Action not permitted
Modal body text goes here.
cve-2020-29652
Vulnerability from cvelistv5
Published
2020-12-17 04:12
Modified
2024-08-04 16:55
Severity
Summary
A nil pointer dereference in the golang.org/x/crypto/ssh component through v0.0.0-20201203163018-be400aefbc4c for Go allows remote attackers to cause a denial of service against SSH servers.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T16:55:10.695Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://groups.google.com/g/golang-announce/c/ouZIlBimOsE?pli=1" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://go-review.googlesource.com/c/crypto/+/278852" }, { "name": "[skywalking-notifications] 20211018 [GitHub] [skywalking-swck] hanahmily opened a new pull request #37: Fix vulnerabilities", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.apache.org/thread.html/r68032132c0399c29d6cdc7bd44918535da54060a10a12b1591328bff%40%3Cnotifications.skywalking.apache.org%3E" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "A nil pointer dereference in the golang.org/x/crypto/ssh component through v0.0.0-20201203163018-be400aefbc4c for Go allows remote attackers to cause a denial of service against SSH servers." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-10-18T05:06:13", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://groups.google.com/g/golang-announce/c/ouZIlBimOsE?pli=1" }, { "tags": [ "x_refsource_MISC" ], "url": "https://go-review.googlesource.com/c/crypto/+/278852" }, { "name": "[skywalking-notifications] 20211018 [GitHub] [skywalking-swck] hanahmily opened a new pull request #37: Fix vulnerabilities", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.apache.org/thread.html/r68032132c0399c29d6cdc7bd44918535da54060a10a12b1591328bff%40%3Cnotifications.skywalking.apache.org%3E" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2020-29652", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A nil pointer dereference in the golang.org/x/crypto/ssh component through v0.0.0-20201203163018-be400aefbc4c for Go allows remote attackers to cause a denial of service against SSH servers." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://groups.google.com/g/golang-announce/c/ouZIlBimOsE?pli=1", "refsource": "MISC", "url": "https://groups.google.com/g/golang-announce/c/ouZIlBimOsE?pli=1" }, { "name": "https://go-review.googlesource.com/c/crypto/+/278852", "refsource": "MISC", "url": "https://go-review.googlesource.com/c/crypto/+/278852" }, { "name": "[skywalking-notifications] 20211018 [GitHub] [skywalking-swck] hanahmily opened a new pull request #37: Fix vulnerabilities", "refsource": "MLIST", "url": "https://lists.apache.org/thread.html/r68032132c0399c29d6cdc7bd44918535da54060a10a12b1591328bff@%3Cnotifications.skywalking.apache.org%3E" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2020-29652", "datePublished": "2020-12-17T04:12:17", "dateReserved": "2020-12-09T00:00:00", "dateUpdated": "2024-08-04T16:55:10.695Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2020-29652\",\"sourceIdentifier\":\"cve@mitre.org\",\"published\":\"2020-12-17T05:15:10.580\",\"lastModified\":\"2023-11-07T03:21:32.983\",\"vulnStatus\":\"Modified\",\"descriptions\":[{\"lang\":\"en\",\"value\":\"A nil pointer dereference in the golang.org/x/crypto/ssh component through v0.0.0-20201203163018-be400aefbc4c for Go allows remote attackers to cause a denial of service against SSH servers.\"},{\"lang\":\"es\",\"value\":\"Una desreferencia de puntero null en el componente golang.org/x/crypto/ssh versiones hasta v0.0.0-20201203163018-be400aefbc4c para Go, permite a atacantes remotos causar una denegaci\u00f3n de servicio contra servidores SSH\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"HIGH\",\"baseScore\":7.5,\"baseSeverity\":\"HIGH\"},\"exploitabilityScore\":3.9,\"impactScore\":3.6}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:L/Au:N/C:N/I:N/A:P\",\"accessVector\":\"NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"PARTIAL\",\"baseScore\":5.0},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":10.0,\"impactScore\":2.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-476\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:golang:ssh:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"0.0.0-20201203163018-be400aefbc4c\",\"matchCriteriaId\":\"997992AC-BE5D-4E27-8042-B64AA2B2AA81\"}]}]}],\"references\":[{\"url\":\"https://go-review.googlesource.com/c/crypto/+/278852\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://groups.google.com/g/golang-announce/c/ouZIlBimOsE?pli=1\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://lists.apache.org/thread.html/r68032132c0399c29d6cdc7bd44918535da54060a10a12b1591328bff%40%3Cnotifications.skywalking.apache.org%3E\",\"source\":\"cve@mitre.org\"}]}}" } }
rhsa-2021_1796
Vulnerability from csaf_redhat
Published
2021-05-18 14:16
Modified
2024-09-18 04:18
Summary
Red Hat Security Advisory: container-tools:rhel8 security, bug fix, and enhancement update
Notes
Topic
An update for the container-tools:rhel8 module is now available for Red Hat Enterprise Linux 8.
Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc.
