-race-1.14.15-1.6.x86_64"
},
"product_reference": "go1.14-race-1.14.15-1.6.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2020-14039",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-14039"
}
],
"notes": [
{
"category": "general",
"text": "In Go before 1.13.13 and 1.14.x before 1.14.5, Certificate.Verify may lack a check on the VerifyOptions.KeyUsages EKU requirements (if VerifyOptions.Roots equals nil and the installation is on Windows). Thus, X.509 certificate verification is incomplete.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:go1.14-1.14.15-1.6.aarch64",
"openSUSE Tumbleweed:go1.14-1.14.15-1.6.ppc64le",
"openSUSE Tumbleweed:go1.14-1.14.15-1.6.s390x",
"openSUSE Tumbleweed:go1.14-1.14.15-1.6.x86_64",
"openSUSE Tumbleweed:go1.14-doc-1.14.15-1.6.aarch64",
"openSUSE Tumbleweed:go1.14-doc-1.14.15-1.6.ppc64le",
"openSUSE Tumbleweed:go1.14-doc-1.14.15-1.6.s390x",
"openSUSE Tumbleweed:go1.14-doc-1.14.15-1.6.x86_64",
"openSUSE Tumbleweed:go1.14-race-1.14.15-1.6.aarch64",
"openSUSE Tumbleweed:go1.14-race-1.14.15-1.6.ppc64le",
"openSUSE Tumbleweed:go1.14-race-1.14.15-1.6.s390x",
"openSUSE Tumbleweed:go1.14-race-1.14.15-1.6.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-14039",
"url": "https://www.suse.com/security/cve/CVE-2020-14039"
},
{
"category": "external",
"summary": "SUSE Bug 1174191 for CVE-2020-14039",
"url": "https://bugzilla.suse.com/1174191"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:go1.14-1.14.15-1.6.aarch64",
"openSUSE Tumbleweed:go1.14-1.14.15-1.6.ppc64le",
"openSUSE Tumbleweed:go1.14-1.14.15-1.6.s390x",
"openSUSE Tumbleweed:go1.14-1.14.15-1.6.x86_64",
"openSUSE Tumbleweed:go1.14-doc-1.14.15-1.6.aarch64",
"openSUSE Tumbleweed:go1.14-doc-1.14.15-1.6.ppc64le",
"openSUSE Tumbleweed:go1.14-doc-1.14.15-1.6.s390x",
"openSUSE Tumbleweed:go1.14-doc-1.14.15-1.6.x86_64",
"openSUSE Tumbleweed:go1.14-race-1.14.15-1.6.aarch64",
"openSUSE Tumbleweed:go1.14-race-1.14.15-1.6.ppc64le",
"openSUSE Tumbleweed:go1.14-race-1.14.15-1.6.s390x",
"openSUSE Tumbleweed:go1.14-race-1.14.15-1.6.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:go1.14-1.14.15-1.6.aarch64",
"openSUSE Tumbleweed:go1.14-1.14.15-1.6.ppc64le",
"openSUSE Tumbleweed:go1.14-1.14.15-1.6.s390x",
"openSUSE Tumbleweed:go1.14-1.14.15-1.6.x86_64",
"openSUSE Tumbleweed:go1.14-doc-1.14.15-1.6.aarch64",
"openSUSE Tumbleweed:go1.14-doc-1.14.15-1.6.ppc64le",
"openSUSE Tumbleweed:go1.14-doc-1.14.15-1.6.s390x",
"openSUSE Tumbleweed:go1.14-doc-1.14.15-1.6.x86_64",
"openSUSE Tumbleweed:go1.14-race-1.14.15-1.6.aarch64",
"openSUSE Tumbleweed:go1.14-race-1.14.15-1.6.ppc64le",
"openSUSE Tumbleweed:go1.14-race-1.14.15-1.6.s390x",
"openSUSE Tumbleweed:go1.14-race-1.14.15-1.6.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2020-14039"
},
{
"cve": "CVE-2020-15586",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-15586"
}
],
"notes": [
{
"category": "general",
"text": "Go before 1.13.13 and 1.14.x before 1.14.5 has a data race in some net/http servers, as demonstrated by the httputil.ReverseProxy Handler, because it reads a request body and writes a response at the same time.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:go1.14-1.14.15-1.6.aarch64",
"openSUSE Tumbleweed:go1.14-1.14.15-1.6.ppc64le",
"openSUSE Tumbleweed:go1.14-1.14.15-1.6.s390x",
"openSUSE Tumbleweed:go1.14-1.14.15-1.6.x86_64",
"openSUSE Tumbleweed:go1.14-doc-1.14.15-1.6.aarch64",
"openSUSE Tumbleweed:go1.14-doc-1.14.15-1.6.ppc64le",
"openSUSE Tumbleweed:go1.14-doc-1.14.15-1.6.s390x",
"openSUSE Tumbleweed:go1.14-doc-1.14.15-1.6.x86_64",
"openSUSE Tumbleweed:go1.14-race-1.14.15-1.6.aarch64",
"openSUSE Tumbleweed:go1.14-race-1.14.15-1.6.ppc64le",
"openSUSE Tumbleweed:go1.14-race-1.14.15-1.6.s390x",
"openSUSE Tumbleweed:go1.14-race-1.14.15-1.6.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-15586",
"url": "https://www.suse.com/security/cve/CVE-2020-15586"
},
{
"category": "external",
"summary": "SUSE Bug 1174153 for CVE-2020-15586",
"url": "https://bugzilla.suse.com/1174153"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:go1.14-1.14.15-1.6.aarch64",
"openSUSE Tumbleweed:go1.14-1.14.15-1.6.ppc64le",
"openSUSE Tumbleweed:go1.14-1.14.15-1.6.s390x",
"openSUSE Tumbleweed:go1.14-1.14.15-1.6.x86_64",
"openSUSE Tumbleweed:go1.14-doc-1.14.15-1.6.aarch64",
"openSUSE Tumbleweed:go1.14-doc-1.14.15-1.6.ppc64le",
"openSUSE Tumbleweed:go1.14-doc-1.14.15-1.6.s390x",
"openSUSE Tumbleweed:go1.14-doc-1.14.15-1.6.x86_64",
"openSUSE Tumbleweed:go1.14-race-1.14.15-1.6.aarch64",
"openSUSE Tumbleweed:go1.14-race-1.14.15-1.6.ppc64le",
"openSUSE Tumbleweed:go1.14-race-1.14.15-1.6.s390x",
"openSUSE Tumbleweed:go1.14-race-1.14.15-1.6.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:go1.14-1.14.15-1.6.aarch64",
"openSUSE Tumbleweed:go1.14-1.14.15-1.6.ppc64le",
"openSUSE Tumbleweed:go1.14-1.14.15-1.6.s390x",
"openSUSE Tumbleweed:go1.14-1.14.15-1.6.x86_64",
"openSUSE Tumbleweed:go1.14-doc-1.14.15-1.6.aarch64",
"openSUSE Tumbleweed:go1.14-doc-1.14.15-1.6.ppc64le",
"openSUSE Tumbleweed:go1.14-doc-1.14.15-1.6.s390x",
"openSUSE Tumbleweed:go1.14-doc-1.14.15-1.6.x86_64",
"openSUSE Tumbleweed:go1.14-race-1.14.15-1.6.aarch64",
"openSUSE Tumbleweed:go1.14-race-1.14.15-1.6.ppc64le",
"openSUSE Tumbleweed:go1.14-race-1.14.15-1.6.s390x",
"openSUSE Tumbleweed:go1.14-race-1.14.15-1.6.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2020-15586"
},
{
"cve": "CVE-2020-16845",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-16845"
}
],
"notes": [
{
"category": "general",
"text": "Go before 1.13.15 and 14.x before 1.14.7 can have an infinite read loop in ReadUvarint and ReadVarint in encoding/binary via invalid inputs.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:go1.14-1.14.15-1.6.aarch64",
"openSUSE Tumbleweed:go1.14-1.14.15-1.6.ppc64le",
"openSUSE Tumbleweed:go1.14-1.14.15-1.6.s390x",
"openSUSE Tumbleweed:go1.14-1.14.15-1.6.x86_64",
"openSUSE Tumbleweed:go1.14-doc-1.14.15-1.6.aarch64",
"openSUSE Tumbleweed:go1.14-doc-1.14.15-1.6.ppc64le",
"openSUSE Tumbleweed:go1.14-doc-1.14.15-1.6.s390x",
"openSUSE Tumbleweed:go1.14-doc-1.14.15-1.6.x86_64",
"openSUSE Tumbleweed:go1.14-race-1.14.15-1.6.aarch64",
"openSUSE Tumbleweed:go1.14-race-1.14.15-1.6.ppc64le",
"openSUSE Tumbleweed:go1.14-race-1.14.15-1.6.s390x",
"openSUSE Tumbleweed:go1.14-race-1.14.15-1.6.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-16845",
"url": "https://www.suse.com/security/cve/CVE-2020-16845"
},
{
"category": "external",
"summary": "SUSE Bug 1174977 for CVE-2020-16845",
"url": "https://bugzilla.suse.com/1174977"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:go1.14-1.14.15-1.6.aarch64",
"openSUSE Tumbleweed:go1.14-1.14.15-1.6.ppc64le",
"openSUSE Tumbleweed:go1.14-1.14.15-1.6.s390x",
"openSUSE Tumbleweed:go1.14-1.14.15-1.6.x86_64",
"openSUSE Tumbleweed:go1.14-doc-1.14.15-1.6.aarch64",
"openSUSE Tumbleweed:go1.14-doc-1.14.15-1.6.ppc64le",
"openSUSE Tumbleweed:go1.14-doc-1.14.15-1.6.s390x",
"openSUSE Tumbleweed:go1.14-doc-1.14.15-1.6.x86_64",
"openSUSE Tumbleweed:go1.14-race-1.14.15-1.6.aarch64",
"openSUSE Tumbleweed:go1.14-race-1.14.15-1.6.ppc64le",
"openSUSE Tumbleweed:go1.14-race-1.14.15-1.6.s390x",
"openSUSE Tumbleweed:go1.14-race-1.14.15-1.6.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:go1.14-1.14.15-1.6.aarch64",
"openSUSE Tumbleweed:go1.14-1.14.15-1.6.ppc64le",
"openSUSE Tumbleweed:go1.14-1.14.15-1.6.s390x",
"openSUSE Tumbleweed:go1.14-1.14.15-1.6.x86_64",
"openSUSE Tumbleweed:go1.14-doc-1.14.15-1.6.aarch64",
"openSUSE Tumbleweed:go1.14-doc-1.14.15-1.6.ppc64le",
"openSUSE Tumbleweed:go1.14-doc-1.14.15-1.6.s390x",
"openSUSE Tumbleweed:go1.14-doc-1.14.15-1.6.x86_64",
"openSUSE Tumbleweed:go1.14-race-1.14.15-1.6.aarch64",
"openSUSE Tumbleweed:go1.14-race-1.14.15-1.6.ppc64le",
"openSUSE Tumbleweed:go1.14-race-1.14.15-1.6.s390x",
"openSUSE Tumbleweed:go1.14-race-1.14.15-1.6.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2020-16845"
},
{
"cve": "CVE-2020-24553",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-24553"
}
],
"notes": [
{
"category": "general",
"text": "Go before 1.14.8 and 1.15.x before 1.15.1 allows XSS because text/html is the default for CGI/FCGI handlers that lack a Content-Type header.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:go1.14-1.14.15-1.6.aarch64",
"openSUSE Tumbleweed:go1.14-1.14.15-1.6.ppc64le",
"openSUSE Tumbleweed:go1.14-1.14.15-1.6.s390x",
"openSUSE Tumbleweed:go1.14-1.14.15-1.6.x86_64",
"openSUSE Tumbleweed:go1.14-doc-1.14.15-1.6.aarch64",
"openSUSE Tumbleweed:go1.14-doc-1.14.15-1.6.ppc64le",
"openSUSE Tumbleweed:go1.14-doc-1.14.15-1.6.s390x",
"openSUSE Tumbleweed:go1.14-doc-1.14.15-1.6.x86_64",
"openSUSE Tumbleweed:go1.14-race-1.14.15-1.6.aarch64",
"openSUSE Tumbleweed:go1.14-race-1.14.15-1.6.ppc64le",
"openSUSE Tumbleweed:go1.14-race-1.14.15-1.6.s390x",
"openSUSE Tumbleweed:go1.14-race-1.14.15-1.6.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-24553",
"url": "https://www.suse.com/security/cve/CVE-2020-24553"
},
{
"category": "external",
"summary": "SUSE Bug 1176031 for CVE-2020-24553",
"url": "https://bugzilla.suse.com/1176031"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:go1.14-1.14.15-1.6.aarch64",
"openSUSE Tumbleweed:go1.14-1.14.15-1.6.ppc64le",
"openSUSE Tumbleweed:go1.14-1.14.15-1.6.s390x",
"openSUSE Tumbleweed:go1.14-1.14.15-1.6.x86_64",
"openSUSE Tumbleweed:go1.14-doc-1.14.15-1.6.aarch64",
"openSUSE Tumbleweed:go1.14-doc-1.14.15-1.6.ppc64le",
"openSUSE Tumbleweed:go1.14-doc-1.14.15-1.6.s390x",
"openSUSE Tumbleweed:go1.14-doc-1.14.15-1.6.x86_64",
"openSUSE Tumbleweed:go1.14-race-1.14.15-1.6.aarch64",
"openSUSE Tumbleweed:go1.14-race-1.14.15-1.6.ppc64le",
"openSUSE Tumbleweed:go1.14-race-1.14.15-1.6.s390x",
"openSUSE Tumbleweed:go1.14-race-1.14.15-1.6.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:go1.14-1.14.15-1.6.aarch64",
"openSUSE Tumbleweed:go1.14-1.14.15-1.6.ppc64le",
"openSUSE Tumbleweed:go1.14-1.14.15-1.6.s390x",
"openSUSE Tumbleweed:go1.14-1.14.15-1.6.x86_64",
"openSUSE Tumbleweed:go1.14-doc-1.14.15-1.6.aarch64",
"openSUSE Tumbleweed:go1.14-doc-1.14.15-1.6.ppc64le",
"openSUSE Tumbleweed:go1.14-doc-1.14.15-1.6.s390x",
"openSUSE Tumbleweed:go1.14-doc-1.14.15-1.6.x86_64",
"openSUSE Tumbleweed:go1.14-race-1.14.15-1.6.aarch64",
"openSUSE Tumbleweed:go1.14-race-1.14.15-1.6.ppc64le",
"openSUSE Tumbleweed:go1.14-race-1.14.15-1.6.s390x",
"openSUSE Tumbleweed:go1.14-race-1.14.15-1.6.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2020-24553"
},
{
"cve": "CVE-2020-28362",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-28362"
}
],
"notes": [
{
"category": "general",
"text": "Go before 1.14.12 and 1.15.x before 1.15.4 allows Denial of Service.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:go1.14-1.14.15-1.6.aarch64",
"openSUSE Tumbleweed:go1.14-1.14.15-1.6.ppc64le",
"openSUSE Tumbleweed:go1.14-1.14.15-1.6.s390x",
"openSUSE Tumbleweed:go1.14-1.14.15-1.6.x86_64",
"openSUSE Tumbleweed:go1.14-doc-1.14.15-1.6.aarch64",
"openSUSE Tumbleweed:go1.14-doc-1.14.15-1.6.ppc64le",
"openSUSE Tumbleweed:go1.14-doc-1.14.15-1.6.s390x",
"openSUSE Tumbleweed:go1.14-doc-1.14.15-1.6.x86_64",
"openSUSE Tumbleweed:go1.14-race-1.14.15-1.6.aarch64",
"openSUSE Tumbleweed:go1.14-race-1.14.15-1.6.ppc64le",
"openSUSE Tumbleweed:go1.14-race-1.14.15-1.6.s390x",
"openSUSE Tumbleweed:go1.14-race-1.14.15-1.6.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-28362",
"url": "https://www.suse.com/security/cve/CVE-2020-28362"
},
{
"category": "external",
"summary": "SUSE Bug 1178750 for CVE-2020-28362",
"url": "https://bugzilla.suse.com/1178750"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:go1.14-1.14.15-1.6.aarch64",
"openSUSE Tumbleweed:go1.14-1.14.15-1.6.ppc64le",
"openSUSE Tumbleweed:go1.14-1.14.15-1.6.s390x",
"openSUSE Tumbleweed:go1.14-1.14.15-1.6.x86_64",
"openSUSE Tumbleweed:go1.14-doc-1.14.15-1.6.aarch64",
"openSUSE Tumbleweed:go1.14-doc-1.14.15-1.6.ppc64le",
"openSUSE Tumbleweed:go1.14-doc-1.14.15-1.6.s390x",
"openSUSE Tumbleweed:go1.14-doc-1.14.15-1.6.x86_64",
"openSUSE Tumbleweed:go1.14-race-1.14.15-1.6.aarch64",
"openSUSE Tumbleweed:go1.14-race-1.14.15-1.6.ppc64le",
"openSUSE Tumbleweed:go1.14-race-1.14.15-1.6.s390x",
"openSUSE Tumbleweed:go1.14-race-1.14.15-1.6.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:go1.14-1.14.15-1.6.aarch64",
"openSUSE Tumbleweed:go1.14-1.14.15-1.6.ppc64le",
"openSUSE Tumbleweed:go1.14-1.14.15-1.6.s390x",
"openSUSE Tumbleweed:go1.14-1.14.15-1.6.x86_64",
"openSUSE Tumbleweed:go1.14-doc-1.14.15-1.6.aarch64",
"openSUSE Tumbleweed:go1.14-doc-1.14.15-1.6.ppc64le",
"openSUSE Tumbleweed:go1.14-doc-1.14.15-1.6.s390x",
"openSUSE Tumbleweed:go1.14-doc-1.14.15-1.6.x86_64",
"openSUSE Tumbleweed:go1.14-race-1.14.15-1.6.aarch64",
"openSUSE Tumbleweed:go1.14-race-1.14.15-1.6.ppc64le",
"openSUSE Tumbleweed:go1.14-race-1.14.15-1.6.s390x",
"openSUSE Tumbleweed:go1.14-race-1.14.15-1.6.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2020-28362"
},
{
"cve": "CVE-2020-28366",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-28366"
}
],
"notes": [
{
"category": "general",
"text": "Code injection in the go command with cgo before Go 1.14.12 and Go 1.15.5 allows arbitrary code execution at build time via a malicious unquoted symbol name in a linked object file.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:go1.14-1.14.15-1.6.aarch64",
"openSUSE Tumbleweed:go1.14-1.14.15-1.6.ppc64le",
"openSUSE Tumbleweed:go1.14-1.14.15-1.6.s390x",
"openSUSE Tumbleweed:go1.14-1.14.15-1.6.x86_64",
"openSUSE Tumbleweed:go1.14-doc-1.14.15-1.6.aarch64",
"openSUSE Tumbleweed:go1.14-doc-1.14.15-1.6.ppc64le",
"openSUSE Tumbleweed:go1.14-doc-1.14.15-1.6.s390x",
"openSUSE Tumbleweed:go1.14-doc-1.14.15-1.6.x86_64",
"openSUSE Tumbleweed:go1.14-race-1.14.15-1.6.aarch64",
"openSUSE Tumbleweed:go1.14-race-1.14.15-1.6.ppc64le",
"openSUSE Tumbleweed:go1.14-race-1.14.15-1.6.s390x",
"openSUSE Tumbleweed:go1.14-race-1.14.15-1.6.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-28366",
"url": "https://www.suse.com/security/cve/CVE-2020-28366"
},
{
"category": "external",
"summary": "SUSE Bug 1178753 for CVE-2020-28366",
"url": "https://bugzilla.suse.com/1178753"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:go1.14-1.14.15-1.6.aarch64",
"openSUSE Tumbleweed:go1.14-1.14.15-1.6.ppc64le",
"openSUSE Tumbleweed:go1.14-1.14.15-1.6.s390x",
"openSUSE Tumbleweed:go1.14-1.14.15-1.6.x86_64",
"openSUSE Tumbleweed:go1.14-doc-1.14.15-1.6.aarch64",
"openSUSE Tumbleweed:go1.14-doc-1.14.15-1.6.ppc64le",
"openSUSE Tumbleweed:go1.14-doc-1.14.15-1.6.s390x",
"openSUSE Tumbleweed:go1.14-doc-1.14.15-1.6.x86_64",
"openSUSE Tumbleweed:go1.14-race-1.14.15-1.6.aarch64",
"openSUSE Tumbleweed:go1.14-race-1.14.15-1.6.ppc64le",
"openSUSE Tumbleweed:go1.14-race-1.14.15-1.6.s390x",
"openSUSE Tumbleweed:go1.14-race-1.14.15-1.6.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:go1.14-1.14.15-1.6.aarch64",
"openSUSE Tumbleweed:go1.14-1.14.15-1.6.ppc64le",
"openSUSE Tumbleweed:go1.14-1.14.15-1.6.s390x",
"openSUSE Tumbleweed:go1.14-1.14.15-1.6.x86_64",
"openSUSE Tumbleweed:go1.14-doc-1.14.15-1.6.aarch64",
"openSUSE Tumbleweed:go1.14-doc-1.14.15-1.6.ppc64le",
"openSUSE Tumbleweed:go1.14-doc-1.14.15-1.6.s390x",
"openSUSE Tumbleweed:go1.14-doc-1.14.15-1.6.x86_64",
"openSUSE Tumbleweed:go1.14-race-1.14.15-1.6.aarch64",
"openSUSE Tumbleweed:go1.14-race-1.14.15-1.6.ppc64le",
"openSUSE Tumbleweed:go1.14-race-1.14.15-1.6.s390x",
"openSUSE Tumbleweed:go1.14-race-1.14.15-1.6.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2020-28366"
},
{
"cve": "CVE-2020-28367",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-28367"
}
],
"notes": [
{
"category": "general",
"text": "Code injection in the go command with cgo before Go 1.14.12 and Go 1.15.5 allows arbitrary code execution at build time via malicious gcc flags specified via a #cgo directive.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:go1.14-1.14.15-1.6.aarch64",
"openSUSE Tumbleweed:go1.14-1.14.15-1.6.ppc64le",
"openSUSE Tumbleweed:go1.14-1.14.15-1.6.s390x",
"openSUSE Tumbleweed:go1.14-1.14.15-1.6.x86_64",
"openSUSE Tumbleweed:go1.14-doc-1.14.15-1.6.aarch64",
"openSUSE Tumbleweed:go1.14-doc-1.14.15-1.6.ppc64le",
"openSUSE Tumbleweed:go1.14-doc-1.14.15-1.6.s390x",
"openSUSE Tumbleweed:go1.14-doc-1.14.15-1.6.x86_64",
"openSUSE Tumbleweed:go1.14-race-1.14.15-1.6.aarch64",
"openSUSE Tumbleweed:go1.14-race-1.14.15-1.6.ppc64le",
"openSUSE Tumbleweed:go1.14-race-1.14.15-1.6.s390x",
"openSUSE Tumbleweed:go1.14-race-1.14.15-1.6.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-28367",
"url": "https://www.suse.com/security/cve/CVE-2020-28367"
},
{
"category": "external",
"summary": "SUSE Bug 1178752 for CVE-2020-28367",
"url": "https://bugzilla.suse.com/1178752"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:go1.14-1.14.15-1.6.aarch64",
"openSUSE Tumbleweed:go1.14-1.14.15-1.6.ppc64le",
"openSUSE Tumbleweed:go1.14-1.14.15-1.6.s390x",
"openSUSE Tumbleweed:go1.14-1.14.15-1.6.x86_64",
"openSUSE Tumbleweed:go1.14-doc-1.14.15-1.6.aarch64",
"openSUSE Tumbleweed:go1.14-doc-1.14.15-1.6.ppc64le",
"openSUSE Tumbleweed:go1.14-doc-1.14.15-1.6.s390x",
"openSUSE Tumbleweed:go1.14-doc-1.14.15-1.6.x86_64",
"openSUSE Tumbleweed:go1.14-race-1.14.15-1.6.aarch64",
"openSUSE Tumbleweed:go1.14-race-1.14.15-1.6.ppc64le",
"openSUSE Tumbleweed:go1.14-race-1.14.15-1.6.s390x",
"openSUSE Tumbleweed:go1.14-race-1.14.15-1.6.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:go1.14-1.14.15-1.6.aarch64",
"openSUSE Tumbleweed:go1.14-1.14.15-1.6.ppc64le",
"openSUSE Tumbleweed:go1.14-1.14.15-1.6.s390x",
"openSUSE Tumbleweed:go1.14-1.14.15-1.6.x86_64",
"openSUSE Tumbleweed:go1.14-doc-1.14.15-1.6.aarch64",
"openSUSE Tumbleweed:go1.14-doc-1.14.15-1.6.ppc64le",
"openSUSE Tumbleweed:go1.14-doc-1.14.15-1.6.s390x",
"openSUSE Tumbleweed:go1.14-doc-1.14.15-1.6.x86_64",
"openSUSE Tumbleweed:go1.14-race-1.14.15-1.6.aarch64",
"openSUSE Tumbleweed:go1.14-race-1.14.15-1.6.ppc64le",
"openSUSE Tumbleweed:go1.14-race-1.14.15-1.6.s390x",
"openSUSE Tumbleweed:go1.14-race-1.14.15-1.6.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2020-28367"
},
{
"cve": "CVE-2021-3114",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-3114"
}
],
"notes": [
{
"category": "general",
"text": "In Go before 1.14.14 and 1.15.x before 1.15.7, crypto/elliptic/p224.go can generate incorrect outputs, related to an underflow of the lowest limb during the final complete reduction in the P-224 field.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:go1.14-1.14.15-1.6.aarch64",
"openSUSE Tumbleweed:go1.14-1.14.15-1.6.ppc64le",
"openSUSE Tumbleweed:go1.14-1.14.15-1.6.s390x",
"openSUSE Tumbleweed:go1.14-1.14.15-1.6.x86_64",
"openSUSE Tumbleweed:go1.14-doc-1.14.15-1.6.aarch64",
"openSUSE Tumbleweed:go1.14-doc-1.14.15-1.6.ppc64le",
"openSUSE Tumbleweed:go1.14-doc-1.14.15-1.6.s390x",
"openSUSE Tumbleweed:go1.14-doc-1.14.15-1.6.x86_64",
"openSUSE Tumbleweed:go1.14-race-1.14.15-1.6.aarch64",
"openSUSE Tumbleweed:go1.14-race-1.14.15-1.6.ppc64le",
"openSUSE Tumbleweed:go1.14-race-1.14.15-1.6.s390x",
"openSUSE Tumbleweed:go1.14-race-1.14.15-1.6.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-3114",
"url": "https://www.suse.com/security/cve/CVE-2021-3114"
},
{
"category": "external",
"summary": "SUSE Bug 1181145 for CVE-2021-3114",
"url": "https://bugzilla.suse.com/1181145"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:go1.14-1.14.15-1.6.aarch64",
"openSUSE Tumbleweed:go1.14-1.14.15-1.6.ppc64le",
"openSUSE Tumbleweed:go1.14-1.14.15-1.6.s390x",
"openSUSE Tumbleweed:go1.14-1.14.15-1.6.x86_64",
"openSUSE Tumbleweed:go1.14-doc-1.14.15-1.6.aarch64",
"openSUSE Tumbleweed:go1.14-doc-1.14.15-1.6.ppc64le",
"openSUSE Tumbleweed:go1.14-doc-1.14.15-1.6.s390x",
"openSUSE Tumbleweed:go1.14-doc-1.14.15-1.6.x86_64",
"openSUSE Tumbleweed:go1.14-race-1.14.15-1.6.aarch64",
"openSUSE Tumbleweed:go1.14-race-1.14.15-1.6.ppc64le",
"openSUSE Tumbleweed:go1.14-race-1.14.15-1.6.s390x",
"openSUSE Tumbleweed:go1.14-race-1.14.15-1.6.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.8,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:go1.14-1.14.15-1.6.aarch64",
"openSUSE Tumbleweed:go1.14-1.14.15-1.6.ppc64le",
"openSUSE Tumbleweed:go1.14-1.14.15-1.6.s390x",
"openSUSE Tumbleweed:go1.14-1.14.15-1.6.x86_64",
"openSUSE Tumbleweed:go1.14-doc-1.14.15-1.6.aarch64",
"openSUSE Tumbleweed:go1.14-doc-1.14.15-1.6.ppc64le",
"openSUSE Tumbleweed:go1.14-doc-1.14.15-1.6.s390x",
"openSUSE Tumbleweed:go1.14-doc-1.14.15-1.6.x86_64",
"openSUSE Tumbleweed:go1.14-race-1.14.15-1.6.aarch64",
"openSUSE Tumbleweed:go1.14-race-1.14.15-1.6.ppc64le",
"openSUSE Tumbleweed:go1.14-race-1.14.15-1.6.s390x",
"openSUSE Tumbleweed:go1.14-race-1.14.15-1.6.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2021-3114"
},
{
"cve": "CVE-2021-3115",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-3115"
}
],
"notes": [
{
"category": "general",
"text": "Go before 1.14.14 and 1.15.x before 1.15.7 on Windows is vulnerable to Command Injection and remote code execution when using the \"go get\" command to fetch modules that make use of cgo (for example, cgo can execute a gcc program from an untrusted download).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:go1.14-1.14.15-1.6.aarch64",
"openSUSE Tumbleweed:go1.14-1.14.15-1.6.ppc64le",
"openSUSE Tumbleweed:go1.14-1.14.15-1.6.s390x",
"openSUSE Tumbleweed:go1.14-1.14.15-1.6.x86_64",
"openSUSE Tumbleweed:go1.14-doc-1.14.15-1.6.aarch64",
"openSUSE Tumbleweed:go1.14-doc-1.14.15-1.6.ppc64le",
"openSUSE Tumbleweed:go1.14-doc-1.14.15-1.6.s390x",
"openSUSE Tumbleweed:go1.14-doc-1.14.15-1.6.x86_64",
"openSUSE Tumbleweed:go1.14-race-1.14.15-1.6.aarch64",
"openSUSE Tumbleweed:go1.14-race-1.14.15-1.6.ppc64le",
"openSUSE Tumbleweed:go1.14-race-1.14.15-1.6.s390x",
"openSUSE Tumbleweed:go1.14-race-1.14.15-1.6.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-3115",
"url": "https://www.suse.com/security/cve/CVE-2021-3115"
},
{
"category": "external",
"summary": "SUSE Bug 1181146 for CVE-2021-3115",
"url": "https://bugzilla.suse.com/1181146"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:go1.14-1.14.15-1.6.aarch64",
"openSUSE Tumbleweed:go1.14-1.14.15-1.6.ppc64le",
"openSUSE Tumbleweed:go1.14-1.14.15-1.6.s390x",
"openSUSE Tumbleweed:go1.14-1.14.15-1.6.x86_64",
"openSUSE Tumbleweed:go1.14-doc-1.14.15-1.6.aarch64",
"openSUSE Tumbleweed:go1.14-doc-1.14.15-1.6.ppc64le",
"openSUSE Tumbleweed:go1.14-doc-1.14.15-1.6.s390x",
"openSUSE Tumbleweed:go1.14-doc-1.14.15-1.6.x86_64",
"openSUSE Tumbleweed:go1.14-race-1.14.15-1.6.aarch64",
"openSUSE Tumbleweed:go1.14-race-1.14.15-1.6.ppc64le",
"openSUSE Tumbleweed:go1.14-race-1.14.15-1.6.s390x",
"openSUSE Tumbleweed:go1.14-race-1.14.15-1.6.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.3,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:go1.14-1.14.15-1.6.aarch64",
"openSUSE Tumbleweed:go1.14-1.14.15-1.6.ppc64le",
"openSUSE Tumbleweed:go1.14-1.14.15-1.6.s390x",
"openSUSE Tumbleweed:go1.14-1.14.15-1.6.x86_64",
"openSUSE Tumbleweed:go1.14-doc-1.14.15-1.6.aarch64",
"openSUSE Tumbleweed:go1.14-doc-1.14.15-1.6.ppc64le",
"openSUSE Tumbleweed:go1.14-doc-1.14.15-1.6.s390x",
"openSUSE Tumbleweed:go1.14-doc-1.14.15-1.6.x86_64",
"openSUSE Tumbleweed:go1.14-race-1.14.15-1.6.aarch64",
"openSUSE Tumbleweed:go1.14-race-1.14.15-1.6.ppc64le",
"openSUSE Tumbleweed:go1.14-race-1.14.15-1.6.s390x",
"openSUSE Tumbleweed:go1.14-race-1.14.15-1.6.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2021-3115"
}
]
}
OPENSUSE-SU-2024:10808-1
Vulnerability from csaf_opensuse - Published: 2024-06-15 00:00 - Updated: 2024-06-15 00:00| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:go1.15-1.15.15-1.2.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:go1.15-1.15.15-1.2.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:go1.15-1.15.15-1.2.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:go1.15-1.15.15-1.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:go1.15-doc-1.15.15-1.2.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:go1.15-doc-1.15.15-1.2.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:go1.15-doc-1.15.15-1.2.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:go1.15-doc-1.15.15-1.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:go1.15-race-1.15.15-1.2.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:go1.15-race-1.15.15-1.2.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:go1.15-race-1.15.15-1.2.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:go1.15-race-1.15.15-1.2.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:go1.15-1.15.15-1.2.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:go1.15-1.15.15-1.2.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:go1.15-1.15.15-1.2.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:go1.15-1.15.15-1.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:go1.15-doc-1.15.15-1.2.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:go1.15-doc-1.15.15-1.2.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:go1.15-doc-1.15.15-1.2.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:go1.15-doc-1.15.15-1.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:go1.15-race-1.15.15-1.2.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:go1.15-race-1.15.15-1.2.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:go1.15-race-1.15.15-1.2.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:go1.15-race-1.15.15-1.2.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:go1.15-1.15.15-1.2.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:go1.15-1.15.15-1.2.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:go1.15-1.15.15-1.2.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:go1.15-1.15.15-1.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:go1.15-doc-1.15.15-1.2.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:go1.15-doc-1.15.15-1.2.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:go1.15-doc-1.15.15-1.2.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:go1.15-doc-1.15.15-1.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:go1.15-race-1.15.15-1.2.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:go1.15-race-1.15.15-1.2.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:go1.15-race-1.15.15-1.2.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:go1.15-race-1.15.15-1.2.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:go1.15-1.15.15-1.2.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:go1.15-1.15.15-1.2.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:go1.15-1.15.15-1.2.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:go1.15-1.15.15-1.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:go1.15-doc-1.15.15-1.2.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:go1.15-doc-1.15.15-1.2.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:go1.15-doc-1.15.15-1.2.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:go1.15-doc-1.15.15-1.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:go1.15-race-1.15.15-1.2.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:go1.15-race-1.15.15-1.2.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:go1.15-race-1.15.15-1.2.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:go1.15-race-1.15.15-1.2.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:go1.15-1.15.15-1.2.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:go1.15-1.15.15-1.2.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:go1.15-1.15.15-1.2.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:go1.15-1.15.15-1.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:go1.15-doc-1.15.15-1.2.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:go1.15-doc-1.15.15-1.2.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:go1.15-doc-1.15.15-1.2.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:go1.15-doc-1.15.15-1.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:go1.15-race-1.15.15-1.2.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:go1.15-race-1.15.15-1.2.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:go1.15-race-1.15.15-1.2.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:go1.15-race-1.15.15-1.2.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:go1.15-1.15.15-1.2.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:go1.15-1.15.15-1.2.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:go1.15-1.15.15-1.2.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:go1.15-1.15.15-1.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:go1.15-doc-1.15.15-1.2.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:go1.15-doc-1.15.15-1.2.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:go1.15-doc-1.15.15-1.2.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:go1.15-doc-1.15.15-1.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:go1.15-race-1.15.15-1.2.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:go1.15-race-1.15.15-1.2.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:go1.15-race-1.15.15-1.2.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:go1.15-race-1.15.15-1.2.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:go1.15-1.15.15-1.2.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:go1.15-1.15.15-1.2.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:go1.15-1.15.15-1.2.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:go1.15-1.15.15-1.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:go1.15-doc-1.15.15-1.2.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:go1.15-doc-1.15.15-1.2.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:go1.15-doc-1.15.15-1.2.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:go1.15-doc-1.15.15-1.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:go1.15-race-1.15.15-1.2.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:go1.15-race-1.15.15-1.2.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:go1.15-race-1.15.15-1.2.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:go1.15-race-1.15.15-1.2.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:go1.15-1.15.15-1.2.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:go1.15-1.15.15-1.2.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:go1.15-1.15.15-1.2.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:go1.15-1.15.15-1.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:go1.15-doc-1.15.15-1.2.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:go1.15-doc-1.15.15-1.2.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:go1.15-doc-1.15.15-1.2.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:go1.15-doc-1.15.15-1.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:go1.15-race-1.15.15-1.2.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:go1.15-race-1.15.15-1.2.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:go1.15-race-1.15.15-1.2.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:go1.15-race-1.15.15-1.2.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:go1.15-1.15.15-1.2.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:go1.15-1.15.15-1.2.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:go1.15-1.15.15-1.2.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:go1.15-1.15.15-1.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:go1.15-doc-1.15.15-1.2.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:go1.15-doc-1.15.15-1.2.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:go1.15-doc-1.15.15-1.2.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:go1.15-doc-1.15.15-1.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:go1.15-race-1.15.15-1.2.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:go1.15-race-1.15.15-1.2.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:go1.15-race-1.15.15-1.2.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:go1.15-race-1.15.15-1.2.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:go1.15-1.15.15-1.2.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:go1.15-1.15.15-1.2.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:go1.15-1.15.15-1.2.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:go1.15-1.15.15-1.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:go1.15-doc-1.15.15-1.2.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:go1.15-doc-1.15.15-1.2.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:go1.15-doc-1.15.15-1.2.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:go1.15-doc-1.15.15-1.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:go1.15-race-1.15.15-1.2.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:go1.15-race-1.15.15-1.2.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:go1.15-race-1.15.15-1.2.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:go1.15-race-1.15.15-1.2.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:go1.15-1.15.15-1.2.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:go1.15-1.15.15-1.2.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:go1.15-1.15.15-1.2.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:go1.15-1.15.15-1.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:go1.15-doc-1.15.15-1.2.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:go1.15-doc-1.15.15-1.2.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:go1.15-doc-1.15.15-1.2.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:go1.15-doc-1.15.15-1.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:go1.15-race-1.15.15-1.2.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:go1.15-race-1.15.15-1.2.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:go1.15-race-1.15.15-1.2.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:go1.15-race-1.15.15-1.2.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:go1.15-1.15.15-1.2.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:go1.15-1.15.15-1.2.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:go1.15-1.15.15-1.2.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:go1.15-1.15.15-1.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:go1.15-doc-1.15.15-1.2.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:go1.15-doc-1.15.15-1.2.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:go1.15-doc-1.15.15-1.2.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:go1.15-doc-1.15.15-1.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:go1.15-race-1.15.15-1.2.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:go1.15-race-1.15.15-1.2.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:go1.15-race-1.15.15-1.2.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:go1.15-race-1.15.15-1.2.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:go1.15-1.15.15-1.2.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:go1.15-1.15.15-1.2.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:go1.15-1.15.15-1.2.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:go1.15-1.15.15-1.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:go1.15-doc-1.15.15-1.2.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:go1.15-doc-1.15.15-1.2.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:go1.15-doc-1.15.15-1.2.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:go1.15-doc-1.15.15-1.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:go1.15-race-1.15.15-1.2.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:go1.15-race-1.15.15-1.2.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:go1.15-race-1.15.15-1.2.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:go1.15-race-1.15.15-1.2.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:go1.15-1.15.15-1.2.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:go1.15-1.15.15-1.2.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:go1.15-1.15.15-1.2.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:go1.15-1.15.15-1.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:go1.15-doc-1.15.15-1.2.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:go1.15-doc-1.15.15-1.2.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:go1.15-doc-1.15.15-1.2.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:go1.15-doc-1.15.15-1.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:go1.15-race-1.15.15-1.2.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:go1.15-race-1.15.15-1.2.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:go1.15-race-1.15.15-1.2.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:go1.15-race-1.15.15-1.2.x86_64 | — |
Vendor Fix
|
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "go1.15-1.15.15-1.2 on GA media",
"title": "Title of the patch"
},
{
"category": "description",
"text": "These are all security issues fixed in the go1.15-1.15.15-1.2 package on the GA media of openSUSE Tumbleweed.",
"title": "Description of the patch"
},
{
"category": "details",
"text": "openSUSE-Tumbleweed-2024-10808",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2024_10808-1.json"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-24553 page",
"url": "https://www.suse.com/security/cve/CVE-2020-24553/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-28362 page",
"url": "https://www.suse.com/security/cve/CVE-2020-28362/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-28366 page",
"url": "https://www.suse.com/security/cve/CVE-2020-28366/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-28367 page",
"url": "https://www.suse.com/security/cve/CVE-2020-28367/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-27918 page",
"url": "https://www.suse.com/security/cve/CVE-2021-27918/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-3114 page",
"url": "https://www.suse.com/security/cve/CVE-2021-3114/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-3115 page",
"url": "https://www.suse.com/security/cve/CVE-2021-3115/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-31525 page",
"url": "https://www.suse.com/security/cve/CVE-2021-31525/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-33195 page",
"url": "https://www.suse.com/security/cve/CVE-2021-33195/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-33196 page",
"url": "https://www.suse.com/security/cve/CVE-2021-33196/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-33197 page",
"url": "https://www.suse.com/security/cve/CVE-2021-33197/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-33198 page",
"url": "https://www.suse.com/security/cve/CVE-2021-33198/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-34558 page",
"url": "https://www.suse.com/security/cve/CVE-2021-34558/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-36221 page",
"url": "https://www.suse.com/security/cve/CVE-2021-36221/"
}
],
"title": "go1.15-1.15.15-1.2 on GA media",
"tracking": {
"current_release_date": "2024-06-15T00:00:00Z",
"generator": {
"date": "2024-06-15T00:00:00Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "openSUSE-SU-2024:10808-1",
"initial_release_date": "2024-06-15T00:00:00Z",
"revision_history": [
{
"date": "2024-06-15T00:00:00Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "go1.15-1.15.15-1.2.aarch64",
"product": {
"name": "go1.15-1.15.15-1.2.aarch64",
"product_id": "go1.15-1.15.15-1.2.aarch64"
}
},
{
"category": "product_version",
"name": "go1.15-doc-1.15.15-1.2.aarch64",
"product": {
"name": "go1.15-doc-1.15.15-1.2.aarch64",
"product_id": "go1.15-doc-1.15.15-1.2.aarch64"
}
},
{
"category": "product_version",
"name": "go1.15-race-1.15.15-1.2.aarch64",
"product": {
"name": "go1.15-race-1.15.15-1.2.aarch64",
"product_id": "go1.15-race-1.15.15-1.2.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "go1.15-1.15.15-1.2.ppc64le",
"product": {
"name": "go1.15-1.15.15-1.2.ppc64le",
"product_id": "go1.15-1.15.15-1.2.ppc64le"
}
},
{
"category": "product_version",
"name": "go1.15-doc-1.15.15-1.2.ppc64le",
"product": {
"name": "go1.15-doc-1.15.15-1.2.ppc64le",
"product_id": "go1.15-doc-1.15.15-1.2.ppc64le"
}
},
{
"category": "product_version",
"name": "go1.15-race-1.15.15-1.2.ppc64le",
"product": {
"name": "go1.15-race-1.15.15-1.2.ppc64le",
"product_id": "go1.15-race-1.15.15-1.2.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "go1.15-1.15.15-1.2.s390x",
"product": {
"name": "go1.15-1.15.15-1.2.s390x",
"product_id": "go1.15-1.15.15-1.2.s390x"
}
},
{
"category": "product_version",
"name": "go1.15-doc-1.15.15-1.2.s390x",
"product": {
"name": "go1.15-doc-1.15.15-1.2.s390x",
"product_id": "go1.15-doc-1.15.15-1.2.s390x"
}
},
{
"category": "product_version",
"name": "go1.15-race-1.15.15-1.2.s390x",
"product": {
"name": "go1.15-race-1.15.15-1.2.s390x",
"product_id": "go1.15-race-1.15.15-1.2.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "go1.15-1.15.15-1.2.x86_64",
"product": {
"name": "go1.15-1.15.15-1.2.x86_64",
"product_id": "go1.15-1.15.15-1.2.x86_64"
}
},
{
"category": "product_version",
"name": "go1.15-doc-1.15.15-1.2.x86_64",
"product": {
"name": "go1.15-doc-1.15.15-1.2.x86_64",
"product_id": "go1.15-doc-1.15.15-1.2.x86_64"
}
},
{
"category": "product_version",
"name": "go1.15-race-1.15.15-1.2.x86_64",
"product": {
"name": "go1.15-race-1.15.15-1.2.x86_64",
"product_id": "go1.15-race-1.15.15-1.2.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "openSUSE Tumbleweed",
"product": {
"name": "openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:tumbleweed"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.15-1.15.15-1.2.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:go1.15-1.15.15-1.2.aarch64"
},
"product_reference": "go1.15-1.15.15-1.2.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.15-1.15.15-1.2.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:go1.15-1.15.15-1.2.ppc64le"
},
"product_reference": "go1.15-1.15.15-1.2.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.15-1.15.15-1.2.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:go1.15-1.15.15-1.2.s390x"
},
"product_reference": "go1.15-1.15.15-1.2.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.15-1.15.15-1.2.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:go1.15-1.15.15-1.2.x86_64"
},
"product_reference": "go1.15-1.15.15-1.2.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.15-doc-1.15.15-1.2.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:go1.15-doc-1.15.15-1.2.aarch64"
},
"product_reference": "go1.15-doc-1.15.15-1.2.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.15-doc-1.15.15-1.2.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:go1.15-doc-1.15.15-1.2.ppc64le"
},
"product_reference": "go1.15-doc-1.15.15-1.2.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.15-doc-1.15.15-1.2.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:go1.15-doc-1.15.15-1.2.s390x"
},
"product_reference": "go1.15-doc-1.15.15-1.2.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.15-doc-1.15.15-1.2.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:go1.15-doc-1.15.15-1.2.x86_64"
},
"product_reference": "go1.15-doc-1.15.15-1.2.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.15-race-1.15.15-1.2.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:go1.15-race-1.15.15-1.2.aarch64"
},
"product_reference": "go1.15-race-1.15.15-1.2.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.15-race-1.15.15-1.2.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:go1.15-race-1.15.15-1.2.ppc64le"
},
"product_reference": "go1.15-race-1.15.15-1.2.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.15-race-1.15.15-1.2.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:go1.15-race-1.15.15-1.2.s390x"
},
"product_reference": "go1.15-race-1.15.15-1.2.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go1.15-race-1.15.15-1.2.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:go1.15-race-1.15.15-1.2.x86_64"
},
"product_reference": "go1.15-race-1.15.15-1.2.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2020-24553",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-24553"
}
],
"notes": [
{
"category": "general",
"text": "Go before 1.14.8 and 1.15.x before 1.15.1 allows XSS because text/html is the default for CGI/FCGI handlers that lack a Content-Type header.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:go1.15-1.15.15-1.2.aarch64",
"openSUSE Tumbleweed:go1.15-1.15.15-1.2.ppc64le",
"openSUSE Tumbleweed:go1.15-1.15.15-1.2.s390x",
"openSUSE Tumbleweed:go1.15-1.15.15-1.2.x86_64",
"openSUSE Tumbleweed:go1.15-doc-1.15.15-1.2.aarch64",
"openSUSE Tumbleweed:go1.15-doc-1.15.15-1.2.ppc64le",
"openSUSE Tumbleweed:go1.15-doc-1.15.15-1.2.s390x",
"openSUSE Tumbleweed:go1.15-doc-1.15.15-1.2.x86_64",
"openSUSE Tumbleweed:go1.15-race-1.15.15-1.2.aarch64",
"openSUSE Tumbleweed:go1.15-race-1.15.15-1.2.ppc64le",
"openSUSE Tumbleweed:go1.15-race-1.15.15-1.2.s390x",
"openSUSE Tumbleweed:go1.15-race-1.15.15-1.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-24553",
"url": "https://www.suse.com/security/cve/CVE-2020-24553"
},
{
"category": "external",
"summary": "SUSE Bug 1176031 for CVE-2020-24553",
"url": "https://bugzilla.suse.com/1176031"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:go1.15-1.15.15-1.2.aarch64",
"openSUSE Tumbleweed:go1.15-1.15.15-1.2.ppc64le",
"openSUSE Tumbleweed:go1.15-1.15.15-1.2.s390x",
"openSUSE Tumbleweed:go1.15-1.15.15-1.2.x86_64",
"openSUSE Tumbleweed:go1.15-doc-1.15.15-1.2.aarch64",
"openSUSE Tumbleweed:go1.15-doc-1.15.15-1.2.ppc64le",
"openSUSE Tumbleweed:go1.15-doc-1.15.15-1.2.s390x",
"openSUSE Tumbleweed:go1.15-doc-1.15.15-1.2.x86_64",
"openSUSE Tumbleweed:go1.15-race-1.15.15-1.2.aarch64",
"openSUSE Tumbleweed:go1.15-race-1.15.15-1.2.ppc64le",
"openSUSE Tumbleweed:go1.15-race-1.15.15-1.2.s390x",
"openSUSE Tumbleweed:go1.15-race-1.15.15-1.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:go1.15-1.15.15-1.2.aarch64",
"openSUSE Tumbleweed:go1.15-1.15.15-1.2.ppc64le",
"openSUSE Tumbleweed:go1.15-1.15.15-1.2.s390x",
"openSUSE Tumbleweed:go1.15-1.15.15-1.2.x86_64",
"openSUSE Tumbleweed:go1.15-doc-1.15.15-1.2.aarch64",
"openSUSE Tumbleweed:go1.15-doc-1.15.15-1.2.ppc64le",
"openSUSE Tumbleweed:go1.15-doc-1.15.15-1.2.s390x",
"openSUSE Tumbleweed:go1.15-doc-1.15.15-1.2.x86_64",
"openSUSE Tumbleweed:go1.15-race-1.15.15-1.2.aarch64",
"openSUSE Tumbleweed:go1.15-race-1.15.15-1.2.ppc64le",
"openSUSE Tumbleweed:go1.15-race-1.15.15-1.2.s390x",
"openSUSE Tumbleweed:go1.15-race-1.15.15-1.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2020-24553"
},
{
"cve": "CVE-2020-28362",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-28362"
}
],
"notes": [
{
"category": "general",
"text": "Go before 1.14.12 and 1.15.x before 1.15.4 allows Denial of Service.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:go1.15-1.15.15-1.2.aarch64",
"openSUSE Tumbleweed:go1.15-1.15.15-1.2.ppc64le",
"openSUSE Tumbleweed:go1.15-1.15.15-1.2.s390x",
"openSUSE Tumbleweed:go1.15-1.15.15-1.2.x86_64",
"openSUSE Tumbleweed:go1.15-doc-1.15.15-1.2.aarch64",
"openSUSE Tumbleweed:go1.15-doc-1.15.15-1.2.ppc64le",
"openSUSE Tumbleweed:go1.15-doc-1.15.15-1.2.s390x",
"openSUSE Tumbleweed:go1.15-doc-1.15.15-1.2.x86_64",
"openSUSE Tumbleweed:go1.15-race-1.15.15-1.2.aarch64",
"openSUSE Tumbleweed:go1.15-race-1.15.15-1.2.ppc64le",
"openSUSE Tumbleweed:go1.15-race-1.15.15-1.2.s390x",
"openSUSE Tumbleweed:go1.15-race-1.15.15-1.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-28362",
"url": "https://www.suse.com/security/cve/CVE-2020-28362"
},
{
"category": "external",
"summary": "SUSE Bug 1178750 for CVE-2020-28362",
"url": "https://bugzilla.suse.com/1178750"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:go1.15-1.15.15-1.2.aarch64",
"openSUSE Tumbleweed:go1.15-1.15.15-1.2.ppc64le",
"openSUSE Tumbleweed:go1.15-1.15.15-1.2.s390x",
"openSUSE Tumbleweed:go1.15-1.15.15-1.2.x86_64",
"openSUSE Tumbleweed:go1.15-doc-1.15.15-1.2.aarch64",
"openSUSE Tumbleweed:go1.15-doc-1.15.15-1.2.ppc64le",
"openSUSE Tumbleweed:go1.15-doc-1.15.15-1.2.s390x",
"openSUSE Tumbleweed:go1.15-doc-1.15.15-1.2.x86_64",
"openSUSE Tumbleweed:go1.15-race-1.15.15-1.2.aarch64",
"openSUSE Tumbleweed:go1.15-race-1.15.15-1.2.ppc64le",
"openSUSE Tumbleweed:go1.15-race-1.15.15-1.2.s390x",
"openSUSE Tumbleweed:go1.15-race-1.15.15-1.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:go1.15-1.15.15-1.2.aarch64",
"openSUSE Tumbleweed:go1.15-1.15.15-1.2.ppc64le",
"openSUSE Tumbleweed:go1.15-1.15.15-1.2.s390x",
"openSUSE Tumbleweed:go1.15-1.15.15-1.2.x86_64",
"openSUSE Tumbleweed:go1.15-doc-1.15.15-1.2.aarch64",
"openSUSE Tumbleweed:go1.15-doc-1.15.15-1.2.ppc64le",
"openSUSE Tumbleweed:go1.15-doc-1.15.15-1.2.s390x",
"openSUSE Tumbleweed:go1.15-doc-1.15.15-1.2.x86_64",
"openSUSE Tumbleweed:go1.15-race-1.15.15-1.2.aarch64",
"openSUSE Tumbleweed:go1.15-race-1.15.15-1.2.ppc64le",
"openSUSE Tumbleweed:go1.15-race-1.15.15-1.2.s390x",
"openSUSE Tumbleweed:go1.15-race-1.15.15-1.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2020-28362"
},
{
"cve": "CVE-2020-28366",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-28366"
}
],
"notes": [
{
"category": "general",
"text": "Code injection in the go command with cgo before Go 1.14.12 and Go 1.15.5 allows arbitrary code execution at build time via a malicious unquoted symbol name in a linked object file.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:go1.15-1.15.15-1.2.aarch64",
"openSUSE Tumbleweed:go1.15-1.15.15-1.2.ppc64le",
"openSUSE Tumbleweed:go1.15-1.15.15-1.2.s390x",
"openSUSE Tumbleweed:go1.15-1.15.15-1.2.x86_64",
"openSUSE Tumbleweed:go1.15-doc-1.15.15-1.2.aarch64",
"openSUSE Tumbleweed:go1.15-doc-1.15.15-1.2.ppc64le",
"openSUSE Tumbleweed:go1.15-doc-1.15.15-1.2.s390x",
"openSUSE Tumbleweed:go1.15-doc-1.15.15-1.2.x86_64",
"openSUSE Tumbleweed:go1.15-race-1.15.15-1.2.aarch64",
"openSUSE Tumbleweed:go1.15-race-1.15.15-1.2.ppc64le",
"openSUSE Tumbleweed:go1.15-race-1.15.15-1.2.s390x",
"openSUSE Tumbleweed:go1.15-race-1.15.15-1.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-28366",
"url": "https://www.suse.com/security/cve/CVE-2020-28366"
},
{
"category": "external",
"summary": "SUSE Bug 1178753 for CVE-2020-28366",
"url": "https://bugzilla.suse.com/1178753"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:go1.15-1.15.15-1.2.aarch64",
"openSUSE Tumbleweed:go1.15-1.15.15-1.2.ppc64le",
"openSUSE Tumbleweed:go1.15-1.15.15-1.2.s390x",
"openSUSE Tumbleweed:go1.15-1.15.15-1.2.x86_64",
"openSUSE Tumbleweed:go1.15-doc-1.15.15-1.2.aarch64",
"openSUSE Tumbleweed:go1.15-doc-1.15.15-1.2.ppc64le",
"openSUSE Tumbleweed:go1.15-doc-1.15.15-1.2.s390x",
"openSUSE Tumbleweed:go1.15-doc-1.15.15-1.2.x86_64",
"openSUSE Tumbleweed:go1.15-race-1.15.15-1.2.aarch64",
"openSUSE Tumbleweed:go1.15-race-1.15.15-1.2.ppc64le",
"openSUSE Tumbleweed:go1.15-race-1.15.15-1.2.s390x",
"openSUSE Tumbleweed:go1.15-race-1.15.15-1.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:go1.15-1.15.15-1.2.aarch64",
"openSUSE Tumbleweed:go1.15-1.15.15-1.2.ppc64le",
"openSUSE Tumbleweed:go1.15-1.15.15-1.2.s390x",
"openSUSE Tumbleweed:go1.15-1.15.15-1.2.x86_64",
"openSUSE Tumbleweed:go1.15-doc-1.15.15-1.2.aarch64",
"openSUSE Tumbleweed:go1.15-doc-1.15.15-1.2.ppc64le",
"openSUSE Tumbleweed:go1.15-doc-1.15.15-1.2.s390x",
"openSUSE Tumbleweed:go1.15-doc-1.15.15-1.2.x86_64",
"openSUSE Tumbleweed:go1.15-race-1.15.15-1.2.aarch64",
"openSUSE Tumbleweed:go1.15-race-1.15.15-1.2.ppc64le",
"openSUSE Tumbleweed:go1.15-race-1.15.15-1.2.s390x",
"openSUSE Tumbleweed:go1.15-race-1.15.15-1.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2020-28366"
},
{
"cve": "CVE-2020-28367",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-28367"
}
],
"notes": [
{
"category": "general",
"text": "Code injection in the go command with cgo before Go 1.14.12 and Go 1.15.5 allows arbitrary code execution at build time via malicious gcc flags specified via a #cgo directive.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:go1.15-1.15.15-1.2.aarch64",
"openSUSE Tumbleweed:go1.15-1.15.15-1.2.ppc64le",
"openSUSE Tumbleweed:go1.15-1.15.15-1.2.s390x",
"openSUSE Tumbleweed:go1.15-1.15.15-1.2.x86_64",
"openSUSE Tumbleweed:go1.15-doc-1.15.15-1.2.aarch64",
"openSUSE Tumbleweed:go1.15-doc-1.15.15-1.2.ppc64le",
"openSUSE Tumbleweed:go1.15-doc-1.15.15-1.2.s390x",
"openSUSE Tumbleweed:go1.15-doc-1.15.15-1.2.x86_64",
"openSUSE Tumbleweed:go1.15-race-1.15.15-1.2.aarch64",
"openSUSE Tumbleweed:go1.15-race-1.15.15-1.2.ppc64le",
"openSUSE Tumbleweed:go1.15-race-1.15.15-1.2.s390x",
"openSUSE Tumbleweed:go1.15-race-1.15.15-1.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-28367",
"url": "https://www.suse.com/security/cve/CVE-2020-28367"
},
{
"category": "external",
"summary": "SUSE Bug 1178752 for CVE-2020-28367",
"url": "https://bugzilla.suse.com/1178752"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:go1.15-1.15.15-1.2.aarch64",
"openSUSE Tumbleweed:go1.15-1.15.15-1.2.ppc64le",
"openSUSE Tumbleweed:go1.15-1.15.15-1.2.s390x",
"openSUSE Tumbleweed:go1.15-1.15.15-1.2.x86_64",
"openSUSE Tumbleweed:go1.15-doc-1.15.15-1.2.aarch64",
"openSUSE Tumbleweed:go1.15-doc-1.15.15-1.2.ppc64le",
"openSUSE Tumbleweed:go1.15-doc-1.15.15-1.2.s390x",
"openSUSE Tumbleweed:go1.15-doc-1.15.15-1.2.x86_64",
"openSUSE Tumbleweed:go1.15-race-1.15.15-1.2.aarch64",
"openSUSE Tumbleweed:go1.15-race-1.15.15-1.2.ppc64le",
"openSUSE Tumbleweed:go1.15-race-1.15.15-1.2.s390x",
"openSUSE Tumbleweed:go1.15-race-1.15.15-1.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:go1.15-1.15.15-1.2.aarch64",
"openSUSE Tumbleweed:go1.15-1.15.15-1.2.ppc64le",
"openSUSE Tumbleweed:go1.15-1.15.15-1.2.s390x",
"openSUSE Tumbleweed:go1.15-1.15.15-1.2.x86_64",
"openSUSE Tumbleweed:go1.15-doc-1.15.15-1.2.aarch64",
"openSUSE Tumbleweed:go1.15-doc-1.15.15-1.2.ppc64le",
"openSUSE Tumbleweed:go1.15-doc-1.15.15-1.2.s390x",
"openSUSE Tumbleweed:go1.15-doc-1.15.15-1.2.x86_64",
"openSUSE Tumbleweed:go1.15-race-1.15.15-1.2.aarch64",
"openSUSE Tumbleweed:go1.15-race-1.15.15-1.2.ppc64le",
"openSUSE Tumbleweed:go1.15-race-1.15.15-1.2.s390x",
"openSUSE Tumbleweed:go1.15-race-1.15.15-1.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2020-28367"
},
{
"cve": "CVE-2021-27918",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-27918"
}
],
"notes": [
{
"category": "general",
"text": "encoding/xml in Go before 1.15.9 and 1.16.x before 1.16.1 has an infinite loop if a custom TokenReader (for xml.NewTokenDecoder) returns EOF in the middle of an element. This can occur in the Decode, DecodeElement, or Skip method.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:go1.15-1.15.15-1.2.aarch64",
"openSUSE Tumbleweed:go1.15-1.15.15-1.2.ppc64le",
"openSUSE Tumbleweed:go1.15-1.15.15-1.2.s390x",
"openSUSE Tumbleweed:go1.15-1.15.15-1.2.x86_64",
"openSUSE Tumbleweed:go1.15-doc-1.15.15-1.2.aarch64",
"openSUSE Tumbleweed:go1.15-doc-1.15.15-1.2.ppc64le",
"openSUSE Tumbleweed:go1.15-doc-1.15.15-1.2.s390x",
"openSUSE Tumbleweed:go1.15-doc-1.15.15-1.2.x86_64",
"openSUSE Tumbleweed:go1.15-race-1.15.15-1.2.aarch64",
"openSUSE Tumbleweed:go1.15-race-1.15.15-1.2.ppc64le",
"openSUSE Tumbleweed:go1.15-race-1.15.15-1.2.s390x",
"openSUSE Tumbleweed:go1.15-race-1.15.15-1.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-27918",
"url": "https://www.suse.com/security/cve/CVE-2021-27918"
},
{
"category": "external",
"summary": "SUSE Bug 1183333 for CVE-2021-27918",
"url": "https://bugzilla.suse.com/1183333"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:go1.15-1.15.15-1.2.aarch64",
"openSUSE Tumbleweed:go1.15-1.15.15-1.2.ppc64le",
"openSUSE Tumbleweed:go1.15-1.15.15-1.2.s390x",
"openSUSE Tumbleweed:go1.15-1.15.15-1.2.x86_64",
"openSUSE Tumbleweed:go1.15-doc-1.15.15-1.2.aarch64",
"openSUSE Tumbleweed:go1.15-doc-1.15.15-1.2.ppc64le",
"openSUSE Tumbleweed:go1.15-doc-1.15.15-1.2.s390x",
"openSUSE Tumbleweed:go1.15-doc-1.15.15-1.2.x86_64",
"openSUSE Tumbleweed:go1.15-race-1.15.15-1.2.aarch64",
"openSUSE Tumbleweed:go1.15-race-1.15.15-1.2.ppc64le",
"openSUSE Tumbleweed:go1.15-race-1.15.15-1.2.s390x",
"openSUSE Tumbleweed:go1.15-race-1.15.15-1.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:go1.15-1.15.15-1.2.aarch64",
"openSUSE Tumbleweed:go1.15-1.15.15-1.2.ppc64le",
"openSUSE Tumbleweed:go1.15-1.15.15-1.2.s390x",
"openSUSE Tumbleweed:go1.15-1.15.15-1.2.x86_64",
"openSUSE Tumbleweed:go1.15-doc-1.15.15-1.2.aarch64",
"openSUSE Tumbleweed:go1.15-doc-1.15.15-1.2.ppc64le",
"openSUSE Tumbleweed:go1.15-doc-1.15.15-1.2.s390x",
"openSUSE Tumbleweed:go1.15-doc-1.15.15-1.2.x86_64",
"openSUSE Tumbleweed:go1.15-race-1.15.15-1.2.aarch64",
"openSUSE Tumbleweed:go1.15-race-1.15.15-1.2.ppc64le",
"openSUSE Tumbleweed:go1.15-race-1.15.15-1.2.s390x",
"openSUSE Tumbleweed:go1.15-race-1.15.15-1.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2021-27918"
},
{
"cve": "CVE-2021-3114",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-3114"
}
],
"notes": [
{
"category": "general",
"text": "In Go before 1.14.14 and 1.15.x before 1.15.7, crypto/elliptic/p224.go can generate incorrect outputs, related to an underflow of the lowest limb during the final complete reduction in the P-224 field.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:go1.15-1.15.15-1.2.aarch64",
"openSUSE Tumbleweed:go1.15-1.15.15-1.2.ppc64le",
"openSUSE Tumbleweed:go1.15-1.15.15-1.2.s390x",
"openSUSE Tumbleweed:go1.15-1.15.15-1.2.x86_64",
"openSUSE Tumbleweed:go1.15-doc-1.15.15-1.2.aarch64",
"openSUSE Tumbleweed:go1.15-doc-1.15.15-1.2.ppc64le",
"openSUSE Tumbleweed:go1.15-doc-1.15.15-1.2.s390x",
"openSUSE Tumbleweed:go1.15-doc-1.15.15-1.2.x86_64",
"openSUSE Tumbleweed:go1.15-race-1.15.15-1.2.aarch64",
"openSUSE Tumbleweed:go1.15-race-1.15.15-1.2.ppc64le",
"openSUSE Tumbleweed:go1.15-race-1.15.15-1.2.s390x",
"openSUSE Tumbleweed:go1.15-race-1.15.15-1.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-3114",
"url": "https://www.suse.com/security/cve/CVE-2021-3114"
},
{
"category": "external",
"summary": "SUSE Bug 1181145 for CVE-2021-3114",
"url": "https://bugzilla.suse.com/1181145"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:go1.15-1.15.15-1.2.aarch64",
"openSUSE Tumbleweed:go1.15-1.15.15-1.2.ppc64le",
"openSUSE Tumbleweed:go1.15-1.15.15-1.2.s390x",
"openSUSE Tumbleweed:go1.15-1.15.15-1.2.x86_64",
"openSUSE Tumbleweed:go1.15-doc-1.15.15-1.2.aarch64",
"openSUSE Tumbleweed:go1.15-doc-1.15.15-1.2.ppc64le",
"openSUSE Tumbleweed:go1.15-doc-1.15.15-1.2.s390x",
"openSUSE Tumbleweed:go1.15-doc-1.15.15-1.2.x86_64",
"openSUSE Tumbleweed:go1.15-race-1.15.15-1.2.aarch64",
"openSUSE Tumbleweed:go1.15-race-1.15.15-1.2.ppc64le",
"openSUSE Tumbleweed:go1.15-race-1.15.15-1.2.s390x",
"openSUSE Tumbleweed:go1.15-race-1.15.15-1.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.8,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:go1.15-1.15.15-1.2.aarch64",
"openSUSE Tumbleweed:go1.15-1.15.15-1.2.ppc64le",
"openSUSE Tumbleweed:go1.15-1.15.15-1.2.s390x",
"openSUSE Tumbleweed:go1.15-1.15.15-1.2.x86_64",
"openSUSE Tumbleweed:go1.15-doc-1.15.15-1.2.aarch64",
"openSUSE Tumbleweed:go1.15-doc-1.15.15-1.2.ppc64le",
"openSUSE Tumbleweed:go1.15-doc-1.15.15-1.2.s390x",
"openSUSE Tumbleweed:go1.15-doc-1.15.15-1.2.x86_64",
"openSUSE Tumbleweed:go1.15-race-1.15.15-1.2.aarch64",
"openSUSE Tumbleweed:go1.15-race-1.15.15-1.2.ppc64le",
"openSUSE Tumbleweed:go1.15-race-1.15.15-1.2.s390x",
"openSUSE Tumbleweed:go1.15-race-1.15.15-1.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2021-3114"
},
{
"cve": "CVE-2021-3115",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-3115"
}
],
"notes": [
{
"category": "general",
"text": "Go before 1.14.14 and 1.15.x before 1.15.7 on Windows is vulnerable to Command Injection and remote code execution when using the \"go get\" command to fetch modules that make use of cgo (for example, cgo can execute a gcc program from an untrusted download).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:go1.15-1.15.15-1.2.aarch64",
"openSUSE Tumbleweed:go1.15-1.15.15-1.2.ppc64le",
"openSUSE Tumbleweed:go1.15-1.15.15-1.2.s390x",
"openSUSE Tumbleweed:go1.15-1.15.15-1.2.x86_64",
"openSUSE Tumbleweed:go1.15-doc-1.15.15-1.2.aarch64",
"openSUSE Tumbleweed:go1.15-doc-1.15.15-1.2.ppc64le",
"openSUSE Tumbleweed:go1.15-doc-1.15.15-1.2.s390x",
"openSUSE Tumbleweed:go1.15-doc-1.15.15-1.2.x86_64",
"openSUSE Tumbleweed:go1.15-race-1.15.15-1.2.aarch64",
"openSUSE Tumbleweed:go1.15-race-1.15.15-1.2.ppc64le",
"openSUSE Tumbleweed:go1.15-race-1.15.15-1.2.s390x",
"openSUSE Tumbleweed:go1.15-race-1.15.15-1.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-3115",
"url": "https://www.suse.com/security/cve/CVE-2021-3115"
},
{
"category": "external",
"summary": "SUSE Bug 1181146 for CVE-2021-3115",
"url": "https://bugzilla.suse.com/1181146"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:go1.15-1.15.15-1.2.aarch64",
"openSUSE Tumbleweed:go1.15-1.15.15-1.2.ppc64le",
"openSUSE Tumbleweed:go1.15-1.15.15-1.2.s390x",
"openSUSE Tumbleweed:go1.15-1.15.15-1.2.x86_64",
"openSUSE Tumbleweed:go1.15-doc-1.15.15-1.2.aarch64",
"openSUSE Tumbleweed:go1.15-doc-1.15.15-1.2.ppc64le",
"openSUSE Tumbleweed:go1.15-doc-1.15.15-1.2.s390x",
"openSUSE Tumbleweed:go1.15-doc-1.15.15-1.2.x86_64",
"openSUSE Tumbleweed:go1.15-race-1.15.15-1.2.aarch64",
"openSUSE Tumbleweed:go1.15-race-1.15.15-1.2.ppc64le",
"openSUSE Tumbleweed:go1.15-race-1.15.15-1.2.s390x",
"openSUSE Tumbleweed:go1.15-race-1.15.15-1.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.3,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:go1.15-1.15.15-1.2.aarch64",
"openSUSE Tumbleweed:go1.15-1.15.15-1.2.ppc64le",
"openSUSE Tumbleweed:go1.15-1.15.15-1.2.s390x",
"openSUSE Tumbleweed:go1.15-1.15.15-1.2.x86_64",
"openSUSE Tumbleweed:go1.15-doc-1.15.15-1.2.aarch64",
"openSUSE Tumbleweed:go1.15-doc-1.15.15-1.2.ppc64le",
"openSUSE Tumbleweed:go1.15-doc-1.15.15-1.2.s390x",
"openSUSE Tumbleweed:go1.15-doc-1.15.15-1.2.x86_64",
"openSUSE Tumbleweed:go1.15-race-1.15.15-1.2.aarch64",
"openSUSE Tumbleweed:go1.15-race-1.15.15-1.2.ppc64le",
"openSUSE Tumbleweed:go1.15-race-1.15.15-1.2.s390x",
"openSUSE Tumbleweed:go1.15-race-1.15.15-1.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2021-3115"
},
{
"cve": "CVE-2021-31525",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-31525"
}
],
"notes": [
{
"category": "general",
"text": "net/http in Go before 1.15.12 and 1.16.x before 1.16.4 allows remote attackers to cause a denial of service (panic) via a large header to ReadRequest or ReadResponse. Server, Transport, and Client can each be affected in some configurations.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:go1.15-1.15.15-1.2.aarch64",
"openSUSE Tumbleweed:go1.15-1.15.15-1.2.ppc64le",
"openSUSE Tumbleweed:go1.15-1.15.15-1.2.s390x",
"openSUSE Tumbleweed:go1.15-1.15.15-1.2.x86_64",
"openSUSE Tumbleweed:go1.15-doc-1.15.15-1.2.aarch64",
"openSUSE Tumbleweed:go1.15-doc-1.15.15-1.2.ppc64le",
"openSUSE Tumbleweed:go1.15-doc-1.15.15-1.2.s390x",
"openSUSE Tumbleweed:go1.15-doc-1.15.15-1.2.x86_64",
"openSUSE Tumbleweed:go1.15-race-1.15.15-1.2.aarch64",
"openSUSE Tumbleweed:go1.15-race-1.15.15-1.2.ppc64le",
"openSUSE Tumbleweed:go1.15-race-1.15.15-1.2.s390x",
"openSUSE Tumbleweed:go1.15-race-1.15.15-1.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-31525",
"url": "https://www.suse.com/security/cve/CVE-2021-31525"
},
{
"category": "external",
"summary": "SUSE Bug 1185790 for CVE-2021-31525",
"url": "https://bugzilla.suse.com/1185790"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:go1.15-1.15.15-1.2.aarch64",
"openSUSE Tumbleweed:go1.15-1.15.15-1.2.ppc64le",
"openSUSE Tumbleweed:go1.15-1.15.15-1.2.s390x",
"openSUSE Tumbleweed:go1.15-1.15.15-1.2.x86_64",
"openSUSE Tumbleweed:go1.15-doc-1.15.15-1.2.aarch64",
"openSUSE Tumbleweed:go1.15-doc-1.15.15-1.2.ppc64le",
"openSUSE Tumbleweed:go1.15-doc-1.15.15-1.2.s390x",
"openSUSE Tumbleweed:go1.15-doc-1.15.15-1.2.x86_64",
"openSUSE Tumbleweed:go1.15-race-1.15.15-1.2.aarch64",
"openSUSE Tumbleweed:go1.15-race-1.15.15-1.2.ppc64le",
"openSUSE Tumbleweed:go1.15-race-1.15.15-1.2.s390x",
"openSUSE Tumbleweed:go1.15-race-1.15.15-1.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:go1.15-1.15.15-1.2.aarch64",
"openSUSE Tumbleweed:go1.15-1.15.15-1.2.ppc64le",
"openSUSE Tumbleweed:go1.15-1.15.15-1.2.s390x",
"openSUSE Tumbleweed:go1.15-1.15.15-1.2.x86_64",
"openSUSE Tumbleweed:go1.15-doc-1.15.15-1.2.aarch64",
"openSUSE Tumbleweed:go1.15-doc-1.15.15-1.2.ppc64le",
"openSUSE Tumbleweed:go1.15-doc-1.15.15-1.2.s390x",
"openSUSE Tumbleweed:go1.15-doc-1.15.15-1.2.x86_64",
"openSUSE Tumbleweed:go1.15-race-1.15.15-1.2.aarch64",
"openSUSE Tumbleweed:go1.15-race-1.15.15-1.2.ppc64le",
"openSUSE Tumbleweed:go1.15-race-1.15.15-1.2.s390x",
"openSUSE Tumbleweed:go1.15-race-1.15.15-1.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2021-31525"
},
{
"cve": "CVE-2021-33195",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-33195"
}
],
"notes": [
{
"category": "general",
"text": "Go before 1.15.13 and 1.16.x before 1.16.5 has functions for DNS lookups that do not validate replies from DNS servers, and thus a return value may contain an unsafe injection (e.g., XSS) that does not conform to the RFC1035 format.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:go1.15-1.15.15-1.2.aarch64",
"openSUSE Tumbleweed:go1.15-1.15.15-1.2.ppc64le",
"openSUSE Tumbleweed:go1.15-1.15.15-1.2.s390x",
"openSUSE Tumbleweed:go1.15-1.15.15-1.2.x86_64",
"openSUSE Tumbleweed:go1.15-doc-1.15.15-1.2.aarch64",
"openSUSE Tumbleweed:go1.15-doc-1.15.15-1.2.ppc64le",
"openSUSE Tumbleweed:go1.15-doc-1.15.15-1.2.s390x",
"openSUSE Tumbleweed:go1.15-doc-1.15.15-1.2.x86_64",
"openSUSE Tumbleweed:go1.15-race-1.15.15-1.2.aarch64",
"openSUSE Tumbleweed:go1.15-race-1.15.15-1.2.ppc64le",
"openSUSE Tumbleweed:go1.15-race-1.15.15-1.2.s390x",
"openSUSE Tumbleweed:go1.15-race-1.15.15-1.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-33195",
"url": "https://www.suse.com/security/cve/CVE-2021-33195"
},
{
"category": "external",
"summary": "SUSE Bug 1187443 for CVE-2021-33195",
"url": "https://bugzilla.suse.com/1187443"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:go1.15-1.15.15-1.2.aarch64",
"openSUSE Tumbleweed:go1.15-1.15.15-1.2.ppc64le",
"openSUSE Tumbleweed:go1.15-1.15.15-1.2.s390x",
"openSUSE Tumbleweed:go1.15-1.15.15-1.2.x86_64",
"openSUSE Tumbleweed:go1.15-doc-1.15.15-1.2.aarch64",
"openSUSE Tumbleweed:go1.15-doc-1.15.15-1.2.ppc64le",
"openSUSE Tumbleweed:go1.15-doc-1.15.15-1.2.s390x",
"openSUSE Tumbleweed:go1.15-doc-1.15.15-1.2.x86_64",
"openSUSE Tumbleweed:go1.15-race-1.15.15-1.2.aarch64",
"openSUSE Tumbleweed:go1.15-race-1.15.15-1.2.ppc64le",
"openSUSE Tumbleweed:go1.15-race-1.15.15-1.2.s390x",
"openSUSE Tumbleweed:go1.15-race-1.15.15-1.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:go1.15-1.15.15-1.2.aarch64",
"openSUSE Tumbleweed:go1.15-1.15.15-1.2.ppc64le",
"openSUSE Tumbleweed:go1.15-1.15.15-1.2.s390x",
"openSUSE Tumbleweed:go1.15-1.15.15-1.2.x86_64",
"openSUSE Tumbleweed:go1.15-doc-1.15.15-1.2.aarch64",
"openSUSE Tumbleweed:go1.15-doc-1.15.15-1.2.ppc64le",
"openSUSE Tumbleweed:go1.15-doc-1.15.15-1.2.s390x",
"openSUSE Tumbleweed:go1.15-doc-1.15.15-1.2.x86_64",
"openSUSE Tumbleweed:go1.15-race-1.15.15-1.2.aarch64",
"openSUSE Tumbleweed:go1.15-race-1.15.15-1.2.ppc64le",
"openSUSE Tumbleweed:go1.15-race-1.15.15-1.2.s390x",
"openSUSE Tumbleweed:go1.15-race-1.15.15-1.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2021-33195"
},
{
"cve": "CVE-2021-33196",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-33196"
}
],
"notes": [
{
"category": "general",
"text": "In archive/zip in Go before 1.15.13 and 1.16.x before 1.16.5, a crafted file count (in an archive\u0027s header) can cause a NewReader or OpenReader panic.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:go1.15-1.15.15-1.2.aarch64",
"openSUSE Tumbleweed:go1.15-1.15.15-1.2.ppc64le",
"openSUSE Tumbleweed:go1.15-1.15.15-1.2.s390x",
"openSUSE Tumbleweed:go1.15-1.15.15-1.2.x86_64",
"openSUSE Tumbleweed:go1.15-doc-1.15.15-1.2.aarch64",
"openSUSE Tumbleweed:go1.15-doc-1.15.15-1.2.ppc64le",
"openSUSE Tumbleweed:go1.15-doc-1.15.15-1.2.s390x",
"openSUSE Tumbleweed:go1.15-doc-1.15.15-1.2.x86_64",
"openSUSE Tumbleweed:go1.15-race-1.15.15-1.2.aarch64",
"openSUSE Tumbleweed:go1.15-race-1.15.15-1.2.ppc64le",
"openSUSE Tumbleweed:go1.15-race-1.15.15-1.2.s390x",
"openSUSE Tumbleweed:go1.15-race-1.15.15-1.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-33196",
"url": "https://www.suse.com/security/cve/CVE-2021-33196"
},
{
"category": "external",
"summary": "SUSE Bug 1186622 for CVE-2021-33196",
"url": "https://bugzilla.suse.com/1186622"
},
{
"category": "external",
"summary": "SUSE Bug 1190589 for CVE-2021-33196",
"url": "https://bugzilla.suse.com/1190589"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:go1.15-1.15.15-1.2.aarch64",
"openSUSE Tumbleweed:go1.15-1.15.15-1.2.ppc64le",
"openSUSE Tumbleweed:go1.15-1.15.15-1.2.s390x",
"openSUSE Tumbleweed:go1.15-1.15.15-1.2.x86_64",
"openSUSE Tumbleweed:go1.15-doc-1.15.15-1.2.aarch64",
"openSUSE Tumbleweed:go1.15-doc-1.15.15-1.2.ppc64le",
"openSUSE Tumbleweed:go1.15-doc-1.15.15-1.2.s390x",
"openSUSE Tumbleweed:go1.15-doc-1.15.15-1.2.x86_64",
"openSUSE Tumbleweed:go1.15-race-1.15.15-1.2.aarch64",
"openSUSE Tumbleweed:go1.15-race-1.15.15-1.2.ppc64le",
"openSUSE Tumbleweed:go1.15-race-1.15.15-1.2.s390x",
"openSUSE Tumbleweed:go1.15-race-1.15.15-1.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:go1.15-1.15.15-1.2.aarch64",
"openSUSE Tumbleweed:go1.15-1.15.15-1.2.ppc64le",
"openSUSE Tumbleweed:go1.15-1.15.15-1.2.s390x",
"openSUSE Tumbleweed:go1.15-1.15.15-1.2.x86_64",
"openSUSE Tumbleweed:go1.15-doc-1.15.15-1.2.aarch64",
"openSUSE Tumbleweed:go1.15-doc-1.15.15-1.2.ppc64le",
"openSUSE Tumbleweed:go1.15-doc-1.15.15-1.2.s390x",
"openSUSE Tumbleweed:go1.15-doc-1.15.15-1.2.x86_64",
"openSUSE Tumbleweed:go1.15-race-1.15.15-1.2.aarch64",
"openSUSE Tumbleweed:go1.15-race-1.15.15-1.2.ppc64le",
"openSUSE Tumbleweed:go1.15-race-1.15.15-1.2.s390x",
"openSUSE Tumbleweed:go1.15-race-1.15.15-1.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2021-33196"
},
{
"cve": "CVE-2021-33197",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-33197"
}
],
"notes": [
{
"category": "general",
"text": "In Go before 1.15.13 and 1.16.x before 1.16.5, some configurations of ReverseProxy (from net/http/httputil) result in a situation where an attacker is able to drop arbitrary headers.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:go1.15-1.15.15-1.2.aarch64",
"openSUSE Tumbleweed:go1.15-1.15.15-1.2.ppc64le",
"openSUSE Tumbleweed:go1.15-1.15.15-1.2.s390x",
"openSUSE Tumbleweed:go1.15-1.15.15-1.2.x86_64",
"openSUSE Tumbleweed:go1.15-doc-1.15.15-1.2.aarch64",
"openSUSE Tumbleweed:go1.15-doc-1.15.15-1.2.ppc64le",
"openSUSE Tumbleweed:go1.15-doc-1.15.15-1.2.s390x",
"openSUSE Tumbleweed:go1.15-doc-1.15.15-1.2.x86_64",
"openSUSE Tumbleweed:go1.15-race-1.15.15-1.2.aarch64",
"openSUSE Tumbleweed:go1.15-race-1.15.15-1.2.ppc64le",
"openSUSE Tumbleweed:go1.15-race-1.15.15-1.2.s390x",
"openSUSE Tumbleweed:go1.15-race-1.15.15-1.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-33197",
"url": "https://www.suse.com/security/cve/CVE-2021-33197"
},
{
"category": "external",
"summary": "SUSE Bug 1187444 for CVE-2021-33197",
"url": "https://bugzilla.suse.com/1187444"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:go1.15-1.15.15-1.2.aarch64",
"openSUSE Tumbleweed:go1.15-1.15.15-1.2.ppc64le",
"openSUSE Tumbleweed:go1.15-1.15.15-1.2.s390x",
"openSUSE Tumbleweed:go1.15-1.15.15-1.2.x86_64",
"openSUSE Tumbleweed:go1.15-doc-1.15.15-1.2.aarch64",
"openSUSE Tumbleweed:go1.15-doc-1.15.15-1.2.ppc64le",
"openSUSE Tumbleweed:go1.15-doc-1.15.15-1.2.s390x",
"openSUSE Tumbleweed:go1.15-doc-1.15.15-1.2.x86_64",
"openSUSE Tumbleweed:go1.15-race-1.15.15-1.2.aarch64",
"openSUSE Tumbleweed:go1.15-race-1.15.15-1.2.ppc64le",
"openSUSE Tumbleweed:go1.15-race-1.15.15-1.2.s390x",
"openSUSE Tumbleweed:go1.15-race-1.15.15-1.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.7,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:go1.15-1.15.15-1.2.aarch64",
"openSUSE Tumbleweed:go1.15-1.15.15-1.2.ppc64le",
"openSUSE Tumbleweed:go1.15-1.15.15-1.2.s390x",
"openSUSE Tumbleweed:go1.15-1.15.15-1.2.x86_64",
"openSUSE Tumbleweed:go1.15-doc-1.15.15-1.2.aarch64",
"openSUSE Tumbleweed:go1.15-doc-1.15.15-1.2.ppc64le",
"openSUSE Tumbleweed:go1.15-doc-1.15.15-1.2.s390x",
"openSUSE Tumbleweed:go1.15-doc-1.15.15-1.2.x86_64",
"openSUSE Tumbleweed:go1.15-race-1.15.15-1.2.aarch64",
"openSUSE Tumbleweed:go1.15-race-1.15.15-1.2.ppc64le",
"openSUSE Tumbleweed:go1.15-race-1.15.15-1.2.s390x",
"openSUSE Tumbleweed:go1.15-race-1.15.15-1.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "low"
}
],
"title": "CVE-2021-33197"
},
{
"cve": "CVE-2021-33198",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-33198"
}
],
"notes": [
{
"category": "general",
"text": "In Go before 1.15.13 and 1.16.x before 1.16.5, there can be a panic for a large exponent to the math/big.Rat SetString or UnmarshalText method.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:go1.15-1.15.15-1.2.aarch64",
"openSUSE Tumbleweed:go1.15-1.15.15-1.2.ppc64le",
"openSUSE Tumbleweed:go1.15-1.15.15-1.2.s390x",
"openSUSE Tumbleweed:go1.15-1.15.15-1.2.x86_64",
"openSUSE Tumbleweed:go1.15-doc-1.15.15-1.2.aarch64",
"openSUSE Tumbleweed:go1.15-doc-1.15.15-1.2.ppc64le",
"openSUSE Tumbleweed:go1.15-doc-1.15.15-1.2.s390x",
"openSUSE Tumbleweed:go1.15-doc-1.15.15-1.2.x86_64",
"openSUSE Tumbleweed:go1.15-race-1.15.15-1.2.aarch64",
"openSUSE Tumbleweed:go1.15-race-1.15.15-1.2.ppc64le",
"openSUSE Tumbleweed:go1.15-race-1.15.15-1.2.s390x",
"openSUSE Tumbleweed:go1.15-race-1.15.15-1.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-33198",
"url": "https://www.suse.com/security/cve/CVE-2021-33198"
},
{
"category": "external",
"summary": "SUSE Bug 1187445 for CVE-2021-33198",
"url": "https://bugzilla.suse.com/1187445"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:go1.15-1.15.15-1.2.aarch64",
"openSUSE Tumbleweed:go1.15-1.15.15-1.2.ppc64le",
"openSUSE Tumbleweed:go1.15-1.15.15-1.2.s390x",
"openSUSE Tumbleweed:go1.15-1.15.15-1.2.x86_64",
"openSUSE Tumbleweed:go1.15-doc-1.15.15-1.2.aarch64",
"openSUSE Tumbleweed:go1.15-doc-1.15.15-1.2.ppc64le",
"openSUSE Tumbleweed:go1.15-doc-1.15.15-1.2.s390x",
"openSUSE Tumbleweed:go1.15-doc-1.15.15-1.2.x86_64",
"openSUSE Tumbleweed:go1.15-race-1.15.15-1.2.aarch64",
"openSUSE Tumbleweed:go1.15-race-1.15.15-1.2.ppc64le",
"openSUSE Tumbleweed:go1.15-race-1.15.15-1.2.s390x",
"openSUSE Tumbleweed:go1.15-race-1.15.15-1.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:go1.15-1.15.15-1.2.aarch64",
"openSUSE Tumbleweed:go1.15-1.15.15-1.2.ppc64le",
"openSUSE Tumbleweed:go1.15-1.15.15-1.2.s390x",
"openSUSE Tumbleweed:go1.15-1.15.15-1.2.x86_64",
"openSUSE Tumbleweed:go1.15-doc-1.15.15-1.2.aarch64",
"openSUSE Tumbleweed:go1.15-doc-1.15.15-1.2.ppc64le",
"openSUSE Tumbleweed:go1.15-doc-1.15.15-1.2.s390x",
"openSUSE Tumbleweed:go1.15-doc-1.15.15-1.2.x86_64",
"openSUSE Tumbleweed:go1.15-race-1.15.15-1.2.aarch64",
"openSUSE Tumbleweed:go1.15-race-1.15.15-1.2.ppc64le",
"openSUSE Tumbleweed:go1.15-race-1.15.15-1.2.s390x",
"openSUSE Tumbleweed:go1.15-race-1.15.15-1.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2021-33198"
},
{
"cve": "CVE-2021-34558",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-34558"
}
],
"notes": [
{
"category": "general",
"text": "The crypto/tls package of Go through 1.16.5 does not properly assert that the type of public key in an X.509 certificate matches the expected type when doing a RSA based key exchange, allowing a malicious TLS server to cause a TLS client to panic.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:go1.15-1.15.15-1.2.aarch64",
"openSUSE Tumbleweed:go1.15-1.15.15-1.2.ppc64le",
"openSUSE Tumbleweed:go1.15-1.15.15-1.2.s390x",
"openSUSE Tumbleweed:go1.15-1.15.15-1.2.x86_64",
"openSUSE Tumbleweed:go1.15-doc-1.15.15-1.2.aarch64",
"openSUSE Tumbleweed:go1.15-doc-1.15.15-1.2.ppc64le",
"openSUSE Tumbleweed:go1.15-doc-1.15.15-1.2.s390x",
"openSUSE Tumbleweed:go1.15-doc-1.15.15-1.2.x86_64",
"openSUSE Tumbleweed:go1.15-race-1.15.15-1.2.aarch64",
"openSUSE Tumbleweed:go1.15-race-1.15.15-1.2.ppc64le",
"openSUSE Tumbleweed:go1.15-race-1.15.15-1.2.s390x",
"openSUSE Tumbleweed:go1.15-race-1.15.15-1.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-34558",
"url": "https://www.suse.com/security/cve/CVE-2021-34558"
},
{
"category": "external",
"summary": "SUSE Bug 1188229 for CVE-2021-34558",
"url": "https://bugzilla.suse.com/1188229"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:go1.15-1.15.15-1.2.aarch64",
"openSUSE Tumbleweed:go1.15-1.15.15-1.2.ppc64le",
"openSUSE Tumbleweed:go1.15-1.15.15-1.2.s390x",
"openSUSE Tumbleweed:go1.15-1.15.15-1.2.x86_64",
"openSUSE Tumbleweed:go1.15-doc-1.15.15-1.2.aarch64",
"openSUSE Tumbleweed:go1.15-doc-1.15.15-1.2.ppc64le",
"openSUSE Tumbleweed:go1.15-doc-1.15.15-1.2.s390x",
"openSUSE Tumbleweed:go1.15-doc-1.15.15-1.2.x86_64",
"openSUSE Tumbleweed:go1.15-race-1.15.15-1.2.aarch64",
"openSUSE Tumbleweed:go1.15-race-1.15.15-1.2.ppc64le",
"openSUSE Tumbleweed:go1.15-race-1.15.15-1.2.s390x",
"openSUSE Tumbleweed:go1.15-race-1.15.15-1.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:go1.15-1.15.15-1.2.aarch64",
"openSUSE Tumbleweed:go1.15-1.15.15-1.2.ppc64le",
"openSUSE Tumbleweed:go1.15-1.15.15-1.2.s390x",
"openSUSE Tumbleweed:go1.15-1.15.15-1.2.x86_64",
"openSUSE Tumbleweed:go1.15-doc-1.15.15-1.2.aarch64",
"openSUSE Tumbleweed:go1.15-doc-1.15.15-1.2.ppc64le",
"openSUSE Tumbleweed:go1.15-doc-1.15.15-1.2.s390x",
"openSUSE Tumbleweed:go1.15-doc-1.15.15-1.2.x86_64",
"openSUSE Tumbleweed:go1.15-race-1.15.15-1.2.aarch64",
"openSUSE Tumbleweed:go1.15-race-1.15.15-1.2.ppc64le",
"openSUSE Tumbleweed:go1.15-race-1.15.15-1.2.s390x",
"openSUSE Tumbleweed:go1.15-race-1.15.15-1.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2021-34558"
},
{
"cve": "CVE-2021-36221",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-36221"
}
],
"notes": [
{
"category": "general",
"text": "Go before 1.15.15 and 1.16.x before 1.16.7 has a race condition that can lead to a net/http/httputil ReverseProxy panic upon an ErrAbortHandler abort.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:go1.15-1.15.15-1.2.aarch64",
"openSUSE Tumbleweed:go1.15-1.15.15-1.2.ppc64le",
"openSUSE Tumbleweed:go1.15-1.15.15-1.2.s390x",
"openSUSE Tumbleweed:go1.15-1.15.15-1.2.x86_64",
"openSUSE Tumbleweed:go1.15-doc-1.15.15-1.2.aarch64",
"openSUSE Tumbleweed:go1.15-doc-1.15.15-1.2.ppc64le",
"openSUSE Tumbleweed:go1.15-doc-1.15.15-1.2.s390x",
"openSUSE Tumbleweed:go1.15-doc-1.15.15-1.2.x86_64",
"openSUSE Tumbleweed:go1.15-race-1.15.15-1.2.aarch64",
"openSUSE Tumbleweed:go1.15-race-1.15.15-1.2.ppc64le",
"openSUSE Tumbleweed:go1.15-race-1.15.15-1.2.s390x",
"openSUSE Tumbleweed:go1.15-race-1.15.15-1.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-36221",
"url": "https://www.suse.com/security/cve/CVE-2021-36221"
},
{
"category": "external",
"summary": "SUSE Bug 1189162 for CVE-2021-36221",
"url": "https://bugzilla.suse.com/1189162"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:go1.15-1.15.15-1.2.aarch64",
"openSUSE Tumbleweed:go1.15-1.15.15-1.2.ppc64le",
"openSUSE Tumbleweed:go1.15-1.15.15-1.2.s390x",
"openSUSE Tumbleweed:go1.15-1.15.15-1.2.x86_64",
"openSUSE Tumbleweed:go1.15-doc-1.15.15-1.2.aarch64",
"openSUSE Tumbleweed:go1.15-doc-1.15.15-1.2.ppc64le",
"openSUSE Tumbleweed:go1.15-doc-1.15.15-1.2.s390x",
"openSUSE Tumbleweed:go1.15-doc-1.15.15-1.2.x86_64",
"openSUSE Tumbleweed:go1.15-race-1.15.15-1.2.aarch64",
"openSUSE Tumbleweed:go1.15-race-1.15.15-1.2.ppc64le",
"openSUSE Tumbleweed:go1.15-race-1.15.15-1.2.s390x",
"openSUSE Tumbleweed:go1.15-race-1.15.15-1.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:go1.15-1.15.15-1.2.aarch64",
"openSUSE Tumbleweed:go1.15-1.15.15-1.2.ppc64le",
"openSUSE Tumbleweed:go1.15-1.15.15-1.2.s390x",
"openSUSE Tumbleweed:go1.15-1.15.15-1.2.x86_64",
"openSUSE Tumbleweed:go1.15-doc-1.15.15-1.2.aarch64",
"openSUSE Tumbleweed:go1.15-doc-1.15.15-1.2.ppc64le",
"openSUSE Tumbleweed:go1.15-doc-1.15.15-1.2.s390x",
"openSUSE Tumbleweed:go1.15-doc-1.15.15-1.2.x86_64",
"openSUSE Tumbleweed:go1.15-race-1.15.15-1.2.aarch64",
"openSUSE Tumbleweed:go1.15-race-1.15.15-1.2.ppc64le",
"openSUSE Tumbleweed:go1.15-race-1.15.15-1.2.s390x",
"openSUSE Tumbleweed:go1.15-race-1.15.15-1.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2021-36221"
}
]
}
RHBA-2021:0305
Vulnerability from csaf_redhat - Published: 2021-02-01 13:17 - Updated: 2026-04-30 16:08A flaw was found in the Cephx authentication protocol, where it does not verify Ceph clients correctly and is then vulnerable to replay attacks in Nautilus. This flaw allows an attacker with access to the Ceph cluster network to authenticate with the Ceph service via a packet sniffer and perform actions allowed by the Ceph service. This issue is a reintroduction of CVE-2018-1128, affecting the msgr2 protocol. The msgr 2 protocol is used for all communication except older clients that do not support the msgr2 protocol. The msgr1 protocol is not affected. The highest threat from this vulnerability is to confidentiality, integrity, and system availability.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 8Base-RH-OCS-4.6:ocs4/cephcsi-rhel8@sha256:5e1a69df83ef96cb0a5411ab3af47c7d789251a89349dc1099735493cfc6a47a_ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: 8Base-RH-OCS-4.6:ocs4/cephcsi-rhel8@sha256:f068579dde9c75f151800205f97989a7e98dde289c9e57128c58ec3a47f6b287_s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 8Base-RH-OCS-4.6:ocs4/cephcsi-rhel8@sha256:f3bc48b18857c970f068ed51915e7fc2a06c6dd14ee0ab08ff4a4733f33a7569_amd64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 8Base-RH-OCS-4.6:ocs4/mcg-core-rhel8@sha256:37c6626cfd258b05b38fe50feff7630270aadafb4bc5d5aff18b7146c5a88984_ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: 8Base-RH-OCS-4.6:ocs4/mcg-core-rhel8@sha256:9c59d208e722581c4a594e0bf32d25f52325fde15cd479c83f04b024119b3067_amd64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 8Base-RH-OCS-4.6:ocs4/mcg-core-rhel8@sha256:f9197232e37920e17504bf717211179508f6313a2dd95805a4f4db4beba7158d_s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 8Base-RH-OCS-4.6:ocs4/mcg-rhel8-operator@sha256:5b7be1d28659e6571e12cde63b10054722a921daeee90f0ed072ef0d38ea46e3_ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: 8Base-RH-OCS-4.6:ocs4/mcg-rhel8-operator@sha256:6a81efd4146ac1750c4cbcbd3480baa30081b84d2b02ac0026e6c52277635848_amd64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 8Base-RH-OCS-4.6:ocs4/mcg-rhel8-operator@sha256:fd22666dd33d119eea7599c30aad0c95f8dc6340133d7f0767aa0afef26588ac_s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 8Base-RH-OCS-4.6:ocs4/ocs-must-gather-rhel8@sha256:6d76e7acca55197ae9478ecffabf6271bf099b64335978d5e053493a40258653_ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: 8Base-RH-OCS-4.6:ocs4/ocs-must-gather-rhel8@sha256:b3e2cbb55f8cfa82480b70e73576ed049cb4e9de984c46f247896951a1746184_amd64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 8Base-RH-OCS-4.6:ocs4/ocs-must-gather-rhel8@sha256:c834e0b34ee694236cb9afdea48831a4b0cf979298c455c0cbc39e30cc40a3e6_s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 8Base-RH-OCS-4.6:ocs4/ocs-operator-bundle@sha256:5bbbd6ea419eb398988a164fe462a20f148cb9422da30014b21282114e57ffc8_s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 8Base-RH-OCS-4.6:ocs4/ocs-operator-bundle@sha256:8ec70c3cd08470cbd88c179a8fc660a64550eed19f48594c8b808bf2c2062720_amd64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 8Base-RH-OCS-4.6:ocs4/ocs-operator-bundle@sha256:d958ddd588a317feb59e9ad0844712c5ca722d625845a8ab4e4b561aed5c2025_ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: 8Base-RH-OCS-4.6:ocs4/ocs-rhel8-operator@sha256:5a56e6d20aa56871173932af58cdf76bb4e6ccba76a494799f525c2ff515cd14_s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 8Base-RH-OCS-4.6:ocs4/ocs-rhel8-operator@sha256:e9e688290c1f7fb4fd5870cd2656f7bf6484404e7151e918dfe37907fadb5125_amd64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 8Base-RH-OCS-4.6:ocs4/ocs-rhel8-operator@sha256:f43e06c9da12f5f70fef80afd5bcf32c03253786f51ffe766b350cce0a688449_ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: 8Base-RH-OCS-4.6:ocs4/rook-ceph-rhel8-operator@sha256:3a00a3b22be44d8802c386bd6a93eda6df48d98e8b90ea0df913a9f4327b3e94_amd64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 8Base-RH-OCS-4.6:ocs4/rook-ceph-rhel8-operator@sha256:da3992b47e7f15c471d7cf68933da800adb9f4f471173a5eb90902ce77fa54ff_s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 8Base-RH-OCS-4.6:ocs4/rook-ceph-rhel8-operator@sha256:fa5085edfb18f46ca9af7af8df02a9a81333c9f69d42cad2013602a862db63da_ppc64le | — |
Vendor Fix
fix
|
A flaw was found in Ceph-ansible where it creates an /etc/ceph/iscsi-gateway.conf with insecure default permissions. This flaw allows any user on the system to read sensitive information within this file. The highest threat from this vulnerability is to confidentiality.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 8Base-RH-OCS-4.6:ocs4/cephcsi-rhel8@sha256:5e1a69df83ef96cb0a5411ab3af47c7d789251a89349dc1099735493cfc6a47a_ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: 8Base-RH-OCS-4.6:ocs4/cephcsi-rhel8@sha256:f068579dde9c75f151800205f97989a7e98dde289c9e57128c58ec3a47f6b287_s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 8Base-RH-OCS-4.6:ocs4/cephcsi-rhel8@sha256:f3bc48b18857c970f068ed51915e7fc2a06c6dd14ee0ab08ff4a4733f33a7569_amd64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 8Base-RH-OCS-4.6:ocs4/mcg-core-rhel8@sha256:37c6626cfd258b05b38fe50feff7630270aadafb4bc5d5aff18b7146c5a88984_ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: 8Base-RH-OCS-4.6:ocs4/mcg-core-rhel8@sha256:9c59d208e722581c4a594e0bf32d25f52325fde15cd479c83f04b024119b3067_amd64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 8Base-RH-OCS-4.6:ocs4/mcg-core-rhel8@sha256:f9197232e37920e17504bf717211179508f6313a2dd95805a4f4db4beba7158d_s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 8Base-RH-OCS-4.6:ocs4/mcg-rhel8-operator@sha256:5b7be1d28659e6571e12cde63b10054722a921daeee90f0ed072ef0d38ea46e3_ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: 8Base-RH-OCS-4.6:ocs4/mcg-rhel8-operator@sha256:6a81efd4146ac1750c4cbcbd3480baa30081b84d2b02ac0026e6c52277635848_amd64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 8Base-RH-OCS-4.6:ocs4/mcg-rhel8-operator@sha256:fd22666dd33d119eea7599c30aad0c95f8dc6340133d7f0767aa0afef26588ac_s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 8Base-RH-OCS-4.6:ocs4/ocs-must-gather-rhel8@sha256:6d76e7acca55197ae9478ecffabf6271bf099b64335978d5e053493a40258653_ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: 8Base-RH-OCS-4.6:ocs4/ocs-must-gather-rhel8@sha256:b3e2cbb55f8cfa82480b70e73576ed049cb4e9de984c46f247896951a1746184_amd64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 8Base-RH-OCS-4.6:ocs4/ocs-must-gather-rhel8@sha256:c834e0b34ee694236cb9afdea48831a4b0cf979298c455c0cbc39e30cc40a3e6_s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 8Base-RH-OCS-4.6:ocs4/ocs-operator-bundle@sha256:5bbbd6ea419eb398988a164fe462a20f148cb9422da30014b21282114e57ffc8_s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 8Base-RH-OCS-4.6:ocs4/ocs-operator-bundle@sha256:8ec70c3cd08470cbd88c179a8fc660a64550eed19f48594c8b808bf2c2062720_amd64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 8Base-RH-OCS-4.6:ocs4/ocs-operator-bundle@sha256:d958ddd588a317feb59e9ad0844712c5ca722d625845a8ab4e4b561aed5c2025_ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: 8Base-RH-OCS-4.6:ocs4/ocs-rhel8-operator@sha256:5a56e6d20aa56871173932af58cdf76bb4e6ccba76a494799f525c2ff515cd14_s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 8Base-RH-OCS-4.6:ocs4/ocs-rhel8-operator@sha256:e9e688290c1f7fb4fd5870cd2656f7bf6484404e7151e918dfe37907fadb5125_amd64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 8Base-RH-OCS-4.6:ocs4/ocs-rhel8-operator@sha256:f43e06c9da12f5f70fef80afd5bcf32c03253786f51ffe766b350cce0a688449_ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: 8Base-RH-OCS-4.6:ocs4/rook-ceph-rhel8-operator@sha256:3a00a3b22be44d8802c386bd6a93eda6df48d98e8b90ea0df913a9f4327b3e94_amd64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 8Base-RH-OCS-4.6:ocs4/rook-ceph-rhel8-operator@sha256:da3992b47e7f15c471d7cf68933da800adb9f4f471173a5eb90902ce77fa54ff_s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 8Base-RH-OCS-4.6:ocs4/rook-ceph-rhel8-operator@sha256:fa5085edfb18f46ca9af7af8df02a9a81333c9f69d42cad2013602a862db63da_ppc64le | — |
Vendor Fix
fix
|
User credentials can be manipulated and stolen by Native CephFS consumers of OpenStack Manila, resulting in potential privilege escalation. An Open Stack Manila user can request access to a share to an arbitrary cephx user, including existing users. The access key is retrieved via the interface drivers. Then, all users of the requesting OpenStack project can view the access key. This enables the attacker to target any resource that the user has access to. This can be done to even "admin" users, compromising the ceph administrator.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 8Base-RH-OCS-4.6:ocs4/cephcsi-rhel8@sha256:5e1a69df83ef96cb0a5411ab3af47c7d789251a89349dc1099735493cfc6a47a_ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: 8Base-RH-OCS-4.6:ocs4/cephcsi-rhel8@sha256:f068579dde9c75f151800205f97989a7e98dde289c9e57128c58ec3a47f6b287_s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 8Base-RH-OCS-4.6:ocs4/cephcsi-rhel8@sha256:f3bc48b18857c970f068ed51915e7fc2a06c6dd14ee0ab08ff4a4733f33a7569_amd64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 8Base-RH-OCS-4.6:ocs4/mcg-core-rhel8@sha256:37c6626cfd258b05b38fe50feff7630270aadafb4bc5d5aff18b7146c5a88984_ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: 8Base-RH-OCS-4.6:ocs4/mcg-core-rhel8@sha256:9c59d208e722581c4a594e0bf32d25f52325fde15cd479c83f04b024119b3067_amd64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 8Base-RH-OCS-4.6:ocs4/mcg-core-rhel8@sha256:f9197232e37920e17504bf717211179508f6313a2dd95805a4f4db4beba7158d_s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 8Base-RH-OCS-4.6:ocs4/mcg-rhel8-operator@sha256:5b7be1d28659e6571e12cde63b10054722a921daeee90f0ed072ef0d38ea46e3_ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: 8Base-RH-OCS-4.6:ocs4/mcg-rhel8-operator@sha256:6a81efd4146ac1750c4cbcbd3480baa30081b84d2b02ac0026e6c52277635848_amd64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 8Base-RH-OCS-4.6:ocs4/mcg-rhel8-operator@sha256:fd22666dd33d119eea7599c30aad0c95f8dc6340133d7f0767aa0afef26588ac_s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 8Base-RH-OCS-4.6:ocs4/ocs-must-gather-rhel8@sha256:6d76e7acca55197ae9478ecffabf6271bf099b64335978d5e053493a40258653_ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: 8Base-RH-OCS-4.6:ocs4/ocs-must-gather-rhel8@sha256:b3e2cbb55f8cfa82480b70e73576ed049cb4e9de984c46f247896951a1746184_amd64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 8Base-RH-OCS-4.6:ocs4/ocs-must-gather-rhel8@sha256:c834e0b34ee694236cb9afdea48831a4b0cf979298c455c0cbc39e30cc40a3e6_s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 8Base-RH-OCS-4.6:ocs4/ocs-operator-bundle@sha256:5bbbd6ea419eb398988a164fe462a20f148cb9422da30014b21282114e57ffc8_s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 8Base-RH-OCS-4.6:ocs4/ocs-operator-bundle@sha256:8ec70c3cd08470cbd88c179a8fc660a64550eed19f48594c8b808bf2c2062720_amd64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 8Base-RH-OCS-4.6:ocs4/ocs-operator-bundle@sha256:d958ddd588a317feb59e9ad0844712c5ca722d625845a8ab4e4b561aed5c2025_ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: 8Base-RH-OCS-4.6:ocs4/ocs-rhel8-operator@sha256:5a56e6d20aa56871173932af58cdf76bb4e6ccba76a494799f525c2ff515cd14_s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 8Base-RH-OCS-4.6:ocs4/ocs-rhel8-operator@sha256:e9e688290c1f7fb4fd5870cd2656f7bf6484404e7151e918dfe37907fadb5125_amd64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 8Base-RH-OCS-4.6:ocs4/ocs-rhel8-operator@sha256:f43e06c9da12f5f70fef80afd5bcf32c03253786f51ffe766b350cce0a688449_ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: 8Base-RH-OCS-4.6:ocs4/rook-ceph-rhel8-operator@sha256:3a00a3b22be44d8802c386bd6a93eda6df48d98e8b90ea0df913a9f4327b3e94_amd64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 8Base-RH-OCS-4.6:ocs4/rook-ceph-rhel8-operator@sha256:da3992b47e7f15c471d7cf68933da800adb9f4f471173a5eb90902ce77fa54ff_s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 8Base-RH-OCS-4.6:ocs4/rook-ceph-rhel8-operator@sha256:fa5085edfb18f46ca9af7af8df02a9a81333c9f69d42cad2013602a862db63da_ppc64le | — |
Vendor Fix
fix
|
A flaw was found in the math/big package of Go's standard library that causes a denial of service. Applications written in Go that use math/big via cryptographic packages, including crypto/rsa and crypto/x509, are vulnerable and can potentially cause panic via a crafted certificate chain. The highest threat from this vulnerability is to system availability.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 8Base-RH-OCS-4.6:ocs4/cephcsi-rhel8@sha256:5e1a69df83ef96cb0a5411ab3af47c7d789251a89349dc1099735493cfc6a47a_ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: 8Base-RH-OCS-4.6:ocs4/cephcsi-rhel8@sha256:f068579dde9c75f151800205f97989a7e98dde289c9e57128c58ec3a47f6b287_s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 8Base-RH-OCS-4.6:ocs4/cephcsi-rhel8@sha256:f3bc48b18857c970f068ed51915e7fc2a06c6dd14ee0ab08ff4a4733f33a7569_amd64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 8Base-RH-OCS-4.6:ocs4/rook-ceph-rhel8-operator@sha256:3a00a3b22be44d8802c386bd6a93eda6df48d98e8b90ea0df913a9f4327b3e94_amd64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 8Base-RH-OCS-4.6:ocs4/rook-ceph-rhel8-operator@sha256:da3992b47e7f15c471d7cf68933da800adb9f4f471173a5eb90902ce77fa54ff_s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 8Base-RH-OCS-4.6:ocs4/rook-ceph-rhel8-operator@sha256:fa5085edfb18f46ca9af7af8df02a9a81333c9f69d42cad2013602a862db63da_ppc64le | — |
Vendor Fix
fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 8Base-RH-OCS-4.6:ocs4/mcg-core-rhel8@sha256:37c6626cfd258b05b38fe50feff7630270aadafb4bc5d5aff18b7146c5a88984_ppc64le | — | ||
| Unresolved product id: 8Base-RH-OCS-4.6:ocs4/mcg-core-rhel8@sha256:9c59d208e722581c4a594e0bf32d25f52325fde15cd479c83f04b024119b3067_amd64 | — | ||
| Unresolved product id: 8Base-RH-OCS-4.6:ocs4/mcg-core-rhel8@sha256:f9197232e37920e17504bf717211179508f6313a2dd95805a4f4db4beba7158d_s390x | — | ||
| Unresolved product id: 8Base-RH-OCS-4.6:ocs4/mcg-rhel8-operator@sha256:5b7be1d28659e6571e12cde63b10054722a921daeee90f0ed072ef0d38ea46e3_ppc64le | — | ||
| Unresolved product id: 8Base-RH-OCS-4.6:ocs4/mcg-rhel8-operator@sha256:6a81efd4146ac1750c4cbcbd3480baa30081b84d2b02ac0026e6c52277635848_amd64 | — | ||
| Unresolved product id: 8Base-RH-OCS-4.6:ocs4/mcg-rhel8-operator@sha256:fd22666dd33d119eea7599c30aad0c95f8dc6340133d7f0767aa0afef26588ac_s390x | — | ||
| Unresolved product id: 8Base-RH-OCS-4.6:ocs4/ocs-must-gather-rhel8@sha256:6d76e7acca55197ae9478ecffabf6271bf099b64335978d5e053493a40258653_ppc64le | — | ||
| Unresolved product id: 8Base-RH-OCS-4.6:ocs4/ocs-must-gather-rhel8@sha256:b3e2cbb55f8cfa82480b70e73576ed049cb4e9de984c46f247896951a1746184_amd64 | — | ||
| Unresolved product id: 8Base-RH-OCS-4.6:ocs4/ocs-must-gather-rhel8@sha256:c834e0b34ee694236cb9afdea48831a4b0cf979298c455c0cbc39e30cc40a3e6_s390x | — | ||
| Unresolved product id: 8Base-RH-OCS-4.6:ocs4/ocs-operator-bundle@sha256:5bbbd6ea419eb398988a164fe462a20f148cb9422da30014b21282114e57ffc8_s390x | — | ||
| Unresolved product id: 8Base-RH-OCS-4.6:ocs4/ocs-operator-bundle@sha256:8ec70c3cd08470cbd88c179a8fc660a64550eed19f48594c8b808bf2c2062720_amd64 | — | ||
| Unresolved product id: 8Base-RH-OCS-4.6:ocs4/ocs-operator-bundle@sha256:d958ddd588a317feb59e9ad0844712c5ca722d625845a8ab4e4b561aed5c2025_ppc64le | — | ||
| Unresolved product id: 8Base-RH-OCS-4.6:ocs4/ocs-rhel8-operator@sha256:5a56e6d20aa56871173932af58cdf76bb4e6ccba76a494799f525c2ff515cd14_s390x | — | ||
| Unresolved product id: 8Base-RH-OCS-4.6:ocs4/ocs-rhel8-operator@sha256:e9e688290c1f7fb4fd5870cd2656f7bf6484404e7151e918dfe37907fadb5125_amd64 | — | ||
| Unresolved product id: 8Base-RH-OCS-4.6:ocs4/ocs-rhel8-operator@sha256:f43e06c9da12f5f70fef80afd5bcf32c03253786f51ffe766b350cce0a688449_ppc64le | — |
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Updated container images that fix various bugs are now available for Red Hat Openshift Container Storage 4.6.2 from Red Hat Container Registry.",
"title": "Topic"
},
{
"category": "general",
"text": "Red Hat OpenShift Container Storage is software-defined storage integrated with and optimized for the Red Hat OpenShift Container Platform. Red Hat OpenShift Container Storage is a highly scalable, production-grade persistent storage for stateful applications running in the Red Hat OpenShift Container Platform. In addition to persistent storage, Red Hat OpenShift Container Storage provisions a multicloud data management service with an S3 compatible API.\n\nThis advisory fixes the following bugs:\n\n* Previously, there was a race condition with the Red Hat Ceph Storage PG\nautoscaler that caused the creation of 128 PGs instead of the default 32.\nThis meant RGW pods would fail to come up. With this update, RGW pods would be able to start also in small clusters.\n(BZ#1914979)\n\n* Previously, the OSD design had one blocking PodDistributionBudget (PDB) for each OSD. This meant users could only drain one node at a time. OSDs have been redesigned to have one OSD PDB at the beginning which allows only one OSD to go down at a time. Once the OSD goes down, its failure domain is determined, and blocking OSD PDBs are created for other failure domains. The originally created OSD is then deleted, and all of the OSDs can go down in the failure domain. With this new design, multiple nodes can be drained in the same failure domain. (BZ#1916585)\n\nAll users of Red Hat OpenShift Container Storage are advised to pull these new images from the Red Hat Container Registry.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHBA-2021:0305",
"url": "https://access.redhat.com/errata/RHBA-2021:0305"
},
{
"category": "external",
"summary": "1899743",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1899743"
},
{
"category": "external",
"summary": "1914819",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1914819"
},
{
"category": "external",
"summary": "1914979",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1914979"
},
{
"category": "external",
"summary": "1916585",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1916585"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2021/rhba-2021_0305.json"
}
],
"title": "Red Hat Bug Fix Advisory: Red Hat OpenShift Container Storage 4.6.2 container bug fix update",
"tracking": {
"current_release_date": "2026-04-30T16:08:52+00:00",
"generator": {
"date": "2026-04-30T16:08:52+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.7.7"
}
},
"id": "RHBA-2021:0305",
"initial_release_date": "2021-02-01T13:17:36+00:00",
"revision_history": [
{
"date": "2021-02-01T13:17:36+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2021-02-01T13:17:36+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2026-04-30T16:08:52+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat OpenShift Container Storage 4.6 on RHEL-8",
"product": {
"name": "Red Hat OpenShift Container Storage 4.6 on RHEL-8",
"product_id": "8Base-RH-OCS-4.6",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:openshift_container_storage:4.6::el8"
}
}
}
],
"category": "product_family",
"name": "Red Hat OpenShift Container Storage"
},
{
"branches": [
{
"category": "product_version",
"name": "ocs4/cephcsi-rhel8@sha256:f3bc48b18857c970f068ed51915e7fc2a06c6dd14ee0ab08ff4a4733f33a7569_amd64",
"product": {
"name": "ocs4/cephcsi-rhel8@sha256:f3bc48b18857c970f068ed51915e7fc2a06c6dd14ee0ab08ff4a4733f33a7569_amd64",
"product_id": "ocs4/cephcsi-rhel8@sha256:f3bc48b18857c970f068ed51915e7fc2a06c6dd14ee0ab08ff4a4733f33a7569_amd64",
"product_identification_helper": {
"purl": "pkg:oci/cephcsi-rhel8@sha256:f3bc48b18857c970f068ed51915e7fc2a06c6dd14ee0ab08ff4a4733f33a7569?arch=amd64\u0026repository_url=registry.redhat.io/ocs4/cephcsi-rhel8\u0026tag=4.6-54.49cf5efdd.release_4.6"
}
}
},
{
"category": "product_version",
"name": "ocs4/mcg-core-rhel8@sha256:9c59d208e722581c4a594e0bf32d25f52325fde15cd479c83f04b024119b3067_amd64",
"product": {
"name": "ocs4/mcg-core-rhel8@sha256:9c59d208e722581c4a594e0bf32d25f52325fde15cd479c83f04b024119b3067_amd64",
"product_id": "ocs4/mcg-core-rhel8@sha256:9c59d208e722581c4a594e0bf32d25f52325fde15cd479c83f04b024119b3067_amd64",
"product_identification_helper": {
"purl": "pkg:oci/mcg-core-rhel8@sha256:9c59d208e722581c4a594e0bf32d25f52325fde15cd479c83f04b024119b3067?arch=amd64\u0026repository_url=registry.redhat.io/ocs4/mcg-core-rhel8\u0026tag=5.6.0-42.6a01c5fc0.5.6"
}
}
},
{
"category": "product_version",
"name": "ocs4/mcg-rhel8-operator@sha256:6a81efd4146ac1750c4cbcbd3480baa30081b84d2b02ac0026e6c52277635848_amd64",
"product": {
"name": "ocs4/mcg-rhel8-operator@sha256:6a81efd4146ac1750c4cbcbd3480baa30081b84d2b02ac0026e6c52277635848_amd64",
"product_id": "ocs4/mcg-rhel8-operator@sha256:6a81efd4146ac1750c4cbcbd3480baa30081b84d2b02ac0026e6c52277635848_amd64",
"product_identification_helper": {
"purl": "pkg:oci/mcg-rhel8-operator@sha256:6a81efd4146ac1750c4cbcbd3480baa30081b84d2b02ac0026e6c52277635848?arch=amd64\u0026repository_url=registry.redhat.io/ocs4/mcg-rhel8-operator\u0026tag=5.6.0-41.2279a46.5.6"
}
}
},
{
"category": "product_version",
"name": "ocs4/ocs-must-gather-rhel8@sha256:b3e2cbb55f8cfa82480b70e73576ed049cb4e9de984c46f247896951a1746184_amd64",
"product": {
"name": "ocs4/ocs-must-gather-rhel8@sha256:b3e2cbb55f8cfa82480b70e73576ed049cb4e9de984c46f247896951a1746184_amd64",
"product_id": "ocs4/ocs-must-gather-rhel8@sha256:b3e2cbb55f8cfa82480b70e73576ed049cb4e9de984c46f247896951a1746184_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ocs-must-gather-rhel8@sha256:b3e2cbb55f8cfa82480b70e73576ed049cb4e9de984c46f247896951a1746184?arch=amd64\u0026repository_url=registry.redhat.io/ocs4/ocs-must-gather-rhel8\u0026tag=4.6-78.3b7455e4.release_4.6"
}
}
},
{
"category": "product_version",
"name": "ocs4/ocs-operator-bundle@sha256:8ec70c3cd08470cbd88c179a8fc660a64550eed19f48594c8b808bf2c2062720_amd64",
"product": {
"name": "ocs4/ocs-operator-bundle@sha256:8ec70c3cd08470cbd88c179a8fc660a64550eed19f48594c8b808bf2c2062720_amd64",
"product_id": "ocs4/ocs-operator-bundle@sha256:8ec70c3cd08470cbd88c179a8fc660a64550eed19f48594c8b808bf2c2062720_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ocs-operator-bundle@sha256:8ec70c3cd08470cbd88c179a8fc660a64550eed19f48594c8b808bf2c2062720?arch=amd64\u0026repository_url=registry.redhat.io/ocs4/ocs-operator-bundle\u0026tag=4.6.2-1"
}
}
},
{
"category": "product_version",
"name": "ocs4/ocs-rhel8-operator@sha256:e9e688290c1f7fb4fd5870cd2656f7bf6484404e7151e918dfe37907fadb5125_amd64",
"product": {
"name": "ocs4/ocs-rhel8-operator@sha256:e9e688290c1f7fb4fd5870cd2656f7bf6484404e7151e918dfe37907fadb5125_amd64",
"product_id": "ocs4/ocs-rhel8-operator@sha256:e9e688290c1f7fb4fd5870cd2656f7bf6484404e7151e918dfe37907fadb5125_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ocs-rhel8-operator@sha256:e9e688290c1f7fb4fd5870cd2656f7bf6484404e7151e918dfe37907fadb5125?arch=amd64\u0026repository_url=registry.redhat.io/ocs4/ocs-rhel8-operator\u0026tag=4.6-78.3b7455e4.release_4.6"
}
}
},
{
"category": "product_version",
"name": "ocs4/rook-ceph-rhel8-operator@sha256:3a00a3b22be44d8802c386bd6a93eda6df48d98e8b90ea0df913a9f4327b3e94_amd64",
"product": {
"name": "ocs4/rook-ceph-rhel8-operator@sha256:3a00a3b22be44d8802c386bd6a93eda6df48d98e8b90ea0df913a9f4327b3e94_amd64",
"product_id": "ocs4/rook-ceph-rhel8-operator@sha256:3a00a3b22be44d8802c386bd6a93eda6df48d98e8b90ea0df913a9f4327b3e94_amd64",
"product_identification_helper": {
"purl": "pkg:oci/rook-ceph-rhel8-operator@sha256:3a00a3b22be44d8802c386bd6a93eda6df48d98e8b90ea0df913a9f4327b3e94?arch=amd64\u0026repository_url=registry.redhat.io/ocs4/rook-ceph-rhel8-operator\u0026tag=4.6-82.8c7ed584.release_4.6"
}
}
}
],
"category": "architecture",
"name": "amd64"
},
{
"branches": [
{
"category": "product_version",
"name": "ocs4/cephcsi-rhel8@sha256:5e1a69df83ef96cb0a5411ab3af47c7d789251a89349dc1099735493cfc6a47a_ppc64le",
"product": {
"name": "ocs4/cephcsi-rhel8@sha256:5e1a69df83ef96cb0a5411ab3af47c7d789251a89349dc1099735493cfc6a47a_ppc64le",
"product_id": "ocs4/cephcsi-rhel8@sha256:5e1a69df83ef96cb0a5411ab3af47c7d789251a89349dc1099735493cfc6a47a_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/cephcsi-rhel8@sha256:5e1a69df83ef96cb0a5411ab3af47c7d789251a89349dc1099735493cfc6a47a?arch=ppc64le\u0026repository_url=registry.redhat.io/ocs4/cephcsi-rhel8\u0026tag=4.6-54.49cf5efdd.release_4.6"
}
}
},
{
"category": "product_version",
"name": "ocs4/mcg-core-rhel8@sha256:37c6626cfd258b05b38fe50feff7630270aadafb4bc5d5aff18b7146c5a88984_ppc64le",
"product": {
"name": "ocs4/mcg-core-rhel8@sha256:37c6626cfd258b05b38fe50feff7630270aadafb4bc5d5aff18b7146c5a88984_ppc64le",
"product_id": "ocs4/mcg-core-rhel8@sha256:37c6626cfd258b05b38fe50feff7630270aadafb4bc5d5aff18b7146c5a88984_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/mcg-core-rhel8@sha256:37c6626cfd258b05b38fe50feff7630270aadafb4bc5d5aff18b7146c5a88984?arch=ppc64le\u0026repository_url=registry.redhat.io/ocs4/mcg-core-rhel8\u0026tag=5.6.0-42.6a01c5fc0.5.6"
}
}
},
{
"category": "product_version",
"name": "ocs4/mcg-rhel8-operator@sha256:5b7be1d28659e6571e12cde63b10054722a921daeee90f0ed072ef0d38ea46e3_ppc64le",
"product": {
"name": "ocs4/mcg-rhel8-operator@sha256:5b7be1d28659e6571e12cde63b10054722a921daeee90f0ed072ef0d38ea46e3_ppc64le",
"product_id": "ocs4/mcg-rhel8-operator@sha256:5b7be1d28659e6571e12cde63b10054722a921daeee90f0ed072ef0d38ea46e3_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/mcg-rhel8-operator@sha256:5b7be1d28659e6571e12cde63b10054722a921daeee90f0ed072ef0d38ea46e3?arch=ppc64le\u0026repository_url=registry.redhat.io/ocs4/mcg-rhel8-operator\u0026tag=5.6.0-41.2279a46.5.6"
}
}
},
{
"category": "product_version",
"name": "ocs4/ocs-must-gather-rhel8@sha256:6d76e7acca55197ae9478ecffabf6271bf099b64335978d5e053493a40258653_ppc64le",
"product": {
"name": "ocs4/ocs-must-gather-rhel8@sha256:6d76e7acca55197ae9478ecffabf6271bf099b64335978d5e053493a40258653_ppc64le",
"product_id": "ocs4/ocs-must-gather-rhel8@sha256:6d76e7acca55197ae9478ecffabf6271bf099b64335978d5e053493a40258653_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/ocs-must-gather-rhel8@sha256:6d76e7acca55197ae9478ecffabf6271bf099b64335978d5e053493a40258653?arch=ppc64le\u0026repository_url=registry.redhat.io/ocs4/ocs-must-gather-rhel8\u0026tag=4.6-78.3b7455e4.release_4.6"
}
}
},
{
"category": "product_version",
"name": "ocs4/ocs-operator-bundle@sha256:d958ddd588a317feb59e9ad0844712c5ca722d625845a8ab4e4b561aed5c2025_ppc64le",
"product": {
"name": "ocs4/ocs-operator-bundle@sha256:d958ddd588a317feb59e9ad0844712c5ca722d625845a8ab4e4b561aed5c2025_ppc64le",
"product_id": "ocs4/ocs-operator-bundle@sha256:d958ddd588a317feb59e9ad0844712c5ca722d625845a8ab4e4b561aed5c2025_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/ocs-operator-bundle@sha256:d958ddd588a317feb59e9ad0844712c5ca722d625845a8ab4e4b561aed5c2025?arch=ppc64le\u0026repository_url=registry.redhat.io/ocs4/ocs-operator-bundle\u0026tag=4.6.2-1"
}
}
},
{
"category": "product_version",
"name": "ocs4/ocs-rhel8-operator@sha256:f43e06c9da12f5f70fef80afd5bcf32c03253786f51ffe766b350cce0a688449_ppc64le",
"product": {
"name": "ocs4/ocs-rhel8-operator@sha256:f43e06c9da12f5f70fef80afd5bcf32c03253786f51ffe766b350cce0a688449_ppc64le",
"product_id": "ocs4/ocs-rhel8-operator@sha256:f43e06c9da12f5f70fef80afd5bcf32c03253786f51ffe766b350cce0a688449_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/ocs-rhel8-operator@sha256:f43e06c9da12f5f70fef80afd5bcf32c03253786f51ffe766b350cce0a688449?arch=ppc64le\u0026repository_url=registry.redhat.io/ocs4/ocs-rhel8-operator\u0026tag=4.6-78.3b7455e4.release_4.6"
}
}
},
{
"category": "product_version",
"name": "ocs4/rook-ceph-rhel8-operator@sha256:fa5085edfb18f46ca9af7af8df02a9a81333c9f69d42cad2013602a862db63da_ppc64le",
"product": {
"name": "ocs4/rook-ceph-rhel8-operator@sha256:fa5085edfb18f46ca9af7af8df02a9a81333c9f69d42cad2013602a862db63da_ppc64le",
"product_id": "ocs4/rook-ceph-rhel8-operator@sha256:fa5085edfb18f46ca9af7af8df02a9a81333c9f69d42cad2013602a862db63da_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/rook-ceph-rhel8-operator@sha256:fa5085edfb18f46ca9af7af8df02a9a81333c9f69d42cad2013602a862db63da?arch=ppc64le\u0026repository_url=registry.redhat.io/ocs4/rook-ceph-rhel8-operator\u0026tag=4.6-82.8c7ed584.release_4.6"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "ocs4/cephcsi-rhel8@sha256:f068579dde9c75f151800205f97989a7e98dde289c9e57128c58ec3a47f6b287_s390x",
"product": {
"name": "ocs4/cephcsi-rhel8@sha256:f068579dde9c75f151800205f97989a7e98dde289c9e57128c58ec3a47f6b287_s390x",
"product_id": "ocs4/cephcsi-rhel8@sha256:f068579dde9c75f151800205f97989a7e98dde289c9e57128c58ec3a47f6b287_s390x",
"product_identification_helper": {
"purl": "pkg:oci/cephcsi-rhel8@sha256:f068579dde9c75f151800205f97989a7e98dde289c9e57128c58ec3a47f6b287?arch=s390x\u0026repository_url=registry.redhat.io/ocs4/cephcsi-rhel8\u0026tag=4.6-54.49cf5efdd.release_4.6"
}
}
},
{
"category": "product_version",
"name": "ocs4/mcg-core-rhel8@sha256:f9197232e37920e17504bf717211179508f6313a2dd95805a4f4db4beba7158d_s390x",
"product": {
"name": "ocs4/mcg-core-rhel8@sha256:f9197232e37920e17504bf717211179508f6313a2dd95805a4f4db4beba7158d_s390x",
"product_id": "ocs4/mcg-core-rhel8@sha256:f9197232e37920e17504bf717211179508f6313a2dd95805a4f4db4beba7158d_s390x",
"product_identification_helper": {
"purl": "pkg:oci/mcg-core-rhel8@sha256:f9197232e37920e17504bf717211179508f6313a2dd95805a4f4db4beba7158d?arch=s390x\u0026repository_url=registry.redhat.io/ocs4/mcg-core-rhel8\u0026tag=5.6.0-42.6a01c5fc0.5.6"
}
}
},
{
"category": "product_version",
"name": "ocs4/mcg-rhel8-operator@sha256:fd22666dd33d119eea7599c30aad0c95f8dc6340133d7f0767aa0afef26588ac_s390x",
"product": {
"name": "ocs4/mcg-rhel8-operator@sha256:fd22666dd33d119eea7599c30aad0c95f8dc6340133d7f0767aa0afef26588ac_s390x",
"product_id": "ocs4/mcg-rhel8-operator@sha256:fd22666dd33d119eea7599c30aad0c95f8dc6340133d7f0767aa0afef26588ac_s390x",
"product_identification_helper": {
"purl": "pkg:oci/mcg-rhel8-operator@sha256:fd22666dd33d119eea7599c30aad0c95f8dc6340133d7f0767aa0afef26588ac?arch=s390x\u0026repository_url=registry.redhat.io/ocs4/mcg-rhel8-operator\u0026tag=5.6.0-41.2279a46.5.6"
}
}
},
{
"category": "product_version",
"name": "ocs4/ocs-must-gather-rhel8@sha256:c834e0b34ee694236cb9afdea48831a4b0cf979298c455c0cbc39e30cc40a3e6_s390x",
"product": {
"name": "ocs4/ocs-must-gather-rhel8@sha256:c834e0b34ee694236cb9afdea48831a4b0cf979298c455c0cbc39e30cc40a3e6_s390x",
"product_id": "ocs4/ocs-must-gather-rhel8@sha256:c834e0b34ee694236cb9afdea48831a4b0cf979298c455c0cbc39e30cc40a3e6_s390x",
"product_identification_helper": {
"purl": "pkg:oci/ocs-must-gather-rhel8@sha256:c834e0b34ee694236cb9afdea48831a4b0cf979298c455c0cbc39e30cc40a3e6?arch=s390x\u0026repository_url=registry.redhat.io/ocs4/ocs-must-gather-rhel8\u0026tag=4.6-78.3b7455e4.release_4.6"
}
}
},
{
"category": "product_version",
"name": "ocs4/ocs-operator-bundle@sha256:5bbbd6ea419eb398988a164fe462a20f148cb9422da30014b21282114e57ffc8_s390x",
"product": {
"name": "ocs4/ocs-operator-bundle@sha256:5bbbd6ea419eb398988a164fe462a20f148cb9422da30014b21282114e57ffc8_s390x",
"product_id": "ocs4/ocs-operator-bundle@sha256:5bbbd6ea419eb398988a164fe462a20f148cb9422da30014b21282114e57ffc8_s390x",
"product_identification_helper": {
"purl": "pkg:oci/ocs-operator-bundle@sha256:5bbbd6ea419eb398988a164fe462a20f148cb9422da30014b21282114e57ffc8?arch=s390x\u0026repository_url=registry.redhat.io/ocs4/ocs-operator-bundle\u0026tag=4.6.2-1"
}
}
},
{
"category": "product_version",
"name": "ocs4/ocs-rhel8-operator@sha256:5a56e6d20aa56871173932af58cdf76bb4e6ccba76a494799f525c2ff515cd14_s390x",
"product": {
"name": "ocs4/ocs-rhel8-operator@sha256:5a56e6d20aa56871173932af58cdf76bb4e6ccba76a494799f525c2ff515cd14_s390x",
"product_id": "ocs4/ocs-rhel8-operator@sha256:5a56e6d20aa56871173932af58cdf76bb4e6ccba76a494799f525c2ff515cd14_s390x",
"product_identification_helper": {
"purl": "pkg:oci/ocs-rhel8-operator@sha256:5a56e6d20aa56871173932af58cdf76bb4e6ccba76a494799f525c2ff515cd14?arch=s390x\u0026repository_url=registry.redhat.io/ocs4/ocs-rhel8-operator\u0026tag=4.6-78.3b7455e4.release_4.6"
}
}
},
{
"category": "product_version",
"name": "ocs4/rook-ceph-rhel8-operator@sha256:da3992b47e7f15c471d7cf68933da800adb9f4f471173a5eb90902ce77fa54ff_s390x",
"product": {
"name": "ocs4/rook-ceph-rhel8-operator@sha256:da3992b47e7f15c471d7cf68933da800adb9f4f471173a5eb90902ce77fa54ff_s390x",
"product_id": "ocs4/rook-ceph-rhel8-operator@sha256:da3992b47e7f15c471d7cf68933da800adb9f4f471173a5eb90902ce77fa54ff_s390x",
"product_identification_helper": {
"purl": "pkg:oci/rook-ceph-rhel8-operator@sha256:da3992b47e7f15c471d7cf68933da800adb9f4f471173a5eb90902ce77fa54ff?arch=s390x\u0026repository_url=registry.redhat.io/ocs4/rook-ceph-rhel8-operator\u0026tag=4.6-82.8c7ed584.release_4.6"
}
}
}
],
"category": "architecture",
"name": "s390x"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "ocs4/cephcsi-rhel8@sha256:5e1a69df83ef96cb0a5411ab3af47c7d789251a89349dc1099735493cfc6a47a_ppc64le as a component of Red Hat OpenShift Container Storage 4.6 on RHEL-8",
"product_id": "8Base-RH-OCS-4.6:ocs4/cephcsi-rhel8@sha256:5e1a69df83ef96cb0a5411ab3af47c7d789251a89349dc1099735493cfc6a47a_ppc64le"
},
"product_reference": "ocs4/cephcsi-rhel8@sha256:5e1a69df83ef96cb0a5411ab3af47c7d789251a89349dc1099735493cfc6a47a_ppc64le",
"relates_to_product_reference": "8Base-RH-OCS-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocs4/cephcsi-rhel8@sha256:f068579dde9c75f151800205f97989a7e98dde289c9e57128c58ec3a47f6b287_s390x as a component of Red Hat OpenShift Container Storage 4.6 on RHEL-8",
"product_id": "8Base-RH-OCS-4.6:ocs4/cephcsi-rhel8@sha256:f068579dde9c75f151800205f97989a7e98dde289c9e57128c58ec3a47f6b287_s390x"
},
"product_reference": "ocs4/cephcsi-rhel8@sha256:f068579dde9c75f151800205f97989a7e98dde289c9e57128c58ec3a47f6b287_s390x",
"relates_to_product_reference": "8Base-RH-OCS-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocs4/cephcsi-rhel8@sha256:f3bc48b18857c970f068ed51915e7fc2a06c6dd14ee0ab08ff4a4733f33a7569_amd64 as a component of Red Hat OpenShift Container Storage 4.6 on RHEL-8",
"product_id": "8Base-RH-OCS-4.6:ocs4/cephcsi-rhel8@sha256:f3bc48b18857c970f068ed51915e7fc2a06c6dd14ee0ab08ff4a4733f33a7569_amd64"
},
"product_reference": "ocs4/cephcsi-rhel8@sha256:f3bc48b18857c970f068ed51915e7fc2a06c6dd14ee0ab08ff4a4733f33a7569_amd64",
"relates_to_product_reference": "8Base-RH-OCS-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocs4/mcg-core-rhel8@sha256:37c6626cfd258b05b38fe50feff7630270aadafb4bc5d5aff18b7146c5a88984_ppc64le as a component of Red Hat OpenShift Container Storage 4.6 on RHEL-8",
"product_id": "8Base-RH-OCS-4.6:ocs4/mcg-core-rhel8@sha256:37c6626cfd258b05b38fe50feff7630270aadafb4bc5d5aff18b7146c5a88984_ppc64le"
},
"product_reference": "ocs4/mcg-core-rhel8@sha256:37c6626cfd258b05b38fe50feff7630270aadafb4bc5d5aff18b7146c5a88984_ppc64le",
"relates_to_product_reference": "8Base-RH-OCS-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocs4/mcg-core-rhel8@sha256:9c59d208e722581c4a594e0bf32d25f52325fde15cd479c83f04b024119b3067_amd64 as a component of Red Hat OpenShift Container Storage 4.6 on RHEL-8",
"product_id": "8Base-RH-OCS-4.6:ocs4/mcg-core-rhel8@sha256:9c59d208e722581c4a594e0bf32d25f52325fde15cd479c83f04b024119b3067_amd64"
},
"product_reference": "ocs4/mcg-core-rhel8@sha256:9c59d208e722581c4a594e0bf32d25f52325fde15cd479c83f04b024119b3067_amd64",
"relates_to_product_reference": "8Base-RH-OCS-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocs4/mcg-core-rhel8@sha256:f9197232e37920e17504bf717211179508f6313a2dd95805a4f4db4beba7158d_s390x as a component of Red Hat OpenShift Container Storage 4.6 on RHEL-8",
"product_id": "8Base-RH-OCS-4.6:ocs4/mcg-core-rhel8@sha256:f9197232e37920e17504bf717211179508f6313a2dd95805a4f4db4beba7158d_s390x"
},
"product_reference": "ocs4/mcg-core-rhel8@sha256:f9197232e37920e17504bf717211179508f6313a2dd95805a4f4db4beba7158d_s390x",
"relates_to_product_reference": "8Base-RH-OCS-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocs4/mcg-rhel8-operator@sha256:5b7be1d28659e6571e12cde63b10054722a921daeee90f0ed072ef0d38ea46e3_ppc64le as a component of Red Hat OpenShift Container Storage 4.6 on RHEL-8",
"product_id": "8Base-RH-OCS-4.6:ocs4/mcg-rhel8-operator@sha256:5b7be1d28659e6571e12cde63b10054722a921daeee90f0ed072ef0d38ea46e3_ppc64le"
},
"product_reference": "ocs4/mcg-rhel8-operator@sha256:5b7be1d28659e6571e12cde63b10054722a921daeee90f0ed072ef0d38ea46e3_ppc64le",
"relates_to_product_reference": "8Base-RH-OCS-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocs4/mcg-rhel8-operator@sha256:6a81efd4146ac1750c4cbcbd3480baa30081b84d2b02ac0026e6c52277635848_amd64 as a component of Red Hat OpenShift Container Storage 4.6 on RHEL-8",
"product_id": "8Base-RH-OCS-4.6:ocs4/mcg-rhel8-operator@sha256:6a81efd4146ac1750c4cbcbd3480baa30081b84d2b02ac0026e6c52277635848_amd64"
},
"product_reference": "ocs4/mcg-rhel8-operator@sha256:6a81efd4146ac1750c4cbcbd3480baa30081b84d2b02ac0026e6c52277635848_amd64",
"relates_to_product_reference": "8Base-RH-OCS-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocs4/mcg-rhel8-operator@sha256:fd22666dd33d119eea7599c30aad0c95f8dc6340133d7f0767aa0afef26588ac_s390x as a component of Red Hat OpenShift Container Storage 4.6 on RHEL-8",
"product_id": "8Base-RH-OCS-4.6:ocs4/mcg-rhel8-operator@sha256:fd22666dd33d119eea7599c30aad0c95f8dc6340133d7f0767aa0afef26588ac_s390x"
},
"product_reference": "ocs4/mcg-rhel8-operator@sha256:fd22666dd33d119eea7599c30aad0c95f8dc6340133d7f0767aa0afef26588ac_s390x",
"relates_to_product_reference": "8Base-RH-OCS-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocs4/ocs-must-gather-rhel8@sha256:6d76e7acca55197ae9478ecffabf6271bf099b64335978d5e053493a40258653_ppc64le as a component of Red Hat OpenShift Container Storage 4.6 on RHEL-8",
"product_id": "8Base-RH-OCS-4.6:ocs4/ocs-must-gather-rhel8@sha256:6d76e7acca55197ae9478ecffabf6271bf099b64335978d5e053493a40258653_ppc64le"
},
"product_reference": "ocs4/ocs-must-gather-rhel8@sha256:6d76e7acca55197ae9478ecffabf6271bf099b64335978d5e053493a40258653_ppc64le",
"relates_to_product_reference": "8Base-RH-OCS-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocs4/ocs-must-gather-rhel8@sha256:b3e2cbb55f8cfa82480b70e73576ed049cb4e9de984c46f247896951a1746184_amd64 as a component of Red Hat OpenShift Container Storage 4.6 on RHEL-8",
"product_id": "8Base-RH-OCS-4.6:ocs4/ocs-must-gather-rhel8@sha256:b3e2cbb55f8cfa82480b70e73576ed049cb4e9de984c46f247896951a1746184_amd64"
},
"product_reference": "ocs4/ocs-must-gather-rhel8@sha256:b3e2cbb55f8cfa82480b70e73576ed049cb4e9de984c46f247896951a1746184_amd64",
"relates_to_product_reference": "8Base-RH-OCS-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocs4/ocs-must-gather-rhel8@sha256:c834e0b34ee694236cb9afdea48831a4b0cf979298c455c0cbc39e30cc40a3e6_s390x as a component of Red Hat OpenShift Container Storage 4.6 on RHEL-8",
"product_id": "8Base-RH-OCS-4.6:ocs4/ocs-must-gather-rhel8@sha256:c834e0b34ee694236cb9afdea48831a4b0cf979298c455c0cbc39e30cc40a3e6_s390x"
},
"product_reference": "ocs4/ocs-must-gather-rhel8@sha256:c834e0b34ee694236cb9afdea48831a4b0cf979298c455c0cbc39e30cc40a3e6_s390x",
"relates_to_product_reference": "8Base-RH-OCS-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocs4/ocs-operator-bundle@sha256:5bbbd6ea419eb398988a164fe462a20f148cb9422da30014b21282114e57ffc8_s390x as a component of Red Hat OpenShift Container Storage 4.6 on RHEL-8",
"product_id": "8Base-RH-OCS-4.6:ocs4/ocs-operator-bundle@sha256:5bbbd6ea419eb398988a164fe462a20f148cb9422da30014b21282114e57ffc8_s390x"
},
"product_reference": "ocs4/ocs-operator-bundle@sha256:5bbbd6ea419eb398988a164fe462a20f148cb9422da30014b21282114e57ffc8_s390x",
"relates_to_product_reference": "8Base-RH-OCS-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocs4/ocs-operator-bundle@sha256:8ec70c3cd08470cbd88c179a8fc660a64550eed19f48594c8b808bf2c2062720_amd64 as a component of Red Hat OpenShift Container Storage 4.6 on RHEL-8",
"product_id": "8Base-RH-OCS-4.6:ocs4/ocs-operator-bundle@sha256:8ec70c3cd08470cbd88c179a8fc660a64550eed19f48594c8b808bf2c2062720_amd64"
},
"product_reference": "ocs4/ocs-operator-bundle@sha256:8ec70c3cd08470cbd88c179a8fc660a64550eed19f48594c8b808bf2c2062720_amd64",
"relates_to_product_reference": "8Base-RH-OCS-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocs4/ocs-operator-bundle@sha256:d958ddd588a317feb59e9ad0844712c5ca722d625845a8ab4e4b561aed5c2025_ppc64le as a component of Red Hat OpenShift Container Storage 4.6 on RHEL-8",
"product_id": "8Base-RH-OCS-4.6:ocs4/ocs-operator-bundle@sha256:d958ddd588a317feb59e9ad0844712c5ca722d625845a8ab4e4b561aed5c2025_ppc64le"
},
"product_reference": "ocs4/ocs-operator-bundle@sha256:d958ddd588a317feb59e9ad0844712c5ca722d625845a8ab4e4b561aed5c2025_ppc64le",
"relates_to_product_reference": "8Base-RH-OCS-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocs4/ocs-rhel8-operator@sha256:5a56e6d20aa56871173932af58cdf76bb4e6ccba76a494799f525c2ff515cd14_s390x as a component of Red Hat OpenShift Container Storage 4.6 on RHEL-8",
"product_id": "8Base-RH-OCS-4.6:ocs4/ocs-rhel8-operator@sha256:5a56e6d20aa56871173932af58cdf76bb4e6ccba76a494799f525c2ff515cd14_s390x"
},
"product_reference": "ocs4/ocs-rhel8-operator@sha256:5a56e6d20aa56871173932af58cdf76bb4e6ccba76a494799f525c2ff515cd14_s390x",
"relates_to_product_reference": "8Base-RH-OCS-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocs4/ocs-rhel8-operator@sha256:e9e688290c1f7fb4fd5870cd2656f7bf6484404e7151e918dfe37907fadb5125_amd64 as a component of Red Hat OpenShift Container Storage 4.6 on RHEL-8",
"product_id": "8Base-RH-OCS-4.6:ocs4/ocs-rhel8-operator@sha256:e9e688290c1f7fb4fd5870cd2656f7bf6484404e7151e918dfe37907fadb5125_amd64"
},
"product_reference": "ocs4/ocs-rhel8-operator@sha256:e9e688290c1f7fb4fd5870cd2656f7bf6484404e7151e918dfe37907fadb5125_amd64",
"relates_to_product_reference": "8Base-RH-OCS-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocs4/ocs-rhel8-operator@sha256:f43e06c9da12f5f70fef80afd5bcf32c03253786f51ffe766b350cce0a688449_ppc64le as a component of Red Hat OpenShift Container Storage 4.6 on RHEL-8",
"product_id": "8Base-RH-OCS-4.6:ocs4/ocs-rhel8-operator@sha256:f43e06c9da12f5f70fef80afd5bcf32c03253786f51ffe766b350cce0a688449_ppc64le"
},
"product_reference": "ocs4/ocs-rhel8-operator@sha256:f43e06c9da12f5f70fef80afd5bcf32c03253786f51ffe766b350cce0a688449_ppc64le",
"relates_to_product_reference": "8Base-RH-OCS-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocs4/rook-ceph-rhel8-operator@sha256:3a00a3b22be44d8802c386bd6a93eda6df48d98e8b90ea0df913a9f4327b3e94_amd64 as a component of Red Hat OpenShift Container Storage 4.6 on RHEL-8",
"product_id": "8Base-RH-OCS-4.6:ocs4/rook-ceph-rhel8-operator@sha256:3a00a3b22be44d8802c386bd6a93eda6df48d98e8b90ea0df913a9f4327b3e94_amd64"
},
"product_reference": "ocs4/rook-ceph-rhel8-operator@sha256:3a00a3b22be44d8802c386bd6a93eda6df48d98e8b90ea0df913a9f4327b3e94_amd64",
"relates_to_product_reference": "8Base-RH-OCS-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocs4/rook-ceph-rhel8-operator@sha256:da3992b47e7f15c471d7cf68933da800adb9f4f471173a5eb90902ce77fa54ff_s390x as a component of Red Hat OpenShift Container Storage 4.6 on RHEL-8",
"product_id": "8Base-RH-OCS-4.6:ocs4/rook-ceph-rhel8-operator@sha256:da3992b47e7f15c471d7cf68933da800adb9f4f471173a5eb90902ce77fa54ff_s390x"
},
"product_reference": "ocs4/rook-ceph-rhel8-operator@sha256:da3992b47e7f15c471d7cf68933da800adb9f4f471173a5eb90902ce77fa54ff_s390x",
"relates_to_product_reference": "8Base-RH-OCS-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocs4/rook-ceph-rhel8-operator@sha256:fa5085edfb18f46ca9af7af8df02a9a81333c9f69d42cad2013602a862db63da_ppc64le as a component of Red Hat OpenShift Container Storage 4.6 on RHEL-8",
"product_id": "8Base-RH-OCS-4.6:ocs4/rook-ceph-rhel8-operator@sha256:fa5085edfb18f46ca9af7af8df02a9a81333c9f69d42cad2013602a862db63da_ppc64le"
},
"product_reference": "ocs4/rook-ceph-rhel8-operator@sha256:fa5085edfb18f46ca9af7af8df02a9a81333c9f69d42cad2013602a862db63da_ppc64le",
"relates_to_product_reference": "8Base-RH-OCS-4.6"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"Ilya Dryomov"
],
"organization": "Red Hat",
"summary": "This issue was discovered by Red Hat."
}
],
"cve": "CVE-2020-25660",
"cwe": {
"id": "CWE-294",
"name": "Authentication Bypass by Capture-replay"
},
"discovery_date": "2020-10-21T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1890354"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Cephx authentication protocol, where it does not verify Ceph clients correctly and is then vulnerable to replay attacks in Nautilus. This flaw allows an attacker with access to the Ceph cluster network to authenticate with the Ceph service via a packet sniffer and perform actions allowed by the Ceph service. This issue is a reintroduction of CVE-2018-1128, affecting the msgr2 protocol. The msgr 2 protocol is used for all communication except older clients that do not support the msgr2 protocol. The msgr1 protocol is not affected. The highest threat from this vulnerability is to confidentiality, integrity, and system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "ceph: CEPHX_V2 replay attack protection lost",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat Ceph Storage 3 has already had a fix shipped for this particular flaw. RHCS 4.1 is shipped with CVE-2018-1128 vulnerability reintroduced, affecting msgr 2 protocol.\n\nRed Hat OpenShift Container Storage (RHOCS) 4 shipped ceph package for the usage of RHOCS 4.2 only, that has reached End Of Life. Hence, ceph package is no longer used and supported with the release of RHOCS 4.3.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-RH-OCS-4.6:ocs4/cephcsi-rhel8@sha256:5e1a69df83ef96cb0a5411ab3af47c7d789251a89349dc1099735493cfc6a47a_ppc64le",
"8Base-RH-OCS-4.6:ocs4/cephcsi-rhel8@sha256:f068579dde9c75f151800205f97989a7e98dde289c9e57128c58ec3a47f6b287_s390x",
"8Base-RH-OCS-4.6:ocs4/cephcsi-rhel8@sha256:f3bc48b18857c970f068ed51915e7fc2a06c6dd14ee0ab08ff4a4733f33a7569_amd64",
"8Base-RH-OCS-4.6:ocs4/mcg-core-rhel8@sha256:37c6626cfd258b05b38fe50feff7630270aadafb4bc5d5aff18b7146c5a88984_ppc64le",
"8Base-RH-OCS-4.6:ocs4/mcg-core-rhel8@sha256:9c59d208e722581c4a594e0bf32d25f52325fde15cd479c83f04b024119b3067_amd64",
"8Base-RH-OCS-4.6:ocs4/mcg-core-rhel8@sha256:f9197232e37920e17504bf717211179508f6313a2dd95805a4f4db4beba7158d_s390x",
"8Base-RH-OCS-4.6:ocs4/mcg-rhel8-operator@sha256:5b7be1d28659e6571e12cde63b10054722a921daeee90f0ed072ef0d38ea46e3_ppc64le",
"8Base-RH-OCS-4.6:ocs4/mcg-rhel8-operator@sha256:6a81efd4146ac1750c4cbcbd3480baa30081b84d2b02ac0026e6c52277635848_amd64",
"8Base-RH-OCS-4.6:ocs4/mcg-rhel8-operator@sha256:fd22666dd33d119eea7599c30aad0c95f8dc6340133d7f0767aa0afef26588ac_s390x",
"8Base-RH-OCS-4.6:ocs4/ocs-must-gather-rhel8@sha256:6d76e7acca55197ae9478ecffabf6271bf099b64335978d5e053493a40258653_ppc64le",
"8Base-RH-OCS-4.6:ocs4/ocs-must-gather-rhel8@sha256:b3e2cbb55f8cfa82480b70e73576ed049cb4e9de984c46f247896951a1746184_amd64",
"8Base-RH-OCS-4.6:ocs4/ocs-must-gather-rhel8@sha256:c834e0b34ee694236cb9afdea48831a4b0cf979298c455c0cbc39e30cc40a3e6_s390x",
"8Base-RH-OCS-4.6:ocs4/ocs-operator-bundle@sha256:5bbbd6ea419eb398988a164fe462a20f148cb9422da30014b21282114e57ffc8_s390x",
"8Base-RH-OCS-4.6:ocs4/ocs-operator-bundle@sha256:8ec70c3cd08470cbd88c179a8fc660a64550eed19f48594c8b808bf2c2062720_amd64",
"8Base-RH-OCS-4.6:ocs4/ocs-operator-bundle@sha256:d958ddd588a317feb59e9ad0844712c5ca722d625845a8ab4e4b561aed5c2025_ppc64le",
"8Base-RH-OCS-4.6:ocs4/ocs-rhel8-operator@sha256:5a56e6d20aa56871173932af58cdf76bb4e6ccba76a494799f525c2ff515cd14_s390x",
"8Base-RH-OCS-4.6:ocs4/ocs-rhel8-operator@sha256:e9e688290c1f7fb4fd5870cd2656f7bf6484404e7151e918dfe37907fadb5125_amd64",
"8Base-RH-OCS-4.6:ocs4/ocs-rhel8-operator@sha256:f43e06c9da12f5f70fef80afd5bcf32c03253786f51ffe766b350cce0a688449_ppc64le",
"8Base-RH-OCS-4.6:ocs4/rook-ceph-rhel8-operator@sha256:3a00a3b22be44d8802c386bd6a93eda6df48d98e8b90ea0df913a9f4327b3e94_amd64",
"8Base-RH-OCS-4.6:ocs4/rook-ceph-rhel8-operator@sha256:da3992b47e7f15c471d7cf68933da800adb9f4f471173a5eb90902ce77fa54ff_s390x",
"8Base-RH-OCS-4.6:ocs4/rook-ceph-rhel8-operator@sha256:fa5085edfb18f46ca9af7af8df02a9a81333c9f69d42cad2013602a862db63da_ppc64le"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-25660"
},
{
"category": "external",
"summary": "RHBZ#1890354",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1890354"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-25660",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-25660"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-25660",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-25660"
},
{
"category": "external",
"summary": "https://ceph.io/community/v15-2-6-octopus-released/",
"url": "https://ceph.io/community/v15-2-6-octopus-released/"
},
{
"category": "external",
"summary": "https://ceph.io/releases/v14-2-14-nautilus-released/",
"url": "https://ceph.io/releases/v14-2-14-nautilus-released/"
}
],
"release_date": "2020-11-17T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-02-01T13:17:36+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"8Base-RH-OCS-4.6:ocs4/cephcsi-rhel8@sha256:5e1a69df83ef96cb0a5411ab3af47c7d789251a89349dc1099735493cfc6a47a_ppc64le",
"8Base-RH-OCS-4.6:ocs4/cephcsi-rhel8@sha256:f068579dde9c75f151800205f97989a7e98dde289c9e57128c58ec3a47f6b287_s390x",
"8Base-RH-OCS-4.6:ocs4/cephcsi-rhel8@sha256:f3bc48b18857c970f068ed51915e7fc2a06c6dd14ee0ab08ff4a4733f33a7569_amd64",
"8Base-RH-OCS-4.6:ocs4/mcg-core-rhel8@sha256:37c6626cfd258b05b38fe50feff7630270aadafb4bc5d5aff18b7146c5a88984_ppc64le",
"8Base-RH-OCS-4.6:ocs4/mcg-core-rhel8@sha256:9c59d208e722581c4a594e0bf32d25f52325fde15cd479c83f04b024119b3067_amd64",
"8Base-RH-OCS-4.6:ocs4/mcg-core-rhel8@sha256:f9197232e37920e17504bf717211179508f6313a2dd95805a4f4db4beba7158d_s390x",
"8Base-RH-OCS-4.6:ocs4/mcg-rhel8-operator@sha256:5b7be1d28659e6571e12cde63b10054722a921daeee90f0ed072ef0d38ea46e3_ppc64le",
"8Base-RH-OCS-4.6:ocs4/mcg-rhel8-operator@sha256:6a81efd4146ac1750c4cbcbd3480baa30081b84d2b02ac0026e6c52277635848_amd64",
"8Base-RH-OCS-4.6:ocs4/mcg-rhel8-operator@sha256:fd22666dd33d119eea7599c30aad0c95f8dc6340133d7f0767aa0afef26588ac_s390x",
"8Base-RH-OCS-4.6:ocs4/ocs-must-gather-rhel8@sha256:6d76e7acca55197ae9478ecffabf6271bf099b64335978d5e053493a40258653_ppc64le",
"8Base-RH-OCS-4.6:ocs4/ocs-must-gather-rhel8@sha256:b3e2cbb55f8cfa82480b70e73576ed049cb4e9de984c46f247896951a1746184_amd64",
"8Base-RH-OCS-4.6:ocs4/ocs-must-gather-rhel8@sha256:c834e0b34ee694236cb9afdea48831a4b0cf979298c455c0cbc39e30cc40a3e6_s390x",
"8Base-RH-OCS-4.6:ocs4/ocs-operator-bundle@sha256:5bbbd6ea419eb398988a164fe462a20f148cb9422da30014b21282114e57ffc8_s390x",
"8Base-RH-OCS-4.6:ocs4/ocs-operator-bundle@sha256:8ec70c3cd08470cbd88c179a8fc660a64550eed19f48594c8b808bf2c2062720_amd64",
"8Base-RH-OCS-4.6:ocs4/ocs-operator-bundle@sha256:d958ddd588a317feb59e9ad0844712c5ca722d625845a8ab4e4b561aed5c2025_ppc64le",
"8Base-RH-OCS-4.6:ocs4/ocs-rhel8-operator@sha256:5a56e6d20aa56871173932af58cdf76bb4e6ccba76a494799f525c2ff515cd14_s390x",
"8Base-RH-OCS-4.6:ocs4/ocs-rhel8-operator@sha256:e9e688290c1f7fb4fd5870cd2656f7bf6484404e7151e918dfe37907fadb5125_amd64",
"8Base-RH-OCS-4.6:ocs4/ocs-rhel8-operator@sha256:f43e06c9da12f5f70fef80afd5bcf32c03253786f51ffe766b350cce0a688449_ppc64le",
"8Base-RH-OCS-4.6:ocs4/rook-ceph-rhel8-operator@sha256:3a00a3b22be44d8802c386bd6a93eda6df48d98e8b90ea0df913a9f4327b3e94_amd64",
"8Base-RH-OCS-4.6:ocs4/rook-ceph-rhel8-operator@sha256:da3992b47e7f15c471d7cf68933da800adb9f4f471173a5eb90902ce77fa54ff_s390x",
"8Base-RH-OCS-4.6:ocs4/rook-ceph-rhel8-operator@sha256:fa5085edfb18f46ca9af7af8df02a9a81333c9f69d42cad2013602a862db63da_ppc64le"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHBA-2021:0305"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "ADJACENT_NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"8Base-RH-OCS-4.6:ocs4/cephcsi-rhel8@sha256:5e1a69df83ef96cb0a5411ab3af47c7d789251a89349dc1099735493cfc6a47a_ppc64le",
"8Base-RH-OCS-4.6:ocs4/cephcsi-rhel8@sha256:f068579dde9c75f151800205f97989a7e98dde289c9e57128c58ec3a47f6b287_s390x",
"8Base-RH-OCS-4.6:ocs4/cephcsi-rhel8@sha256:f3bc48b18857c970f068ed51915e7fc2a06c6dd14ee0ab08ff4a4733f33a7569_amd64",
"8Base-RH-OCS-4.6:ocs4/mcg-core-rhel8@sha256:37c6626cfd258b05b38fe50feff7630270aadafb4bc5d5aff18b7146c5a88984_ppc64le",
"8Base-RH-OCS-4.6:ocs4/mcg-core-rhel8@sha256:9c59d208e722581c4a594e0bf32d25f52325fde15cd479c83f04b024119b3067_amd64",
"8Base-RH-OCS-4.6:ocs4/mcg-core-rhel8@sha256:f9197232e37920e17504bf717211179508f6313a2dd95805a4f4db4beba7158d_s390x",
"8Base-RH-OCS-4.6:ocs4/mcg-rhel8-operator@sha256:5b7be1d28659e6571e12cde63b10054722a921daeee90f0ed072ef0d38ea46e3_ppc64le",
"8Base-RH-OCS-4.6:ocs4/mcg-rhel8-operator@sha256:6a81efd4146ac1750c4cbcbd3480baa30081b84d2b02ac0026e6c52277635848_amd64",
"8Base-RH-OCS-4.6:ocs4/mcg-rhel8-operator@sha256:fd22666dd33d119eea7599c30aad0c95f8dc6340133d7f0767aa0afef26588ac_s390x",
"8Base-RH-OCS-4.6:ocs4/ocs-must-gather-rhel8@sha256:6d76e7acca55197ae9478ecffabf6271bf099b64335978d5e053493a40258653_ppc64le",
"8Base-RH-OCS-4.6:ocs4/ocs-must-gather-rhel8@sha256:b3e2cbb55f8cfa82480b70e73576ed049cb4e9de984c46f247896951a1746184_amd64",
"8Base-RH-OCS-4.6:ocs4/ocs-must-gather-rhel8@sha256:c834e0b34ee694236cb9afdea48831a4b0cf979298c455c0cbc39e30cc40a3e6_s390x",
"8Base-RH-OCS-4.6:ocs4/ocs-operator-bundle@sha256:5bbbd6ea419eb398988a164fe462a20f148cb9422da30014b21282114e57ffc8_s390x",
"8Base-RH-OCS-4.6:ocs4/ocs-operator-bundle@sha256:8ec70c3cd08470cbd88c179a8fc660a64550eed19f48594c8b808bf2c2062720_amd64",
"8Base-RH-OCS-4.6:ocs4/ocs-operator-bundle@sha256:d958ddd588a317feb59e9ad0844712c5ca722d625845a8ab4e4b561aed5c2025_ppc64le",
"8Base-RH-OCS-4.6:ocs4/ocs-rhel8-operator@sha256:5a56e6d20aa56871173932af58cdf76bb4e6ccba76a494799f525c2ff515cd14_s390x",
"8Base-RH-OCS-4.6:ocs4/ocs-rhel8-operator@sha256:e9e688290c1f7fb4fd5870cd2656f7bf6484404e7151e918dfe37907fadb5125_amd64",
"8Base-RH-OCS-4.6:ocs4/ocs-rhel8-operator@sha256:f43e06c9da12f5f70fef80afd5bcf32c03253786f51ffe766b350cce0a688449_ppc64le",
"8Base-RH-OCS-4.6:ocs4/rook-ceph-rhel8-operator@sha256:3a00a3b22be44d8802c386bd6a93eda6df48d98e8b90ea0df913a9f4327b3e94_amd64",
"8Base-RH-OCS-4.6:ocs4/rook-ceph-rhel8-operator@sha256:da3992b47e7f15c471d7cf68933da800adb9f4f471173a5eb90902ce77fa54ff_s390x",
"8Base-RH-OCS-4.6:ocs4/rook-ceph-rhel8-operator@sha256:fa5085edfb18f46ca9af7af8df02a9a81333c9f69d42cad2013602a862db63da_ppc64le"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "ceph: CEPHX_V2 replay attack protection lost"
},
{
"cve": "CVE-2020-25677",
"cwe": {
"id": "CWE-312",
"name": "Cleartext Storage of Sensitive Information"
},
"discovery_date": "2020-10-21T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1892108"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in Ceph-ansible where it creates an /etc/ceph/iscsi-gateway.conf with insecure default permissions. This flaw allows any user on the system to read sensitive information within this file. The highest threat from this vulnerability is to confidentiality.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "ceph-ansible: insecure ownership on /etc/ceph/iscsi-gateway.conf configuration file",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat OpenStack Platform 13 ships the flawed code, however RHOSP does not deploy ceph-iscsi-gw role in any supported scenario. For this reason, a ceph-ansible update will not be provided at this time.\n\nRed Hat Ceph Storage 3 and 4 create /etc/ceph/iscsi-gateway.conf with the insecure permissions.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-RH-OCS-4.6:ocs4/cephcsi-rhel8@sha256:5e1a69df83ef96cb0a5411ab3af47c7d789251a89349dc1099735493cfc6a47a_ppc64le",
"8Base-RH-OCS-4.6:ocs4/cephcsi-rhel8@sha256:f068579dde9c75f151800205f97989a7e98dde289c9e57128c58ec3a47f6b287_s390x",
"8Base-RH-OCS-4.6:ocs4/cephcsi-rhel8@sha256:f3bc48b18857c970f068ed51915e7fc2a06c6dd14ee0ab08ff4a4733f33a7569_amd64",
"8Base-RH-OCS-4.6:ocs4/mcg-core-rhel8@sha256:37c6626cfd258b05b38fe50feff7630270aadafb4bc5d5aff18b7146c5a88984_ppc64le",
"8Base-RH-OCS-4.6:ocs4/mcg-core-rhel8@sha256:9c59d208e722581c4a594e0bf32d25f52325fde15cd479c83f04b024119b3067_amd64",
"8Base-RH-OCS-4.6:ocs4/mcg-core-rhel8@sha256:f9197232e37920e17504bf717211179508f6313a2dd95805a4f4db4beba7158d_s390x",
"8Base-RH-OCS-4.6:ocs4/mcg-rhel8-operator@sha256:5b7be1d28659e6571e12cde63b10054722a921daeee90f0ed072ef0d38ea46e3_ppc64le",
"8Base-RH-OCS-4.6:ocs4/mcg-rhel8-operator@sha256:6a81efd4146ac1750c4cbcbd3480baa30081b84d2b02ac0026e6c52277635848_amd64",
"8Base-RH-OCS-4.6:ocs4/mcg-rhel8-operator@sha256:fd22666dd33d119eea7599c30aad0c95f8dc6340133d7f0767aa0afef26588ac_s390x",
"8Base-RH-OCS-4.6:ocs4/ocs-must-gather-rhel8@sha256:6d76e7acca55197ae9478ecffabf6271bf099b64335978d5e053493a40258653_ppc64le",
"8Base-RH-OCS-4.6:ocs4/ocs-must-gather-rhel8@sha256:b3e2cbb55f8cfa82480b70e73576ed049cb4e9de984c46f247896951a1746184_amd64",
"8Base-RH-OCS-4.6:ocs4/ocs-must-gather-rhel8@sha256:c834e0b34ee694236cb9afdea48831a4b0cf979298c455c0cbc39e30cc40a3e6_s390x",
"8Base-RH-OCS-4.6:ocs4/ocs-operator-bundle@sha256:5bbbd6ea419eb398988a164fe462a20f148cb9422da30014b21282114e57ffc8_s390x",
"8Base-RH-OCS-4.6:ocs4/ocs-operator-bundle@sha256:8ec70c3cd08470cbd88c179a8fc660a64550eed19f48594c8b808bf2c2062720_amd64",
"8Base-RH-OCS-4.6:ocs4/ocs-operator-bundle@sha256:d958ddd588a317feb59e9ad0844712c5ca722d625845a8ab4e4b561aed5c2025_ppc64le",
"8Base-RH-OCS-4.6:ocs4/ocs-rhel8-operator@sha256:5a56e6d20aa56871173932af58cdf76bb4e6ccba76a494799f525c2ff515cd14_s390x",
"8Base-RH-OCS-4.6:ocs4/ocs-rhel8-operator@sha256:e9e688290c1f7fb4fd5870cd2656f7bf6484404e7151e918dfe37907fadb5125_amd64",
"8Base-RH-OCS-4.6:ocs4/ocs-rhel8-operator@sha256:f43e06c9da12f5f70fef80afd5bcf32c03253786f51ffe766b350cce0a688449_ppc64le",
"8Base-RH-OCS-4.6:ocs4/rook-ceph-rhel8-operator@sha256:3a00a3b22be44d8802c386bd6a93eda6df48d98e8b90ea0df913a9f4327b3e94_amd64",
"8Base-RH-OCS-4.6:ocs4/rook-ceph-rhel8-operator@sha256:da3992b47e7f15c471d7cf68933da800adb9f4f471173a5eb90902ce77fa54ff_s390x",
"8Base-RH-OCS-4.6:ocs4/rook-ceph-rhel8-operator@sha256:fa5085edfb18f46ca9af7af8df02a9a81333c9f69d42cad2013602a862db63da_ppc64le"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-25677"
},
{
"category": "external",
"summary": "RHBZ#1892108",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1892108"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-25677",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-25677"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-25677",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-25677"
}
],
"release_date": "2020-11-23T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-02-01T13:17:36+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"8Base-RH-OCS-4.6:ocs4/cephcsi-rhel8@sha256:5e1a69df83ef96cb0a5411ab3af47c7d789251a89349dc1099735493cfc6a47a_ppc64le",
"8Base-RH-OCS-4.6:ocs4/cephcsi-rhel8@sha256:f068579dde9c75f151800205f97989a7e98dde289c9e57128c58ec3a47f6b287_s390x",
"8Base-RH-OCS-4.6:ocs4/cephcsi-rhel8@sha256:f3bc48b18857c970f068ed51915e7fc2a06c6dd14ee0ab08ff4a4733f33a7569_amd64",
"8Base-RH-OCS-4.6:ocs4/mcg-core-rhel8@sha256:37c6626cfd258b05b38fe50feff7630270aadafb4bc5d5aff18b7146c5a88984_ppc64le",
"8Base-RH-OCS-4.6:ocs4/mcg-core-rhel8@sha256:9c59d208e722581c4a594e0bf32d25f52325fde15cd479c83f04b024119b3067_amd64",
"8Base-RH-OCS-4.6:ocs4/mcg-core-rhel8@sha256:f9197232e37920e17504bf717211179508f6313a2dd95805a4f4db4beba7158d_s390x",
"8Base-RH-OCS-4.6:ocs4/mcg-rhel8-operator@sha256:5b7be1d28659e6571e12cde63b10054722a921daeee90f0ed072ef0d38ea46e3_ppc64le",
"8Base-RH-OCS-4.6:ocs4/mcg-rhel8-operator@sha256:6a81efd4146ac1750c4cbcbd3480baa30081b84d2b02ac0026e6c52277635848_amd64",
"8Base-RH-OCS-4.6:ocs4/mcg-rhel8-operator@sha256:fd22666dd33d119eea7599c30aad0c95f8dc6340133d7f0767aa0afef26588ac_s390x",
"8Base-RH-OCS-4.6:ocs4/ocs-must-gather-rhel8@sha256:6d76e7acca55197ae9478ecffabf6271bf099b64335978d5e053493a40258653_ppc64le",
"8Base-RH-OCS-4.6:ocs4/ocs-must-gather-rhel8@sha256:b3e2cbb55f8cfa82480b70e73576ed049cb4e9de984c46f247896951a1746184_amd64",
"8Base-RH-OCS-4.6:ocs4/ocs-must-gather-rhel8@sha256:c834e0b34ee694236cb9afdea48831a4b0cf979298c455c0cbc39e30cc40a3e6_s390x",
"8Base-RH-OCS-4.6:ocs4/ocs-operator-bundle@sha256:5bbbd6ea419eb398988a164fe462a20f148cb9422da30014b21282114e57ffc8_s390x",
"8Base-RH-OCS-4.6:ocs4/ocs-operator-bundle@sha256:8ec70c3cd08470cbd88c179a8fc660a64550eed19f48594c8b808bf2c2062720_amd64",
"8Base-RH-OCS-4.6:ocs4/ocs-operator-bundle@sha256:d958ddd588a317feb59e9ad0844712c5ca722d625845a8ab4e4b561aed5c2025_ppc64le",
"8Base-RH-OCS-4.6:ocs4/ocs-rhel8-operator@sha256:5a56e6d20aa56871173932af58cdf76bb4e6ccba76a494799f525c2ff515cd14_s390x",
"8Base-RH-OCS-4.6:ocs4/ocs-rhel8-operator@sha256:e9e688290c1f7fb4fd5870cd2656f7bf6484404e7151e918dfe37907fadb5125_amd64",
"8Base-RH-OCS-4.6:ocs4/ocs-rhel8-operator@sha256:f43e06c9da12f5f70fef80afd5bcf32c03253786f51ffe766b350cce0a688449_ppc64le",
"8Base-RH-OCS-4.6:ocs4/rook-ceph-rhel8-operator@sha256:3a00a3b22be44d8802c386bd6a93eda6df48d98e8b90ea0df913a9f4327b3e94_amd64",
"8Base-RH-OCS-4.6:ocs4/rook-ceph-rhel8-operator@sha256:da3992b47e7f15c471d7cf68933da800adb9f4f471173a5eb90902ce77fa54ff_s390x",
"8Base-RH-OCS-4.6:ocs4/rook-ceph-rhel8-operator@sha256:fa5085edfb18f46ca9af7af8df02a9a81333c9f69d42cad2013602a862db63da_ppc64le"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHBA-2021:0305"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"8Base-RH-OCS-4.6:ocs4/cephcsi-rhel8@sha256:5e1a69df83ef96cb0a5411ab3af47c7d789251a89349dc1099735493cfc6a47a_ppc64le",
"8Base-RH-OCS-4.6:ocs4/cephcsi-rhel8@sha256:f068579dde9c75f151800205f97989a7e98dde289c9e57128c58ec3a47f6b287_s390x",
"8Base-RH-OCS-4.6:ocs4/cephcsi-rhel8@sha256:f3bc48b18857c970f068ed51915e7fc2a06c6dd14ee0ab08ff4a4733f33a7569_amd64",
"8Base-RH-OCS-4.6:ocs4/mcg-core-rhel8@sha256:37c6626cfd258b05b38fe50feff7630270aadafb4bc5d5aff18b7146c5a88984_ppc64le",
"8Base-RH-OCS-4.6:ocs4/mcg-core-rhel8@sha256:9c59d208e722581c4a594e0bf32d25f52325fde15cd479c83f04b024119b3067_amd64",
"8Base-RH-OCS-4.6:ocs4/mcg-core-rhel8@sha256:f9197232e37920e17504bf717211179508f6313a2dd95805a4f4db4beba7158d_s390x",
"8Base-RH-OCS-4.6:ocs4/mcg-rhel8-operator@sha256:5b7be1d28659e6571e12cde63b10054722a921daeee90f0ed072ef0d38ea46e3_ppc64le",
"8Base-RH-OCS-4.6:ocs4/mcg-rhel8-operator@sha256:6a81efd4146ac1750c4cbcbd3480baa30081b84d2b02ac0026e6c52277635848_amd64",
"8Base-RH-OCS-4.6:ocs4/mcg-rhel8-operator@sha256:fd22666dd33d119eea7599c30aad0c95f8dc6340133d7f0767aa0afef26588ac_s390x",
"8Base-RH-OCS-4.6:ocs4/ocs-must-gather-rhel8@sha256:6d76e7acca55197ae9478ecffabf6271bf099b64335978d5e053493a40258653_ppc64le",
"8Base-RH-OCS-4.6:ocs4/ocs-must-gather-rhel8@sha256:b3e2cbb55f8cfa82480b70e73576ed049cb4e9de984c46f247896951a1746184_amd64",
"8Base-RH-OCS-4.6:ocs4/ocs-must-gather-rhel8@sha256:c834e0b34ee694236cb9afdea48831a4b0cf979298c455c0cbc39e30cc40a3e6_s390x",
"8Base-RH-OCS-4.6:ocs4/ocs-operator-bundle@sha256:5bbbd6ea419eb398988a164fe462a20f148cb9422da30014b21282114e57ffc8_s390x",
"8Base-RH-OCS-4.6:ocs4/ocs-operator-bundle@sha256:8ec70c3cd08470cbd88c179a8fc660a64550eed19f48594c8b808bf2c2062720_amd64",
"8Base-RH-OCS-4.6:ocs4/ocs-operator-bundle@sha256:d958ddd588a317feb59e9ad0844712c5ca722d625845a8ab4e4b561aed5c2025_ppc64le",
"8Base-RH-OCS-4.6:ocs4/ocs-rhel8-operator@sha256:5a56e6d20aa56871173932af58cdf76bb4e6ccba76a494799f525c2ff515cd14_s390x",
"8Base-RH-OCS-4.6:ocs4/ocs-rhel8-operator@sha256:e9e688290c1f7fb4fd5870cd2656f7bf6484404e7151e918dfe37907fadb5125_amd64",
"8Base-RH-OCS-4.6:ocs4/ocs-rhel8-operator@sha256:f43e06c9da12f5f70fef80afd5bcf32c03253786f51ffe766b350cce0a688449_ppc64le",
"8Base-RH-OCS-4.6:ocs4/rook-ceph-rhel8-operator@sha256:3a00a3b22be44d8802c386bd6a93eda6df48d98e8b90ea0df913a9f4327b3e94_amd64",
"8Base-RH-OCS-4.6:ocs4/rook-ceph-rhel8-operator@sha256:da3992b47e7f15c471d7cf68933da800adb9f4f471173a5eb90902ce77fa54ff_s390x",
"8Base-RH-OCS-4.6:ocs4/rook-ceph-rhel8-operator@sha256:fa5085edfb18f46ca9af7af8df02a9a81333c9f69d42cad2013602a862db63da_ppc64le"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "ceph-ansible: insecure ownership on /etc/ceph/iscsi-gateway.conf configuration file"
},
{
"acknowledgments": [
{
"names": [
"Goutham Pacha Ravi"
],
"organization": "Red Hat",
"summary": "This issue was discovered by Red Hat."
},
{
"names": [
"Jahson Babel"
],
"organization": "Centre de Calcul de l\u0027IN2P3"
},
{
"names": [
"John Garbutt"
],
"organization": "StackHPC"
}
],
"cve": "CVE-2020-27781",
"cwe": {
"id": "CWE-522",
"name": "Insufficiently Protected Credentials"
},
"discovery_date": "2020-11-20T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1900109"
}
],
"notes": [
{
"category": "description",
"text": "User credentials can be manipulated and stolen by Native CephFS consumers of OpenStack Manila, resulting in potential privilege escalation. An Open Stack Manila user can request access to a share to an arbitrary cephx user, including existing users. The access key is retrieved via the interface drivers. Then, all users of the requesting OpenStack project can view the access key. This enables the attacker to target any resource that the user has access to. This can be done to even \"admin\" users, compromising the ceph administrator.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "ceph: User credentials can be manipulated and stolen by Native CephFS consumers of OpenStack Manila",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat OpenStack Platform deployments use the ceph package directly from the Ceph channel; the RHOSP package will not be updated at this time.\n\nRed Hat OpenShift Container Storage (RHOCS) 4 shipped ceph package for the usage of RHOCS 4.2 only, that has reached End Of Life. The shipped version of ceph package is no longer used and supported with the release of RHOCS 4.3.\n\nRed Hat Enterprise Linux ceph packages do not include the vulnerable component.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-RH-OCS-4.6:ocs4/cephcsi-rhel8@sha256:5e1a69df83ef96cb0a5411ab3af47c7d789251a89349dc1099735493cfc6a47a_ppc64le",
"8Base-RH-OCS-4.6:ocs4/cephcsi-rhel8@sha256:f068579dde9c75f151800205f97989a7e98dde289c9e57128c58ec3a47f6b287_s390x",
"8Base-RH-OCS-4.6:ocs4/cephcsi-rhel8@sha256:f3bc48b18857c970f068ed51915e7fc2a06c6dd14ee0ab08ff4a4733f33a7569_amd64",
"8Base-RH-OCS-4.6:ocs4/mcg-core-rhel8@sha256:37c6626cfd258b05b38fe50feff7630270aadafb4bc5d5aff18b7146c5a88984_ppc64le",
"8Base-RH-OCS-4.6:ocs4/mcg-core-rhel8@sha256:9c59d208e722581c4a594e0bf32d25f52325fde15cd479c83f04b024119b3067_amd64",
"8Base-RH-OCS-4.6:ocs4/mcg-core-rhel8@sha256:f9197232e37920e17504bf717211179508f6313a2dd95805a4f4db4beba7158d_s390x",
"8Base-RH-OCS-4.6:ocs4/mcg-rhel8-operator@sha256:5b7be1d28659e6571e12cde63b10054722a921daeee90f0ed072ef0d38ea46e3_ppc64le",
"8Base-RH-OCS-4.6:ocs4/mcg-rhel8-operator@sha256:6a81efd4146ac1750c4cbcbd3480baa30081b84d2b02ac0026e6c52277635848_amd64",
"8Base-RH-OCS-4.6:ocs4/mcg-rhel8-operator@sha256:fd22666dd33d119eea7599c30aad0c95f8dc6340133d7f0767aa0afef26588ac_s390x",
"8Base-RH-OCS-4.6:ocs4/ocs-must-gather-rhel8@sha256:6d76e7acca55197ae9478ecffabf6271bf099b64335978d5e053493a40258653_ppc64le",
"8Base-RH-OCS-4.6:ocs4/ocs-must-gather-rhel8@sha256:b3e2cbb55f8cfa82480b70e73576ed049cb4e9de984c46f247896951a1746184_amd64",
"8Base-RH-OCS-4.6:ocs4/ocs-must-gather-rhel8@sha256:c834e0b34ee694236cb9afdea48831a4b0cf979298c455c0cbc39e30cc40a3e6_s390x",
"8Base-RH-OCS-4.6:ocs4/ocs-operator-bundle@sha256:5bbbd6ea419eb398988a164fe462a20f148cb9422da30014b21282114e57ffc8_s390x",
"8Base-RH-OCS-4.6:ocs4/ocs-operator-bundle@sha256:8ec70c3cd08470cbd88c179a8fc660a64550eed19f48594c8b808bf2c2062720_amd64",
"8Base-RH-OCS-4.6:ocs4/ocs-operator-bundle@sha256:d958ddd588a317feb59e9ad0844712c5ca722d625845a8ab4e4b561aed5c2025_ppc64le",
"8Base-RH-OCS-4.6:ocs4/ocs-rhel8-operator@sha256:5a56e6d20aa56871173932af58cdf76bb4e6ccba76a494799f525c2ff515cd14_s390x",
"8Base-RH-OCS-4.6:ocs4/ocs-rhel8-operator@sha256:e9e688290c1f7fb4fd5870cd2656f7bf6484404e7151e918dfe37907fadb5125_amd64",
"8Base-RH-OCS-4.6:ocs4/ocs-rhel8-operator@sha256:f43e06c9da12f5f70fef80afd5bcf32c03253786f51ffe766b350cce0a688449_ppc64le",
"8Base-RH-OCS-4.6:ocs4/rook-ceph-rhel8-operator@sha256:3a00a3b22be44d8802c386bd6a93eda6df48d98e8b90ea0df913a9f4327b3e94_amd64",
"8Base-RH-OCS-4.6:ocs4/rook-ceph-rhel8-operator@sha256:da3992b47e7f15c471d7cf68933da800adb9f4f471173a5eb90902ce77fa54ff_s390x",
"8Base-RH-OCS-4.6:ocs4/rook-ceph-rhel8-operator@sha256:fa5085edfb18f46ca9af7af8df02a9a81333c9f69d42cad2013602a862db63da_ppc64le"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-27781"
},
{
"category": "external",
"summary": "RHBZ#1900109",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1900109"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-27781",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-27781"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-27781",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-27781"
}
],
"release_date": "2020-12-16T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-02-01T13:17:36+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"8Base-RH-OCS-4.6:ocs4/cephcsi-rhel8@sha256:5e1a69df83ef96cb0a5411ab3af47c7d789251a89349dc1099735493cfc6a47a_ppc64le",
"8Base-RH-OCS-4.6:ocs4/cephcsi-rhel8@sha256:f068579dde9c75f151800205f97989a7e98dde289c9e57128c58ec3a47f6b287_s390x",
"8Base-RH-OCS-4.6:ocs4/cephcsi-rhel8@sha256:f3bc48b18857c970f068ed51915e7fc2a06c6dd14ee0ab08ff4a4733f33a7569_amd64",
"8Base-RH-OCS-4.6:ocs4/mcg-core-rhel8@sha256:37c6626cfd258b05b38fe50feff7630270aadafb4bc5d5aff18b7146c5a88984_ppc64le",
"8Base-RH-OCS-4.6:ocs4/mcg-core-rhel8@sha256:9c59d208e722581c4a594e0bf32d25f52325fde15cd479c83f04b024119b3067_amd64",
"8Base-RH-OCS-4.6:ocs4/mcg-core-rhel8@sha256:f9197232e37920e17504bf717211179508f6313a2dd95805a4f4db4beba7158d_s390x",
"8Base-RH-OCS-4.6:ocs4/mcg-rhel8-operator@sha256:5b7be1d28659e6571e12cde63b10054722a921daeee90f0ed072ef0d38ea46e3_ppc64le",
"8Base-RH-OCS-4.6:ocs4/mcg-rhel8-operator@sha256:6a81efd4146ac1750c4cbcbd3480baa30081b84d2b02ac0026e6c52277635848_amd64",
"8Base-RH-OCS-4.6:ocs4/mcg-rhel8-operator@sha256:fd22666dd33d119eea7599c30aad0c95f8dc6340133d7f0767aa0afef26588ac_s390x",
"8Base-RH-OCS-4.6:ocs4/ocs-must-gather-rhel8@sha256:6d76e7acca55197ae9478ecffabf6271bf099b64335978d5e053493a40258653_ppc64le",
"8Base-RH-OCS-4.6:ocs4/ocs-must-gather-rhel8@sha256:b3e2cbb55f8cfa82480b70e73576ed049cb4e9de984c46f247896951a1746184_amd64",
"8Base-RH-OCS-4.6:ocs4/ocs-must-gather-rhel8@sha256:c834e0b34ee694236cb9afdea48831a4b0cf979298c455c0cbc39e30cc40a3e6_s390x",
"8Base-RH-OCS-4.6:ocs4/ocs-operator-bundle@sha256:5bbbd6ea419eb398988a164fe462a20f148cb9422da30014b21282114e57ffc8_s390x",
"8Base-RH-OCS-4.6:ocs4/ocs-operator-bundle@sha256:8ec70c3cd08470cbd88c179a8fc660a64550eed19f48594c8b808bf2c2062720_amd64",
"8Base-RH-OCS-4.6:ocs4/ocs-operator-bundle@sha256:d958ddd588a317feb59e9ad0844712c5ca722d625845a8ab4e4b561aed5c2025_ppc64le",
"8Base-RH-OCS-4.6:ocs4/ocs-rhel8-operator@sha256:5a56e6d20aa56871173932af58cdf76bb4e6ccba76a494799f525c2ff515cd14_s390x",
"8Base-RH-OCS-4.6:ocs4/ocs-rhel8-operator@sha256:e9e688290c1f7fb4fd5870cd2656f7bf6484404e7151e918dfe37907fadb5125_amd64",
"8Base-RH-OCS-4.6:ocs4/ocs-rhel8-operator@sha256:f43e06c9da12f5f70fef80afd5bcf32c03253786f51ffe766b350cce0a688449_ppc64le",
"8Base-RH-OCS-4.6:ocs4/rook-ceph-rhel8-operator@sha256:3a00a3b22be44d8802c386bd6a93eda6df48d98e8b90ea0df913a9f4327b3e94_amd64",
"8Base-RH-OCS-4.6:ocs4/rook-ceph-rhel8-operator@sha256:da3992b47e7f15c471d7cf68933da800adb9f4f471173a5eb90902ce77fa54ff_s390x",
"8Base-RH-OCS-4.6:ocs4/rook-ceph-rhel8-operator@sha256:fa5085edfb18f46ca9af7af8df02a9a81333c9f69d42cad2013602a862db63da_ppc64le"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHBA-2021:0305"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 7.1,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"8Base-RH-OCS-4.6:ocs4/cephcsi-rhel8@sha256:5e1a69df83ef96cb0a5411ab3af47c7d789251a89349dc1099735493cfc6a47a_ppc64le",
"8Base-RH-OCS-4.6:ocs4/cephcsi-rhel8@sha256:f068579dde9c75f151800205f97989a7e98dde289c9e57128c58ec3a47f6b287_s390x",
"8Base-RH-OCS-4.6:ocs4/cephcsi-rhel8@sha256:f3bc48b18857c970f068ed51915e7fc2a06c6dd14ee0ab08ff4a4733f33a7569_amd64",
"8Base-RH-OCS-4.6:ocs4/mcg-core-rhel8@sha256:37c6626cfd258b05b38fe50feff7630270aadafb4bc5d5aff18b7146c5a88984_ppc64le",
"8Base-RH-OCS-4.6:ocs4/mcg-core-rhel8@sha256:9c59d208e722581c4a594e0bf32d25f52325fde15cd479c83f04b024119b3067_amd64",
"8Base-RH-OCS-4.6:ocs4/mcg-core-rhel8@sha256:f9197232e37920e17504bf717211179508f6313a2dd95805a4f4db4beba7158d_s390x",
"8Base-RH-OCS-4.6:ocs4/mcg-rhel8-operator@sha256:5b7be1d28659e6571e12cde63b10054722a921daeee90f0ed072ef0d38ea46e3_ppc64le",
"8Base-RH-OCS-4.6:ocs4/mcg-rhel8-operator@sha256:6a81efd4146ac1750c4cbcbd3480baa30081b84d2b02ac0026e6c52277635848_amd64",
"8Base-RH-OCS-4.6:ocs4/mcg-rhel8-operator@sha256:fd22666dd33d119eea7599c30aad0c95f8dc6340133d7f0767aa0afef26588ac_s390x",
"8Base-RH-OCS-4.6:ocs4/ocs-must-gather-rhel8@sha256:6d76e7acca55197ae9478ecffabf6271bf099b64335978d5e053493a40258653_ppc64le",
"8Base-RH-OCS-4.6:ocs4/ocs-must-gather-rhel8@sha256:b3e2cbb55f8cfa82480b70e73576ed049cb4e9de984c46f247896951a1746184_amd64",
"8Base-RH-OCS-4.6:ocs4/ocs-must-gather-rhel8@sha256:c834e0b34ee694236cb9afdea48831a4b0cf979298c455c0cbc39e30cc40a3e6_s390x",
"8Base-RH-OCS-4.6:ocs4/ocs-operator-bundle@sha256:5bbbd6ea419eb398988a164fe462a20f148cb9422da30014b21282114e57ffc8_s390x",
"8Base-RH-OCS-4.6:ocs4/ocs-operator-bundle@sha256:8ec70c3cd08470cbd88c179a8fc660a64550eed19f48594c8b808bf2c2062720_amd64",
"8Base-RH-OCS-4.6:ocs4/ocs-operator-bundle@sha256:d958ddd588a317feb59e9ad0844712c5ca722d625845a8ab4e4b561aed5c2025_ppc64le",
"8Base-RH-OCS-4.6:ocs4/ocs-rhel8-operator@sha256:5a56e6d20aa56871173932af58cdf76bb4e6ccba76a494799f525c2ff515cd14_s390x",
"8Base-RH-OCS-4.6:ocs4/ocs-rhel8-operator@sha256:e9e688290c1f7fb4fd5870cd2656f7bf6484404e7151e918dfe37907fadb5125_amd64",
"8Base-RH-OCS-4.6:ocs4/ocs-rhel8-operator@sha256:f43e06c9da12f5f70fef80afd5bcf32c03253786f51ffe766b350cce0a688449_ppc64le",
"8Base-RH-OCS-4.6:ocs4/rook-ceph-rhel8-operator@sha256:3a00a3b22be44d8802c386bd6a93eda6df48d98e8b90ea0df913a9f4327b3e94_amd64",
"8Base-RH-OCS-4.6:ocs4/rook-ceph-rhel8-operator@sha256:da3992b47e7f15c471d7cf68933da800adb9f4f471173a5eb90902ce77fa54ff_s390x",
"8Base-RH-OCS-4.6:ocs4/rook-ceph-rhel8-operator@sha256:fa5085edfb18f46ca9af7af8df02a9a81333c9f69d42cad2013602a862db63da_ppc64le"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "ceph: User credentials can be manipulated and stolen by Native CephFS consumers of OpenStack Manila"
},
{
"cve": "CVE-2020-28362",
"cwe": {
"id": "CWE-295",
"name": "Improper Certificate Validation"
},
"discovery_date": "2020-11-12T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"8Base-RH-OCS-4.6:ocs4/mcg-core-rhel8@sha256:37c6626cfd258b05b38fe50feff7630270aadafb4bc5d5aff18b7146c5a88984_ppc64le",
"8Base-RH-OCS-4.6:ocs4/mcg-core-rhel8@sha256:9c59d208e722581c4a594e0bf32d25f52325fde15cd479c83f04b024119b3067_amd64",
"8Base-RH-OCS-4.6:ocs4/mcg-core-rhel8@sha256:f9197232e37920e17504bf717211179508f6313a2dd95805a4f4db4beba7158d_s390x",
"8Base-RH-OCS-4.6:ocs4/mcg-rhel8-operator@sha256:5b7be1d28659e6571e12cde63b10054722a921daeee90f0ed072ef0d38ea46e3_ppc64le",
"8Base-RH-OCS-4.6:ocs4/mcg-rhel8-operator@sha256:6a81efd4146ac1750c4cbcbd3480baa30081b84d2b02ac0026e6c52277635848_amd64",
"8Base-RH-OCS-4.6:ocs4/mcg-rhel8-operator@sha256:fd22666dd33d119eea7599c30aad0c95f8dc6340133d7f0767aa0afef26588ac_s390x",
"8Base-RH-OCS-4.6:ocs4/ocs-must-gather-rhel8@sha256:6d76e7acca55197ae9478ecffabf6271bf099b64335978d5e053493a40258653_ppc64le",
"8Base-RH-OCS-4.6:ocs4/ocs-must-gather-rhel8@sha256:b3e2cbb55f8cfa82480b70e73576ed049cb4e9de984c46f247896951a1746184_amd64",
"8Base-RH-OCS-4.6:ocs4/ocs-must-gather-rhel8@sha256:c834e0b34ee694236cb9afdea48831a4b0cf979298c455c0cbc39e30cc40a3e6_s390x",
"8Base-RH-OCS-4.6:ocs4/ocs-operator-bundle@sha256:5bbbd6ea419eb398988a164fe462a20f148cb9422da30014b21282114e57ffc8_s390x",
"8Base-RH-OCS-4.6:ocs4/ocs-operator-bundle@sha256:8ec70c3cd08470cbd88c179a8fc660a64550eed19f48594c8b808bf2c2062720_amd64",
"8Base-RH-OCS-4.6:ocs4/ocs-operator-bundle@sha256:d958ddd588a317feb59e9ad0844712c5ca722d625845a8ab4e4b561aed5c2025_ppc64le",
"8Base-RH-OCS-4.6:ocs4/ocs-rhel8-operator@sha256:5a56e6d20aa56871173932af58cdf76bb4e6ccba76a494799f525c2ff515cd14_s390x",
"8Base-RH-OCS-4.6:ocs4/ocs-rhel8-operator@sha256:e9e688290c1f7fb4fd5870cd2656f7bf6484404e7151e918dfe37907fadb5125_amd64",
"8Base-RH-OCS-4.6:ocs4/ocs-rhel8-operator@sha256:f43e06c9da12f5f70fef80afd5bcf32c03253786f51ffe766b350cce0a688449_ppc64le"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1897635"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the math/big package of Go\u0027s standard library that causes a denial of service. Applications written in Go that use math/big via cryptographic packages, including crypto/rsa and crypto/x509, are vulnerable and can potentially cause panic via a crafted certificate chain. The highest threat from this vulnerability is to system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: math/big: panic during recursive division of very large numbers",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "OpenShift ServiceMesh (OSSM) 1.1 is Out Of Support Scope (OOSS) for Moderate and Low impact vulnerabilities because it is now in the Maintenance Phase of the support.\nOpenshift Virtualization 1 (formerly Container Native Virtualization) is Out Of Support Scope (OOSS) for Moderate and Low impact vulnerabilities.\n\nRed Hat Gluster Storage 3 shipped multi-cloud-object-gateway-cli and noobaa-operator container as a technical preview and is not currently planned to be addressed in future updates.\n\nOpenShift Container Platform (OCP) 4.5 and earlier are built with Go versions earlier than 1.14, which are not affected by this vulnerability. OCP 4.6 is built with Go 1.15 and is affected.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-RH-OCS-4.6:ocs4/cephcsi-rhel8@sha256:5e1a69df83ef96cb0a5411ab3af47c7d789251a89349dc1099735493cfc6a47a_ppc64le",
"8Base-RH-OCS-4.6:ocs4/cephcsi-rhel8@sha256:f068579dde9c75f151800205f97989a7e98dde289c9e57128c58ec3a47f6b287_s390x",
"8Base-RH-OCS-4.6:ocs4/cephcsi-rhel8@sha256:f3bc48b18857c970f068ed51915e7fc2a06c6dd14ee0ab08ff4a4733f33a7569_amd64",
"8Base-RH-OCS-4.6:ocs4/rook-ceph-rhel8-operator@sha256:3a00a3b22be44d8802c386bd6a93eda6df48d98e8b90ea0df913a9f4327b3e94_amd64",
"8Base-RH-OCS-4.6:ocs4/rook-ceph-rhel8-operator@sha256:da3992b47e7f15c471d7cf68933da800adb9f4f471173a5eb90902ce77fa54ff_s390x",
"8Base-RH-OCS-4.6:ocs4/rook-ceph-rhel8-operator@sha256:fa5085edfb18f46ca9af7af8df02a9a81333c9f69d42cad2013602a862db63da_ppc64le"
],
"known_not_affected": [
"8Base-RH-OCS-4.6:ocs4/mcg-core-rhel8@sha256:37c6626cfd258b05b38fe50feff7630270aadafb4bc5d5aff18b7146c5a88984_ppc64le",
"8Base-RH-OCS-4.6:ocs4/mcg-core-rhel8@sha256:9c59d208e722581c4a594e0bf32d25f52325fde15cd479c83f04b024119b3067_amd64",
"8Base-RH-OCS-4.6:ocs4/mcg-core-rhel8@sha256:f9197232e37920e17504bf717211179508f6313a2dd95805a4f4db4beba7158d_s390x",
"8Base-RH-OCS-4.6:ocs4/mcg-rhel8-operator@sha256:5b7be1d28659e6571e12cde63b10054722a921daeee90f0ed072ef0d38ea46e3_ppc64le",
"8Base-RH-OCS-4.6:ocs4/mcg-rhel8-operator@sha256:6a81efd4146ac1750c4cbcbd3480baa30081b84d2b02ac0026e6c52277635848_amd64",
"8Base-RH-OCS-4.6:ocs4/mcg-rhel8-operator@sha256:fd22666dd33d119eea7599c30aad0c95f8dc6340133d7f0767aa0afef26588ac_s390x",
"8Base-RH-OCS-4.6:ocs4/ocs-must-gather-rhel8@sha256:6d76e7acca55197ae9478ecffabf6271bf099b64335978d5e053493a40258653_ppc64le",
"8Base-RH-OCS-4.6:ocs4/ocs-must-gather-rhel8@sha256:b3e2cbb55f8cfa82480b70e73576ed049cb4e9de984c46f247896951a1746184_amd64",
"8Base-RH-OCS-4.6:ocs4/ocs-must-gather-rhel8@sha256:c834e0b34ee694236cb9afdea48831a4b0cf979298c455c0cbc39e30cc40a3e6_s390x",
"8Base-RH-OCS-4.6:ocs4/ocs-operator-bundle@sha256:5bbbd6ea419eb398988a164fe462a20f148cb9422da30014b21282114e57ffc8_s390x",
"8Base-RH-OCS-4.6:ocs4/ocs-operator-bundle@sha256:8ec70c3cd08470cbd88c179a8fc660a64550eed19f48594c8b808bf2c2062720_amd64",
"8Base-RH-OCS-4.6:ocs4/ocs-operator-bundle@sha256:d958ddd588a317feb59e9ad0844712c5ca722d625845a8ab4e4b561aed5c2025_ppc64le",
"8Base-RH-OCS-4.6:ocs4/ocs-rhel8-operator@sha256:5a56e6d20aa56871173932af58cdf76bb4e6ccba76a494799f525c2ff515cd14_s390x",
"8Base-RH-OCS-4.6:ocs4/ocs-rhel8-operator@sha256:e9e688290c1f7fb4fd5870cd2656f7bf6484404e7151e918dfe37907fadb5125_amd64",
"8Base-RH-OCS-4.6:ocs4/ocs-rhel8-operator@sha256:f43e06c9da12f5f70fef80afd5bcf32c03253786f51ffe766b350cce0a688449_ppc64le"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-28362"
},
{
"category": "external",
"summary": "RHBZ#1897635",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1897635"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-28362",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-28362"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-28362",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-28362"
}
],
"release_date": "2020-11-12T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-02-01T13:17:36+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"8Base-RH-OCS-4.6:ocs4/cephcsi-rhel8@sha256:5e1a69df83ef96cb0a5411ab3af47c7d789251a89349dc1099735493cfc6a47a_ppc64le",
"8Base-RH-OCS-4.6:ocs4/cephcsi-rhel8@sha256:f068579dde9c75f151800205f97989a7e98dde289c9e57128c58ec3a47f6b287_s390x",
"8Base-RH-OCS-4.6:ocs4/cephcsi-rhel8@sha256:f3bc48b18857c970f068ed51915e7fc2a06c6dd14ee0ab08ff4a4733f33a7569_amd64",
"8Base-RH-OCS-4.6:ocs4/rook-ceph-rhel8-operator@sha256:3a00a3b22be44d8802c386bd6a93eda6df48d98e8b90ea0df913a9f4327b3e94_amd64",
"8Base-RH-OCS-4.6:ocs4/rook-ceph-rhel8-operator@sha256:da3992b47e7f15c471d7cf68933da800adb9f4f471173a5eb90902ce77fa54ff_s390x",
"8Base-RH-OCS-4.6:ocs4/rook-ceph-rhel8-operator@sha256:fa5085edfb18f46ca9af7af8df02a9a81333c9f69d42cad2013602a862db63da_ppc64le"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHBA-2021:0305"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"8Base-RH-OCS-4.6:ocs4/cephcsi-rhel8@sha256:5e1a69df83ef96cb0a5411ab3af47c7d789251a89349dc1099735493cfc6a47a_ppc64le",
"8Base-RH-OCS-4.6:ocs4/cephcsi-rhel8@sha256:f068579dde9c75f151800205f97989a7e98dde289c9e57128c58ec3a47f6b287_s390x",
"8Base-RH-OCS-4.6:ocs4/cephcsi-rhel8@sha256:f3bc48b18857c970f068ed51915e7fc2a06c6dd14ee0ab08ff4a4733f33a7569_amd64",
"8Base-RH-OCS-4.6:ocs4/mcg-core-rhel8@sha256:37c6626cfd258b05b38fe50feff7630270aadafb4bc5d5aff18b7146c5a88984_ppc64le",
"8Base-RH-OCS-4.6:ocs4/mcg-core-rhel8@sha256:9c59d208e722581c4a594e0bf32d25f52325fde15cd479c83f04b024119b3067_amd64",
"8Base-RH-OCS-4.6:ocs4/mcg-core-rhel8@sha256:f9197232e37920e17504bf717211179508f6313a2dd95805a4f4db4beba7158d_s390x",
"8Base-RH-OCS-4.6:ocs4/mcg-rhel8-operator@sha256:5b7be1d28659e6571e12cde63b10054722a921daeee90f0ed072ef0d38ea46e3_ppc64le",
"8Base-RH-OCS-4.6:ocs4/mcg-rhel8-operator@sha256:6a81efd4146ac1750c4cbcbd3480baa30081b84d2b02ac0026e6c52277635848_amd64",
"8Base-RH-OCS-4.6:ocs4/mcg-rhel8-operator@sha256:fd22666dd33d119eea7599c30aad0c95f8dc6340133d7f0767aa0afef26588ac_s390x",
"8Base-RH-OCS-4.6:ocs4/ocs-must-gather-rhel8@sha256:6d76e7acca55197ae9478ecffabf6271bf099b64335978d5e053493a40258653_ppc64le",
"8Base-RH-OCS-4.6:ocs4/ocs-must-gather-rhel8@sha256:b3e2cbb55f8cfa82480b70e73576ed049cb4e9de984c46f247896951a1746184_amd64",
"8Base-RH-OCS-4.6:ocs4/ocs-must-gather-rhel8@sha256:c834e0b34ee694236cb9afdea48831a4b0cf979298c455c0cbc39e30cc40a3e6_s390x",
"8Base-RH-OCS-4.6:ocs4/ocs-operator-bundle@sha256:5bbbd6ea419eb398988a164fe462a20f148cb9422da30014b21282114e57ffc8_s390x",
"8Base-RH-OCS-4.6:ocs4/ocs-operator-bundle@sha256:8ec70c3cd08470cbd88c179a8fc660a64550eed19f48594c8b808bf2c2062720_amd64",
"8Base-RH-OCS-4.6:ocs4/ocs-operator-bundle@sha256:d958ddd588a317feb59e9ad0844712c5ca722d625845a8ab4e4b561aed5c2025_ppc64le",
"8Base-RH-OCS-4.6:ocs4/ocs-rhel8-operator@sha256:5a56e6d20aa56871173932af58cdf76bb4e6ccba76a494799f525c2ff515cd14_s390x",
"8Base-RH-OCS-4.6:ocs4/ocs-rhel8-operator@sha256:e9e688290c1f7fb4fd5870cd2656f7bf6484404e7151e918dfe37907fadb5125_amd64",
"8Base-RH-OCS-4.6:ocs4/ocs-rhel8-operator@sha256:f43e06c9da12f5f70fef80afd5bcf32c03253786f51ffe766b350cce0a688449_ppc64le",
"8Base-RH-OCS-4.6:ocs4/rook-ceph-rhel8-operator@sha256:3a00a3b22be44d8802c386bd6a93eda6df48d98e8b90ea0df913a9f4327b3e94_amd64",
"8Base-RH-OCS-4.6:ocs4/rook-ceph-rhel8-operator@sha256:da3992b47e7f15c471d7cf68933da800adb9f4f471173a5eb90902ce77fa54ff_s390x",
"8Base-RH-OCS-4.6:ocs4/rook-ceph-rhel8-operator@sha256:fa5085edfb18f46ca9af7af8df02a9a81333c9f69d42cad2013602a862db63da_ppc64le"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "golang: math/big: panic during recursive division of very large numbers"
}
]
}
RHBA-2021:0482
Vulnerability from csaf_redhat - Published: 2021-02-11 11:59 - Updated: 2026-04-30 16:08A flaw was found in the math/big package of Go's standard library that causes a denial of service. Applications written in Go that use math/big via cryptographic packages, including crypto/rsa and crypto/x509, are vulnerable and can potentially cause panic via a crafted certificate chain. The highest threat from this vulnerability is to system availability.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 8Base-OSSM-2.0:kiali-0:v1.24.4.redhat2-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: 8Base-OSSM-2.0:kiali-0:v1.24.4.redhat2-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 8Base-OSSM-2.0:kiali-0:v1.24.4.redhat2-1.el8.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 8Base-OSSM-2.0:kiali-0:v1.24.4.redhat2-1.el8.x86_64 | — |
Vendor Fix
fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 8Base-OSSM-2.0:servicemesh-0:2.0.2-1.el8.ppc64le | — | ||
| Unresolved product id: 8Base-OSSM-2.0:servicemesh-0:2.0.2-1.el8.s390x | — | ||
| Unresolved product id: 8Base-OSSM-2.0:servicemesh-0:2.0.2-1.el8.src | — | ||
| Unresolved product id: 8Base-OSSM-2.0:servicemesh-0:2.0.2-1.el8.x86_64 | — | ||
| Unresolved product id: 8Base-OSSM-2.0:servicemesh-cni-0:2.0.2-2.el8.ppc64le | — | ||
| Unresolved product id: 8Base-OSSM-2.0:servicemesh-cni-0:2.0.2-2.el8.s390x | — | ||
| Unresolved product id: 8Base-OSSM-2.0:servicemesh-cni-0:2.0.2-2.el8.src | — | ||
| Unresolved product id: 8Base-OSSM-2.0:servicemesh-cni-0:2.0.2-2.el8.x86_64 | — | ||
| Unresolved product id: 8Base-OSSM-2.0:servicemesh-grafana-0:6.4.3-3.el8.1.ppc64le | — | ||
| Unresolved product id: 8Base-OSSM-2.0:servicemesh-grafana-0:6.4.3-3.el8.1.s390x | — | ||
| Unresolved product id: 8Base-OSSM-2.0:servicemesh-grafana-0:6.4.3-3.el8.1.src | — | ||
| Unresolved product id: 8Base-OSSM-2.0:servicemesh-grafana-0:6.4.3-3.el8.1.x86_64 | — | ||
| Unresolved product id: 8Base-OSSM-2.0:servicemesh-grafana-prometheus-0:6.4.3-3.el8.1.ppc64le | — | ||
| Unresolved product id: 8Base-OSSM-2.0:servicemesh-grafana-prometheus-0:6.4.3-3.el8.1.s390x | — | ||
| Unresolved product id: 8Base-OSSM-2.0:servicemesh-grafana-prometheus-0:6.4.3-3.el8.1.x86_64 | — | ||
| Unresolved product id: 8Base-OSSM-2.0:servicemesh-istioctl-0:2.0.2-1.el8.ppc64le | — | ||
| Unresolved product id: 8Base-OSSM-2.0:servicemesh-istioctl-0:2.0.2-1.el8.s390x | — | ||
| Unresolved product id: 8Base-OSSM-2.0:servicemesh-istioctl-0:2.0.2-1.el8.x86_64 | — | ||
| Unresolved product id: 8Base-OSSM-2.0:servicemesh-mixc-0:2.0.2-1.el8.ppc64le | — | ||
| Unresolved product id: 8Base-OSSM-2.0:servicemesh-mixc-0:2.0.2-1.el8.s390x | — | ||
| Unresolved product id: 8Base-OSSM-2.0:servicemesh-mixc-0:2.0.2-1.el8.x86_64 | — | ||
| Unresolved product id: 8Base-OSSM-2.0:servicemesh-mixs-0:2.0.2-1.el8.ppc64le | — | ||
| Unresolved product id: 8Base-OSSM-2.0:servicemesh-mixs-0:2.0.2-1.el8.s390x | — | ||
| Unresolved product id: 8Base-OSSM-2.0:servicemesh-mixs-0:2.0.2-1.el8.x86_64 | — | ||
| Unresolved product id: 8Base-OSSM-2.0:servicemesh-operator-0:2.0.2-3.el8.ppc64le | — | ||
| Unresolved product id: 8Base-OSSM-2.0:servicemesh-operator-0:2.0.2-3.el8.s390x | — | ||
| Unresolved product id: 8Base-OSSM-2.0:servicemesh-operator-0:2.0.2-3.el8.src | — | ||
| Unresolved product id: 8Base-OSSM-2.0:servicemesh-operator-0:2.0.2-3.el8.x86_64 | — | ||
| Unresolved product id: 8Base-OSSM-2.0:servicemesh-pilot-agent-0:2.0.2-1.el8.ppc64le | — | ||
| Unresolved product id: 8Base-OSSM-2.0:servicemesh-pilot-agent-0:2.0.2-1.el8.s390x | — | ||
| Unresolved product id: 8Base-OSSM-2.0:servicemesh-pilot-agent-0:2.0.2-1.el8.x86_64 | — | ||
| Unresolved product id: 8Base-OSSM-2.0:servicemesh-pilot-discovery-0:2.0.2-1.el8.ppc64le | — | ||
| Unresolved product id: 8Base-OSSM-2.0:servicemesh-pilot-discovery-0:2.0.2-1.el8.s390x | — | ||
| Unresolved product id: 8Base-OSSM-2.0:servicemesh-pilot-discovery-0:2.0.2-1.el8.x86_64 | — | ||
| Unresolved product id: 8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-3.el8.1.ppc64le | — | ||
| Unresolved product id: 8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-3.el8.1.s390x | — | ||
| Unresolved product id: 8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-3.el8.1.src | — | ||
| Unresolved product id: 8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-3.el8.1.x86_64 | — | ||
| Unresolved product id: 8Base-OSSM-2.0:servicemesh-proxy-0:2.0.2-1.el8.ppc64le | — | ||
| Unresolved product id: 8Base-OSSM-2.0:servicemesh-proxy-0:2.0.2-1.el8.s390x | — | ||
| Unresolved product id: 8Base-OSSM-2.0:servicemesh-proxy-0:2.0.2-1.el8.src | — | ||
| Unresolved product id: 8Base-OSSM-2.0:servicemesh-proxy-0:2.0.2-1.el8.x86_64 | — |
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Red Hat OpenShift Service Mesh 2.0.2.",
"title": "Topic"
},
{
"category": "general",
"text": "Red Hat OpenShift Service Mesh is Red Hat\u0027s distribution of the Istio service mesh project, tailored for installation into an on-premise OpenShift Container Platform installation.\n\nThe OpenShift Service Mesh release notes provide information on the features and known issues:\n\nhttps://docs.openshift.com/container-platform/latest/service_mesh/v2x/servicemesh-release-notes.html\n\nThis advisory covers the RPM packages for the release.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHBA-2021:0482",
"url": "https://access.redhat.com/errata/RHBA-2021:0482"
},
{
"category": "external",
"summary": "MAISTRA-2086",
"url": "https://issues.redhat.com/browse/MAISTRA-2086"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2021/rhba-2021_0482.json"
}
],
"title": "Red Hat Bug Fix Advisory: Red Hat OpenShift Service Mesh 2.0.2 RPMs",
"tracking": {
"current_release_date": "2026-04-30T16:08:52+00:00",
"generator": {
"date": "2026-04-30T16:08:52+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.7.7"
}
},
"id": "RHBA-2021:0482",
"initial_release_date": "2021-02-11T11:59:56+00:00",
"revision_history": [
{
"date": "2021-02-11T11:59:56+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2021-02-11T11:59:56+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2026-04-30T16:08:52+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "OpenShift Service Mesh 2.0",
"product": {
"name": "OpenShift Service Mesh 2.0",
"product_id": "8Base-OSSM-2.0",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:service_mesh:2.0::el8"
}
}
}
],
"category": "product_family",
"name": "Red Hat OpenShift Service Mesh"
},
{
"branches": [
{
"category": "product_version",
"name": "kiali-0:v1.24.4.redhat2-1.el8.src",
"product": {
"name": "kiali-0:v1.24.4.redhat2-1.el8.src",
"product_id": "kiali-0:v1.24.4.redhat2-1.el8.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kiali@v1.24.4.redhat2-1.el8?arch=src"
}
}
},
{
"category": "product_version",
"name": "servicemesh-prometheus-0:2.14.0-3.el8.1.src",
"product": {
"name": "servicemesh-prometheus-0:2.14.0-3.el8.1.src",
"product_id": "servicemesh-prometheus-0:2.14.0-3.el8.1.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/servicemesh-prometheus@2.14.0-3.el8.1?arch=src"
}
}
},
{
"category": "product_version",
"name": "servicemesh-0:2.0.2-1.el8.src",
"product": {
"name": "servicemesh-0:2.0.2-1.el8.src",
"product_id": "servicemesh-0:2.0.2-1.el8.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/servicemesh@2.0.2-1.el8?arch=src"
}
}
},
{
"category": "product_version",
"name": "servicemesh-grafana-0:6.4.3-3.el8.1.src",
"product": {
"name": "servicemesh-grafana-0:6.4.3-3.el8.1.src",
"product_id": "servicemesh-grafana-0:6.4.3-3.el8.1.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/servicemesh-grafana@6.4.3-3.el8.1?arch=src"
}
}
},
{
"category": "product_version",
"name": "servicemesh-proxy-0:2.0.2-1.el8.src",
"product": {
"name": "servicemesh-proxy-0:2.0.2-1.el8.src",
"product_id": "servicemesh-proxy-0:2.0.2-1.el8.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/servicemesh-proxy@2.0.2-1.el8?arch=src"
}
}
},
{
"category": "product_version",
"name": "servicemesh-cni-0:2.0.2-2.el8.src",
"product": {
"name": "servicemesh-cni-0:2.0.2-2.el8.src",
"product_id": "servicemesh-cni-0:2.0.2-2.el8.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/servicemesh-cni@2.0.2-2.el8?arch=src"
}
}
},
{
"category": "product_version",
"name": "servicemesh-operator-0:2.0.2-3.el8.src",
"product": {
"name": "servicemesh-operator-0:2.0.2-3.el8.src",
"product_id": "servicemesh-operator-0:2.0.2-3.el8.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/servicemesh-operator@2.0.2-3.el8?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "kiali-0:v1.24.4.redhat2-1.el8.x86_64",
"product": {
"name": "kiali-0:v1.24.4.redhat2-1.el8.x86_64",
"product_id": "kiali-0:v1.24.4.redhat2-1.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kiali@v1.24.4.redhat2-1.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "servicemesh-prometheus-0:2.14.0-3.el8.1.x86_64",
"product": {
"name": "servicemesh-prometheus-0:2.14.0-3.el8.1.x86_64",
"product_id": "servicemesh-prometheus-0:2.14.0-3.el8.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/servicemesh-prometheus@2.14.0-3.el8.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "servicemesh-0:2.0.2-1.el8.x86_64",
"product": {
"name": "servicemesh-0:2.0.2-1.el8.x86_64",
"product_id": "servicemesh-0:2.0.2-1.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/servicemesh@2.0.2-1.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "servicemesh-istioctl-0:2.0.2-1.el8.x86_64",
"product": {
"name": "servicemesh-istioctl-0:2.0.2-1.el8.x86_64",
"product_id": "servicemesh-istioctl-0:2.0.2-1.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/servicemesh-istioctl@2.0.2-1.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "servicemesh-mixc-0:2.0.2-1.el8.x86_64",
"product": {
"name": "servicemesh-mixc-0:2.0.2-1.el8.x86_64",
"product_id": "servicemesh-mixc-0:2.0.2-1.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/servicemesh-mixc@2.0.2-1.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "servicemesh-mixs-0:2.0.2-1.el8.x86_64",
"product": {
"name": "servicemesh-mixs-0:2.0.2-1.el8.x86_64",
"product_id": "servicemesh-mixs-0:2.0.2-1.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/servicemesh-mixs@2.0.2-1.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "servicemesh-pilot-agent-0:2.0.2-1.el8.x86_64",
"product": {
"name": "servicemesh-pilot-agent-0:2.0.2-1.el8.x86_64",
"product_id": "servicemesh-pilot-agent-0:2.0.2-1.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/servicemesh-pilot-agent@2.0.2-1.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "servicemesh-pilot-discovery-0:2.0.2-1.el8.x86_64",
"product": {
"name": "servicemesh-pilot-discovery-0:2.0.2-1.el8.x86_64",
"product_id": "servicemesh-pilot-discovery-0:2.0.2-1.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/servicemesh-pilot-discovery@2.0.2-1.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "servicemesh-grafana-0:6.4.3-3.el8.1.x86_64",
"product": {
"name": "servicemesh-grafana-0:6.4.3-3.el8.1.x86_64",
"product_id": "servicemesh-grafana-0:6.4.3-3.el8.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/servicemesh-grafana@6.4.3-3.el8.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "servicemesh-grafana-prometheus-0:6.4.3-3.el8.1.x86_64",
"product": {
"name": "servicemesh-grafana-prometheus-0:6.4.3-3.el8.1.x86_64",
"product_id": "servicemesh-grafana-prometheus-0:6.4.3-3.el8.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/servicemesh-grafana-prometheus@6.4.3-3.el8.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "servicemesh-proxy-0:2.0.2-1.el8.x86_64",
"product": {
"name": "servicemesh-proxy-0:2.0.2-1.el8.x86_64",
"product_id": "servicemesh-proxy-0:2.0.2-1.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/servicemesh-proxy@2.0.2-1.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "servicemesh-cni-0:2.0.2-2.el8.x86_64",
"product": {
"name": "servicemesh-cni-0:2.0.2-2.el8.x86_64",
"product_id": "servicemesh-cni-0:2.0.2-2.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/servicemesh-cni@2.0.2-2.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "servicemesh-operator-0:2.0.2-3.el8.x86_64",
"product": {
"name": "servicemesh-operator-0:2.0.2-3.el8.x86_64",
"product_id": "servicemesh-operator-0:2.0.2-3.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/servicemesh-operator@2.0.2-3.el8?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "kiali-0:v1.24.4.redhat2-1.el8.ppc64le",
"product": {
"name": "kiali-0:v1.24.4.redhat2-1.el8.ppc64le",
"product_id": "kiali-0:v1.24.4.redhat2-1.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kiali@v1.24.4.redhat2-1.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "servicemesh-prometheus-0:2.14.0-3.el8.1.ppc64le",
"product": {
"name": "servicemesh-prometheus-0:2.14.0-3.el8.1.ppc64le",
"product_id": "servicemesh-prometheus-0:2.14.0-3.el8.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/servicemesh-prometheus@2.14.0-3.el8.1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "servicemesh-0:2.0.2-1.el8.ppc64le",
"product": {
"name": "servicemesh-0:2.0.2-1.el8.ppc64le",
"product_id": "servicemesh-0:2.0.2-1.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/servicemesh@2.0.2-1.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "servicemesh-istioctl-0:2.0.2-1.el8.ppc64le",
"product": {
"name": "servicemesh-istioctl-0:2.0.2-1.el8.ppc64le",
"product_id": "servicemesh-istioctl-0:2.0.2-1.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/servicemesh-istioctl@2.0.2-1.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "servicemesh-mixc-0:2.0.2-1.el8.ppc64le",
"product": {
"name": "servicemesh-mixc-0:2.0.2-1.el8.ppc64le",
"product_id": "servicemesh-mixc-0:2.0.2-1.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/servicemesh-mixc@2.0.2-1.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "servicemesh-mixs-0:2.0.2-1.el8.ppc64le",
"product": {
"name": "servicemesh-mixs-0:2.0.2-1.el8.ppc64le",
"product_id": "servicemesh-mixs-0:2.0.2-1.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/servicemesh-mixs@2.0.2-1.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "servicemesh-pilot-agent-0:2.0.2-1.el8.ppc64le",
"product": {
"name": "servicemesh-pilot-agent-0:2.0.2-1.el8.ppc64le",
"product_id": "servicemesh-pilot-agent-0:2.0.2-1.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/servicemesh-pilot-agent@2.0.2-1.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "servicemesh-pilot-discovery-0:2.0.2-1.el8.ppc64le",
"product": {
"name": "servicemesh-pilot-discovery-0:2.0.2-1.el8.ppc64le",
"product_id": "servicemesh-pilot-discovery-0:2.0.2-1.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/servicemesh-pilot-discovery@2.0.2-1.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "servicemesh-grafana-0:6.4.3-3.el8.1.ppc64le",
"product": {
"name": "servicemesh-grafana-0:6.4.3-3.el8.1.ppc64le",
"product_id": "servicemesh-grafana-0:6.4.3-3.el8.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/servicemesh-grafana@6.4.3-3.el8.1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "servicemesh-grafana-prometheus-0:6.4.3-3.el8.1.ppc64le",
"product": {
"name": "servicemesh-grafana-prometheus-0:6.4.3-3.el8.1.ppc64le",
"product_id": "servicemesh-grafana-prometheus-0:6.4.3-3.el8.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/servicemesh-grafana-prometheus@6.4.3-3.el8.1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "servicemesh-proxy-0:2.0.2-1.el8.ppc64le",
"product": {
"name": "servicemesh-proxy-0:2.0.2-1.el8.ppc64le",
"product_id": "servicemesh-proxy-0:2.0.2-1.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/servicemesh-proxy@2.0.2-1.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "servicemesh-cni-0:2.0.2-2.el8.ppc64le",
"product": {
"name": "servicemesh-cni-0:2.0.2-2.el8.ppc64le",
"product_id": "servicemesh-cni-0:2.0.2-2.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/servicemesh-cni@2.0.2-2.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "servicemesh-operator-0:2.0.2-3.el8.ppc64le",
"product": {
"name": "servicemesh-operator-0:2.0.2-3.el8.ppc64le",
"product_id": "servicemesh-operator-0:2.0.2-3.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/servicemesh-operator@2.0.2-3.el8?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "kiali-0:v1.24.4.redhat2-1.el8.s390x",
"product": {
"name": "kiali-0:v1.24.4.redhat2-1.el8.s390x",
"product_id": "kiali-0:v1.24.4.redhat2-1.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kiali@v1.24.4.redhat2-1.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "servicemesh-prometheus-0:2.14.0-3.el8.1.s390x",
"product": {
"name": "servicemesh-prometheus-0:2.14.0-3.el8.1.s390x",
"product_id": "servicemesh-prometheus-0:2.14.0-3.el8.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/servicemesh-prometheus@2.14.0-3.el8.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "servicemesh-0:2.0.2-1.el8.s390x",
"product": {
"name": "servicemesh-0:2.0.2-1.el8.s390x",
"product_id": "servicemesh-0:2.0.2-1.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/servicemesh@2.0.2-1.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "servicemesh-istioctl-0:2.0.2-1.el8.s390x",
"product": {
"name": "servicemesh-istioctl-0:2.0.2-1.el8.s390x",
"product_id": "servicemesh-istioctl-0:2.0.2-1.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/servicemesh-istioctl@2.0.2-1.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "servicemesh-mixc-0:2.0.2-1.el8.s390x",
"product": {
"name": "servicemesh-mixc-0:2.0.2-1.el8.s390x",
"product_id": "servicemesh-mixc-0:2.0.2-1.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/servicemesh-mixc@2.0.2-1.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "servicemesh-mixs-0:2.0.2-1.el8.s390x",
"product": {
"name": "servicemesh-mixs-0:2.0.2-1.el8.s390x",
"product_id": "servicemesh-mixs-0:2.0.2-1.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/servicemesh-mixs@2.0.2-1.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "servicemesh-pilot-agent-0:2.0.2-1.el8.s390x",
"product": {
"name": "servicemesh-pilot-agent-0:2.0.2-1.el8.s390x",
"product_id": "servicemesh-pilot-agent-0:2.0.2-1.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/servicemesh-pilot-agent@2.0.2-1.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "servicemesh-pilot-discovery-0:2.0.2-1.el8.s390x",
"product": {
"name": "servicemesh-pilot-discovery-0:2.0.2-1.el8.s390x",
"product_id": "servicemesh-pilot-discovery-0:2.0.2-1.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/servicemesh-pilot-discovery@2.0.2-1.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "servicemesh-grafana-0:6.4.3-3.el8.1.s390x",
"product": {
"name": "servicemesh-grafana-0:6.4.3-3.el8.1.s390x",
"product_id": "servicemesh-grafana-0:6.4.3-3.el8.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/servicemesh-grafana@6.4.3-3.el8.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "servicemesh-grafana-prometheus-0:6.4.3-3.el8.1.s390x",
"product": {
"name": "servicemesh-grafana-prometheus-0:6.4.3-3.el8.1.s390x",
"product_id": "servicemesh-grafana-prometheus-0:6.4.3-3.el8.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/servicemesh-grafana-prometheus@6.4.3-3.el8.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "servicemesh-proxy-0:2.0.2-1.el8.s390x",
"product": {
"name": "servicemesh-proxy-0:2.0.2-1.el8.s390x",
"product_id": "servicemesh-proxy-0:2.0.2-1.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/servicemesh-proxy@2.0.2-1.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "servicemesh-cni-0:2.0.2-2.el8.s390x",
"product": {
"name": "servicemesh-cni-0:2.0.2-2.el8.s390x",
"product_id": "servicemesh-cni-0:2.0.2-2.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/servicemesh-cni@2.0.2-2.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "servicemesh-operator-0:2.0.2-3.el8.s390x",
"product": {
"name": "servicemesh-operator-0:2.0.2-3.el8.s390x",
"product_id": "servicemesh-operator-0:2.0.2-3.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/servicemesh-operator@2.0.2-3.el8?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kiali-0:v1.24.4.redhat2-1.el8.ppc64le as a component of OpenShift Service Mesh 2.0",
"product_id": "8Base-OSSM-2.0:kiali-0:v1.24.4.redhat2-1.el8.ppc64le"
},
"product_reference": "kiali-0:v1.24.4.redhat2-1.el8.ppc64le",
"relates_to_product_reference": "8Base-OSSM-2.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kiali-0:v1.24.4.redhat2-1.el8.s390x as a component of OpenShift Service Mesh 2.0",
"product_id": "8Base-OSSM-2.0:kiali-0:v1.24.4.redhat2-1.el8.s390x"
},
"product_reference": "kiali-0:v1.24.4.redhat2-1.el8.s390x",
"relates_to_product_reference": "8Base-OSSM-2.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kiali-0:v1.24.4.redhat2-1.el8.src as a component of OpenShift Service Mesh 2.0",
"product_id": "8Base-OSSM-2.0:kiali-0:v1.24.4.redhat2-1.el8.src"
},
"product_reference": "kiali-0:v1.24.4.redhat2-1.el8.src",
"relates_to_product_reference": "8Base-OSSM-2.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kiali-0:v1.24.4.redhat2-1.el8.x86_64 as a component of OpenShift Service Mesh 2.0",
"product_id": "8Base-OSSM-2.0:kiali-0:v1.24.4.redhat2-1.el8.x86_64"
},
"product_reference": "kiali-0:v1.24.4.redhat2-1.el8.x86_64",
"relates_to_product_reference": "8Base-OSSM-2.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "servicemesh-0:2.0.2-1.el8.ppc64le as a component of OpenShift Service Mesh 2.0",
"product_id": "8Base-OSSM-2.0:servicemesh-0:2.0.2-1.el8.ppc64le"
},
"product_reference": "servicemesh-0:2.0.2-1.el8.ppc64le",
"relates_to_product_reference": "8Base-OSSM-2.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "servicemesh-0:2.0.2-1.el8.s390x as a component of OpenShift Service Mesh 2.0",
"product_id": "8Base-OSSM-2.0:servicemesh-0:2.0.2-1.el8.s390x"
},
"product_reference": "servicemesh-0:2.0.2-1.el8.s390x",
"relates_to_product_reference": "8Base-OSSM-2.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "servicemesh-0:2.0.2-1.el8.src as a component of OpenShift Service Mesh 2.0",
"product_id": "8Base-OSSM-2.0:servicemesh-0:2.0.2-1.el8.src"
},
"product_reference": "servicemesh-0:2.0.2-1.el8.src",
"relates_to_product_reference": "8Base-OSSM-2.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "servicemesh-0:2.0.2-1.el8.x86_64 as a component of OpenShift Service Mesh 2.0",
"product_id": "8Base-OSSM-2.0:servicemesh-0:2.0.2-1.el8.x86_64"
},
"product_reference": "servicemesh-0:2.0.2-1.el8.x86_64",
"relates_to_product_reference": "8Base-OSSM-2.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "servicemesh-cni-0:2.0.2-2.el8.ppc64le as a component of OpenShift Service Mesh 2.0",
"product_id": "8Base-OSSM-2.0:servicemesh-cni-0:2.0.2-2.el8.ppc64le"
},
"product_reference": "servicemesh-cni-0:2.0.2-2.el8.ppc64le",
"relates_to_product_reference": "8Base-OSSM-2.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "servicemesh-cni-0:2.0.2-2.el8.s390x as a component of OpenShift Service Mesh 2.0",
"product_id": "8Base-OSSM-2.0:servicemesh-cni-0:2.0.2-2.el8.s390x"
},
"product_reference": "servicemesh-cni-0:2.0.2-2.el8.s390x",
"relates_to_product_reference": "8Base-OSSM-2.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "servicemesh-cni-0:2.0.2-2.el8.src as a component of OpenShift Service Mesh 2.0",
"product_id": "8Base-OSSM-2.0:servicemesh-cni-0:2.0.2-2.el8.src"
},
"product_reference": "servicemesh-cni-0:2.0.2-2.el8.src",
"relates_to_product_reference": "8Base-OSSM-2.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "servicemesh-cni-0:2.0.2-2.el8.x86_64 as a component of OpenShift Service Mesh 2.0",
"product_id": "8Base-OSSM-2.0:servicemesh-cni-0:2.0.2-2.el8.x86_64"
},
"product_reference": "servicemesh-cni-0:2.0.2-2.el8.x86_64",
"relates_to_product_reference": "8Base-OSSM-2.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "servicemesh-grafana-0:6.4.3-3.el8.1.ppc64le as a component of OpenShift Service Mesh 2.0",
"product_id": "8Base-OSSM-2.0:servicemesh-grafana-0:6.4.3-3.el8.1.ppc64le"
},
"product_reference": "servicemesh-grafana-0:6.4.3-3.el8.1.ppc64le",
"relates_to_product_reference": "8Base-OSSM-2.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "servicemesh-grafana-0:6.4.3-3.el8.1.s390x as a component of OpenShift Service Mesh 2.0",
"product_id": "8Base-OSSM-2.0:servicemesh-grafana-0:6.4.3-3.el8.1.s390x"
},
"product_reference": "servicemesh-grafana-0:6.4.3-3.el8.1.s390x",
"relates_to_product_reference": "8Base-OSSM-2.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "servicemesh-grafana-0:6.4.3-3.el8.1.src as a component of OpenShift Service Mesh 2.0",
"product_id": "8Base-OSSM-2.0:servicemesh-grafana-0:6.4.3-3.el8.1.src"
},
"product_reference": "servicemesh-grafana-0:6.4.3-3.el8.1.src",
"relates_to_product_reference": "8Base-OSSM-2.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "servicemesh-grafana-0:6.4.3-3.el8.1.x86_64 as a component of OpenShift Service Mesh 2.0",
"product_id": "8Base-OSSM-2.0:servicemesh-grafana-0:6.4.3-3.el8.1.x86_64"
},
"product_reference": "servicemesh-grafana-0:6.4.3-3.el8.1.x86_64",
"relates_to_product_reference": "8Base-OSSM-2.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "servicemesh-grafana-prometheus-0:6.4.3-3.el8.1.ppc64le as a component of OpenShift Service Mesh 2.0",
"product_id": "8Base-OSSM-2.0:servicemesh-grafana-prometheus-0:6.4.3-3.el8.1.ppc64le"
},
"product_reference": "servicemesh-grafana-prometheus-0:6.4.3-3.el8.1.ppc64le",
"relates_to_product_reference": "8Base-OSSM-2.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "servicemesh-grafana-prometheus-0:6.4.3-3.el8.1.s390x as a component of OpenShift Service Mesh 2.0",
"product_id": "8Base-OSSM-2.0:servicemesh-grafana-prometheus-0:6.4.3-3.el8.1.s390x"
},
"product_reference": "servicemesh-grafana-prometheus-0:6.4.3-3.el8.1.s390x",
"relates_to_product_reference": "8Base-OSSM-2.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "servicemesh-grafana-prometheus-0:6.4.3-3.el8.1.x86_64 as a component of OpenShift Service Mesh 2.0",
"product_id": "8Base-OSSM-2.0:servicemesh-grafana-prometheus-0:6.4.3-3.el8.1.x86_64"
},
"product_reference": "servicemesh-grafana-prometheus-0:6.4.3-3.el8.1.x86_64",
"relates_to_product_reference": "8Base-OSSM-2.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "servicemesh-istioctl-0:2.0.2-1.el8.ppc64le as a component of OpenShift Service Mesh 2.0",
"product_id": "8Base-OSSM-2.0:servicemesh-istioctl-0:2.0.2-1.el8.ppc64le"
},
"product_reference": "servicemesh-istioctl-0:2.0.2-1.el8.ppc64le",
"relates_to_product_reference": "8Base-OSSM-2.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "servicemesh-istioctl-0:2.0.2-1.el8.s390x as a component of OpenShift Service Mesh 2.0",
"product_id": "8Base-OSSM-2.0:servicemesh-istioctl-0:2.0.2-1.el8.s390x"
},
"product_reference": "servicemesh-istioctl-0:2.0.2-1.el8.s390x",
"relates_to_product_reference": "8Base-OSSM-2.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "servicemesh-istioctl-0:2.0.2-1.el8.x86_64 as a component of OpenShift Service Mesh 2.0",
"product_id": "8Base-OSSM-2.0:servicemesh-istioctl-0:2.0.2-1.el8.x86_64"
},
"product_reference": "servicemesh-istioctl-0:2.0.2-1.el8.x86_64",
"relates_to_product_reference": "8Base-OSSM-2.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "servicemesh-mixc-0:2.0.2-1.el8.ppc64le as a component of OpenShift Service Mesh 2.0",
"product_id": "8Base-OSSM-2.0:servicemesh-mixc-0:2.0.2-1.el8.ppc64le"
},
"product_reference": "servicemesh-mixc-0:2.0.2-1.el8.ppc64le",
"relates_to_product_reference": "8Base-OSSM-2.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "servicemesh-mixc-0:2.0.2-1.el8.s390x as a component of OpenShift Service Mesh 2.0",
"product_id": "8Base-OSSM-2.0:servicemesh-mixc-0:2.0.2-1.el8.s390x"
},
"product_reference": "servicemesh-mixc-0:2.0.2-1.el8.s390x",
"relates_to_product_reference": "8Base-OSSM-2.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "servicemesh-mixc-0:2.0.2-1.el8.x86_64 as a component of OpenShift Service Mesh 2.0",
"product_id": "8Base-OSSM-2.0:servicemesh-mixc-0:2.0.2-1.el8.x86_64"
},
"product_reference": "servicemesh-mixc-0:2.0.2-1.el8.x86_64",
"relates_to_product_reference": "8Base-OSSM-2.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "servicemesh-mixs-0:2.0.2-1.el8.ppc64le as a component of OpenShift Service Mesh 2.0",
"product_id": "8Base-OSSM-2.0:servicemesh-mixs-0:2.0.2-1.el8.ppc64le"
},
"product_reference": "servicemesh-mixs-0:2.0.2-1.el8.ppc64le",
"relates_to_product_reference": "8Base-OSSM-2.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "servicemesh-mixs-0:2.0.2-1.el8.s390x as a component of OpenShift Service Mesh 2.0",
"product_id": "8Base-OSSM-2.0:servicemesh-mixs-0:2.0.2-1.el8.s390x"
},
"product_reference": "servicemesh-mixs-0:2.0.2-1.el8.s390x",
"relates_to_product_reference": "8Base-OSSM-2.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "servicemesh-mixs-0:2.0.2-1.el8.x86_64 as a component of OpenShift Service Mesh 2.0",
"product_id": "8Base-OSSM-2.0:servicemesh-mixs-0:2.0.2-1.el8.x86_64"
},
"product_reference": "servicemesh-mixs-0:2.0.2-1.el8.x86_64",
"relates_to_product_reference": "8Base-OSSM-2.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "servicemesh-operator-0:2.0.2-3.el8.ppc64le as a component of OpenShift Service Mesh 2.0",
"product_id": "8Base-OSSM-2.0:servicemesh-operator-0:2.0.2-3.el8.ppc64le"
},
"product_reference": "servicemesh-operator-0:2.0.2-3.el8.ppc64le",
"relates_to_product_reference": "8Base-OSSM-2.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "servicemesh-operator-0:2.0.2-3.el8.s390x as a component of OpenShift Service Mesh 2.0",
"product_id": "8Base-OSSM-2.0:servicemesh-operator-0:2.0.2-3.el8.s390x"
},
"product_reference": "servicemesh-operator-0:2.0.2-3.el8.s390x",
"relates_to_product_reference": "8Base-OSSM-2.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "servicemesh-operator-0:2.0.2-3.el8.src as a component of OpenShift Service Mesh 2.0",
"product_id": "8Base-OSSM-2.0:servicemesh-operator-0:2.0.2-3.el8.src"
},
"product_reference": "servicemesh-operator-0:2.0.2-3.el8.src",
"relates_to_product_reference": "8Base-OSSM-2.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "servicemesh-operator-0:2.0.2-3.el8.x86_64 as a component of OpenShift Service Mesh 2.0",
"product_id": "8Base-OSSM-2.0:servicemesh-operator-0:2.0.2-3.el8.x86_64"
},
"product_reference": "servicemesh-operator-0:2.0.2-3.el8.x86_64",
"relates_to_product_reference": "8Base-OSSM-2.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "servicemesh-pilot-agent-0:2.0.2-1.el8.ppc64le as a component of OpenShift Service Mesh 2.0",
"product_id": "8Base-OSSM-2.0:servicemesh-pilot-agent-0:2.0.2-1.el8.ppc64le"
},
"product_reference": "servicemesh-pilot-agent-0:2.0.2-1.el8.ppc64le",
"relates_to_product_reference": "8Base-OSSM-2.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "servicemesh-pilot-agent-0:2.0.2-1.el8.s390x as a component of OpenShift Service Mesh 2.0",
"product_id": "8Base-OSSM-2.0:servicemesh-pilot-agent-0:2.0.2-1.el8.s390x"
},
"product_reference": "servicemesh-pilot-agent-0:2.0.2-1.el8.s390x",
"relates_to_product_reference": "8Base-OSSM-2.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "servicemesh-pilot-agent-0:2.0.2-1.el8.x86_64 as a component of OpenShift Service Mesh 2.0",
"product_id": "8Base-OSSM-2.0:servicemesh-pilot-agent-0:2.0.2-1.el8.x86_64"
},
"product_reference": "servicemesh-pilot-agent-0:2.0.2-1.el8.x86_64",
"relates_to_product_reference": "8Base-OSSM-2.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "servicemesh-pilot-discovery-0:2.0.2-1.el8.ppc64le as a component of OpenShift Service Mesh 2.0",
"product_id": "8Base-OSSM-2.0:servicemesh-pilot-discovery-0:2.0.2-1.el8.ppc64le"
},
"product_reference": "servicemesh-pilot-discovery-0:2.0.2-1.el8.ppc64le",
"relates_to_product_reference": "8Base-OSSM-2.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "servicemesh-pilot-discovery-0:2.0.2-1.el8.s390x as a component of OpenShift Service Mesh 2.0",
"product_id": "8Base-OSSM-2.0:servicemesh-pilot-discovery-0:2.0.2-1.el8.s390x"
},
"product_reference": "servicemesh-pilot-discovery-0:2.0.2-1.el8.s390x",
"relates_to_product_reference": "8Base-OSSM-2.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "servicemesh-pilot-discovery-0:2.0.2-1.el8.x86_64 as a component of OpenShift Service Mesh 2.0",
"product_id": "8Base-OSSM-2.0:servicemesh-pilot-discovery-0:2.0.2-1.el8.x86_64"
},
"product_reference": "servicemesh-pilot-discovery-0:2.0.2-1.el8.x86_64",
"relates_to_product_reference": "8Base-OSSM-2.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "servicemesh-prometheus-0:2.14.0-3.el8.1.ppc64le as a component of OpenShift Service Mesh 2.0",
"product_id": "8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-3.el8.1.ppc64le"
},
"product_reference": "servicemesh-prometheus-0:2.14.0-3.el8.1.ppc64le",
"relates_to_product_reference": "8Base-OSSM-2.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "servicemesh-prometheus-0:2.14.0-3.el8.1.s390x as a component of OpenShift Service Mesh 2.0",
"product_id": "8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-3.el8.1.s390x"
},
"product_reference": "servicemesh-prometheus-0:2.14.0-3.el8.1.s390x",
"relates_to_product_reference": "8Base-OSSM-2.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "servicemesh-prometheus-0:2.14.0-3.el8.1.src as a component of OpenShift Service Mesh 2.0",
"product_id": "8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-3.el8.1.src"
},
"product_reference": "servicemesh-prometheus-0:2.14.0-3.el8.1.src",
"relates_to_product_reference": "8Base-OSSM-2.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "servicemesh-prometheus-0:2.14.0-3.el8.1.x86_64 as a component of OpenShift Service Mesh 2.0",
"product_id": "8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-3.el8.1.x86_64"
},
"product_reference": "servicemesh-prometheus-0:2.14.0-3.el8.1.x86_64",
"relates_to_product_reference": "8Base-OSSM-2.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "servicemesh-proxy-0:2.0.2-1.el8.ppc64le as a component of OpenShift Service Mesh 2.0",
"product_id": "8Base-OSSM-2.0:servicemesh-proxy-0:2.0.2-1.el8.ppc64le"
},
"product_reference": "servicemesh-proxy-0:2.0.2-1.el8.ppc64le",
"relates_to_product_reference": "8Base-OSSM-2.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "servicemesh-proxy-0:2.0.2-1.el8.s390x as a component of OpenShift Service Mesh 2.0",
"product_id": "8Base-OSSM-2.0:servicemesh-proxy-0:2.0.2-1.el8.s390x"
},
"product_reference": "servicemesh-proxy-0:2.0.2-1.el8.s390x",
"relates_to_product_reference": "8Base-OSSM-2.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "servicemesh-proxy-0:2.0.2-1.el8.src as a component of OpenShift Service Mesh 2.0",
"product_id": "8Base-OSSM-2.0:servicemesh-proxy-0:2.0.2-1.el8.src"
},
"product_reference": "servicemesh-proxy-0:2.0.2-1.el8.src",
"relates_to_product_reference": "8Base-OSSM-2.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "servicemesh-proxy-0:2.0.2-1.el8.x86_64 as a component of OpenShift Service Mesh 2.0",
"product_id": "8Base-OSSM-2.0:servicemesh-proxy-0:2.0.2-1.el8.x86_64"
},
"product_reference": "servicemesh-proxy-0:2.0.2-1.el8.x86_64",
"relates_to_product_reference": "8Base-OSSM-2.0"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2020-28362",
"cwe": {
"id": "CWE-295",
"name": "Improper Certificate Validation"
},
"discovery_date": "2020-11-12T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"8Base-OSSM-2.0:servicemesh-0:2.0.2-1.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-0:2.0.2-1.el8.s390x",
"8Base-OSSM-2.0:servicemesh-0:2.0.2-1.el8.src",
"8Base-OSSM-2.0:servicemesh-0:2.0.2-1.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-cni-0:2.0.2-2.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-cni-0:2.0.2-2.el8.s390x",
"8Base-OSSM-2.0:servicemesh-cni-0:2.0.2-2.el8.src",
"8Base-OSSM-2.0:servicemesh-cni-0:2.0.2-2.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-grafana-0:6.4.3-3.el8.1.ppc64le",
"8Base-OSSM-2.0:servicemesh-grafana-0:6.4.3-3.el8.1.s390x",
"8Base-OSSM-2.0:servicemesh-grafana-0:6.4.3-3.el8.1.src",
"8Base-OSSM-2.0:servicemesh-grafana-0:6.4.3-3.el8.1.x86_64",
"8Base-OSSM-2.0:servicemesh-grafana-prometheus-0:6.4.3-3.el8.1.ppc64le",
"8Base-OSSM-2.0:servicemesh-grafana-prometheus-0:6.4.3-3.el8.1.s390x",
"8Base-OSSM-2.0:servicemesh-grafana-prometheus-0:6.4.3-3.el8.1.x86_64",
"8Base-OSSM-2.0:servicemesh-istioctl-0:2.0.2-1.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-istioctl-0:2.0.2-1.el8.s390x",
"8Base-OSSM-2.0:servicemesh-istioctl-0:2.0.2-1.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-mixc-0:2.0.2-1.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-mixc-0:2.0.2-1.el8.s390x",
"8Base-OSSM-2.0:servicemesh-mixc-0:2.0.2-1.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-mixs-0:2.0.2-1.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-mixs-0:2.0.2-1.el8.s390x",
"8Base-OSSM-2.0:servicemesh-mixs-0:2.0.2-1.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-operator-0:2.0.2-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-operator-0:2.0.2-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-operator-0:2.0.2-3.el8.src",
"8Base-OSSM-2.0:servicemesh-operator-0:2.0.2-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-pilot-agent-0:2.0.2-1.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-pilot-agent-0:2.0.2-1.el8.s390x",
"8Base-OSSM-2.0:servicemesh-pilot-agent-0:2.0.2-1.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-pilot-discovery-0:2.0.2-1.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-pilot-discovery-0:2.0.2-1.el8.s390x",
"8Base-OSSM-2.0:servicemesh-pilot-discovery-0:2.0.2-1.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-3.el8.1.ppc64le",
"8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-3.el8.1.s390x",
"8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-3.el8.1.src",
"8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-3.el8.1.x86_64",
"8Base-OSSM-2.0:servicemesh-proxy-0:2.0.2-1.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-proxy-0:2.0.2-1.el8.s390x",
"8Base-OSSM-2.0:servicemesh-proxy-0:2.0.2-1.el8.src",
"8Base-OSSM-2.0:servicemesh-proxy-0:2.0.2-1.el8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1897635"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the math/big package of Go\u0027s standard library that causes a denial of service. Applications written in Go that use math/big via cryptographic packages, including crypto/rsa and crypto/x509, are vulnerable and can potentially cause panic via a crafted certificate chain. The highest threat from this vulnerability is to system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: math/big: panic during recursive division of very large numbers",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "OpenShift ServiceMesh (OSSM) 1.1 is Out Of Support Scope (OOSS) for Moderate and Low impact vulnerabilities because it is now in the Maintenance Phase of the support.\nOpenshift Virtualization 1 (formerly Container Native Virtualization) is Out Of Support Scope (OOSS) for Moderate and Low impact vulnerabilities.\n\nRed Hat Gluster Storage 3 shipped multi-cloud-object-gateway-cli and noobaa-operator container as a technical preview and is not currently planned to be addressed in future updates.\n\nOpenShift Container Platform (OCP) 4.5 and earlier are built with Go versions earlier than 1.14, which are not affected by this vulnerability. OCP 4.6 is built with Go 1.15 and is affected.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-OSSM-2.0:kiali-0:v1.24.4.redhat2-1.el8.ppc64le",
"8Base-OSSM-2.0:kiali-0:v1.24.4.redhat2-1.el8.s390x",
"8Base-OSSM-2.0:kiali-0:v1.24.4.redhat2-1.el8.src",
"8Base-OSSM-2.0:kiali-0:v1.24.4.redhat2-1.el8.x86_64"
],
"known_not_affected": [
"8Base-OSSM-2.0:servicemesh-0:2.0.2-1.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-0:2.0.2-1.el8.s390x",
"8Base-OSSM-2.0:servicemesh-0:2.0.2-1.el8.src",
"8Base-OSSM-2.0:servicemesh-0:2.0.2-1.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-cni-0:2.0.2-2.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-cni-0:2.0.2-2.el8.s390x",
"8Base-OSSM-2.0:servicemesh-cni-0:2.0.2-2.el8.src",
"8Base-OSSM-2.0:servicemesh-cni-0:2.0.2-2.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-grafana-0:6.4.3-3.el8.1.ppc64le",
"8Base-OSSM-2.0:servicemesh-grafana-0:6.4.3-3.el8.1.s390x",
"8Base-OSSM-2.0:servicemesh-grafana-0:6.4.3-3.el8.1.src",
"8Base-OSSM-2.0:servicemesh-grafana-0:6.4.3-3.el8.1.x86_64",
"8Base-OSSM-2.0:servicemesh-grafana-prometheus-0:6.4.3-3.el8.1.ppc64le",
"8Base-OSSM-2.0:servicemesh-grafana-prometheus-0:6.4.3-3.el8.1.s390x",
"8Base-OSSM-2.0:servicemesh-grafana-prometheus-0:6.4.3-3.el8.1.x86_64",
"8Base-OSSM-2.0:servicemesh-istioctl-0:2.0.2-1.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-istioctl-0:2.0.2-1.el8.s390x",
"8Base-OSSM-2.0:servicemesh-istioctl-0:2.0.2-1.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-mixc-0:2.0.2-1.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-mixc-0:2.0.2-1.el8.s390x",
"8Base-OSSM-2.0:servicemesh-mixc-0:2.0.2-1.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-mixs-0:2.0.2-1.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-mixs-0:2.0.2-1.el8.s390x",
"8Base-OSSM-2.0:servicemesh-mixs-0:2.0.2-1.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-operator-0:2.0.2-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-operator-0:2.0.2-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-operator-0:2.0.2-3.el8.src",
"8Base-OSSM-2.0:servicemesh-operator-0:2.0.2-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-pilot-agent-0:2.0.2-1.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-pilot-agent-0:2.0.2-1.el8.s390x",
"8Base-OSSM-2.0:servicemesh-pilot-agent-0:2.0.2-1.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-pilot-discovery-0:2.0.2-1.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-pilot-discovery-0:2.0.2-1.el8.s390x",
"8Base-OSSM-2.0:servicemesh-pilot-discovery-0:2.0.2-1.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-3.el8.1.ppc64le",
"8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-3.el8.1.s390x",
"8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-3.el8.1.src",
"8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-3.el8.1.x86_64",
"8Base-OSSM-2.0:servicemesh-proxy-0:2.0.2-1.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-proxy-0:2.0.2-1.el8.s390x",
"8Base-OSSM-2.0:servicemesh-proxy-0:2.0.2-1.el8.src",
"8Base-OSSM-2.0:servicemesh-proxy-0:2.0.2-1.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-28362"
},
{
"category": "external",
"summary": "RHBZ#1897635",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1897635"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-28362",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-28362"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-28362",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-28362"
}
],
"release_date": "2020-11-12T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-02-11T11:59:56+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"8Base-OSSM-2.0:kiali-0:v1.24.4.redhat2-1.el8.ppc64le",
"8Base-OSSM-2.0:kiali-0:v1.24.4.redhat2-1.el8.s390x",
"8Base-OSSM-2.0:kiali-0:v1.24.4.redhat2-1.el8.src",
"8Base-OSSM-2.0:kiali-0:v1.24.4.redhat2-1.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHBA-2021:0482"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"8Base-OSSM-2.0:kiali-0:v1.24.4.redhat2-1.el8.ppc64le",
"8Base-OSSM-2.0:kiali-0:v1.24.4.redhat2-1.el8.s390x",
"8Base-OSSM-2.0:kiali-0:v1.24.4.redhat2-1.el8.src",
"8Base-OSSM-2.0:kiali-0:v1.24.4.redhat2-1.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-0:2.0.2-1.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-0:2.0.2-1.el8.s390x",
"8Base-OSSM-2.0:servicemesh-0:2.0.2-1.el8.src",
"8Base-OSSM-2.0:servicemesh-0:2.0.2-1.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-cni-0:2.0.2-2.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-cni-0:2.0.2-2.el8.s390x",
"8Base-OSSM-2.0:servicemesh-cni-0:2.0.2-2.el8.src",
"8Base-OSSM-2.0:servicemesh-cni-0:2.0.2-2.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-grafana-0:6.4.3-3.el8.1.ppc64le",
"8Base-OSSM-2.0:servicemesh-grafana-0:6.4.3-3.el8.1.s390x",
"8Base-OSSM-2.0:servicemesh-grafana-0:6.4.3-3.el8.1.src",
"8Base-OSSM-2.0:servicemesh-grafana-0:6.4.3-3.el8.1.x86_64",
"8Base-OSSM-2.0:servicemesh-grafana-prometheus-0:6.4.3-3.el8.1.ppc64le",
"8Base-OSSM-2.0:servicemesh-grafana-prometheus-0:6.4.3-3.el8.1.s390x",
"8Base-OSSM-2.0:servicemesh-grafana-prometheus-0:6.4.3-3.el8.1.x86_64",
"8Base-OSSM-2.0:servicemesh-istioctl-0:2.0.2-1.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-istioctl-0:2.0.2-1.el8.s390x",
"8Base-OSSM-2.0:servicemesh-istioctl-0:2.0.2-1.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-mixc-0:2.0.2-1.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-mixc-0:2.0.2-1.el8.s390x",
"8Base-OSSM-2.0:servicemesh-mixc-0:2.0.2-1.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-mixs-0:2.0.2-1.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-mixs-0:2.0.2-1.el8.s390x",
"8Base-OSSM-2.0:servicemesh-mixs-0:2.0.2-1.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-operator-0:2.0.2-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-operator-0:2.0.2-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-operator-0:2.0.2-3.el8.src",
"8Base-OSSM-2.0:servicemesh-operator-0:2.0.2-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-pilot-agent-0:2.0.2-1.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-pilot-agent-0:2.0.2-1.el8.s390x",
"8Base-OSSM-2.0:servicemesh-pilot-agent-0:2.0.2-1.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-pilot-discovery-0:2.0.2-1.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-pilot-discovery-0:2.0.2-1.el8.s390x",
"8Base-OSSM-2.0:servicemesh-pilot-discovery-0:2.0.2-1.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-3.el8.1.ppc64le",
"8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-3.el8.1.s390x",
"8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-3.el8.1.src",
"8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-3.el8.1.x86_64",
"8Base-OSSM-2.0:servicemesh-proxy-0:2.0.2-1.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-proxy-0:2.0.2-1.el8.s390x",
"8Base-OSSM-2.0:servicemesh-proxy-0:2.0.2-1.el8.src",
"8Base-OSSM-2.0:servicemesh-proxy-0:2.0.2-1.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "golang: math/big: panic during recursive division of very large numbers"
}
]
}
RHBA-2021_0305
Vulnerability from csaf_redhat - Published: 2021-02-01 13:17 - Updated: 2024-11-22 15:40A flaw was found in the Cephx authentication protocol, where it does not verify Ceph clients correctly and is then vulnerable to replay attacks in Nautilus. This flaw allows an attacker with access to the Ceph cluster network to authenticate with the Ceph service via a packet sniffer and perform actions allowed by the Ceph service. This issue is a reintroduction of CVE-2018-1128, affecting the msgr2 protocol. The msgr 2 protocol is used for all communication except older clients that do not support the msgr2 protocol. The msgr1 protocol is not affected. The highest threat from this vulnerability is to confidentiality, integrity, and system availability.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 8Base-RH-OCS-4.6:ocs4/cephcsi-rhel8@sha256:5e1a69df83ef96cb0a5411ab3af47c7d789251a89349dc1099735493cfc6a47a_ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: 8Base-RH-OCS-4.6:ocs4/cephcsi-rhel8@sha256:f068579dde9c75f151800205f97989a7e98dde289c9e57128c58ec3a47f6b287_s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 8Base-RH-OCS-4.6:ocs4/cephcsi-rhel8@sha256:f3bc48b18857c970f068ed51915e7fc2a06c6dd14ee0ab08ff4a4733f33a7569_amd64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 8Base-RH-OCS-4.6:ocs4/mcg-core-rhel8@sha256:37c6626cfd258b05b38fe50feff7630270aadafb4bc5d5aff18b7146c5a88984_ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: 8Base-RH-OCS-4.6:ocs4/mcg-core-rhel8@sha256:9c59d208e722581c4a594e0bf32d25f52325fde15cd479c83f04b024119b3067_amd64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 8Base-RH-OCS-4.6:ocs4/mcg-core-rhel8@sha256:f9197232e37920e17504bf717211179508f6313a2dd95805a4f4db4beba7158d_s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 8Base-RH-OCS-4.6:ocs4/mcg-rhel8-operator@sha256:5b7be1d28659e6571e12cde63b10054722a921daeee90f0ed072ef0d38ea46e3_ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: 8Base-RH-OCS-4.6:ocs4/mcg-rhel8-operator@sha256:6a81efd4146ac1750c4cbcbd3480baa30081b84d2b02ac0026e6c52277635848_amd64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 8Base-RH-OCS-4.6:ocs4/mcg-rhel8-operator@sha256:fd22666dd33d119eea7599c30aad0c95f8dc6340133d7f0767aa0afef26588ac_s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 8Base-RH-OCS-4.6:ocs4/ocs-must-gather-rhel8@sha256:6d76e7acca55197ae9478ecffabf6271bf099b64335978d5e053493a40258653_ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: 8Base-RH-OCS-4.6:ocs4/ocs-must-gather-rhel8@sha256:b3e2cbb55f8cfa82480b70e73576ed049cb4e9de984c46f247896951a1746184_amd64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 8Base-RH-OCS-4.6:ocs4/ocs-must-gather-rhel8@sha256:c834e0b34ee694236cb9afdea48831a4b0cf979298c455c0cbc39e30cc40a3e6_s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 8Base-RH-OCS-4.6:ocs4/ocs-operator-bundle@sha256:5bbbd6ea419eb398988a164fe462a20f148cb9422da30014b21282114e57ffc8_s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 8Base-RH-OCS-4.6:ocs4/ocs-operator-bundle@sha256:8ec70c3cd08470cbd88c179a8fc660a64550eed19f48594c8b808bf2c2062720_amd64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 8Base-RH-OCS-4.6:ocs4/ocs-operator-bundle@sha256:d958ddd588a317feb59e9ad0844712c5ca722d625845a8ab4e4b561aed5c2025_ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: 8Base-RH-OCS-4.6:ocs4/ocs-rhel8-operator@sha256:5a56e6d20aa56871173932af58cdf76bb4e6ccba76a494799f525c2ff515cd14_s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 8Base-RH-OCS-4.6:ocs4/ocs-rhel8-operator@sha256:e9e688290c1f7fb4fd5870cd2656f7bf6484404e7151e918dfe37907fadb5125_amd64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 8Base-RH-OCS-4.6:ocs4/ocs-rhel8-operator@sha256:f43e06c9da12f5f70fef80afd5bcf32c03253786f51ffe766b350cce0a688449_ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: 8Base-RH-OCS-4.6:ocs4/rook-ceph-rhel8-operator@sha256:3a00a3b22be44d8802c386bd6a93eda6df48d98e8b90ea0df913a9f4327b3e94_amd64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 8Base-RH-OCS-4.6:ocs4/rook-ceph-rhel8-operator@sha256:da3992b47e7f15c471d7cf68933da800adb9f4f471173a5eb90902ce77fa54ff_s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 8Base-RH-OCS-4.6:ocs4/rook-ceph-rhel8-operator@sha256:fa5085edfb18f46ca9af7af8df02a9a81333c9f69d42cad2013602a862db63da_ppc64le | — |
Vendor Fix
fix
|
A flaw was found in Ceph-ansible where it creates an /etc/ceph/iscsi-gateway.conf with insecure default permissions. This flaw allows any user on the system to read sensitive information within this file. The highest threat from this vulnerability is to confidentiality.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 8Base-RH-OCS-4.6:ocs4/cephcsi-rhel8@sha256:5e1a69df83ef96cb0a5411ab3af47c7d789251a89349dc1099735493cfc6a47a_ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: 8Base-RH-OCS-4.6:ocs4/cephcsi-rhel8@sha256:f068579dde9c75f151800205f97989a7e98dde289c9e57128c58ec3a47f6b287_s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 8Base-RH-OCS-4.6:ocs4/cephcsi-rhel8@sha256:f3bc48b18857c970f068ed51915e7fc2a06c6dd14ee0ab08ff4a4733f33a7569_amd64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 8Base-RH-OCS-4.6:ocs4/mcg-core-rhel8@sha256:37c6626cfd258b05b38fe50feff7630270aadafb4bc5d5aff18b7146c5a88984_ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: 8Base-RH-OCS-4.6:ocs4/mcg-core-rhel8@sha256:9c59d208e722581c4a594e0bf32d25f52325fde15cd479c83f04b024119b3067_amd64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 8Base-RH-OCS-4.6:ocs4/mcg-core-rhel8@sha256:f9197232e37920e17504bf717211179508f6313a2dd95805a4f4db4beba7158d_s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 8Base-RH-OCS-4.6:ocs4/mcg-rhel8-operator@sha256:5b7be1d28659e6571e12cde63b10054722a921daeee90f0ed072ef0d38ea46e3_ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: 8Base-RH-OCS-4.6:ocs4/mcg-rhel8-operator@sha256:6a81efd4146ac1750c4cbcbd3480baa30081b84d2b02ac0026e6c52277635848_amd64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 8Base-RH-OCS-4.6:ocs4/mcg-rhel8-operator@sha256:fd22666dd33d119eea7599c30aad0c95f8dc6340133d7f0767aa0afef26588ac_s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 8Base-RH-OCS-4.6:ocs4/ocs-must-gather-rhel8@sha256:6d76e7acca55197ae9478ecffabf6271bf099b64335978d5e053493a40258653_ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: 8Base-RH-OCS-4.6:ocs4/ocs-must-gather-rhel8@sha256:b3e2cbb55f8cfa82480b70e73576ed049cb4e9de984c46f247896951a1746184_amd64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 8Base-RH-OCS-4.6:ocs4/ocs-must-gather-rhel8@sha256:c834e0b34ee694236cb9afdea48831a4b0cf979298c455c0cbc39e30cc40a3e6_s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 8Base-RH-OCS-4.6:ocs4/ocs-operator-bundle@sha256:5bbbd6ea419eb398988a164fe462a20f148cb9422da30014b21282114e57ffc8_s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 8Base-RH-OCS-4.6:ocs4/ocs-operator-bundle@sha256:8ec70c3cd08470cbd88c179a8fc660a64550eed19f48594c8b808bf2c2062720_amd64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 8Base-RH-OCS-4.6:ocs4/ocs-operator-bundle@sha256:d958ddd588a317feb59e9ad0844712c5ca722d625845a8ab4e4b561aed5c2025_ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: 8Base-RH-OCS-4.6:ocs4/ocs-rhel8-operator@sha256:5a56e6d20aa56871173932af58cdf76bb4e6ccba76a494799f525c2ff515cd14_s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 8Base-RH-OCS-4.6:ocs4/ocs-rhel8-operator@sha256:e9e688290c1f7fb4fd5870cd2656f7bf6484404e7151e918dfe37907fadb5125_amd64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 8Base-RH-OCS-4.6:ocs4/ocs-rhel8-operator@sha256:f43e06c9da12f5f70fef80afd5bcf32c03253786f51ffe766b350cce0a688449_ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: 8Base-RH-OCS-4.6:ocs4/rook-ceph-rhel8-operator@sha256:3a00a3b22be44d8802c386bd6a93eda6df48d98e8b90ea0df913a9f4327b3e94_amd64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 8Base-RH-OCS-4.6:ocs4/rook-ceph-rhel8-operator@sha256:da3992b47e7f15c471d7cf68933da800adb9f4f471173a5eb90902ce77fa54ff_s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 8Base-RH-OCS-4.6:ocs4/rook-ceph-rhel8-operator@sha256:fa5085edfb18f46ca9af7af8df02a9a81333c9f69d42cad2013602a862db63da_ppc64le | — |
Vendor Fix
fix
|
User credentials can be manipulated and stolen by Native CephFS consumers of OpenStack Manila, resulting in potential privilege escalation. An Open Stack Manila user can request access to a share to an arbitrary cephx user, including existing users. The access key is retrieved via the interface drivers. Then, all users of the requesting OpenStack project can view the access key. This enables the attacker to target any resource that the user has access to. This can be done to even "admin" users, compromising the ceph administrator.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 8Base-RH-OCS-4.6:ocs4/cephcsi-rhel8@sha256:5e1a69df83ef96cb0a5411ab3af47c7d789251a89349dc1099735493cfc6a47a_ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: 8Base-RH-OCS-4.6:ocs4/cephcsi-rhel8@sha256:f068579dde9c75f151800205f97989a7e98dde289c9e57128c58ec3a47f6b287_s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 8Base-RH-OCS-4.6:ocs4/cephcsi-rhel8@sha256:f3bc48b18857c970f068ed51915e7fc2a06c6dd14ee0ab08ff4a4733f33a7569_amd64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 8Base-RH-OCS-4.6:ocs4/mcg-core-rhel8@sha256:37c6626cfd258b05b38fe50feff7630270aadafb4bc5d5aff18b7146c5a88984_ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: 8Base-RH-OCS-4.6:ocs4/mcg-core-rhel8@sha256:9c59d208e722581c4a594e0bf32d25f52325fde15cd479c83f04b024119b3067_amd64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 8Base-RH-OCS-4.6:ocs4/mcg-core-rhel8@sha256:f9197232e37920e17504bf717211179508f6313a2dd95805a4f4db4beba7158d_s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 8Base-RH-OCS-4.6:ocs4/mcg-rhel8-operator@sha256:5b7be1d28659e6571e12cde63b10054722a921daeee90f0ed072ef0d38ea46e3_ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: 8Base-RH-OCS-4.6:ocs4/mcg-rhel8-operator@sha256:6a81efd4146ac1750c4cbcbd3480baa30081b84d2b02ac0026e6c52277635848_amd64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 8Base-RH-OCS-4.6:ocs4/mcg-rhel8-operator@sha256:fd22666dd33d119eea7599c30aad0c95f8dc6340133d7f0767aa0afef26588ac_s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 8Base-RH-OCS-4.6:ocs4/ocs-must-gather-rhel8@sha256:6d76e7acca55197ae9478ecffabf6271bf099b64335978d5e053493a40258653_ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: 8Base-RH-OCS-4.6:ocs4/ocs-must-gather-rhel8@sha256:b3e2cbb55f8cfa82480b70e73576ed049cb4e9de984c46f247896951a1746184_amd64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 8Base-RH-OCS-4.6:ocs4/ocs-must-gather-rhel8@sha256:c834e0b34ee694236cb9afdea48831a4b0cf979298c455c0cbc39e30cc40a3e6_s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 8Base-RH-OCS-4.6:ocs4/ocs-operator-bundle@sha256:5bbbd6ea419eb398988a164fe462a20f148cb9422da30014b21282114e57ffc8_s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 8Base-RH-OCS-4.6:ocs4/ocs-operator-bundle@sha256:8ec70c3cd08470cbd88c179a8fc660a64550eed19f48594c8b808bf2c2062720_amd64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 8Base-RH-OCS-4.6:ocs4/ocs-operator-bundle@sha256:d958ddd588a317feb59e9ad0844712c5ca722d625845a8ab4e4b561aed5c2025_ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: 8Base-RH-OCS-4.6:ocs4/ocs-rhel8-operator@sha256:5a56e6d20aa56871173932af58cdf76bb4e6ccba76a494799f525c2ff515cd14_s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 8Base-RH-OCS-4.6:ocs4/ocs-rhel8-operator@sha256:e9e688290c1f7fb4fd5870cd2656f7bf6484404e7151e918dfe37907fadb5125_amd64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 8Base-RH-OCS-4.6:ocs4/ocs-rhel8-operator@sha256:f43e06c9da12f5f70fef80afd5bcf32c03253786f51ffe766b350cce0a688449_ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: 8Base-RH-OCS-4.6:ocs4/rook-ceph-rhel8-operator@sha256:3a00a3b22be44d8802c386bd6a93eda6df48d98e8b90ea0df913a9f4327b3e94_amd64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 8Base-RH-OCS-4.6:ocs4/rook-ceph-rhel8-operator@sha256:da3992b47e7f15c471d7cf68933da800adb9f4f471173a5eb90902ce77fa54ff_s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 8Base-RH-OCS-4.6:ocs4/rook-ceph-rhel8-operator@sha256:fa5085edfb18f46ca9af7af8df02a9a81333c9f69d42cad2013602a862db63da_ppc64le | — |
Vendor Fix
fix
|
A flaw was found in the math/big package of Go's standard library that causes a denial of service. Applications written in Go that use math/big via cryptographic packages, including crypto/rsa and crypto/x509, are vulnerable and can potentially cause panic via a crafted certificate chain. The highest threat from this vulnerability is to system availability.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 8Base-RH-OCS-4.6:ocs4/cephcsi-rhel8@sha256:5e1a69df83ef96cb0a5411ab3af47c7d789251a89349dc1099735493cfc6a47a_ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: 8Base-RH-OCS-4.6:ocs4/cephcsi-rhel8@sha256:f068579dde9c75f151800205f97989a7e98dde289c9e57128c58ec3a47f6b287_s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 8Base-RH-OCS-4.6:ocs4/cephcsi-rhel8@sha256:f3bc48b18857c970f068ed51915e7fc2a06c6dd14ee0ab08ff4a4733f33a7569_amd64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 8Base-RH-OCS-4.6:ocs4/rook-ceph-rhel8-operator@sha256:3a00a3b22be44d8802c386bd6a93eda6df48d98e8b90ea0df913a9f4327b3e94_amd64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 8Base-RH-OCS-4.6:ocs4/rook-ceph-rhel8-operator@sha256:da3992b47e7f15c471d7cf68933da800adb9f4f471173a5eb90902ce77fa54ff_s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 8Base-RH-OCS-4.6:ocs4/rook-ceph-rhel8-operator@sha256:fa5085edfb18f46ca9af7af8df02a9a81333c9f69d42cad2013602a862db63da_ppc64le | — |
Vendor Fix
fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 8Base-RH-OCS-4.6:ocs4/mcg-core-rhel8@sha256:37c6626cfd258b05b38fe50feff7630270aadafb4bc5d5aff18b7146c5a88984_ppc64le | — | ||
| Unresolved product id: 8Base-RH-OCS-4.6:ocs4/mcg-core-rhel8@sha256:9c59d208e722581c4a594e0bf32d25f52325fde15cd479c83f04b024119b3067_amd64 | — | ||
| Unresolved product id: 8Base-RH-OCS-4.6:ocs4/mcg-core-rhel8@sha256:f9197232e37920e17504bf717211179508f6313a2dd95805a4f4db4beba7158d_s390x | — | ||
| Unresolved product id: 8Base-RH-OCS-4.6:ocs4/mcg-rhel8-operator@sha256:5b7be1d28659e6571e12cde63b10054722a921daeee90f0ed072ef0d38ea46e3_ppc64le | — | ||
| Unresolved product id: 8Base-RH-OCS-4.6:ocs4/mcg-rhel8-operator@sha256:6a81efd4146ac1750c4cbcbd3480baa30081b84d2b02ac0026e6c52277635848_amd64 | — | ||
| Unresolved product id: 8Base-RH-OCS-4.6:ocs4/mcg-rhel8-operator@sha256:fd22666dd33d119eea7599c30aad0c95f8dc6340133d7f0767aa0afef26588ac_s390x | — | ||
| Unresolved product id: 8Base-RH-OCS-4.6:ocs4/ocs-must-gather-rhel8@sha256:6d76e7acca55197ae9478ecffabf6271bf099b64335978d5e053493a40258653_ppc64le | — | ||
| Unresolved product id: 8Base-RH-OCS-4.6:ocs4/ocs-must-gather-rhel8@sha256:b3e2cbb55f8cfa82480b70e73576ed049cb4e9de984c46f247896951a1746184_amd64 | — | ||
| Unresolved product id: 8Base-RH-OCS-4.6:ocs4/ocs-must-gather-rhel8@sha256:c834e0b34ee694236cb9afdea48831a4b0cf979298c455c0cbc39e30cc40a3e6_s390x | — | ||
| Unresolved product id: 8Base-RH-OCS-4.6:ocs4/ocs-operator-bundle@sha256:5bbbd6ea419eb398988a164fe462a20f148cb9422da30014b21282114e57ffc8_s390x | — | ||
| Unresolved product id: 8Base-RH-OCS-4.6:ocs4/ocs-operator-bundle@sha256:8ec70c3cd08470cbd88c179a8fc660a64550eed19f48594c8b808bf2c2062720_amd64 | — | ||
| Unresolved product id: 8Base-RH-OCS-4.6:ocs4/ocs-operator-bundle@sha256:d958ddd588a317feb59e9ad0844712c5ca722d625845a8ab4e4b561aed5c2025_ppc64le | — | ||
| Unresolved product id: 8Base-RH-OCS-4.6:ocs4/ocs-rhel8-operator@sha256:5a56e6d20aa56871173932af58cdf76bb4e6ccba76a494799f525c2ff515cd14_s390x | — | ||
| Unresolved product id: 8Base-RH-OCS-4.6:ocs4/ocs-rhel8-operator@sha256:e9e688290c1f7fb4fd5870cd2656f7bf6484404e7151e918dfe37907fadb5125_amd64 | — | ||
| Unresolved product id: 8Base-RH-OCS-4.6:ocs4/ocs-rhel8-operator@sha256:f43e06c9da12f5f70fef80afd5bcf32c03253786f51ffe766b350cce0a688449_ppc64le | — |
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Updated container images that fix various bugs are now available for Red Hat Openshift Container Storage 4.6.2 from Red Hat Container Registry.",
"title": "Topic"
},
{
"category": "general",
"text": "Red Hat OpenShift Container Storage is software-defined storage integrated with and optimized for the Red Hat OpenShift Container Platform. Red Hat OpenShift Container Storage is a highly scalable, production-grade persistent storage for stateful applications running in the Red Hat OpenShift Container Platform. In addition to persistent storage, Red Hat OpenShift Container Storage provisions a multicloud data management service with an S3 compatible API.\n\nThis advisory fixes the following bugs:\n\n* Previously, there was a race condition with the Red Hat Ceph Storage PG\nautoscaler that caused the creation of 128 PGs instead of the default 32.\nThis meant RGW pods would fail to come up. With this update, RGW pods would be able to start also in small clusters.\n(BZ#1914979)\n\n* Previously, the OSD design had one blocking PodDistributionBudget (PDB) for each OSD. This meant users could only drain one node at a time. OSDs have been redesigned to have one OSD PDB at the beginning which allows only one OSD to go down at a time. Once the OSD goes down, its failure domain is determined, and blocking OSD PDBs are created for other failure domains. The originally created OSD is then deleted, and all of the OSDs can go down in the failure domain. With this new design, multiple nodes can be drained in the same failure domain. (BZ#1916585)\n\nAll users of Red Hat OpenShift Container Storage are advised to pull these new images from the Red Hat Container Registry.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHBA-2021:0305",
"url": "https://access.redhat.com/errata/RHBA-2021:0305"
},
{
"category": "external",
"summary": "1899743",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1899743"
},
{
"category": "external",
"summary": "1914819",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1914819"
},
{
"category": "external",
"summary": "1914979",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1914979"
},
{
"category": "external",
"summary": "1916585",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1916585"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2021/rhba-2021_0305.json"
}
],
"title": "Red Hat Bug Fix Advisory: Red Hat OpenShift Container Storage 4.6.2 container bug fix update",
"tracking": {
"current_release_date": "2024-11-22T15:40:59+00:00",
"generator": {
"date": "2024-11-22T15:40:59+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.2.1"
}
},
"id": "RHBA-2021:0305",
"initial_release_date": "2021-02-01T13:17:36+00:00",
"revision_history": [
{
"date": "2021-02-01T13:17:36+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2021-02-01T13:17:36+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2024-11-22T15:40:59+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat OpenShift Container Storage 4.6 on RHEL-8",
"product": {
"name": "Red Hat OpenShift Container Storage 4.6 on RHEL-8",
"product_id": "8Base-RH-OCS-4.6",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:openshift_container_storage:4.6::el8"
}
}
}
],
"category": "product_family",
"name": "Red Hat OpenShift Container Storage"
},
{
"branches": [
{
"category": "product_version",
"name": "ocs4/cephcsi-rhel8@sha256:f3bc48b18857c970f068ed51915e7fc2a06c6dd14ee0ab08ff4a4733f33a7569_amd64",
"product": {
"name": "ocs4/cephcsi-rhel8@sha256:f3bc48b18857c970f068ed51915e7fc2a06c6dd14ee0ab08ff4a4733f33a7569_amd64",
"product_id": "ocs4/cephcsi-rhel8@sha256:f3bc48b18857c970f068ed51915e7fc2a06c6dd14ee0ab08ff4a4733f33a7569_amd64",
"product_identification_helper": {
"purl": "pkg:oci/cephcsi-rhel8@sha256:f3bc48b18857c970f068ed51915e7fc2a06c6dd14ee0ab08ff4a4733f33a7569?arch=amd64\u0026repository_url=registry.redhat.io/ocs4/cephcsi-rhel8\u0026tag=4.6-54.49cf5efdd.release_4.6"
}
}
},
{
"category": "product_version",
"name": "ocs4/mcg-core-rhel8@sha256:9c59d208e722581c4a594e0bf32d25f52325fde15cd479c83f04b024119b3067_amd64",
"product": {
"name": "ocs4/mcg-core-rhel8@sha256:9c59d208e722581c4a594e0bf32d25f52325fde15cd479c83f04b024119b3067_amd64",
"product_id": "ocs4/mcg-core-rhel8@sha256:9c59d208e722581c4a594e0bf32d25f52325fde15cd479c83f04b024119b3067_amd64",
"product_identification_helper": {
"purl": "pkg:oci/mcg-core-rhel8@sha256:9c59d208e722581c4a594e0bf32d25f52325fde15cd479c83f04b024119b3067?arch=amd64\u0026repository_url=registry.redhat.io/ocs4/mcg-core-rhel8\u0026tag=5.6.0-42.6a01c5fc0.5.6"
}
}
},
{
"category": "product_version",
"name": "ocs4/mcg-rhel8-operator@sha256:6a81efd4146ac1750c4cbcbd3480baa30081b84d2b02ac0026e6c52277635848_amd64",
"product": {
"name": "ocs4/mcg-rhel8-operator@sha256:6a81efd4146ac1750c4cbcbd3480baa30081b84d2b02ac0026e6c52277635848_amd64",
"product_id": "ocs4/mcg-rhel8-operator@sha256:6a81efd4146ac1750c4cbcbd3480baa30081b84d2b02ac0026e6c52277635848_amd64",
"product_identification_helper": {
"purl": "pkg:oci/mcg-rhel8-operator@sha256:6a81efd4146ac1750c4cbcbd3480baa30081b84d2b02ac0026e6c52277635848?arch=amd64\u0026repository_url=registry.redhat.io/ocs4/mcg-rhel8-operator\u0026tag=5.6.0-41.2279a46.5.6"
}
}
},
{
"category": "product_version",
"name": "ocs4/ocs-must-gather-rhel8@sha256:b3e2cbb55f8cfa82480b70e73576ed049cb4e9de984c46f247896951a1746184_amd64",
"product": {
"name": "ocs4/ocs-must-gather-rhel8@sha256:b3e2cbb55f8cfa82480b70e73576ed049cb4e9de984c46f247896951a1746184_amd64",
"product_id": "ocs4/ocs-must-gather-rhel8@sha256:b3e2cbb55f8cfa82480b70e73576ed049cb4e9de984c46f247896951a1746184_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ocs-must-gather-rhel8@sha256:b3e2cbb55f8cfa82480b70e73576ed049cb4e9de984c46f247896951a1746184?arch=amd64\u0026repository_url=registry.redhat.io/ocs4/ocs-must-gather-rhel8\u0026tag=4.6-78.3b7455e4.release_4.6"
}
}
},
{
"category": "product_version",
"name": "ocs4/ocs-operator-bundle@sha256:8ec70c3cd08470cbd88c179a8fc660a64550eed19f48594c8b808bf2c2062720_amd64",
"product": {
"name": "ocs4/ocs-operator-bundle@sha256:8ec70c3cd08470cbd88c179a8fc660a64550eed19f48594c8b808bf2c2062720_amd64",
"product_id": "ocs4/ocs-operator-bundle@sha256:8ec70c3cd08470cbd88c179a8fc660a64550eed19f48594c8b808bf2c2062720_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ocs-operator-bundle@sha256:8ec70c3cd08470cbd88c179a8fc660a64550eed19f48594c8b808bf2c2062720?arch=amd64\u0026repository_url=registry.redhat.io/ocs4/ocs-operator-bundle\u0026tag=4.6.2-1"
}
}
},
{
"category": "product_version",
"name": "ocs4/ocs-rhel8-operator@sha256:e9e688290c1f7fb4fd5870cd2656f7bf6484404e7151e918dfe37907fadb5125_amd64",
"product": {
"name": "ocs4/ocs-rhel8-operator@sha256:e9e688290c1f7fb4fd5870cd2656f7bf6484404e7151e918dfe37907fadb5125_amd64",
"product_id": "ocs4/ocs-rhel8-operator@sha256:e9e688290c1f7fb4fd5870cd2656f7bf6484404e7151e918dfe37907fadb5125_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ocs-rhel8-operator@sha256:e9e688290c1f7fb4fd5870cd2656f7bf6484404e7151e918dfe37907fadb5125?arch=amd64\u0026repository_url=registry.redhat.io/ocs4/ocs-rhel8-operator\u0026tag=4.6-78.3b7455e4.release_4.6"
}
}
},
{
"category": "product_version",
"name": "ocs4/rook-ceph-rhel8-operator@sha256:3a00a3b22be44d8802c386bd6a93eda6df48d98e8b90ea0df913a9f4327b3e94_amd64",
"product": {
"name": "ocs4/rook-ceph-rhel8-operator@sha256:3a00a3b22be44d8802c386bd6a93eda6df48d98e8b90ea0df913a9f4327b3e94_amd64",
"product_id": "ocs4/rook-ceph-rhel8-operator@sha256:3a00a3b22be44d8802c386bd6a93eda6df48d98e8b90ea0df913a9f4327b3e94_amd64",
"product_identification_helper": {
"purl": "pkg:oci/rook-ceph-rhel8-operator@sha256:3a00a3b22be44d8802c386bd6a93eda6df48d98e8b90ea0df913a9f4327b3e94?arch=amd64\u0026repository_url=registry.redhat.io/ocs4/rook-ceph-rhel8-operator\u0026tag=4.6-82.8c7ed584.release_4.6"
}
}
}
],
"category": "architecture",
"name": "amd64"
},
{
"branches": [
{
"category": "product_version",
"name": "ocs4/cephcsi-rhel8@sha256:5e1a69df83ef96cb0a5411ab3af47c7d789251a89349dc1099735493cfc6a47a_ppc64le",
"product": {
"name": "ocs4/cephcsi-rhel8@sha256:5e1a69df83ef96cb0a5411ab3af47c7d789251a89349dc1099735493cfc6a47a_ppc64le",
"product_id": "ocs4/cephcsi-rhel8@sha256:5e1a69df83ef96cb0a5411ab3af47c7d789251a89349dc1099735493cfc6a47a_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/cephcsi-rhel8@sha256:5e1a69df83ef96cb0a5411ab3af47c7d789251a89349dc1099735493cfc6a47a?arch=ppc64le\u0026repository_url=registry.redhat.io/ocs4/cephcsi-rhel8\u0026tag=4.6-54.49cf5efdd.release_4.6"
}
}
},
{
"category": "product_version",
"name": "ocs4/mcg-core-rhel8@sha256:37c6626cfd258b05b38fe50feff7630270aadafb4bc5d5aff18b7146c5a88984_ppc64le",
"product": {
"name": "ocs4/mcg-core-rhel8@sha256:37c6626cfd258b05b38fe50feff7630270aadafb4bc5d5aff18b7146c5a88984_ppc64le",
"product_id": "ocs4/mcg-core-rhel8@sha256:37c6626cfd258b05b38fe50feff7630270aadafb4bc5d5aff18b7146c5a88984_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/mcg-core-rhel8@sha256:37c6626cfd258b05b38fe50feff7630270aadafb4bc5d5aff18b7146c5a88984?arch=ppc64le\u0026repository_url=registry.redhat.io/ocs4/mcg-core-rhel8\u0026tag=5.6.0-42.6a01c5fc0.5.6"
}
}
},
{
"category": "product_version",
"name": "ocs4/mcg-rhel8-operator@sha256:5b7be1d28659e6571e12cde63b10054722a921daeee90f0ed072ef0d38ea46e3_ppc64le",
"product": {
"name": "ocs4/mcg-rhel8-operator@sha256:5b7be1d28659e6571e12cde63b10054722a921daeee90f0ed072ef0d38ea46e3_ppc64le",
"product_id": "ocs4/mcg-rhel8-operator@sha256:5b7be1d28659e6571e12cde63b10054722a921daeee90f0ed072ef0d38ea46e3_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/mcg-rhel8-operator@sha256:5b7be1d28659e6571e12cde63b10054722a921daeee90f0ed072ef0d38ea46e3?arch=ppc64le\u0026repository_url=registry.redhat.io/ocs4/mcg-rhel8-operator\u0026tag=5.6.0-41.2279a46.5.6"
}
}
},
{
"category": "product_version",
"name": "ocs4/ocs-must-gather-rhel8@sha256:6d76e7acca55197ae9478ecffabf6271bf099b64335978d5e053493a40258653_ppc64le",
"product": {
"name": "ocs4/ocs-must-gather-rhel8@sha256:6d76e7acca55197ae9478ecffabf6271bf099b64335978d5e053493a40258653_ppc64le",
"product_id": "ocs4/ocs-must-gather-rhel8@sha256:6d76e7acca55197ae9478ecffabf6271bf099b64335978d5e053493a40258653_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/ocs-must-gather-rhel8@sha256:6d76e7acca55197ae9478ecffabf6271bf099b64335978d5e053493a40258653?arch=ppc64le\u0026repository_url=registry.redhat.io/ocs4/ocs-must-gather-rhel8\u0026tag=4.6-78.3b7455e4.release_4.6"
}
}
},
{
"category": "product_version",
"name": "ocs4/ocs-operator-bundle@sha256:d958ddd588a317feb59e9ad0844712c5ca722d625845a8ab4e4b561aed5c2025_ppc64le",
"product": {
"name": "ocs4/ocs-operator-bundle@sha256:d958ddd588a317feb59e9ad0844712c5ca722d625845a8ab4e4b561aed5c2025_ppc64le",
"product_id": "ocs4/ocs-operator-bundle@sha256:d958ddd588a317feb59e9ad0844712c5ca722d625845a8ab4e4b561aed5c2025_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/ocs-operator-bundle@sha256:d958ddd588a317feb59e9ad0844712c5ca722d625845a8ab4e4b561aed5c2025?arch=ppc64le\u0026repository_url=registry.redhat.io/ocs4/ocs-operator-bundle\u0026tag=4.6.2-1"
}
}
},
{
"category": "product_version",
"name": "ocs4/ocs-rhel8-operator@sha256:f43e06c9da12f5f70fef80afd5bcf32c03253786f51ffe766b350cce0a688449_ppc64le",
"product": {
"name": "ocs4/ocs-rhel8-operator@sha256:f43e06c9da12f5f70fef80afd5bcf32c03253786f51ffe766b350cce0a688449_ppc64le",
"product_id": "ocs4/ocs-rhel8-operator@sha256:f43e06c9da12f5f70fef80afd5bcf32c03253786f51ffe766b350cce0a688449_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/ocs-rhel8-operator@sha256:f43e06c9da12f5f70fef80afd5bcf32c03253786f51ffe766b350cce0a688449?arch=ppc64le\u0026repository_url=registry.redhat.io/ocs4/ocs-rhel8-operator\u0026tag=4.6-78.3b7455e4.release_4.6"
}
}
},
{
"category": "product_version",
"name": "ocs4/rook-ceph-rhel8-operator@sha256:fa5085edfb18f46ca9af7af8df02a9a81333c9f69d42cad2013602a862db63da_ppc64le",
"product": {
"name": "ocs4/rook-ceph-rhel8-operator@sha256:fa5085edfb18f46ca9af7af8df02a9a81333c9f69d42cad2013602a862db63da_ppc64le",
"product_id": "ocs4/rook-ceph-rhel8-operator@sha256:fa5085edfb18f46ca9af7af8df02a9a81333c9f69d42cad2013602a862db63da_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/rook-ceph-rhel8-operator@sha256:fa5085edfb18f46ca9af7af8df02a9a81333c9f69d42cad2013602a862db63da?arch=ppc64le\u0026repository_url=registry.redhat.io/ocs4/rook-ceph-rhel8-operator\u0026tag=4.6-82.8c7ed584.release_4.6"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "ocs4/cephcsi-rhel8@sha256:f068579dde9c75f151800205f97989a7e98dde289c9e57128c58ec3a47f6b287_s390x",
"product": {
"name": "ocs4/cephcsi-rhel8@sha256:f068579dde9c75f151800205f97989a7e98dde289c9e57128c58ec3a47f6b287_s390x",
"product_id": "ocs4/cephcsi-rhel8@sha256:f068579dde9c75f151800205f97989a7e98dde289c9e57128c58ec3a47f6b287_s390x",
"product_identification_helper": {
"purl": "pkg:oci/cephcsi-rhel8@sha256:f068579dde9c75f151800205f97989a7e98dde289c9e57128c58ec3a47f6b287?arch=s390x\u0026repository_url=registry.redhat.io/ocs4/cephcsi-rhel8\u0026tag=4.6-54.49cf5efdd.release_4.6"
}
}
},
{
"category": "product_version",
"name": "ocs4/mcg-core-rhel8@sha256:f9197232e37920e17504bf717211179508f6313a2dd95805a4f4db4beba7158d_s390x",
"product": {
"name": "ocs4/mcg-core-rhel8@sha256:f9197232e37920e17504bf717211179508f6313a2dd95805a4f4db4beba7158d_s390x",
"product_id": "ocs4/mcg-core-rhel8@sha256:f9197232e37920e17504bf717211179508f6313a2dd95805a4f4db4beba7158d_s390x",
"product_identification_helper": {
"purl": "pkg:oci/mcg-core-rhel8@sha256:f9197232e37920e17504bf717211179508f6313a2dd95805a4f4db4beba7158d?arch=s390x\u0026repository_url=registry.redhat.io/ocs4/mcg-core-rhel8\u0026tag=5.6.0-42.6a01c5fc0.5.6"
}
}
},
{
"category": "product_version",
"name": "ocs4/mcg-rhel8-operator@sha256:fd22666dd33d119eea7599c30aad0c95f8dc6340133d7f0767aa0afef26588ac_s390x",
"product": {
"name": "ocs4/mcg-rhel8-operator@sha256:fd22666dd33d119eea7599c30aad0c95f8dc6340133d7f0767aa0afef26588ac_s390x",
"product_id": "ocs4/mcg-rhel8-operator@sha256:fd22666dd33d119eea7599c30aad0c95f8dc6340133d7f0767aa0afef26588ac_s390x",
"product_identification_helper": {
"purl": "pkg:oci/mcg-rhel8-operator@sha256:fd22666dd33d119eea7599c30aad0c95f8dc6340133d7f0767aa0afef26588ac?arch=s390x\u0026repository_url=registry.redhat.io/ocs4/mcg-rhel8-operator\u0026tag=5.6.0-41.2279a46.5.6"
}
}
},
{
"category": "product_version",
"name": "ocs4/ocs-must-gather-rhel8@sha256:c834e0b34ee694236cb9afdea48831a4b0cf979298c455c0cbc39e30cc40a3e6_s390x",
"product": {
"name": "ocs4/ocs-must-gather-rhel8@sha256:c834e0b34ee694236cb9afdea48831a4b0cf979298c455c0cbc39e30cc40a3e6_s390x",
"product_id": "ocs4/ocs-must-gather-rhel8@sha256:c834e0b34ee694236cb9afdea48831a4b0cf979298c455c0cbc39e30cc40a3e6_s390x",
"product_identification_helper": {
"purl": "pkg:oci/ocs-must-gather-rhel8@sha256:c834e0b34ee694236cb9afdea48831a4b0cf979298c455c0cbc39e30cc40a3e6?arch=s390x\u0026repository_url=registry.redhat.io/ocs4/ocs-must-gather-rhel8\u0026tag=4.6-78.3b7455e4.release_4.6"
}
}
},
{
"category": "product_version",
"name": "ocs4/ocs-operator-bundle@sha256:5bbbd6ea419eb398988a164fe462a20f148cb9422da30014b21282114e57ffc8_s390x",
"product": {
"name": "ocs4/ocs-operator-bundle@sha256:5bbbd6ea419eb398988a164fe462a20f148cb9422da30014b21282114e57ffc8_s390x",
"product_id": "ocs4/ocs-operator-bundle@sha256:5bbbd6ea419eb398988a164fe462a20f148cb9422da30014b21282114e57ffc8_s390x",
"product_identification_helper": {
"purl": "pkg:oci/ocs-operator-bundle@sha256:5bbbd6ea419eb398988a164fe462a20f148cb9422da30014b21282114e57ffc8?arch=s390x\u0026repository_url=registry.redhat.io/ocs4/ocs-operator-bundle\u0026tag=4.6.2-1"
}
}
},
{
"category": "product_version",
"name": "ocs4/ocs-rhel8-operator@sha256:5a56e6d20aa56871173932af58cdf76bb4e6ccba76a494799f525c2ff515cd14_s390x",
"product": {
"name": "ocs4/ocs-rhel8-operator@sha256:5a56e6d20aa56871173932af58cdf76bb4e6ccba76a494799f525c2ff515cd14_s390x",
"product_id": "ocs4/ocs-rhel8-operator@sha256:5a56e6d20aa56871173932af58cdf76bb4e6ccba76a494799f525c2ff515cd14_s390x",
"product_identification_helper": {
"purl": "pkg:oci/ocs-rhel8-operator@sha256:5a56e6d20aa56871173932af58cdf76bb4e6ccba76a494799f525c2ff515cd14?arch=s390x\u0026repository_url=registry.redhat.io/ocs4/ocs-rhel8-operator\u0026tag=4.6-78.3b7455e4.release_4.6"
}
}
},
{
"category": "product_version",
"name": "ocs4/rook-ceph-rhel8-operator@sha256:da3992b47e7f15c471d7cf68933da800adb9f4f471173a5eb90902ce77fa54ff_s390x",
"product": {
"name": "ocs4/rook-ceph-rhel8-operator@sha256:da3992b47e7f15c471d7cf68933da800adb9f4f471173a5eb90902ce77fa54ff_s390x",
"product_id": "ocs4/rook-ceph-rhel8-operator@sha256:da3992b47e7f15c471d7cf68933da800adb9f4f471173a5eb90902ce77fa54ff_s390x",
"product_identification_helper": {
"purl": "pkg:oci/rook-ceph-rhel8-operator@sha256:da3992b47e7f15c471d7cf68933da800adb9f4f471173a5eb90902ce77fa54ff?arch=s390x\u0026repository_url=registry.redhat.io/ocs4/rook-ceph-rhel8-operator\u0026tag=4.6-82.8c7ed584.release_4.6"
}
}
}
],
"category": "architecture",
"name": "s390x"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "ocs4/cephcsi-rhel8@sha256:5e1a69df83ef96cb0a5411ab3af47c7d789251a89349dc1099735493cfc6a47a_ppc64le as a component of Red Hat OpenShift Container Storage 4.6 on RHEL-8",
"product_id": "8Base-RH-OCS-4.6:ocs4/cephcsi-rhel8@sha256:5e1a69df83ef96cb0a5411ab3af47c7d789251a89349dc1099735493cfc6a47a_ppc64le"
},
"product_reference": "ocs4/cephcsi-rhel8@sha256:5e1a69df83ef96cb0a5411ab3af47c7d789251a89349dc1099735493cfc6a47a_ppc64le",
"relates_to_product_reference": "8Base-RH-OCS-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocs4/cephcsi-rhel8@sha256:f068579dde9c75f151800205f97989a7e98dde289c9e57128c58ec3a47f6b287_s390x as a component of Red Hat OpenShift Container Storage 4.6 on RHEL-8",
"product_id": "8Base-RH-OCS-4.6:ocs4/cephcsi-rhel8@sha256:f068579dde9c75f151800205f97989a7e98dde289c9e57128c58ec3a47f6b287_s390x"
},
"product_reference": "ocs4/cephcsi-rhel8@sha256:f068579dde9c75f151800205f97989a7e98dde289c9e57128c58ec3a47f6b287_s390x",
"relates_to_product_reference": "8Base-RH-OCS-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocs4/cephcsi-rhel8@sha256:f3bc48b18857c970f068ed51915e7fc2a06c6dd14ee0ab08ff4a4733f33a7569_amd64 as a component of Red Hat OpenShift Container Storage 4.6 on RHEL-8",
"product_id": "8Base-RH-OCS-4.6:ocs4/cephcsi-rhel8@sha256:f3bc48b18857c970f068ed51915e7fc2a06c6dd14ee0ab08ff4a4733f33a7569_amd64"
},
"product_reference": "ocs4/cephcsi-rhel8@sha256:f3bc48b18857c970f068ed51915e7fc2a06c6dd14ee0ab08ff4a4733f33a7569_amd64",
"relates_to_product_reference": "8Base-RH-OCS-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocs4/mcg-core-rhel8@sha256:37c6626cfd258b05b38fe50feff7630270aadafb4bc5d5aff18b7146c5a88984_ppc64le as a component of Red Hat OpenShift Container Storage 4.6 on RHEL-8",
"product_id": "8Base-RH-OCS-4.6:ocs4/mcg-core-rhel8@sha256:37c6626cfd258b05b38fe50feff7630270aadafb4bc5d5aff18b7146c5a88984_ppc64le"
},
"product_reference": "ocs4/mcg-core-rhel8@sha256:37c6626cfd258b05b38fe50feff7630270aadafb4bc5d5aff18b7146c5a88984_ppc64le",
"relates_to_product_reference": "8Base-RH-OCS-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocs4/mcg-core-rhel8@sha256:9c59d208e722581c4a594e0bf32d25f52325fde15cd479c83f04b024119b3067_amd64 as a component of Red Hat OpenShift Container Storage 4.6 on RHEL-8",
"product_id": "8Base-RH-OCS-4.6:ocs4/mcg-core-rhel8@sha256:9c59d208e722581c4a594e0bf32d25f52325fde15cd479c83f04b024119b3067_amd64"
},
"product_reference": "ocs4/mcg-core-rhel8@sha256:9c59d208e722581c4a594e0bf32d25f52325fde15cd479c83f04b024119b3067_amd64",
"relates_to_product_reference": "8Base-RH-OCS-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocs4/mcg-core-rhel8@sha256:f9197232e37920e17504bf717211179508f6313a2dd95805a4f4db4beba7158d_s390x as a component of Red Hat OpenShift Container Storage 4.6 on RHEL-8",
"product_id": "8Base-RH-OCS-4.6:ocs4/mcg-core-rhel8@sha256:f9197232e37920e17504bf717211179508f6313a2dd95805a4f4db4beba7158d_s390x"
},
"product_reference": "ocs4/mcg-core-rhel8@sha256:f9197232e37920e17504bf717211179508f6313a2dd95805a4f4db4beba7158d_s390x",
"relates_to_product_reference": "8Base-RH-OCS-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocs4/mcg-rhel8-operator@sha256:5b7be1d28659e6571e12cde63b10054722a921daeee90f0ed072ef0d38ea46e3_ppc64le as a component of Red Hat OpenShift Container Storage 4.6 on RHEL-8",
"product_id": "8Base-RH-OCS-4.6:ocs4/mcg-rhel8-operator@sha256:5b7be1d28659e6571e12cde63b10054722a921daeee90f0ed072ef0d38ea46e3_ppc64le"
},
"product_reference": "ocs4/mcg-rhel8-operator@sha256:5b7be1d28659e6571e12cde63b10054722a921daeee90f0ed072ef0d38ea46e3_ppc64le",
"relates_to_product_reference": "8Base-RH-OCS-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocs4/mcg-rhel8-operator@sha256:6a81efd4146ac1750c4cbcbd3480baa30081b84d2b02ac0026e6c52277635848_amd64 as a component of Red Hat OpenShift Container Storage 4.6 on RHEL-8",
"product_id": "8Base-RH-OCS-4.6:ocs4/mcg-rhel8-operator@sha256:6a81efd4146ac1750c4cbcbd3480baa30081b84d2b02ac0026e6c52277635848_amd64"
},
"product_reference": "ocs4/mcg-rhel8-operator@sha256:6a81efd4146ac1750c4cbcbd3480baa30081b84d2b02ac0026e6c52277635848_amd64",
"relates_to_product_reference": "8Base-RH-OCS-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocs4/mcg-rhel8-operator@sha256:fd22666dd33d119eea7599c30aad0c95f8dc6340133d7f0767aa0afef26588ac_s390x as a component of Red Hat OpenShift Container Storage 4.6 on RHEL-8",
"product_id": "8Base-RH-OCS-4.6:ocs4/mcg-rhel8-operator@sha256:fd22666dd33d119eea7599c30aad0c95f8dc6340133d7f0767aa0afef26588ac_s390x"
},
"product_reference": "ocs4/mcg-rhel8-operator@sha256:fd22666dd33d119eea7599c30aad0c95f8dc6340133d7f0767aa0afef26588ac_s390x",
"relates_to_product_reference": "8Base-RH-OCS-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocs4/ocs-must-gather-rhel8@sha256:6d76e7acca55197ae9478ecffabf6271bf099b64335978d5e053493a40258653_ppc64le as a component of Red Hat OpenShift Container Storage 4.6 on RHEL-8",
"product_id": "8Base-RH-OCS-4.6:ocs4/ocs-must-gather-rhel8@sha256:6d76e7acca55197ae9478ecffabf6271bf099b64335978d5e053493a40258653_ppc64le"
},
"product_reference": "ocs4/ocs-must-gather-rhel8@sha256:6d76e7acca55197ae9478ecffabf6271bf099b64335978d5e053493a40258653_ppc64le",
"relates_to_product_reference": "8Base-RH-OCS-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocs4/ocs-must-gather-rhel8@sha256:b3e2cbb55f8cfa82480b70e73576ed049cb4e9de984c46f247896951a1746184_amd64 as a component of Red Hat OpenShift Container Storage 4.6 on RHEL-8",
"product_id": "8Base-RH-OCS-4.6:ocs4/ocs-must-gather-rhel8@sha256:b3e2cbb55f8cfa82480b70e73576ed049cb4e9de984c46f247896951a1746184_amd64"
},
"product_reference": "ocs4/ocs-must-gather-rhel8@sha256:b3e2cbb55f8cfa82480b70e73576ed049cb4e9de984c46f247896951a1746184_amd64",
"relates_to_product_reference": "8Base-RH-OCS-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocs4/ocs-must-gather-rhel8@sha256:c834e0b34ee694236cb9afdea48831a4b0cf979298c455c0cbc39e30cc40a3e6_s390x as a component of Red Hat OpenShift Container Storage 4.6 on RHEL-8",
"product_id": "8Base-RH-OCS-4.6:ocs4/ocs-must-gather-rhel8@sha256:c834e0b34ee694236cb9afdea48831a4b0cf979298c455c0cbc39e30cc40a3e6_s390x"
},
"product_reference": "ocs4/ocs-must-gather-rhel8@sha256:c834e0b34ee694236cb9afdea48831a4b0cf979298c455c0cbc39e30cc40a3e6_s390x",
"relates_to_product_reference": "8Base-RH-OCS-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocs4/ocs-operator-bundle@sha256:5bbbd6ea419eb398988a164fe462a20f148cb9422da30014b21282114e57ffc8_s390x as a component of Red Hat OpenShift Container Storage 4.6 on RHEL-8",
"product_id": "8Base-RH-OCS-4.6:ocs4/ocs-operator-bundle@sha256:5bbbd6ea419eb398988a164fe462a20f148cb9422da30014b21282114e57ffc8_s390x"
},
"product_reference": "ocs4/ocs-operator-bundle@sha256:5bbbd6ea419eb398988a164fe462a20f148cb9422da30014b21282114e57ffc8_s390x",
"relates_to_product_reference": "8Base-RH-OCS-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocs4/ocs-operator-bundle@sha256:8ec70c3cd08470cbd88c179a8fc660a64550eed19f48594c8b808bf2c2062720_amd64 as a component of Red Hat OpenShift Container Storage 4.6 on RHEL-8",
"product_id": "8Base-RH-OCS-4.6:ocs4/ocs-operator-bundle@sha256:8ec70c3cd08470cbd88c179a8fc660a64550eed19f48594c8b808bf2c2062720_amd64"
},
"product_reference": "ocs4/ocs-operator-bundle@sha256:8ec70c3cd08470cbd88c179a8fc660a64550eed19f48594c8b808bf2c2062720_amd64",
"relates_to_product_reference": "8Base-RH-OCS-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocs4/ocs-operator-bundle@sha256:d958ddd588a317feb59e9ad0844712c5ca722d625845a8ab4e4b561aed5c2025_ppc64le as a component of Red Hat OpenShift Container Storage 4.6 on RHEL-8",
"product_id": "8Base-RH-OCS-4.6:ocs4/ocs-operator-bundle@sha256:d958ddd588a317feb59e9ad0844712c5ca722d625845a8ab4e4b561aed5c2025_ppc64le"
},
"product_reference": "ocs4/ocs-operator-bundle@sha256:d958ddd588a317feb59e9ad0844712c5ca722d625845a8ab4e4b561aed5c2025_ppc64le",
"relates_to_product_reference": "8Base-RH-OCS-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocs4/ocs-rhel8-operator@sha256:5a56e6d20aa56871173932af58cdf76bb4e6ccba76a494799f525c2ff515cd14_s390x as a component of Red Hat OpenShift Container Storage 4.6 on RHEL-8",
"product_id": "8Base-RH-OCS-4.6:ocs4/ocs-rhel8-operator@sha256:5a56e6d20aa56871173932af58cdf76bb4e6ccba76a494799f525c2ff515cd14_s390x"
},
"product_reference": "ocs4/ocs-rhel8-operator@sha256:5a56e6d20aa56871173932af58cdf76bb4e6ccba76a494799f525c2ff515cd14_s390x",
"relates_to_product_reference": "8Base-RH-OCS-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocs4/ocs-rhel8-operator@sha256:e9e688290c1f7fb4fd5870cd2656f7bf6484404e7151e918dfe37907fadb5125_amd64 as a component of Red Hat OpenShift Container Storage 4.6 on RHEL-8",
"product_id": "8Base-RH-OCS-4.6:ocs4/ocs-rhel8-operator@sha256:e9e688290c1f7fb4fd5870cd2656f7bf6484404e7151e918dfe37907fadb5125_amd64"
},
"product_reference": "ocs4/ocs-rhel8-operator@sha256:e9e688290c1f7fb4fd5870cd2656f7bf6484404e7151e918dfe37907fadb5125_amd64",
"relates_to_product_reference": "8Base-RH-OCS-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocs4/ocs-rhel8-operator@sha256:f43e06c9da12f5f70fef80afd5bcf32c03253786f51ffe766b350cce0a688449_ppc64le as a component of Red Hat OpenShift Container Storage 4.6 on RHEL-8",
"product_id": "8Base-RH-OCS-4.6:ocs4/ocs-rhel8-operator@sha256:f43e06c9da12f5f70fef80afd5bcf32c03253786f51ffe766b350cce0a688449_ppc64le"
},
"product_reference": "ocs4/ocs-rhel8-operator@sha256:f43e06c9da12f5f70fef80afd5bcf32c03253786f51ffe766b350cce0a688449_ppc64le",
"relates_to_product_reference": "8Base-RH-OCS-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocs4/rook-ceph-rhel8-operator@sha256:3a00a3b22be44d8802c386bd6a93eda6df48d98e8b90ea0df913a9f4327b3e94_amd64 as a component of Red Hat OpenShift Container Storage 4.6 on RHEL-8",
"product_id": "8Base-RH-OCS-4.6:ocs4/rook-ceph-rhel8-operator@sha256:3a00a3b22be44d8802c386bd6a93eda6df48d98e8b90ea0df913a9f4327b3e94_amd64"
},
"product_reference": "ocs4/rook-ceph-rhel8-operator@sha256:3a00a3b22be44d8802c386bd6a93eda6df48d98e8b90ea0df913a9f4327b3e94_amd64",
"relates_to_product_reference": "8Base-RH-OCS-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocs4/rook-ceph-rhel8-operator@sha256:da3992b47e7f15c471d7cf68933da800adb9f4f471173a5eb90902ce77fa54ff_s390x as a component of Red Hat OpenShift Container Storage 4.6 on RHEL-8",
"product_id": "8Base-RH-OCS-4.6:ocs4/rook-ceph-rhel8-operator@sha256:da3992b47e7f15c471d7cf68933da800adb9f4f471173a5eb90902ce77fa54ff_s390x"
},
"product_reference": "ocs4/rook-ceph-rhel8-operator@sha256:da3992b47e7f15c471d7cf68933da800adb9f4f471173a5eb90902ce77fa54ff_s390x",
"relates_to_product_reference": "8Base-RH-OCS-4.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocs4/rook-ceph-rhel8-operator@sha256:fa5085edfb18f46ca9af7af8df02a9a81333c9f69d42cad2013602a862db63da_ppc64le as a component of Red Hat OpenShift Container Storage 4.6 on RHEL-8",
"product_id": "8Base-RH-OCS-4.6:ocs4/rook-ceph-rhel8-operator@sha256:fa5085edfb18f46ca9af7af8df02a9a81333c9f69d42cad2013602a862db63da_ppc64le"
},
"product_reference": "ocs4/rook-ceph-rhel8-operator@sha256:fa5085edfb18f46ca9af7af8df02a9a81333c9f69d42cad2013602a862db63da_ppc64le",
"relates_to_product_reference": "8Base-RH-OCS-4.6"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"Ilya Dryomov"
],
"organization": "Red Hat",
"summary": "This issue was discovered by Red Hat."
}
],
"cve": "CVE-2020-25660",
"cwe": {
"id": "CWE-294",
"name": "Authentication Bypass by Capture-replay"
},
"discovery_date": "2020-10-21T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1890354"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Cephx authentication protocol, where it does not verify Ceph clients correctly and is then vulnerable to replay attacks in Nautilus. This flaw allows an attacker with access to the Ceph cluster network to authenticate with the Ceph service via a packet sniffer and perform actions allowed by the Ceph service. This issue is a reintroduction of CVE-2018-1128, affecting the msgr2 protocol. The msgr 2 protocol is used for all communication except older clients that do not support the msgr2 protocol. The msgr1 protocol is not affected. The highest threat from this vulnerability is to confidentiality, integrity, and system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "ceph: CEPHX_V2 replay attack protection lost",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat Ceph Storage 3 has already had a fix shipped for this particular flaw. RHCS 4.1 is shipped with CVE-2018-1128 vulnerability reintroduced, affecting msgr 2 protocol.\n\nRed Hat OpenShift Container Storage (RHOCS) 4 shipped ceph package for the usage of RHOCS 4.2 only, that has reached End Of Life. Hence, ceph package is no longer used and supported with the release of RHOCS 4.3.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-RH-OCS-4.6:ocs4/cephcsi-rhel8@sha256:5e1a69df83ef96cb0a5411ab3af47c7d789251a89349dc1099735493cfc6a47a_ppc64le",
"8Base-RH-OCS-4.6:ocs4/cephcsi-rhel8@sha256:f068579dde9c75f151800205f97989a7e98dde289c9e57128c58ec3a47f6b287_s390x",
"8Base-RH-OCS-4.6:ocs4/cephcsi-rhel8@sha256:f3bc48b18857c970f068ed51915e7fc2a06c6dd14ee0ab08ff4a4733f33a7569_amd64",
"8Base-RH-OCS-4.6:ocs4/mcg-core-rhel8@sha256:37c6626cfd258b05b38fe50feff7630270aadafb4bc5d5aff18b7146c5a88984_ppc64le",
"8Base-RH-OCS-4.6:ocs4/mcg-core-rhel8@sha256:9c59d208e722581c4a594e0bf32d25f52325fde15cd479c83f04b024119b3067_amd64",
"8Base-RH-OCS-4.6:ocs4/mcg-core-rhel8@sha256:f9197232e37920e17504bf717211179508f6313a2dd95805a4f4db4beba7158d_s390x",
"8Base-RH-OCS-4.6:ocs4/mcg-rhel8-operator@sha256:5b7be1d28659e6571e12cde63b10054722a921daeee90f0ed072ef0d38ea46e3_ppc64le",
"8Base-RH-OCS-4.6:ocs4/mcg-rhel8-operator@sha256:6a81efd4146ac1750c4cbcbd3480baa30081b84d2b02ac0026e6c52277635848_amd64",
"8Base-RH-OCS-4.6:ocs4/mcg-rhel8-operator@sha256:fd22666dd33d119eea7599c30aad0c95f8dc6340133d7f0767aa0afef26588ac_s390x",
"8Base-RH-OCS-4.6:ocs4/ocs-must-gather-rhel8@sha256:6d76e7acca55197ae9478ecffabf6271bf099b64335978d5e053493a40258653_ppc64le",
"8Base-RH-OCS-4.6:ocs4/ocs-must-gather-rhel8@sha256:b3e2cbb55f8cfa82480b70e73576ed049cb4e9de984c46f247896951a1746184_amd64",
"8Base-RH-OCS-4.6:ocs4/ocs-must-gather-rhel8@sha256:c834e0b34ee694236cb9afdea48831a4b0cf979298c455c0cbc39e30cc40a3e6_s390x",
"8Base-RH-OCS-4.6:ocs4/ocs-operator-bundle@sha256:5bbbd6ea419eb398988a164fe462a20f148cb9422da30014b21282114e57ffc8_s390x",
"8Base-RH-OCS-4.6:ocs4/ocs-operator-bundle@sha256:8ec70c3cd08470cbd88c179a8fc660a64550eed19f48594c8b808bf2c2062720_amd64",
"8Base-RH-OCS-4.6:ocs4/ocs-operator-bundle@sha256:d958ddd588a317feb59e9ad0844712c5ca722d625845a8ab4e4b561aed5c2025_ppc64le",
"8Base-RH-OCS-4.6:ocs4/ocs-rhel8-operator@sha256:5a56e6d20aa56871173932af58cdf76bb4e6ccba76a494799f525c2ff515cd14_s390x",
"8Base-RH-OCS-4.6:ocs4/ocs-rhel8-operator@sha256:e9e688290c1f7fb4fd5870cd2656f7bf6484404e7151e918dfe37907fadb5125_amd64",
"8Base-RH-OCS-4.6:ocs4/ocs-rhel8-operator@sha256:f43e06c9da12f5f70fef80afd5bcf32c03253786f51ffe766b350cce0a688449_ppc64le",
"8Base-RH-OCS-4.6:ocs4/rook-ceph-rhel8-operator@sha256:3a00a3b22be44d8802c386bd6a93eda6df48d98e8b90ea0df913a9f4327b3e94_amd64",
"8Base-RH-OCS-4.6:ocs4/rook-ceph-rhel8-operator@sha256:da3992b47e7f15c471d7cf68933da800adb9f4f471173a5eb90902ce77fa54ff_s390x",
"8Base-RH-OCS-4.6:ocs4/rook-ceph-rhel8-operator@sha256:fa5085edfb18f46ca9af7af8df02a9a81333c9f69d42cad2013602a862db63da_ppc64le"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-25660"
},
{
"category": "external",
"summary": "RHBZ#1890354",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1890354"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-25660",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-25660"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-25660",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-25660"
},
{
"category": "external",
"summary": "https://ceph.io/community/v15-2-6-octopus-released/",
"url": "https://ceph.io/community/v15-2-6-octopus-released/"
},
{
"category": "external",
"summary": "https://ceph.io/releases/v14-2-14-nautilus-released/",
"url": "https://ceph.io/releases/v14-2-14-nautilus-released/"
}
],
"release_date": "2020-11-17T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-02-01T13:17:36+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"8Base-RH-OCS-4.6:ocs4/cephcsi-rhel8@sha256:5e1a69df83ef96cb0a5411ab3af47c7d789251a89349dc1099735493cfc6a47a_ppc64le",
"8Base-RH-OCS-4.6:ocs4/cephcsi-rhel8@sha256:f068579dde9c75f151800205f97989a7e98dde289c9e57128c58ec3a47f6b287_s390x",
"8Base-RH-OCS-4.6:ocs4/cephcsi-rhel8@sha256:f3bc48b18857c970f068ed51915e7fc2a06c6dd14ee0ab08ff4a4733f33a7569_amd64",
"8Base-RH-OCS-4.6:ocs4/mcg-core-rhel8@sha256:37c6626cfd258b05b38fe50feff7630270aadafb4bc5d5aff18b7146c5a88984_ppc64le",
"8Base-RH-OCS-4.6:ocs4/mcg-core-rhel8@sha256:9c59d208e722581c4a594e0bf32d25f52325fde15cd479c83f04b024119b3067_amd64",
"8Base-RH-OCS-4.6:ocs4/mcg-core-rhel8@sha256:f9197232e37920e17504bf717211179508f6313a2dd95805a4f4db4beba7158d_s390x",
"8Base-RH-OCS-4.6:ocs4/mcg-rhel8-operator@sha256:5b7be1d28659e6571e12cde63b10054722a921daeee90f0ed072ef0d38ea46e3_ppc64le",
"8Base-RH-OCS-4.6:ocs4/mcg-rhel8-operator@sha256:6a81efd4146ac1750c4cbcbd3480baa30081b84d2b02ac0026e6c52277635848_amd64",
"8Base-RH-OCS-4.6:ocs4/mcg-rhel8-operator@sha256:fd22666dd33d119eea7599c30aad0c95f8dc6340133d7f0767aa0afef26588ac_s390x",
"8Base-RH-OCS-4.6:ocs4/ocs-must-gather-rhel8@sha256:6d76e7acca55197ae9478ecffabf6271bf099b64335978d5e053493a40258653_ppc64le",
"8Base-RH-OCS-4.6:ocs4/ocs-must-gather-rhel8@sha256:b3e2cbb55f8cfa82480b70e73576ed049cb4e9de984c46f247896951a1746184_amd64",
"8Base-RH-OCS-4.6:ocs4/ocs-must-gather-rhel8@sha256:c834e0b34ee694236cb9afdea48831a4b0cf979298c455c0cbc39e30cc40a3e6_s390x",
"8Base-RH-OCS-4.6:ocs4/ocs-operator-bundle@sha256:5bbbd6ea419eb398988a164fe462a20f148cb9422da30014b21282114e57ffc8_s390x",
"8Base-RH-OCS-4.6:ocs4/ocs-operator-bundle@sha256:8ec70c3cd08470cbd88c179a8fc660a64550eed19f48594c8b808bf2c2062720_amd64",
"8Base-RH-OCS-4.6:ocs4/ocs-operator-bundle@sha256:d958ddd588a317feb59e9ad0844712c5ca722d625845a8ab4e4b561aed5c2025_ppc64le",
"8Base-RH-OCS-4.6:ocs4/ocs-rhel8-operator@sha256:5a56e6d20aa56871173932af58cdf76bb4e6ccba76a494799f525c2ff515cd14_s390x",
"8Base-RH-OCS-4.6:ocs4/ocs-rhel8-operator@sha256:e9e688290c1f7fb4fd5870cd2656f7bf6484404e7151e918dfe37907fadb5125_amd64",
"8Base-RH-OCS-4.6:ocs4/ocs-rhel8-operator@sha256:f43e06c9da12f5f70fef80afd5bcf32c03253786f51ffe766b350cce0a688449_ppc64le",
"8Base-RH-OCS-4.6:ocs4/rook-ceph-rhel8-operator@sha256:3a00a3b22be44d8802c386bd6a93eda6df48d98e8b90ea0df913a9f4327b3e94_amd64",
"8Base-RH-OCS-4.6:ocs4/rook-ceph-rhel8-operator@sha256:da3992b47e7f15c471d7cf68933da800adb9f4f471173a5eb90902ce77fa54ff_s390x",
"8Base-RH-OCS-4.6:ocs4/rook-ceph-rhel8-operator@sha256:fa5085edfb18f46ca9af7af8df02a9a81333c9f69d42cad2013602a862db63da_ppc64le"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHBA-2021:0305"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "ADJACENT_NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"8Base-RH-OCS-4.6:ocs4/cephcsi-rhel8@sha256:5e1a69df83ef96cb0a5411ab3af47c7d789251a89349dc1099735493cfc6a47a_ppc64le",
"8Base-RH-OCS-4.6:ocs4/cephcsi-rhel8@sha256:f068579dde9c75f151800205f97989a7e98dde289c9e57128c58ec3a47f6b287_s390x",
"8Base-RH-OCS-4.6:ocs4/cephcsi-rhel8@sha256:f3bc48b18857c970f068ed51915e7fc2a06c6dd14ee0ab08ff4a4733f33a7569_amd64",
"8Base-RH-OCS-4.6:ocs4/mcg-core-rhel8@sha256:37c6626cfd258b05b38fe50feff7630270aadafb4bc5d5aff18b7146c5a88984_ppc64le",
"8Base-RH-OCS-4.6:ocs4/mcg-core-rhel8@sha256:9c59d208e722581c4a594e0bf32d25f52325fde15cd479c83f04b024119b3067_amd64",
"8Base-RH-OCS-4.6:ocs4/mcg-core-rhel8@sha256:f9197232e37920e17504bf717211179508f6313a2dd95805a4f4db4beba7158d_s390x",
"8Base-RH-OCS-4.6:ocs4/mcg-rhel8-operator@sha256:5b7be1d28659e6571e12cde63b10054722a921daeee90f0ed072ef0d38ea46e3_ppc64le",
"8Base-RH-OCS-4.6:ocs4/mcg-rhel8-operator@sha256:6a81efd4146ac1750c4cbcbd3480baa30081b84d2b02ac0026e6c52277635848_amd64",
"8Base-RH-OCS-4.6:ocs4/mcg-rhel8-operator@sha256:fd22666dd33d119eea7599c30aad0c95f8dc6340133d7f0767aa0afef26588ac_s390x",
"8Base-RH-OCS-4.6:ocs4/ocs-must-gather-rhel8@sha256:6d76e7acca55197ae9478ecffabf6271bf099b64335978d5e053493a40258653_ppc64le",
"8Base-RH-OCS-4.6:ocs4/ocs-must-gather-rhel8@sha256:b3e2cbb55f8cfa82480b70e73576ed049cb4e9de984c46f247896951a1746184_amd64",
"8Base-RH-OCS-4.6:ocs4/ocs-must-gather-rhel8@sha256:c834e0b34ee694236cb9afdea48831a4b0cf979298c455c0cbc39e30cc40a3e6_s390x",
"8Base-RH-OCS-4.6:ocs4/ocs-operator-bundle@sha256:5bbbd6ea419eb398988a164fe462a20f148cb9422da30014b21282114e57ffc8_s390x",
"8Base-RH-OCS-4.6:ocs4/ocs-operator-bundle@sha256:8ec70c3cd08470cbd88c179a8fc660a64550eed19f48594c8b808bf2c2062720_amd64",
"8Base-RH-OCS-4.6:ocs4/ocs-operator-bundle@sha256:d958ddd588a317feb59e9ad0844712c5ca722d625845a8ab4e4b561aed5c2025_ppc64le",
"8Base-RH-OCS-4.6:ocs4/ocs-rhel8-operator@sha256:5a56e6d20aa56871173932af58cdf76bb4e6ccba76a494799f525c2ff515cd14_s390x",
"8Base-RH-OCS-4.6:ocs4/ocs-rhel8-operator@sha256:e9e688290c1f7fb4fd5870cd2656f7bf6484404e7151e918dfe37907fadb5125_amd64",
"8Base-RH-OCS-4.6:ocs4/ocs-rhel8-operator@sha256:f43e06c9da12f5f70fef80afd5bcf32c03253786f51ffe766b350cce0a688449_ppc64le",
"8Base-RH-OCS-4.6:ocs4/rook-ceph-rhel8-operator@sha256:3a00a3b22be44d8802c386bd6a93eda6df48d98e8b90ea0df913a9f4327b3e94_amd64",
"8Base-RH-OCS-4.6:ocs4/rook-ceph-rhel8-operator@sha256:da3992b47e7f15c471d7cf68933da800adb9f4f471173a5eb90902ce77fa54ff_s390x",
"8Base-RH-OCS-4.6:ocs4/rook-ceph-rhel8-operator@sha256:fa5085edfb18f46ca9af7af8df02a9a81333c9f69d42cad2013602a862db63da_ppc64le"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "ceph: CEPHX_V2 replay attack protection lost"
},
{
"cve": "CVE-2020-25677",
"cwe": {
"id": "CWE-312",
"name": "Cleartext Storage of Sensitive Information"
},
"discovery_date": "2020-10-21T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1892108"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in Ceph-ansible where it creates an /etc/ceph/iscsi-gateway.conf with insecure default permissions. This flaw allows any user on the system to read sensitive information within this file. The highest threat from this vulnerability is to confidentiality.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "ceph-ansible: insecure ownership on /etc/ceph/iscsi-gateway.conf configuration file",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat OpenStack Platform 13 ships the flawed code, however RHOSP does not deploy ceph-iscsi-gw role in any supported scenario. For this reason, a ceph-ansible update will not be provided at this time.\n\nRed Hat Ceph Storage 3 and 4 create /etc/ceph/iscsi-gateway.conf with the insecure permissions.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-RH-OCS-4.6:ocs4/cephcsi-rhel8@sha256:5e1a69df83ef96cb0a5411ab3af47c7d789251a89349dc1099735493cfc6a47a_ppc64le",
"8Base-RH-OCS-4.6:ocs4/cephcsi-rhel8@sha256:f068579dde9c75f151800205f97989a7e98dde289c9e57128c58ec3a47f6b287_s390x",
"8Base-RH-OCS-4.6:ocs4/cephcsi-rhel8@sha256:f3bc48b18857c970f068ed51915e7fc2a06c6dd14ee0ab08ff4a4733f33a7569_amd64",
"8Base-RH-OCS-4.6:ocs4/mcg-core-rhel8@sha256:37c6626cfd258b05b38fe50feff7630270aadafb4bc5d5aff18b7146c5a88984_ppc64le",
"8Base-RH-OCS-4.6:ocs4/mcg-core-rhel8@sha256:9c59d208e722581c4a594e0bf32d25f52325fde15cd479c83f04b024119b3067_amd64",
"8Base-RH-OCS-4.6:ocs4/mcg-core-rhel8@sha256:f9197232e37920e17504bf717211179508f6313a2dd95805a4f4db4beba7158d_s390x",
"8Base-RH-OCS-4.6:ocs4/mcg-rhel8-operator@sha256:5b7be1d28659e6571e12cde63b10054722a921daeee90f0ed072ef0d38ea46e3_ppc64le",
"8Base-RH-OCS-4.6:ocs4/mcg-rhel8-operator@sha256:6a81efd4146ac1750c4cbcbd3480baa30081b84d2b02ac0026e6c52277635848_amd64",
"8Base-RH-OCS-4.6:ocs4/mcg-rhel8-operator@sha256:fd22666dd33d119eea7599c30aad0c95f8dc6340133d7f0767aa0afef26588ac_s390x",
"8Base-RH-OCS-4.6:ocs4/ocs-must-gather-rhel8@sha256:6d76e7acca55197ae9478ecffabf6271bf099b64335978d5e053493a40258653_ppc64le",
"8Base-RH-OCS-4.6:ocs4/ocs-must-gather-rhel8@sha256:b3e2cbb55f8cfa82480b70e73576ed049cb4e9de984c46f247896951a1746184_amd64",
"8Base-RH-OCS-4.6:ocs4/ocs-must-gather-rhel8@sha256:c834e0b34ee694236cb9afdea48831a4b0cf979298c455c0cbc39e30cc40a3e6_s390x",
"8Base-RH-OCS-4.6:ocs4/ocs-operator-bundle@sha256:5bbbd6ea419eb398988a164fe462a20f148cb9422da30014b21282114e57ffc8_s390x",
"8Base-RH-OCS-4.6:ocs4/ocs-operator-bundle@sha256:8ec70c3cd08470cbd88c179a8fc660a64550eed19f48594c8b808bf2c2062720_amd64",
"8Base-RH-OCS-4.6:ocs4/ocs-operator-bundle@sha256:d958ddd588a317feb59e9ad0844712c5ca722d625845a8ab4e4b561aed5c2025_ppc64le",
"8Base-RH-OCS-4.6:ocs4/ocs-rhel8-operator@sha256:5a56e6d20aa56871173932af58cdf76bb4e6ccba76a494799f525c2ff515cd14_s390x",
"8Base-RH-OCS-4.6:ocs4/ocs-rhel8-operator@sha256:e9e688290c1f7fb4fd5870cd2656f7bf6484404e7151e918dfe37907fadb5125_amd64",
"8Base-RH-OCS-4.6:ocs4/ocs-rhel8-operator@sha256:f43e06c9da12f5f70fef80afd5bcf32c03253786f51ffe766b350cce0a688449_ppc64le",
"8Base-RH-OCS-4.6:ocs4/rook-ceph-rhel8-operator@sha256:3a00a3b22be44d8802c386bd6a93eda6df48d98e8b90ea0df913a9f4327b3e94_amd64",
"8Base-RH-OCS-4.6:ocs4/rook-ceph-rhel8-operator@sha256:da3992b47e7f15c471d7cf68933da800adb9f4f471173a5eb90902ce77fa54ff_s390x",
"8Base-RH-OCS-4.6:ocs4/rook-ceph-rhel8-operator@sha256:fa5085edfb18f46ca9af7af8df02a9a81333c9f69d42cad2013602a862db63da_ppc64le"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-25677"
},
{
"category": "external",
"summary": "RHBZ#1892108",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1892108"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-25677",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-25677"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-25677",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-25677"
}
],
"release_date": "2020-11-23T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-02-01T13:17:36+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"8Base-RH-OCS-4.6:ocs4/cephcsi-rhel8@sha256:5e1a69df83ef96cb0a5411ab3af47c7d789251a89349dc1099735493cfc6a47a_ppc64le",
"8Base-RH-OCS-4.6:ocs4/cephcsi-rhel8@sha256:f068579dde9c75f151800205f97989a7e98dde289c9e57128c58ec3a47f6b287_s390x",
"8Base-RH-OCS-4.6:ocs4/cephcsi-rhel8@sha256:f3bc48b18857c970f068ed51915e7fc2a06c6dd14ee0ab08ff4a4733f33a7569_amd64",
"8Base-RH-OCS-4.6:ocs4/mcg-core-rhel8@sha256:37c6626cfd258b05b38fe50feff7630270aadafb4bc5d5aff18b7146c5a88984_ppc64le",
"8Base-RH-OCS-4.6:ocs4/mcg-core-rhel8@sha256:9c59d208e722581c4a594e0bf32d25f52325fde15cd479c83f04b024119b3067_amd64",
"8Base-RH-OCS-4.6:ocs4/mcg-core-rhel8@sha256:f9197232e37920e17504bf717211179508f6313a2dd95805a4f4db4beba7158d_s390x",
"8Base-RH-OCS-4.6:ocs4/mcg-rhel8-operator@sha256:5b7be1d28659e6571e12cde63b10054722a921daeee90f0ed072ef0d38ea46e3_ppc64le",
"8Base-RH-OCS-4.6:ocs4/mcg-rhel8-operator@sha256:6a81efd4146ac1750c4cbcbd3480baa30081b84d2b02ac0026e6c52277635848_amd64",
"8Base-RH-OCS-4.6:ocs4/mcg-rhel8-operator@sha256:fd22666dd33d119eea7599c30aad0c95f8dc6340133d7f0767aa0afef26588ac_s390x",
"8Base-RH-OCS-4.6:ocs4/ocs-must-gather-rhel8@sha256:6d76e7acca55197ae9478ecffabf6271bf099b64335978d5e053493a40258653_ppc64le",
"8Base-RH-OCS-4.6:ocs4/ocs-must-gather-rhel8@sha256:b3e2cbb55f8cfa82480b70e73576ed049cb4e9de984c46f247896951a1746184_amd64",
"8Base-RH-OCS-4.6:ocs4/ocs-must-gather-rhel8@sha256:c834e0b34ee694236cb9afdea48831a4b0cf979298c455c0cbc39e30cc40a3e6_s390x",
"8Base-RH-OCS-4.6:ocs4/ocs-operator-bundle@sha256:5bbbd6ea419eb398988a164fe462a20f148cb9422da30014b21282114e57ffc8_s390x",
"8Base-RH-OCS-4.6:ocs4/ocs-operator-bundle@sha256:8ec70c3cd08470cbd88c179a8fc660a64550eed19f48594c8b808bf2c2062720_amd64",
"8Base-RH-OCS-4.6:ocs4/ocs-operator-bundle@sha256:d958ddd588a317feb59e9ad0844712c5ca722d625845a8ab4e4b561aed5c2025_ppc64le",
"8Base-RH-OCS-4.6:ocs4/ocs-rhel8-operator@sha256:5a56e6d20aa56871173932af58cdf76bb4e6ccba76a494799f525c2ff515cd14_s390x",
"8Base-RH-OCS-4.6:ocs4/ocs-rhel8-operator@sha256:e9e688290c1f7fb4fd5870cd2656f7bf6484404e7151e918dfe37907fadb5125_amd64",
"8Base-RH-OCS-4.6:ocs4/ocs-rhel8-operator@sha256:f43e06c9da12f5f70fef80afd5bcf32c03253786f51ffe766b350cce0a688449_ppc64le",
"8Base-RH-OCS-4.6:ocs4/rook-ceph-rhel8-operator@sha256:3a00a3b22be44d8802c386bd6a93eda6df48d98e8b90ea0df913a9f4327b3e94_amd64",
"8Base-RH-OCS-4.6:ocs4/rook-ceph-rhel8-operator@sha256:da3992b47e7f15c471d7cf68933da800adb9f4f471173a5eb90902ce77fa54ff_s390x",
"8Base-RH-OCS-4.6:ocs4/rook-ceph-rhel8-operator@sha256:fa5085edfb18f46ca9af7af8df02a9a81333c9f69d42cad2013602a862db63da_ppc64le"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHBA-2021:0305"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"8Base-RH-OCS-4.6:ocs4/cephcsi-rhel8@sha256:5e1a69df83ef96cb0a5411ab3af47c7d789251a89349dc1099735493cfc6a47a_ppc64le",
"8Base-RH-OCS-4.6:ocs4/cephcsi-rhel8@sha256:f068579dde9c75f151800205f97989a7e98dde289c9e57128c58ec3a47f6b287_s390x",
"8Base-RH-OCS-4.6:ocs4/cephcsi-rhel8@sha256:f3bc48b18857c970f068ed51915e7fc2a06c6dd14ee0ab08ff4a4733f33a7569_amd64",
"8Base-RH-OCS-4.6:ocs4/mcg-core-rhel8@sha256:37c6626cfd258b05b38fe50feff7630270aadafb4bc5d5aff18b7146c5a88984_ppc64le",
"8Base-RH-OCS-4.6:ocs4/mcg-core-rhel8@sha256:9c59d208e722581c4a594e0bf32d25f52325fde15cd479c83f04b024119b3067_amd64",
"8Base-RH-OCS-4.6:ocs4/mcg-core-rhel8@sha256:f9197232e37920e17504bf717211179508f6313a2dd95805a4f4db4beba7158d_s390x",
"8Base-RH-OCS-4.6:ocs4/mcg-rhel8-operator@sha256:5b7be1d28659e6571e12cde63b10054722a921daeee90f0ed072ef0d38ea46e3_ppc64le",
"8Base-RH-OCS-4.6:ocs4/mcg-rhel8-operator@sha256:6a81efd4146ac1750c4cbcbd3480baa30081b84d2b02ac0026e6c52277635848_amd64",
"8Base-RH-OCS-4.6:ocs4/mcg-rhel8-operator@sha256:fd22666dd33d119eea7599c30aad0c95f8dc6340133d7f0767aa0afef26588ac_s390x",
"8Base-RH-OCS-4.6:ocs4/ocs-must-gather-rhel8@sha256:6d76e7acca55197ae9478ecffabf6271bf099b64335978d5e053493a40258653_ppc64le",
"8Base-RH-OCS-4.6:ocs4/ocs-must-gather-rhel8@sha256:b3e2cbb55f8cfa82480b70e73576ed049cb4e9de984c46f247896951a1746184_amd64",
"8Base-RH-OCS-4.6:ocs4/ocs-must-gather-rhel8@sha256:c834e0b34ee694236cb9afdea48831a4b0cf979298c455c0cbc39e30cc40a3e6_s390x",
"8Base-RH-OCS-4.6:ocs4/ocs-operator-bundle@sha256:5bbbd6ea419eb398988a164fe462a20f148cb9422da30014b21282114e57ffc8_s390x",
"8Base-RH-OCS-4.6:ocs4/ocs-operator-bundle@sha256:8ec70c3cd08470cbd88c179a8fc660a64550eed19f48594c8b808bf2c2062720_amd64",
"8Base-RH-OCS-4.6:ocs4/ocs-operator-bundle@sha256:d958ddd588a317feb59e9ad0844712c5ca722d625845a8ab4e4b561aed5c2025_ppc64le",
"8Base-RH-OCS-4.6:ocs4/ocs-rhel8-operator@sha256:5a56e6d20aa56871173932af58cdf76bb4e6ccba76a494799f525c2ff515cd14_s390x",
"8Base-RH-OCS-4.6:ocs4/ocs-rhel8-operator@sha256:e9e688290c1f7fb4fd5870cd2656f7bf6484404e7151e918dfe37907fadb5125_amd64",
"8Base-RH-OCS-4.6:ocs4/ocs-rhel8-operator@sha256:f43e06c9da12f5f70fef80afd5bcf32c03253786f51ffe766b350cce0a688449_ppc64le",
"8Base-RH-OCS-4.6:ocs4/rook-ceph-rhel8-operator@sha256:3a00a3b22be44d8802c386bd6a93eda6df48d98e8b90ea0df913a9f4327b3e94_amd64",
"8Base-RH-OCS-4.6:ocs4/rook-ceph-rhel8-operator@sha256:da3992b47e7f15c471d7cf68933da800adb9f4f471173a5eb90902ce77fa54ff_s390x",
"8Base-RH-OCS-4.6:ocs4/rook-ceph-rhel8-operator@sha256:fa5085edfb18f46ca9af7af8df02a9a81333c9f69d42cad2013602a862db63da_ppc64le"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "ceph-ansible: insecure ownership on /etc/ceph/iscsi-gateway.conf configuration file"
},
{
"acknowledgments": [
{
"names": [
"Goutham Pacha Ravi"
],
"organization": "Red Hat",
"summary": "This issue was discovered by Red Hat."
},
{
"names": [
"Jahson Babel"
],
"organization": "Centre de Calcul de l\u0027IN2P3"
},
{
"names": [
"John Garbutt"
],
"organization": "StackHPC"
}
],
"cve": "CVE-2020-27781",
"cwe": {
"id": "CWE-522",
"name": "Insufficiently Protected Credentials"
},
"discovery_date": "2020-11-20T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1900109"
}
],
"notes": [
{
"category": "description",
"text": "User credentials can be manipulated and stolen by Native CephFS consumers of OpenStack Manila, resulting in potential privilege escalation. An Open Stack Manila user can request access to a share to an arbitrary cephx user, including existing users. The access key is retrieved via the interface drivers. Then, all users of the requesting OpenStack project can view the access key. This enables the attacker to target any resource that the user has access to. This can be done to even \"admin\" users, compromising the ceph administrator.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "ceph: User credentials can be manipulated and stolen by Native CephFS consumers of OpenStack Manila",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat OpenStack Platform deployments use the ceph package directly from the Ceph channel; the RHOSP package will not be updated at this time.\n\nRed Hat OpenShift Container Storage (RHOCS) 4 shipped ceph package for the usage of RHOCS 4.2 only, that has reached End Of Life. The shipped version of ceph package is no longer used and supported with the release of RHOCS 4.3.\n\nRed Hat Enterprise Linux ceph packages do not include the vulnerable component.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-RH-OCS-4.6:ocs4/cephcsi-rhel8@sha256:5e1a69df83ef96cb0a5411ab3af47c7d789251a89349dc1099735493cfc6a47a_ppc64le",
"8Base-RH-OCS-4.6:ocs4/cephcsi-rhel8@sha256:f068579dde9c75f151800205f97989a7e98dde289c9e57128c58ec3a47f6b287_s390x",
"8Base-RH-OCS-4.6:ocs4/cephcsi-rhel8@sha256:f3bc48b18857c970f068ed51915e7fc2a06c6dd14ee0ab08ff4a4733f33a7569_amd64",
"8Base-RH-OCS-4.6:ocs4/mcg-core-rhel8@sha256:37c6626cfd258b05b38fe50feff7630270aadafb4bc5d5aff18b7146c5a88984_ppc64le",
"8Base-RH-OCS-4.6:ocs4/mcg-core-rhel8@sha256:9c59d208e722581c4a594e0bf32d25f52325fde15cd479c83f04b024119b3067_amd64",
"8Base-RH-OCS-4.6:ocs4/mcg-core-rhel8@sha256:f9197232e37920e17504bf717211179508f6313a2dd95805a4f4db4beba7158d_s390x",
"8Base-RH-OCS-4.6:ocs4/mcg-rhel8-operator@sha256:5b7be1d28659e6571e12cde63b10054722a921daeee90f0ed072ef0d38ea46e3_ppc64le",
"8Base-RH-OCS-4.6:ocs4/mcg-rhel8-operator@sha256:6a81efd4146ac1750c4cbcbd3480baa30081b84d2b02ac0026e6c52277635848_amd64",
"8Base-RH-OCS-4.6:ocs4/mcg-rhel8-operator@sha256:fd22666dd33d119eea7599c30aad0c95f8dc6340133d7f0767aa0afef26588ac_s390x",
"8Base-RH-OCS-4.6:ocs4/ocs-must-gather-rhel8@sha256:6d76e7acca55197ae9478ecffabf6271bf099b64335978d5e053493a40258653_ppc64le",
"8Base-RH-OCS-4.6:ocs4/ocs-must-gather-rhel8@sha256:b3e2cbb55f8cfa82480b70e73576ed049cb4e9de984c46f247896951a1746184_amd64",
"8Base-RH-OCS-4.6:ocs4/ocs-must-gather-rhel8@sha256:c834e0b34ee694236cb9afdea48831a4b0cf979298c455c0cbc39e30cc40a3e6_s390x",
"8Base-RH-OCS-4.6:ocs4/ocs-operator-bundle@sha256:5bbbd6ea419eb398988a164fe462a20f148cb9422da30014b21282114e57ffc8_s390x",
"8Base-RH-OCS-4.6:ocs4/ocs-operator-bundle@sha256:8ec70c3cd08470cbd88c179a8fc660a64550eed19f48594c8b808bf2c2062720_amd64",
"8Base-RH-OCS-4.6:ocs4/ocs-operator-bundle@sha256:d958ddd588a317feb59e9ad0844712c5ca722d625845a8ab4e4b561aed5c2025_ppc64le",
"8Base-RH-OCS-4.6:ocs4/ocs-rhel8-operator@sha256:5a56e6d20aa56871173932af58cdf76bb4e6ccba76a494799f525c2ff515cd14_s390x",
"8Base-RH-OCS-4.6:ocs4/ocs-rhel8-operator@sha256:e9e688290c1f7fb4fd5870cd2656f7bf6484404e7151e918dfe37907fadb5125_amd64",
"8Base-RH-OCS-4.6:ocs4/ocs-rhel8-operator@sha256:f43e06c9da12f5f70fef80afd5bcf32c03253786f51ffe766b350cce0a688449_ppc64le",
"8Base-RH-OCS-4.6:ocs4/rook-ceph-rhel8-operator@sha256:3a00a3b22be44d8802c386bd6a93eda6df48d98e8b90ea0df913a9f4327b3e94_amd64",
"8Base-RH-OCS-4.6:ocs4/rook-ceph-rhel8-operator@sha256:da3992b47e7f15c471d7cf68933da800adb9f4f471173a5eb90902ce77fa54ff_s390x",
"8Base-RH-OCS-4.6:ocs4/rook-ceph-rhel8-operator@sha256:fa5085edfb18f46ca9af7af8df02a9a81333c9f69d42cad2013602a862db63da_ppc64le"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-27781"
},
{
"category": "external",
"summary": "RHBZ#1900109",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1900109"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-27781",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-27781"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-27781",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-27781"
}
],
"release_date": "2020-12-16T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-02-01T13:17:36+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"8Base-RH-OCS-4.6:ocs4/cephcsi-rhel8@sha256:5e1a69df83ef96cb0a5411ab3af47c7d789251a89349dc1099735493cfc6a47a_ppc64le",
"8Base-RH-OCS-4.6:ocs4/cephcsi-rhel8@sha256:f068579dde9c75f151800205f97989a7e98dde289c9e57128c58ec3a47f6b287_s390x",
"8Base-RH-OCS-4.6:ocs4/cephcsi-rhel8@sha256:f3bc48b18857c970f068ed51915e7fc2a06c6dd14ee0ab08ff4a4733f33a7569_amd64",
"8Base-RH-OCS-4.6:ocs4/mcg-core-rhel8@sha256:37c6626cfd258b05b38fe50feff7630270aadafb4bc5d5aff18b7146c5a88984_ppc64le",
"8Base-RH-OCS-4.6:ocs4/mcg-core-rhel8@sha256:9c59d208e722581c4a594e0bf32d25f52325fde15cd479c83f04b024119b3067_amd64",
"8Base-RH-OCS-4.6:ocs4/mcg-core-rhel8@sha256:f9197232e37920e17504bf717211179508f6313a2dd95805a4f4db4beba7158d_s390x",
"8Base-RH-OCS-4.6:ocs4/mcg-rhel8-operator@sha256:5b7be1d28659e6571e12cde63b10054722a921daeee90f0ed072ef0d38ea46e3_ppc64le",
"8Base-RH-OCS-4.6:ocs4/mcg-rhel8-operator@sha256:6a81efd4146ac1750c4cbcbd3480baa30081b84d2b02ac0026e6c52277635848_amd64",
"8Base-RH-OCS-4.6:ocs4/mcg-rhel8-operator@sha256:fd22666dd33d119eea7599c30aad0c95f8dc6340133d7f0767aa0afef26588ac_s390x",
"8Base-RH-OCS-4.6:ocs4/ocs-must-gather-rhel8@sha256:6d76e7acca55197ae9478ecffabf6271bf099b64335978d5e053493a40258653_ppc64le",
"8Base-RH-OCS-4.6:ocs4/ocs-must-gather-rhel8@sha256:b3e2cbb55f8cfa82480b70e73576ed049cb4e9de984c46f247896951a1746184_amd64",
"8Base-RH-OCS-4.6:ocs4/ocs-must-gather-rhel8@sha256:c834e0b34ee694236cb9afdea48831a4b0cf979298c455c0cbc39e30cc40a3e6_s390x",
"8Base-RH-OCS-4.6:ocs4/ocs-operator-bundle@sha256:5bbbd6ea419eb398988a164fe462a20f148cb9422da30014b21282114e57ffc8_s390x",
"8Base-RH-OCS-4.6:ocs4/ocs-operator-bundle@sha256:8ec70c3cd08470cbd88c179a8fc660a64550eed19f48594c8b808bf2c2062720_amd64",
"8Base-RH-OCS-4.6:ocs4/ocs-operator-bundle@sha256:d958ddd588a317feb59e9ad0844712c5ca722d625845a8ab4e4b561aed5c2025_ppc64le",
"8Base-RH-OCS-4.6:ocs4/ocs-rhel8-operator@sha256:5a56e6d20aa56871173932af58cdf76bb4e6ccba76a494799f525c2ff515cd14_s390x",
"8Base-RH-OCS-4.6:ocs4/ocs-rhel8-operator@sha256:e9e688290c1f7fb4fd5870cd2656f7bf6484404e7151e918dfe37907fadb5125_amd64",
"8Base-RH-OCS-4.6:ocs4/ocs-rhel8-operator@sha256:f43e06c9da12f5f70fef80afd5bcf32c03253786f51ffe766b350cce0a688449_ppc64le",
"8Base-RH-OCS-4.6:ocs4/rook-ceph-rhel8-operator@sha256:3a00a3b22be44d8802c386bd6a93eda6df48d98e8b90ea0df913a9f4327b3e94_amd64",
"8Base-RH-OCS-4.6:ocs4/rook-ceph-rhel8-operator@sha256:da3992b47e7f15c471d7cf68933da800adb9f4f471173a5eb90902ce77fa54ff_s390x",
"8Base-RH-OCS-4.6:ocs4/rook-ceph-rhel8-operator@sha256:fa5085edfb18f46ca9af7af8df02a9a81333c9f69d42cad2013602a862db63da_ppc64le"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHBA-2021:0305"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 7.1,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"8Base-RH-OCS-4.6:ocs4/cephcsi-rhel8@sha256:5e1a69df83ef96cb0a5411ab3af47c7d789251a89349dc1099735493cfc6a47a_ppc64le",
"8Base-RH-OCS-4.6:ocs4/cephcsi-rhel8@sha256:f068579dde9c75f151800205f97989a7e98dde289c9e57128c58ec3a47f6b287_s390x",
"8Base-RH-OCS-4.6:ocs4/cephcsi-rhel8@sha256:f3bc48b18857c970f068ed51915e7fc2a06c6dd14ee0ab08ff4a4733f33a7569_amd64",
"8Base-RH-OCS-4.6:ocs4/mcg-core-rhel8@sha256:37c6626cfd258b05b38fe50feff7630270aadafb4bc5d5aff18b7146c5a88984_ppc64le",
"8Base-RH-OCS-4.6:ocs4/mcg-core-rhel8@sha256:9c59d208e722581c4a594e0bf32d25f52325fde15cd479c83f04b024119b3067_amd64",
"8Base-RH-OCS-4.6:ocs4/mcg-core-rhel8@sha256:f9197232e37920e17504bf717211179508f6313a2dd95805a4f4db4beba7158d_s390x",
"8Base-RH-OCS-4.6:ocs4/mcg-rhel8-operator@sha256:5b7be1d28659e6571e12cde63b10054722a921daeee90f0ed072ef0d38ea46e3_ppc64le",
"8Base-RH-OCS-4.6:ocs4/mcg-rhel8-operator@sha256:6a81efd4146ac1750c4cbcbd3480baa30081b84d2b02ac0026e6c52277635848_amd64",
"8Base-RH-OCS-4.6:ocs4/mcg-rhel8-operator@sha256:fd22666dd33d119eea7599c30aad0c95f8dc6340133d7f0767aa0afef26588ac_s390x",
"8Base-RH-OCS-4.6:ocs4/ocs-must-gather-rhel8@sha256:6d76e7acca55197ae9478ecffabf6271bf099b64335978d5e053493a40258653_ppc64le",
"8Base-RH-OCS-4.6:ocs4/ocs-must-gather-rhel8@sha256:b3e2cbb55f8cfa82480b70e73576ed049cb4e9de984c46f247896951a1746184_amd64",
"8Base-RH-OCS-4.6:ocs4/ocs-must-gather-rhel8@sha256:c834e0b34ee694236cb9afdea48831a4b0cf979298c455c0cbc39e30cc40a3e6_s390x",
"8Base-RH-OCS-4.6:ocs4/ocs-operator-bundle@sha256:5bbbd6ea419eb398988a164fe462a20f148cb9422da30014b21282114e57ffc8_s390x",
"8Base-RH-OCS-4.6:ocs4/ocs-operator-bundle@sha256:8ec70c3cd08470cbd88c179a8fc660a64550eed19f48594c8b808bf2c2062720_amd64",
"8Base-RH-OCS-4.6:ocs4/ocs-operator-bundle@sha256:d958ddd588a317feb59e9ad0844712c5ca722d625845a8ab4e4b561aed5c2025_ppc64le",
"8Base-RH-OCS-4.6:ocs4/ocs-rhel8-operator@sha256:5a56e6d20aa56871173932af58cdf76bb4e6ccba76a494799f525c2ff515cd14_s390x",
"8Base-RH-OCS-4.6:ocs4/ocs-rhel8-operator@sha256:e9e688290c1f7fb4fd5870cd2656f7bf6484404e7151e918dfe37907fadb5125_amd64",
"8Base-RH-OCS-4.6:ocs4/ocs-rhel8-operator@sha256:f43e06c9da12f5f70fef80afd5bcf32c03253786f51ffe766b350cce0a688449_ppc64le",
"8Base-RH-OCS-4.6:ocs4/rook-ceph-rhel8-operator@sha256:3a00a3b22be44d8802c386bd6a93eda6df48d98e8b90ea0df913a9f4327b3e94_amd64",
"8Base-RH-OCS-4.6:ocs4/rook-ceph-rhel8-operator@sha256:da3992b47e7f15c471d7cf68933da800adb9f4f471173a5eb90902ce77fa54ff_s390x",
"8Base-RH-OCS-4.6:ocs4/rook-ceph-rhel8-operator@sha256:fa5085edfb18f46ca9af7af8df02a9a81333c9f69d42cad2013602a862db63da_ppc64le"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "ceph: User credentials can be manipulated and stolen by Native CephFS consumers of OpenStack Manila"
},
{
"cve": "CVE-2020-28362",
"cwe": {
"id": "CWE-295",
"name": "Improper Certificate Validation"
},
"discovery_date": "2020-11-12T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"8Base-RH-OCS-4.6:ocs4/mcg-core-rhel8@sha256:37c6626cfd258b05b38fe50feff7630270aadafb4bc5d5aff18b7146c5a88984_ppc64le",
"8Base-RH-OCS-4.6:ocs4/mcg-core-rhel8@sha256:9c59d208e722581c4a594e0bf32d25f52325fde15cd479c83f04b024119b3067_amd64",
"8Base-RH-OCS-4.6:ocs4/mcg-core-rhel8@sha256:f9197232e37920e17504bf717211179508f6313a2dd95805a4f4db4beba7158d_s390x",
"8Base-RH-OCS-4.6:ocs4/mcg-rhel8-operator@sha256:5b7be1d28659e6571e12cde63b10054722a921daeee90f0ed072ef0d38ea46e3_ppc64le",
"8Base-RH-OCS-4.6:ocs4/mcg-rhel8-operator@sha256:6a81efd4146ac1750c4cbcbd3480baa30081b84d2b02ac0026e6c52277635848_amd64",
"8Base-RH-OCS-4.6:ocs4/mcg-rhel8-operator@sha256:fd22666dd33d119eea7599c30aad0c95f8dc6340133d7f0767aa0afef26588ac_s390x",
"8Base-RH-OCS-4.6:ocs4/ocs-must-gather-rhel8@sha256:6d76e7acca55197ae9478ecffabf6271bf099b64335978d5e053493a40258653_ppc64le",
"8Base-RH-OCS-4.6:ocs4/ocs-must-gather-rhel8@sha256:b3e2cbb55f8cfa82480b70e73576ed049cb4e9de984c46f247896951a1746184_amd64",
"8Base-RH-OCS-4.6:ocs4/ocs-must-gather-rhel8@sha256:c834e0b34ee694236cb9afdea48831a4b0cf979298c455c0cbc39e30cc40a3e6_s390x",
"8Base-RH-OCS-4.6:ocs4/ocs-operator-bundle@sha256:5bbbd6ea419eb398988a164fe462a20f148cb9422da30014b21282114e57ffc8_s390x",
"8Base-RH-OCS-4.6:ocs4/ocs-operator-bundle@sha256:8ec70c3cd08470cbd88c179a8fc660a64550eed19f48594c8b808bf2c2062720_amd64",
"8Base-RH-OCS-4.6:ocs4/ocs-operator-bundle@sha256:d958ddd588a317feb59e9ad0844712c5ca722d625845a8ab4e4b561aed5c2025_ppc64le",
"8Base-RH-OCS-4.6:ocs4/ocs-rhel8-operator@sha256:5a56e6d20aa56871173932af58cdf76bb4e6ccba76a494799f525c2ff515cd14_s390x",
"8Base-RH-OCS-4.6:ocs4/ocs-rhel8-operator@sha256:e9e688290c1f7fb4fd5870cd2656f7bf6484404e7151e918dfe37907fadb5125_amd64",
"8Base-RH-OCS-4.6:ocs4/ocs-rhel8-operator@sha256:f43e06c9da12f5f70fef80afd5bcf32c03253786f51ffe766b350cce0a688449_ppc64le"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1897635"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the math/big package of Go\u0027s standard library that causes a denial of service. Applications written in Go that use math/big via cryptographic packages, including crypto/rsa and crypto/x509, are vulnerable and can potentially cause panic via a crafted certificate chain. The highest threat from this vulnerability is to system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: math/big: panic during recursive division of very large numbers",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "OpenShift ServiceMesh (OSSM) 1.1 is Out Of Support Scope (OOSS) for Moderate and Low impact vulnerabilities because it is now in the Maintenance Phase of the support.\nOpenshift Virtualization 1 (formerly Container Native Virtualization) is Out Of Support Scope (OOSS) for Moderate and Low impact vulnerabilities.\n\nRed Hat Gluster Storage 3 shipped multi-cloud-object-gateway-cli and noobaa-operator container as a technical preview and is not currently planned to be addressed in future updates.\n\nOpenShift Container Platform (OCP) 4.5 and earlier are built with Go versions earlier than 1.14, which are not affected by this vulnerability. OCP 4.6 is built with Go 1.15 and is affected.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-RH-OCS-4.6:ocs4/cephcsi-rhel8@sha256:5e1a69df83ef96cb0a5411ab3af47c7d789251a89349dc1099735493cfc6a47a_ppc64le",
"8Base-RH-OCS-4.6:ocs4/cephcsi-rhel8@sha256:f068579dde9c75f151800205f97989a7e98dde289c9e57128c58ec3a47f6b287_s390x",
"8Base-RH-OCS-4.6:ocs4/cephcsi-rhel8@sha256:f3bc48b18857c970f068ed51915e7fc2a06c6dd14ee0ab08ff4a4733f33a7569_amd64",
"8Base-RH-OCS-4.6:ocs4/rook-ceph-rhel8-operator@sha256:3a00a3b22be44d8802c386bd6a93eda6df48d98e8b90ea0df913a9f4327b3e94_amd64",
"8Base-RH-OCS-4.6:ocs4/rook-ceph-rhel8-operator@sha256:da3992b47e7f15c471d7cf68933da800adb9f4f471173a5eb90902ce77fa54ff_s390x",
"8Base-RH-OCS-4.6:ocs4/rook-ceph-rhel8-operator@sha256:fa5085edfb18f46ca9af7af8df02a9a81333c9f69d42cad2013602a862db63da_ppc64le"
],
"known_not_affected": [
"8Base-RH-OCS-4.6:ocs4/mcg-core-rhel8@sha256:37c6626cfd258b05b38fe50feff7630270aadafb4bc5d5aff18b7146c5a88984_ppc64le",
"8Base-RH-OCS-4.6:ocs4/mcg-core-rhel8@sha256:9c59d208e722581c4a594e0bf32d25f52325fde15cd479c83f04b024119b3067_amd64",
"8Base-RH-OCS-4.6:ocs4/mcg-core-rhel8@sha256:f9197232e37920e17504bf717211179508f6313a2dd95805a4f4db4beba7158d_s390x",
"8Base-RH-OCS-4.6:ocs4/mcg-rhel8-operator@sha256:5b7be1d28659e6571e12cde63b10054722a921daeee90f0ed072ef0d38ea46e3_ppc64le",
"8Base-RH-OCS-4.6:ocs4/mcg-rhel8-operator@sha256:6a81efd4146ac1750c4cbcbd3480baa30081b84d2b02ac0026e6c52277635848_amd64",
"8Base-RH-OCS-4.6:ocs4/mcg-rhel8-operator@sha256:fd22666dd33d119eea7599c30aad0c95f8dc6340133d7f0767aa0afef26588ac_s390x",
"8Base-RH-OCS-4.6:ocs4/ocs-must-gather-rhel8@sha256:6d76e7acca55197ae9478ecffabf6271bf099b64335978d5e053493a40258653_ppc64le",
"8Base-RH-OCS-4.6:ocs4/ocs-must-gather-rhel8@sha256:b3e2cbb55f8cfa82480b70e73576ed049cb4e9de984c46f247896951a1746184_amd64",
"8Base-RH-OCS-4.6:ocs4/ocs-must-gather-rhel8@sha256:c834e0b34ee694236cb9afdea48831a4b0cf979298c455c0cbc39e30cc40a3e6_s390x",
"8Base-RH-OCS-4.6:ocs4/ocs-operator-bundle@sha256:5bbbd6ea419eb398988a164fe462a20f148cb9422da30014b21282114e57ffc8_s390x",
"8Base-RH-OCS-4.6:ocs4/ocs-operator-bundle@sha256:8ec70c3cd08470cbd88c179a8fc660a64550eed19f48594c8b808bf2c2062720_amd64",
"8Base-RH-OCS-4.6:ocs4/ocs-operator-bundle@sha256:d958ddd588a317feb59e9ad0844712c5ca722d625845a8ab4e4b561aed5c2025_ppc64le",
"8Base-RH-OCS-4.6:ocs4/ocs-rhel8-operator@sha256:5a56e6d20aa56871173932af58cdf76bb4e6ccba76a494799f525c2ff515cd14_s390x",
"8Base-RH-OCS-4.6:ocs4/ocs-rhel8-operator@sha256:e9e688290c1f7fb4fd5870cd2656f7bf6484404e7151e918dfe37907fadb5125_amd64",
"8Base-RH-OCS-4.6:ocs4/ocs-rhel8-operator@sha256:f43e06c9da12f5f70fef80afd5bcf32c03253786f51ffe766b350cce0a688449_ppc64le"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-28362"
},
{
"category": "external",
"summary": "RHBZ#1897635",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1897635"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-28362",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-28362"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-28362",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-28362"
}
],
"release_date": "2020-11-12T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-02-01T13:17:36+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"8Base-RH-OCS-4.6:ocs4/cephcsi-rhel8@sha256:5e1a69df83ef96cb0a5411ab3af47c7d789251a89349dc1099735493cfc6a47a_ppc64le",
"8Base-RH-OCS-4.6:ocs4/cephcsi-rhel8@sha256:f068579dde9c75f151800205f97989a7e98dde289c9e57128c58ec3a47f6b287_s390x",
"8Base-RH-OCS-4.6:ocs4/cephcsi-rhel8@sha256:f3bc48b18857c970f068ed51915e7fc2a06c6dd14ee0ab08ff4a4733f33a7569_amd64",
"8Base-RH-OCS-4.6:ocs4/rook-ceph-rhel8-operator@sha256:3a00a3b22be44d8802c386bd6a93eda6df48d98e8b90ea0df913a9f4327b3e94_amd64",
"8Base-RH-OCS-4.6:ocs4/rook-ceph-rhel8-operator@sha256:da3992b47e7f15c471d7cf68933da800adb9f4f471173a5eb90902ce77fa54ff_s390x",
"8Base-RH-OCS-4.6:ocs4/rook-ceph-rhel8-operator@sha256:fa5085edfb18f46ca9af7af8df02a9a81333c9f69d42cad2013602a862db63da_ppc64le"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHBA-2021:0305"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"8Base-RH-OCS-4.6:ocs4/cephcsi-rhel8@sha256:5e1a69df83ef96cb0a5411ab3af47c7d789251a89349dc1099735493cfc6a47a_ppc64le",
"8Base-RH-OCS-4.6:ocs4/cephcsi-rhel8@sha256:f068579dde9c75f151800205f97989a7e98dde289c9e57128c58ec3a47f6b287_s390x",
"8Base-RH-OCS-4.6:ocs4/cephcsi-rhel8@sha256:f3bc48b18857c970f068ed51915e7fc2a06c6dd14ee0ab08ff4a4733f33a7569_amd64",
"8Base-RH-OCS-4.6:ocs4/rook-ceph-rhel8-operator@sha256:3a00a3b22be44d8802c386bd6a93eda6df48d98e8b90ea0df913a9f4327b3e94_amd64",
"8Base-RH-OCS-4.6:ocs4/rook-ceph-rhel8-operator@sha256:da3992b47e7f15c471d7cf68933da800adb9f4f471173a5eb90902ce77fa54ff_s390x",
"8Base-RH-OCS-4.6:ocs4/rook-ceph-rhel8-operator@sha256:fa5085edfb18f46ca9af7af8df02a9a81333c9f69d42cad2013602a862db63da_ppc64le"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "golang: math/big: panic during recursive division of very large numbers"
}
]
}
RHBA-2021_0482
Vulnerability from csaf_redhat - Published: 2021-02-11 11:59 - Updated: 2024-11-13 22:07A flaw was found in the math/big package of Go's standard library that causes a denial of service. Applications written in Go that use math/big via cryptographic packages, including crypto/rsa and crypto/x509, are vulnerable and can potentially cause panic via a crafted certificate chain. The highest threat from this vulnerability is to system availability.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 8Base-OSSM-2.0:kiali-0:v1.24.4.redhat2-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: 8Base-OSSM-2.0:kiali-0:v1.24.4.redhat2-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 8Base-OSSM-2.0:kiali-0:v1.24.4.redhat2-1.el8.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 8Base-OSSM-2.0:kiali-0:v1.24.4.redhat2-1.el8.x86_64 | — |
Vendor Fix
fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 8Base-OSSM-2.0:servicemesh-0:2.0.2-1.el8.ppc64le | — | ||
| Unresolved product id: 8Base-OSSM-2.0:servicemesh-0:2.0.2-1.el8.s390x | — | ||
| Unresolved product id: 8Base-OSSM-2.0:servicemesh-0:2.0.2-1.el8.src | — | ||
| Unresolved product id: 8Base-OSSM-2.0:servicemesh-0:2.0.2-1.el8.x86_64 | — | ||
| Unresolved product id: 8Base-OSSM-2.0:servicemesh-cni-0:2.0.2-2.el8.ppc64le | — | ||
| Unresolved product id: 8Base-OSSM-2.0:servicemesh-cni-0:2.0.2-2.el8.s390x | — | ||
| Unresolved product id: 8Base-OSSM-2.0:servicemesh-cni-0:2.0.2-2.el8.src | — | ||
| Unresolved product id: 8Base-OSSM-2.0:servicemesh-cni-0:2.0.2-2.el8.x86_64 | — | ||
| Unresolved product id: 8Base-OSSM-2.0:servicemesh-grafana-0:6.4.3-3.el8.1.ppc64le | — | ||
| Unresolved product id: 8Base-OSSM-2.0:servicemesh-grafana-0:6.4.3-3.el8.1.s390x | — | ||
| Unresolved product id: 8Base-OSSM-2.0:servicemesh-grafana-0:6.4.3-3.el8.1.src | — | ||
| Unresolved product id: 8Base-OSSM-2.0:servicemesh-grafana-0:6.4.3-3.el8.1.x86_64 | — | ||
| Unresolved product id: 8Base-OSSM-2.0:servicemesh-grafana-prometheus-0:6.4.3-3.el8.1.ppc64le | — | ||
| Unresolved product id: 8Base-OSSM-2.0:servicemesh-grafana-prometheus-0:6.4.3-3.el8.1.s390x | — | ||
| Unresolved product id: 8Base-OSSM-2.0:servicemesh-grafana-prometheus-0:6.4.3-3.el8.1.x86_64 | — | ||
| Unresolved product id: 8Base-OSSM-2.0:servicemesh-istioctl-0:2.0.2-1.el8.ppc64le | — | ||
| Unresolved product id: 8Base-OSSM-2.0:servicemesh-istioctl-0:2.0.2-1.el8.s390x | — | ||
| Unresolved product id: 8Base-OSSM-2.0:servicemesh-istioctl-0:2.0.2-1.el8.x86_64 | — | ||
| Unresolved product id: 8Base-OSSM-2.0:servicemesh-mixc-0:2.0.2-1.el8.ppc64le | — | ||
| Unresolved product id: 8Base-OSSM-2.0:servicemesh-mixc-0:2.0.2-1.el8.s390x | — | ||
| Unresolved product id: 8Base-OSSM-2.0:servicemesh-mixc-0:2.0.2-1.el8.x86_64 | — | ||
| Unresolved product id: 8Base-OSSM-2.0:servicemesh-mixs-0:2.0.2-1.el8.ppc64le | — | ||
| Unresolved product id: 8Base-OSSM-2.0:servicemesh-mixs-0:2.0.2-1.el8.s390x | — | ||
| Unresolved product id: 8Base-OSSM-2.0:servicemesh-mixs-0:2.0.2-1.el8.x86_64 | — | ||
| Unresolved product id: 8Base-OSSM-2.0:servicemesh-operator-0:2.0.2-3.el8.ppc64le | — | ||
| Unresolved product id: 8Base-OSSM-2.0:servicemesh-operator-0:2.0.2-3.el8.s390x | — | ||
| Unresolved product id: 8Base-OSSM-2.0:servicemesh-operator-0:2.0.2-3.el8.src | — | ||
| Unresolved product id: 8Base-OSSM-2.0:servicemesh-operator-0:2.0.2-3.el8.x86_64 | — | ||
| Unresolved product id: 8Base-OSSM-2.0:servicemesh-pilot-agent-0:2.0.2-1.el8.ppc64le | — | ||
| Unresolved product id: 8Base-OSSM-2.0:servicemesh-pilot-agent-0:2.0.2-1.el8.s390x | — | ||
| Unresolved product id: 8Base-OSSM-2.0:servicemesh-pilot-agent-0:2.0.2-1.el8.x86_64 | — | ||
| Unresolved product id: 8Base-OSSM-2.0:servicemesh-pilot-discovery-0:2.0.2-1.el8.ppc64le | — | ||
| Unresolved product id: 8Base-OSSM-2.0:servicemesh-pilot-discovery-0:2.0.2-1.el8.s390x | — | ||
| Unresolved product id: 8Base-OSSM-2.0:servicemesh-pilot-discovery-0:2.0.2-1.el8.x86_64 | — | ||
| Unresolved product id: 8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-3.el8.1.ppc64le | — | ||
| Unresolved product id: 8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-3.el8.1.s390x | — | ||
| Unresolved product id: 8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-3.el8.1.src | — | ||
| Unresolved product id: 8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-3.el8.1.x86_64 | — | ||
| Unresolved product id: 8Base-OSSM-2.0:servicemesh-proxy-0:2.0.2-1.el8.ppc64le | — | ||
| Unresolved product id: 8Base-OSSM-2.0:servicemesh-proxy-0:2.0.2-1.el8.s390x | — | ||
| Unresolved product id: 8Base-OSSM-2.0:servicemesh-proxy-0:2.0.2-1.el8.src | — | ||
| Unresolved product id: 8Base-OSSM-2.0:servicemesh-proxy-0:2.0.2-1.el8.x86_64 | — |
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Red Hat OpenShift Service Mesh 2.0.2.",
"title": "Topic"
},
{
"category": "general",
"text": "Red Hat OpenShift Service Mesh is Red Hat\u0027s distribution of the Istio service mesh project, tailored for installation into an on-premise OpenShift Container Platform installation.\n\nThe OpenShift Service Mesh release notes provide information on the features and known issues:\n\nhttps://docs.openshift.com/container-platform/latest/service_mesh/v2x/servicemesh-release-notes.html\n\nThis advisory covers the RPM packages for the release.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHBA-2021:0482",
"url": "https://access.redhat.com/errata/RHBA-2021:0482"
},
{
"category": "external",
"summary": "MAISTRA-2086",
"url": "https://issues.redhat.com/browse/MAISTRA-2086"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2021/rhba-2021_0482.json"
}
],
"title": "Red Hat Bug Fix Advisory: Red Hat OpenShift Service Mesh 2.0.2 RPMs",
"tracking": {
"current_release_date": "2024-11-13T22:07:41+00:00",
"generator": {
"date": "2024-11-13T22:07:41+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.2.0"
}
},
"id": "RHBA-2021:0482",
"initial_release_date": "2021-02-11T11:59:56+00:00",
"revision_history": [
{
"date": "2021-02-11T11:59:56+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2021-02-11T11:59:56+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2024-11-13T22:07:41+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "OpenShift Service Mesh 2.0",
"product": {
"name": "OpenShift Service Mesh 2.0",
"product_id": "8Base-OSSM-2.0",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:service_mesh:2.0::el8"
}
}
}
],
"category": "product_family",
"name": "Red Hat OpenShift Service Mesh"
},
{
"branches": [
{
"category": "product_version",
"name": "kiali-0:v1.24.4.redhat2-1.el8.src",
"product": {
"name": "kiali-0:v1.24.4.redhat2-1.el8.src",
"product_id": "kiali-0:v1.24.4.redhat2-1.el8.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kiali@v1.24.4.redhat2-1.el8?arch=src"
}
}
},
{
"category": "product_version",
"name": "servicemesh-prometheus-0:2.14.0-3.el8.1.src",
"product": {
"name": "servicemesh-prometheus-0:2.14.0-3.el8.1.src",
"product_id": "servicemesh-prometheus-0:2.14.0-3.el8.1.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/servicemesh-prometheus@2.14.0-3.el8.1?arch=src"
}
}
},
{
"category": "product_version",
"name": "servicemesh-0:2.0.2-1.el8.src",
"product": {
"name": "servicemesh-0:2.0.2-1.el8.src",
"product_id": "servicemesh-0:2.0.2-1.el8.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/servicemesh@2.0.2-1.el8?arch=src"
}
}
},
{
"category": "product_version",
"name": "servicemesh-grafana-0:6.4.3-3.el8.1.src",
"product": {
"name": "servicemesh-grafana-0:6.4.3-3.el8.1.src",
"product_id": "servicemesh-grafana-0:6.4.3-3.el8.1.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/servicemesh-grafana@6.4.3-3.el8.1?arch=src"
}
}
},
{
"category": "product_version",
"name": "servicemesh-proxy-0:2.0.2-1.el8.src",
"product": {
"name": "servicemesh-proxy-0:2.0.2-1.el8.src",
"product_id": "servicemesh-proxy-0:2.0.2-1.el8.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/servicemesh-proxy@2.0.2-1.el8?arch=src"
}
}
},
{
"category": "product_version",
"name": "servicemesh-cni-0:2.0.2-2.el8.src",
"product": {
"name": "servicemesh-cni-0:2.0.2-2.el8.src",
"product_id": "servicemesh-cni-0:2.0.2-2.el8.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/servicemesh-cni@2.0.2-2.el8?arch=src"
}
}
},
{
"category": "product_version",
"name": "servicemesh-operator-0:2.0.2-3.el8.src",
"product": {
"name": "servicemesh-operator-0:2.0.2-3.el8.src",
"product_id": "servicemesh-operator-0:2.0.2-3.el8.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/servicemesh-operator@2.0.2-3.el8?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "kiali-0:v1.24.4.redhat2-1.el8.x86_64",
"product": {
"name": "kiali-0:v1.24.4.redhat2-1.el8.x86_64",
"product_id": "kiali-0:v1.24.4.redhat2-1.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kiali@v1.24.4.redhat2-1.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "servicemesh-prometheus-0:2.14.0-3.el8.1.x86_64",
"product": {
"name": "servicemesh-prometheus-0:2.14.0-3.el8.1.x86_64",
"product_id": "servicemesh-prometheus-0:2.14.0-3.el8.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/servicemesh-prometheus@2.14.0-3.el8.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "servicemesh-0:2.0.2-1.el8.x86_64",
"product": {
"name": "servicemesh-0:2.0.2-1.el8.x86_64",
"product_id": "servicemesh-0:2.0.2-1.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/servicemesh@2.0.2-1.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "servicemesh-istioctl-0:2.0.2-1.el8.x86_64",
"product": {
"name": "servicemesh-istioctl-0:2.0.2-1.el8.x86_64",
"product_id": "servicemesh-istioctl-0:2.0.2-1.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/servicemesh-istioctl@2.0.2-1.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "servicemesh-mixc-0:2.0.2-1.el8.x86_64",
"product": {
"name": "servicemesh-mixc-0:2.0.2-1.el8.x86_64",
"product_id": "servicemesh-mixc-0:2.0.2-1.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/servicemesh-mixc@2.0.2-1.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "servicemesh-mixs-0:2.0.2-1.el8.x86_64",
"product": {
"name": "servicemesh-mixs-0:2.0.2-1.el8.x86_64",
"product_id": "servicemesh-mixs-0:2.0.2-1.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/servicemesh-mixs@2.0.2-1.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "servicemesh-pilot-agent-0:2.0.2-1.el8.x86_64",
"product": {
"name": "servicemesh-pilot-agent-0:2.0.2-1.el8.x86_64",
"product_id": "servicemesh-pilot-agent-0:2.0.2-1.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/servicemesh-pilot-agent@2.0.2-1.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "servicemesh-pilot-discovery-0:2.0.2-1.el8.x86_64",
"product": {
"name": "servicemesh-pilot-discovery-0:2.0.2-1.el8.x86_64",
"product_id": "servicemesh-pilot-discovery-0:2.0.2-1.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/servicemesh-pilot-discovery@2.0.2-1.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "servicemesh-grafana-0:6.4.3-3.el8.1.x86_64",
"product": {
"name": "servicemesh-grafana-0:6.4.3-3.el8.1.x86_64",
"product_id": "servicemesh-grafana-0:6.4.3-3.el8.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/servicemesh-grafana@6.4.3-3.el8.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "servicemesh-grafana-prometheus-0:6.4.3-3.el8.1.x86_64",
"product": {
"name": "servicemesh-grafana-prometheus-0:6.4.3-3.el8.1.x86_64",
"product_id": "servicemesh-grafana-prometheus-0:6.4.3-3.el8.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/servicemesh-grafana-prometheus@6.4.3-3.el8.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "servicemesh-proxy-0:2.0.2-1.el8.x86_64",
"product": {
"name": "servicemesh-proxy-0:2.0.2-1.el8.x86_64",
"product_id": "servicemesh-proxy-0:2.0.2-1.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/servicemesh-proxy@2.0.2-1.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "servicemesh-cni-0:2.0.2-2.el8.x86_64",
"product": {
"name": "servicemesh-cni-0:2.0.2-2.el8.x86_64",
"product_id": "servicemesh-cni-0:2.0.2-2.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/servicemesh-cni@2.0.2-2.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "servicemesh-operator-0:2.0.2-3.el8.x86_64",
"product": {
"name": "servicemesh-operator-0:2.0.2-3.el8.x86_64",
"product_id": "servicemesh-operator-0:2.0.2-3.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/servicemesh-operator@2.0.2-3.el8?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "kiali-0:v1.24.4.redhat2-1.el8.ppc64le",
"product": {
"name": "kiali-0:v1.24.4.redhat2-1.el8.ppc64le",
"product_id": "kiali-0:v1.24.4.redhat2-1.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kiali@v1.24.4.redhat2-1.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "servicemesh-prometheus-0:2.14.0-3.el8.1.ppc64le",
"product": {
"name": "servicemesh-prometheus-0:2.14.0-3.el8.1.ppc64le",
"product_id": "servicemesh-prometheus-0:2.14.0-3.el8.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/servicemesh-prometheus@2.14.0-3.el8.1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "servicemesh-0:2.0.2-1.el8.ppc64le",
"product": {
"name": "servicemesh-0:2.0.2-1.el8.ppc64le",
"product_id": "servicemesh-0:2.0.2-1.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/servicemesh@2.0.2-1.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "servicemesh-istioctl-0:2.0.2-1.el8.ppc64le",
"product": {
"name": "servicemesh-istioctl-0:2.0.2-1.el8.ppc64le",
"product_id": "servicemesh-istioctl-0:2.0.2-1.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/servicemesh-istioctl@2.0.2-1.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "servicemesh-mixc-0:2.0.2-1.el8.ppc64le",
"product": {
"name": "servicemesh-mixc-0:2.0.2-1.el8.ppc64le",
"product_id": "servicemesh-mixc-0:2.0.2-1.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/servicemesh-mixc@2.0.2-1.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "servicemesh-mixs-0:2.0.2-1.el8.ppc64le",
"product": {
"name": "servicemesh-mixs-0:2.0.2-1.el8.ppc64le",
"product_id": "servicemesh-mixs-0:2.0.2-1.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/servicemesh-mixs@2.0.2-1.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "servicemesh-pilot-agent-0:2.0.2-1.el8.ppc64le",
"product": {
"name": "servicemesh-pilot-agent-0:2.0.2-1.el8.ppc64le",
"product_id": "servicemesh-pilot-agent-0:2.0.2-1.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/servicemesh-pilot-agent@2.0.2-1.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "servicemesh-pilot-discovery-0:2.0.2-1.el8.ppc64le",
"product": {
"name": "servicemesh-pilot-discovery-0:2.0.2-1.el8.ppc64le",
"product_id": "servicemesh-pilot-discovery-0:2.0.2-1.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/servicemesh-pilot-discovery@2.0.2-1.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "servicemesh-grafana-0:6.4.3-3.el8.1.ppc64le",
"product": {
"name": "servicemesh-grafana-0:6.4.3-3.el8.1.ppc64le",
"product_id": "servicemesh-grafana-0:6.4.3-3.el8.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/servicemesh-grafana@6.4.3-3.el8.1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "servicemesh-grafana-prometheus-0:6.4.3-3.el8.1.ppc64le",
"product": {
"name": "servicemesh-grafana-prometheus-0:6.4.3-3.el8.1.ppc64le",
"product_id": "servicemesh-grafana-prometheus-0:6.4.3-3.el8.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/servicemesh-grafana-prometheus@6.4.3-3.el8.1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "servicemesh-proxy-0:2.0.2-1.el8.ppc64le",
"product": {
"name": "servicemesh-proxy-0:2.0.2-1.el8.ppc64le",
"product_id": "servicemesh-proxy-0:2.0.2-1.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/servicemesh-proxy@2.0.2-1.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "servicemesh-cni-0:2.0.2-2.el8.ppc64le",
"product": {
"name": "servicemesh-cni-0:2.0.2-2.el8.ppc64le",
"product_id": "servicemesh-cni-0:2.0.2-2.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/servicemesh-cni@2.0.2-2.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "servicemesh-operator-0:2.0.2-3.el8.ppc64le",
"product": {
"name": "servicemesh-operator-0:2.0.2-3.el8.ppc64le",
"product_id": "servicemesh-operator-0:2.0.2-3.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/servicemesh-operator@2.0.2-3.el8?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "kiali-0:v1.24.4.redhat2-1.el8.s390x",
"product": {
"name": "kiali-0:v1.24.4.redhat2-1.el8.s390x",
"product_id": "kiali-0:v1.24.4.redhat2-1.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kiali@v1.24.4.redhat2-1.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "servicemesh-prometheus-0:2.14.0-3.el8.1.s390x",
"product": {
"name": "servicemesh-prometheus-0:2.14.0-3.el8.1.s390x",
"product_id": "servicemesh-prometheus-0:2.14.0-3.el8.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/servicemesh-prometheus@2.14.0-3.el8.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "servicemesh-0:2.0.2-1.el8.s390x",
"product": {
"name": "servicemesh-0:2.0.2-1.el8.s390x",
"product_id": "servicemesh-0:2.0.2-1.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/servicemesh@2.0.2-1.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "servicemesh-istioctl-0:2.0.2-1.el8.s390x",
"product": {
"name": "servicemesh-istioctl-0:2.0.2-1.el8.s390x",
"product_id": "servicemesh-istioctl-0:2.0.2-1.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/servicemesh-istioctl@2.0.2-1.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "servicemesh-mixc-0:2.0.2-1.el8.s390x",
"product": {
"name": "servicemesh-mixc-0:2.0.2-1.el8.s390x",
"product_id": "servicemesh-mixc-0:2.0.2-1.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/servicemesh-mixc@2.0.2-1.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "servicemesh-mixs-0:2.0.2-1.el8.s390x",
"product": {
"name": "servicemesh-mixs-0:2.0.2-1.el8.s390x",
"product_id": "servicemesh-mixs-0:2.0.2-1.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/servicemesh-mixs@2.0.2-1.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "servicemesh-pilot-agent-0:2.0.2-1.el8.s390x",
"product": {
"name": "servicemesh-pilot-agent-0:2.0.2-1.el8.s390x",
"product_id": "servicemesh-pilot-agent-0:2.0.2-1.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/servicemesh-pilot-agent@2.0.2-1.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "servicemesh-pilot-discovery-0:2.0.2-1.el8.s390x",
"product": {
"name": "servicemesh-pilot-discovery-0:2.0.2-1.el8.s390x",
"product_id": "servicemesh-pilot-discovery-0:2.0.2-1.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/servicemesh-pilot-discovery@2.0.2-1.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "servicemesh-grafana-0:6.4.3-3.el8.1.s390x",
"product": {
"name": "servicemesh-grafana-0:6.4.3-3.el8.1.s390x",
"product_id": "servicemesh-grafana-0:6.4.3-3.el8.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/servicemesh-grafana@6.4.3-3.el8.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "servicemesh-grafana-prometheus-0:6.4.3-3.el8.1.s390x",
"product": {
"name": "servicemesh-grafana-prometheus-0:6.4.3-3.el8.1.s390x",
"product_id": "servicemesh-grafana-prometheus-0:6.4.3-3.el8.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/servicemesh-grafana-prometheus@6.4.3-3.el8.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "servicemesh-proxy-0:2.0.2-1.el8.s390x",
"product": {
"name": "servicemesh-proxy-0:2.0.2-1.el8.s390x",
"product_id": "servicemesh-proxy-0:2.0.2-1.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/servicemesh-proxy@2.0.2-1.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "servicemesh-cni-0:2.0.2-2.el8.s390x",
"product": {
"name": "servicemesh-cni-0:2.0.2-2.el8.s390x",
"product_id": "servicemesh-cni-0:2.0.2-2.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/servicemesh-cni@2.0.2-2.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "servicemesh-operator-0:2.0.2-3.el8.s390x",
"product": {
"name": "servicemesh-operator-0:2.0.2-3.el8.s390x",
"product_id": "servicemesh-operator-0:2.0.2-3.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/servicemesh-operator@2.0.2-3.el8?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kiali-0:v1.24.4.redhat2-1.el8.ppc64le as a component of OpenShift Service Mesh 2.0",
"product_id": "8Base-OSSM-2.0:kiali-0:v1.24.4.redhat2-1.el8.ppc64le"
},
"product_reference": "kiali-0:v1.24.4.redhat2-1.el8.ppc64le",
"relates_to_product_reference": "8Base-OSSM-2.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kiali-0:v1.24.4.redhat2-1.el8.s390x as a component of OpenShift Service Mesh 2.0",
"product_id": "8Base-OSSM-2.0:kiali-0:v1.24.4.redhat2-1.el8.s390x"
},
"product_reference": "kiali-0:v1.24.4.redhat2-1.el8.s390x",
"relates_to_product_reference": "8Base-OSSM-2.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kiali-0:v1.24.4.redhat2-1.el8.src as a component of OpenShift Service Mesh 2.0",
"product_id": "8Base-OSSM-2.0:kiali-0:v1.24.4.redhat2-1.el8.src"
},
"product_reference": "kiali-0:v1.24.4.redhat2-1.el8.src",
"relates_to_product_reference": "8Base-OSSM-2.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kiali-0:v1.24.4.redhat2-1.el8.x86_64 as a component of OpenShift Service Mesh 2.0",
"product_id": "8Base-OSSM-2.0:kiali-0:v1.24.4.redhat2-1.el8.x86_64"
},
"product_reference": "kiali-0:v1.24.4.redhat2-1.el8.x86_64",
"relates_to_product_reference": "8Base-OSSM-2.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "servicemesh-0:2.0.2-1.el8.ppc64le as a component of OpenShift Service Mesh 2.0",
"product_id": "8Base-OSSM-2.0:servicemesh-0:2.0.2-1.el8.ppc64le"
},
"product_reference": "servicemesh-0:2.0.2-1.el8.ppc64le",
"relates_to_product_reference": "8Base-OSSM-2.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "servicemesh-0:2.0.2-1.el8.s390x as a component of OpenShift Service Mesh 2.0",
"product_id": "8Base-OSSM-2.0:servicemesh-0:2.0.2-1.el8.s390x"
},
"product_reference": "servicemesh-0:2.0.2-1.el8.s390x",
"relates_to_product_reference": "8Base-OSSM-2.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "servicemesh-0:2.0.2-1.el8.src as a component of OpenShift Service Mesh 2.0",
"product_id": "8Base-OSSM-2.0:servicemesh-0:2.0.2-1.el8.src"
},
"product_reference": "servicemesh-0:2.0.2-1.el8.src",
"relates_to_product_reference": "8Base-OSSM-2.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "servicemesh-0:2.0.2-1.el8.x86_64 as a component of OpenShift Service Mesh 2.0",
"product_id": "8Base-OSSM-2.0:servicemesh-0:2.0.2-1.el8.x86_64"
},
"product_reference": "servicemesh-0:2.0.2-1.el8.x86_64",
"relates_to_product_reference": "8Base-OSSM-2.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "servicemesh-cni-0:2.0.2-2.el8.ppc64le as a component of OpenShift Service Mesh 2.0",
"product_id": "8Base-OSSM-2.0:servicemesh-cni-0:2.0.2-2.el8.ppc64le"
},
"product_reference": "servicemesh-cni-0:2.0.2-2.el8.ppc64le",
"relates_to_product_reference": "8Base-OSSM-2.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "servicemesh-cni-0:2.0.2-2.el8.s390x as a component of OpenShift Service Mesh 2.0",
"product_id": "8Base-OSSM-2.0:servicemesh-cni-0:2.0.2-2.el8.s390x"
},
"product_reference": "servicemesh-cni-0:2.0.2-2.el8.s390x",
"relates_to_product_reference": "8Base-OSSM-2.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "servicemesh-cni-0:2.0.2-2.el8.src as a component of OpenShift Service Mesh 2.0",
"product_id": "8Base-OSSM-2.0:servicemesh-cni-0:2.0.2-2.el8.src"
},
"product_reference": "servicemesh-cni-0:2.0.2-2.el8.src",
"relates_to_product_reference": "8Base-OSSM-2.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "servicemesh-cni-0:2.0.2-2.el8.x86_64 as a component of OpenShift Service Mesh 2.0",
"product_id": "8Base-OSSM-2.0:servicemesh-cni-0:2.0.2-2.el8.x86_64"
},
"product_reference": "servicemesh-cni-0:2.0.2-2.el8.x86_64",
"relates_to_product_reference": "8Base-OSSM-2.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "servicemesh-grafana-0:6.4.3-3.el8.1.ppc64le as a component of OpenShift Service Mesh 2.0",
"product_id": "8Base-OSSM-2.0:servicemesh-grafana-0:6.4.3-3.el8.1.ppc64le"
},
"product_reference": "servicemesh-grafana-0:6.4.3-3.el8.1.ppc64le",
"relates_to_product_reference": "8Base-OSSM-2.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "servicemesh-grafana-0:6.4.3-3.el8.1.s390x as a component of OpenShift Service Mesh 2.0",
"product_id": "8Base-OSSM-2.0:servicemesh-grafana-0:6.4.3-3.el8.1.s390x"
},
"product_reference": "servicemesh-grafana-0:6.4.3-3.el8.1.s390x",
"relates_to_product_reference": "8Base-OSSM-2.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "servicemesh-grafana-0:6.4.3-3.el8.1.src as a component of OpenShift Service Mesh 2.0",
"product_id": "8Base-OSSM-2.0:servicemesh-grafana-0:6.4.3-3.el8.1.src"
},
"product_reference": "servicemesh-grafana-0:6.4.3-3.el8.1.src",
"relates_to_product_reference": "8Base-OSSM-2.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "servicemesh-grafana-0:6.4.3-3.el8.1.x86_64 as a component of OpenShift Service Mesh 2.0",
"product_id": "8Base-OSSM-2.0:servicemesh-grafana-0:6.4.3-3.el8.1.x86_64"
},
"product_reference": "servicemesh-grafana-0:6.4.3-3.el8.1.x86_64",
"relates_to_product_reference": "8Base-OSSM-2.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "servicemesh-grafana-prometheus-0:6.4.3-3.el8.1.ppc64le as a component of OpenShift Service Mesh 2.0",
"product_id": "8Base-OSSM-2.0:servicemesh-grafana-prometheus-0:6.4.3-3.el8.1.ppc64le"
},
"product_reference": "servicemesh-grafana-prometheus-0:6.4.3-3.el8.1.ppc64le",
"relates_to_product_reference": "8Base-OSSM-2.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "servicemesh-grafana-prometheus-0:6.4.3-3.el8.1.s390x as a component of OpenShift Service Mesh 2.0",
"product_id": "8Base-OSSM-2.0:servicemesh-grafana-prometheus-0:6.4.3-3.el8.1.s390x"
},
"product_reference": "servicemesh-grafana-prometheus-0:6.4.3-3.el8.1.s390x",
"relates_to_product_reference": "8Base-OSSM-2.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "servicemesh-grafana-prometheus-0:6.4.3-3.el8.1.x86_64 as a component of OpenShift Service Mesh 2.0",
"product_id": "8Base-OSSM-2.0:servicemesh-grafana-prometheus-0:6.4.3-3.el8.1.x86_64"
},
"product_reference": "servicemesh-grafana-prometheus-0:6.4.3-3.el8.1.x86_64",
"relates_to_product_reference": "8Base-OSSM-2.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "servicemesh-istioctl-0:2.0.2-1.el8.ppc64le as a component of OpenShift Service Mesh 2.0",
"product_id": "8Base-OSSM-2.0:servicemesh-istioctl-0:2.0.2-1.el8.ppc64le"
},
"product_reference": "servicemesh-istioctl-0:2.0.2-1.el8.ppc64le",
"relates_to_product_reference": "8Base-OSSM-2.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "servicemesh-istioctl-0:2.0.2-1.el8.s390x as a component of OpenShift Service Mesh 2.0",
"product_id": "8Base-OSSM-2.0:servicemesh-istioctl-0:2.0.2-1.el8.s390x"
},
"product_reference": "servicemesh-istioctl-0:2.0.2-1.el8.s390x",
"relates_to_product_reference": "8Base-OSSM-2.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "servicemesh-istioctl-0:2.0.2-1.el8.x86_64 as a component of OpenShift Service Mesh 2.0",
"product_id": "8Base-OSSM-2.0:servicemesh-istioctl-0:2.0.2-1.el8.x86_64"
},
"product_reference": "servicemesh-istioctl-0:2.0.2-1.el8.x86_64",
"relates_to_product_reference": "8Base-OSSM-2.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "servicemesh-mixc-0:2.0.2-1.el8.ppc64le as a component of OpenShift Service Mesh 2.0",
"product_id": "8Base-OSSM-2.0:servicemesh-mixc-0:2.0.2-1.el8.ppc64le"
},
"product_reference": "servicemesh-mixc-0:2.0.2-1.el8.ppc64le",
"relates_to_product_reference": "8Base-OSSM-2.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "servicemesh-mixc-0:2.0.2-1.el8.s390x as a component of OpenShift Service Mesh 2.0",
"product_id": "8Base-OSSM-2.0:servicemesh-mixc-0:2.0.2-1.el8.s390x"
},
"product_reference": "servicemesh-mixc-0:2.0.2-1.el8.s390x",
"relates_to_product_reference": "8Base-OSSM-2.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "servicemesh-mixc-0:2.0.2-1.el8.x86_64 as a component of OpenShift Service Mesh 2.0",
"product_id": "8Base-OSSM-2.0:servicemesh-mixc-0:2.0.2-1.el8.x86_64"
},
"product_reference": "servicemesh-mixc-0:2.0.2-1.el8.x86_64",
"relates_to_product_reference": "8Base-OSSM-2.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "servicemesh-mixs-0:2.0.2-1.el8.ppc64le as a component of OpenShift Service Mesh 2.0",
"product_id": "8Base-OSSM-2.0:servicemesh-mixs-0:2.0.2-1.el8.ppc64le"
},
"product_reference": "servicemesh-mixs-0:2.0.2-1.el8.ppc64le",
"relates_to_product_reference": "8Base-OSSM-2.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "servicemesh-mixs-0:2.0.2-1.el8.s390x as a component of OpenShift Service Mesh 2.0",
"product_id": "8Base-OSSM-2.0:servicemesh-mixs-0:2.0.2-1.el8.s390x"
},
"product_reference": "servicemesh-mixs-0:2.0.2-1.el8.s390x",
"relates_to_product_reference": "8Base-OSSM-2.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "servicemesh-mixs-0:2.0.2-1.el8.x86_64 as a component of OpenShift Service Mesh 2.0",
"product_id": "8Base-OSSM-2.0:servicemesh-mixs-0:2.0.2-1.el8.x86_64"
},
"product_reference": "servicemesh-mixs-0:2.0.2-1.el8.x86_64",
"relates_to_product_reference": "8Base-OSSM-2.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "servicemesh-operator-0:2.0.2-3.el8.ppc64le as a component of OpenShift Service Mesh 2.0",
"product_id": "8Base-OSSM-2.0:servicemesh-operator-0:2.0.2-3.el8.ppc64le"
},
"product_reference": "servicemesh-operator-0:2.0.2-3.el8.ppc64le",
"relates_to_product_reference": "8Base-OSSM-2.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "servicemesh-operator-0:2.0.2-3.el8.s390x as a component of OpenShift Service Mesh 2.0",
"product_id": "8Base-OSSM-2.0:servicemesh-operator-0:2.0.2-3.el8.s390x"
},
"product_reference": "servicemesh-operator-0:2.0.2-3.el8.s390x",
"relates_to_product_reference": "8Base-OSSM-2.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "servicemesh-operator-0:2.0.2-3.el8.src as a component of OpenShift Service Mesh 2.0",
"product_id": "8Base-OSSM-2.0:servicemesh-operator-0:2.0.2-3.el8.src"
},
"product_reference": "servicemesh-operator-0:2.0.2-3.el8.src",
"relates_to_product_reference": "8Base-OSSM-2.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "servicemesh-operator-0:2.0.2-3.el8.x86_64 as a component of OpenShift Service Mesh 2.0",
"product_id": "8Base-OSSM-2.0:servicemesh-operator-0:2.0.2-3.el8.x86_64"
},
"product_reference": "servicemesh-operator-0:2.0.2-3.el8.x86_64",
"relates_to_product_reference": "8Base-OSSM-2.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "servicemesh-pilot-agent-0:2.0.2-1.el8.ppc64le as a component of OpenShift Service Mesh 2.0",
"product_id": "8Base-OSSM-2.0:servicemesh-pilot-agent-0:2.0.2-1.el8.ppc64le"
},
"product_reference": "servicemesh-pilot-agent-0:2.0.2-1.el8.ppc64le",
"relates_to_product_reference": "8Base-OSSM-2.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "servicemesh-pilot-agent-0:2.0.2-1.el8.s390x as a component of OpenShift Service Mesh 2.0",
"product_id": "8Base-OSSM-2.0:servicemesh-pilot-agent-0:2.0.2-1.el8.s390x"
},
"product_reference": "servicemesh-pilot-agent-0:2.0.2-1.el8.s390x",
"relates_to_product_reference": "8Base-OSSM-2.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "servicemesh-pilot-agent-0:2.0.2-1.el8.x86_64 as a component of OpenShift Service Mesh 2.0",
"product_id": "8Base-OSSM-2.0:servicemesh-pilot-agent-0:2.0.2-1.el8.x86_64"
},
"product_reference": "servicemesh-pilot-agent-0:2.0.2-1.el8.x86_64",
"relates_to_product_reference": "8Base-OSSM-2.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "servicemesh-pilot-discovery-0:2.0.2-1.el8.ppc64le as a component of OpenShift Service Mesh 2.0",
"product_id": "8Base-OSSM-2.0:servicemesh-pilot-discovery-0:2.0.2-1.el8.ppc64le"
},
"product_reference": "servicemesh-pilot-discovery-0:2.0.2-1.el8.ppc64le",
"relates_to_product_reference": "8Base-OSSM-2.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "servicemesh-pilot-discovery-0:2.0.2-1.el8.s390x as a component of OpenShift Service Mesh 2.0",
"product_id": "8Base-OSSM-2.0:servicemesh-pilot-discovery-0:2.0.2-1.el8.s390x"
},
"product_reference": "servicemesh-pilot-discovery-0:2.0.2-1.el8.s390x",
"relates_to_product_reference": "8Base-OSSM-2.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "servicemesh-pilot-discovery-0:2.0.2-1.el8.x86_64 as a component of OpenShift Service Mesh 2.0",
"product_id": "8Base-OSSM-2.0:servicemesh-pilot-discovery-0:2.0.2-1.el8.x86_64"
},
"product_reference": "servicemesh-pilot-discovery-0:2.0.2-1.el8.x86_64",
"relates_to_product_reference": "8Base-OSSM-2.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "servicemesh-prometheus-0:2.14.0-3.el8.1.ppc64le as a component of OpenShift Service Mesh 2.0",
"product_id": "8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-3.el8.1.ppc64le"
},
"product_reference": "servicemesh-prometheus-0:2.14.0-3.el8.1.ppc64le",
"relates_to_product_reference": "8Base-OSSM-2.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "servicemesh-prometheus-0:2.14.0-3.el8.1.s390x as a component of OpenShift Service Mesh 2.0",
"product_id": "8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-3.el8.1.s390x"
},
"product_reference": "servicemesh-prometheus-0:2.14.0-3.el8.1.s390x",
"relates_to_product_reference": "8Base-OSSM-2.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "servicemesh-prometheus-0:2.14.0-3.el8.1.src as a component of OpenShift Service Mesh 2.0",
"product_id": "8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-3.el8.1.src"
},
"product_reference": "servicemesh-prometheus-0:2.14.0-3.el8.1.src",
"relates_to_product_reference": "8Base-OSSM-2.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "servicemesh-prometheus-0:2.14.0-3.el8.1.x86_64 as a component of OpenShift Service Mesh 2.0",
"product_id": "8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-3.el8.1.x86_64"
},
"product_reference": "servicemesh-prometheus-0:2.14.0-3.el8.1.x86_64",
"relates_to_product_reference": "8Base-OSSM-2.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "servicemesh-proxy-0:2.0.2-1.el8.ppc64le as a component of OpenShift Service Mesh 2.0",
"product_id": "8Base-OSSM-2.0:servicemesh-proxy-0:2.0.2-1.el8.ppc64le"
},
"product_reference": "servicemesh-proxy-0:2.0.2-1.el8.ppc64le",
"relates_to_product_reference": "8Base-OSSM-2.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "servicemesh-proxy-0:2.0.2-1.el8.s390x as a component of OpenShift Service Mesh 2.0",
"product_id": "8Base-OSSM-2.0:servicemesh-proxy-0:2.0.2-1.el8.s390x"
},
"product_reference": "servicemesh-proxy-0:2.0.2-1.el8.s390x",
"relates_to_product_reference": "8Base-OSSM-2.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "servicemesh-proxy-0:2.0.2-1.el8.src as a component of OpenShift Service Mesh 2.0",
"product_id": "8Base-OSSM-2.0:servicemesh-proxy-0:2.0.2-1.el8.src"
},
"product_reference": "servicemesh-proxy-0:2.0.2-1.el8.src",
"relates_to_product_reference": "8Base-OSSM-2.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "servicemesh-proxy-0:2.0.2-1.el8.x86_64 as a component of OpenShift Service Mesh 2.0",
"product_id": "8Base-OSSM-2.0:servicemesh-proxy-0:2.0.2-1.el8.x86_64"
},
"product_reference": "servicemesh-proxy-0:2.0.2-1.el8.x86_64",
"relates_to_product_reference": "8Base-OSSM-2.0"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2020-28362",
"cwe": {
"id": "CWE-295",
"name": "Improper Certificate Validation"
},
"discovery_date": "2020-11-12T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"8Base-OSSM-2.0:servicemesh-0:2.0.2-1.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-0:2.0.2-1.el8.s390x",
"8Base-OSSM-2.0:servicemesh-0:2.0.2-1.el8.src",
"8Base-OSSM-2.0:servicemesh-0:2.0.2-1.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-cni-0:2.0.2-2.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-cni-0:2.0.2-2.el8.s390x",
"8Base-OSSM-2.0:servicemesh-cni-0:2.0.2-2.el8.src",
"8Base-OSSM-2.0:servicemesh-cni-0:2.0.2-2.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-grafana-0:6.4.3-3.el8.1.ppc64le",
"8Base-OSSM-2.0:servicemesh-grafana-0:6.4.3-3.el8.1.s390x",
"8Base-OSSM-2.0:servicemesh-grafana-0:6.4.3-3.el8.1.src",
"8Base-OSSM-2.0:servicemesh-grafana-0:6.4.3-3.el8.1.x86_64",
"8Base-OSSM-2.0:servicemesh-grafana-prometheus-0:6.4.3-3.el8.1.ppc64le",
"8Base-OSSM-2.0:servicemesh-grafana-prometheus-0:6.4.3-3.el8.1.s390x",
"8Base-OSSM-2.0:servicemesh-grafana-prometheus-0:6.4.3-3.el8.1.x86_64",
"8Base-OSSM-2.0:servicemesh-istioctl-0:2.0.2-1.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-istioctl-0:2.0.2-1.el8.s390x",
"8Base-OSSM-2.0:servicemesh-istioctl-0:2.0.2-1.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-mixc-0:2.0.2-1.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-mixc-0:2.0.2-1.el8.s390x",
"8Base-OSSM-2.0:servicemesh-mixc-0:2.0.2-1.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-mixs-0:2.0.2-1.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-mixs-0:2.0.2-1.el8.s390x",
"8Base-OSSM-2.0:servicemesh-mixs-0:2.0.2-1.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-operator-0:2.0.2-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-operator-0:2.0.2-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-operator-0:2.0.2-3.el8.src",
"8Base-OSSM-2.0:servicemesh-operator-0:2.0.2-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-pilot-agent-0:2.0.2-1.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-pilot-agent-0:2.0.2-1.el8.s390x",
"8Base-OSSM-2.0:servicemesh-pilot-agent-0:2.0.2-1.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-pilot-discovery-0:2.0.2-1.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-pilot-discovery-0:2.0.2-1.el8.s390x",
"8Base-OSSM-2.0:servicemesh-pilot-discovery-0:2.0.2-1.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-3.el8.1.ppc64le",
"8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-3.el8.1.s390x",
"8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-3.el8.1.src",
"8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-3.el8.1.x86_64",
"8Base-OSSM-2.0:servicemesh-proxy-0:2.0.2-1.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-proxy-0:2.0.2-1.el8.s390x",
"8Base-OSSM-2.0:servicemesh-proxy-0:2.0.2-1.el8.src",
"8Base-OSSM-2.0:servicemesh-proxy-0:2.0.2-1.el8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1897635"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the math/big package of Go\u0027s standard library that causes a denial of service. Applications written in Go that use math/big via cryptographic packages, including crypto/rsa and crypto/x509, are vulnerable and can potentially cause panic via a crafted certificate chain. The highest threat from this vulnerability is to system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: math/big: panic during recursive division of very large numbers",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "OpenShift ServiceMesh (OSSM) 1.1 is Out Of Support Scope (OOSS) for Moderate and Low impact vulnerabilities because it is now in the Maintenance Phase of the support.\nOpenshift Virtualization 1 (formerly Container Native Virtualization) is Out Of Support Scope (OOSS) for Moderate and Low impact vulnerabilities.\n\nRed Hat Gluster Storage 3 shipped multi-cloud-object-gateway-cli and noobaa-operator container as a technical preview and is not currently planned to be addressed in future updates.\n\nOpenShift Container Platform (OCP) 4.5 and earlier are built with Go versions earlier than 1.14, which are not affected by this vulnerability. OCP 4.6 is built with Go 1.15 and is affected.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-OSSM-2.0:kiali-0:v1.24.4.redhat2-1.el8.ppc64le",
"8Base-OSSM-2.0:kiali-0:v1.24.4.redhat2-1.el8.s390x",
"8Base-OSSM-2.0:kiali-0:v1.24.4.redhat2-1.el8.src",
"8Base-OSSM-2.0:kiali-0:v1.24.4.redhat2-1.el8.x86_64"
],
"known_not_affected": [
"8Base-OSSM-2.0:servicemesh-0:2.0.2-1.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-0:2.0.2-1.el8.s390x",
"8Base-OSSM-2.0:servicemesh-0:2.0.2-1.el8.src",
"8Base-OSSM-2.0:servicemesh-0:2.0.2-1.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-cni-0:2.0.2-2.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-cni-0:2.0.2-2.el8.s390x",
"8Base-OSSM-2.0:servicemesh-cni-0:2.0.2-2.el8.src",
"8Base-OSSM-2.0:servicemesh-cni-0:2.0.2-2.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-grafana-0:6.4.3-3.el8.1.ppc64le",
"8Base-OSSM-2.0:servicemesh-grafana-0:6.4.3-3.el8.1.s390x",
"8Base-OSSM-2.0:servicemesh-grafana-0:6.4.3-3.el8.1.src",
"8Base-OSSM-2.0:servicemesh-grafana-0:6.4.3-3.el8.1.x86_64",
"8Base-OSSM-2.0:servicemesh-grafana-prometheus-0:6.4.3-3.el8.1.ppc64le",
"8Base-OSSM-2.0:servicemesh-grafana-prometheus-0:6.4.3-3.el8.1.s390x",
"8Base-OSSM-2.0:servicemesh-grafana-prometheus-0:6.4.3-3.el8.1.x86_64",
"8Base-OSSM-2.0:servicemesh-istioctl-0:2.0.2-1.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-istioctl-0:2.0.2-1.el8.s390x",
"8Base-OSSM-2.0:servicemesh-istioctl-0:2.0.2-1.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-mixc-0:2.0.2-1.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-mixc-0:2.0.2-1.el8.s390x",
"8Base-OSSM-2.0:servicemesh-mixc-0:2.0.2-1.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-mixs-0:2.0.2-1.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-mixs-0:2.0.2-1.el8.s390x",
"8Base-OSSM-2.0:servicemesh-mixs-0:2.0.2-1.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-operator-0:2.0.2-3.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-operator-0:2.0.2-3.el8.s390x",
"8Base-OSSM-2.0:servicemesh-operator-0:2.0.2-3.el8.src",
"8Base-OSSM-2.0:servicemesh-operator-0:2.0.2-3.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-pilot-agent-0:2.0.2-1.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-pilot-agent-0:2.0.2-1.el8.s390x",
"8Base-OSSM-2.0:servicemesh-pilot-agent-0:2.0.2-1.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-pilot-discovery-0:2.0.2-1.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-pilot-discovery-0:2.0.2-1.el8.s390x",
"8Base-OSSM-2.0:servicemesh-pilot-discovery-0:2.0.2-1.el8.x86_64",
"8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-3.el8.1.ppc64le",
"8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-3.el8.1.s390x",
"8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-3.el8.1.src",
"8Base-OSSM-2.0:servicemesh-prometheus-0:2.14.0-3.el8.1.x86_64",
"8Base-OSSM-2.0:servicemesh-proxy-0:2.0.2-1.el8.ppc64le",
"8Base-OSSM-2.0:servicemesh-proxy-0:2.0.2-1.el8.s390x",
"8Base-OSSM-2.0:servicemesh-proxy-0:2.0.2-1.el8.src",
"8Base-OSSM-2.0:servicemesh-proxy-0:2.0.2-1.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-28362"
},
{
"category": "external",
"summary": "RHBZ#1897635",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1897635"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-28362",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-28362"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-28362",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-28362"
}
],
"release_date": "2020-11-12T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-02-11T11:59:56+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"8Base-OSSM-2.0:kiali-0:v1.24.4.redhat2-1.el8.ppc64le",
"8Base-OSSM-2.0:kiali-0:v1.24.4.redhat2-1.el8.s390x",
"8Base-OSSM-2.0:kiali-0:v1.24.4.redhat2-1.el8.src",
"8Base-OSSM-2.0:kiali-0:v1.24.4.redhat2-1.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHBA-2021:0482"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"8Base-OSSM-2.0:kiali-0:v1.24.4.redhat2-1.el8.ppc64le",
"8Base-OSSM-2.0:kiali-0:v1.24.4.redhat2-1.el8.s390x",
"8Base-OSSM-2.0:kiali-0:v1.24.4.redhat2-1.el8.src",
"8Base-OSSM-2.0:kiali-0:v1.24.4.redhat2-1.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "golang: math/big: panic during recursive division of very large numbers"
}
]
}
Sightings
| Author | Source | Type | Date | Other |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.