Security Fix(es):
* golang: crypto/ssh: crafted authentication request can lead to nil pointer dereference (CVE-2020-29652)
* podman: Remote traffic to rootless containers is seen as orginating from localhost (CVE-2021-20199)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.4 Release Notes linked from the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_vex", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for the container-tools:rhel8 module is now available for Red Hat Enterprise Linux 8.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc.\n\nSecurity Fix(es):\n\n* golang: crypto/ssh: crafted authentication request can lead to nil pointer dereference (CVE-2020-29652)\n\n* podman: Remote traffic to rootless containers is seen as orginating from localhost (CVE-2021-20199)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.4 Release Notes linked from the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat offerings.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2021:1796", "url": "https://access.redhat.com/errata/RHSA-2021:1796" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#moderate", "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "category": "external", "summary": "https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/8/html/8.4_release_notes/", "url": "https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/8/html/8.4_release_notes/" }, { "category": "external", "summary": "1707078", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1707078" }, { "category": "external", "summary": "1724946", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1724946" }, { "category": "external", "summary": "1726442", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1726442" }, { "category": "external", "summary": "1763007", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1763007" }, { "category": "external", "summary": "1770037", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1770037" }, { "category": "external", "summary": "1798278", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1798278" }, { "category": "external", "summary": "1811773", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1811773" }, { "category": "external", "summary": "1838233", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1838233" }, { "category": "external", "summary": "1841485", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1841485" }, { "category": "external", "summary": "1844199", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1844199" }, { "category": "external", "summary": "1853455", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1853455" }, { "category": "external", "summary": "1860176", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1860176" }, { "category": "external", "summary": "1867892", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1867892" }, { "category": "external", "summary": "1881894", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1881894" }, { "category": "external", "summary": "1897282", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1897282" }, { "category": "external", "summary": "1897594", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1897594" }, { "category": "external", "summary": "1902979", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1902979" }, { "category": "external", "summary": "1903813", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1903813" }, { "category": "external", "summary": "1904549", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1904549" }, { "category": "external", "summary": "1908883", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1908883" }, { "category": "external", "summary": "1915383", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1915383" }, { "category": "external", "summary": "1918554", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1918554" }, { "category": "external", "summary": "1919050", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1919050" }, { "category": "external", "summary": "1921128", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1921128" }, { "category": "external", "summary": "1923986", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1923986" }, { "category": "external", "summary": "1924146", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1924146" }, { "category": "external", "summary": "1931545", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1931545" }, { "category": "external", "summary": "1931785", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1931785" }, { "category": "external", "summary": "1932083", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1932083" }, { "category": "external", "summary": "1935376", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1935376" }, { "category": "external", "summary": "1935922", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1935922" }, { "category": "external", "summary": "1936927", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1936927" }, { "category": "external", "summary": "1937487", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1937487" }, { "category": "external", "summary": "1938234", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1938234" }, { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/data/csaf/v2/advisories/2021/rhsa-2021_1796.json" } ], "title": "Red Hat Security Advisory: container-tools:rhel8 security, bug fix, and enhancement update", "tracking": { "current_release_date": "2024-09-18T04:18:37+00:00", "generator": { "date": "2024-09-18T04:18:37+00:00", "engine": { "name": "Red Hat SDEngine", "version": "3.33.3" } }, "id": "RHSA-2021:1796", "initial_release_date": "2021-05-18T14:16:32+00:00", "revision_history": [ { "date": "2021-05-18T14:16:32+00:00", "number": "1", "summary": "Initial version" }, { "date": "2021-05-18T14:16:32+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-09-18T04:18:37+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux AppStream (v. 8)", "product": { "name": "Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.4.0.GA", "product_identification_helper": { "cpe": "cpe:/a:redhat:enterprise_linux:8::appstream" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "container-tools:rhel8:8040020210407081426:59631bd5", "product": { "name": "container-tools:rhel8:8040020210407081426:59631bd5", "product_id": "container-tools:rhel8:8040020210407081426:59631bd5", "product_identification_helper": { "purl": "pkg:rpmmod/redhat/container-tools@rhel8:8040020210407081426:59631bd5" } } }, { "category": "product_version", "name": "cockpit-podman-0:29-2.module+el8.4.0+10607+f4da7515.noarch", "product": { "name": "cockpit-podman-0:29-2.module+el8.4.0+10607+f4da7515.noarch", "product_id": "cockpit-podman-0:29-2.module+el8.4.0+10607+f4da7515.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/cockpit-podman@29-2.module%2Bel8.4.0%2B10607%2Bf4da7515?arch=noarch" } } }, { "category": "product_version", "name": "container-selinux-2:2.158.0-1.module+el8.4.0+10607+f4da7515.noarch", "product": { "name": "container-selinux-2:2.158.0-1.module+el8.4.0+10607+f4da7515.noarch", "product_id": "container-selinux-2:2.158.0-1.module+el8.4.0+10607+f4da7515.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/container-selinux@2.158.0-1.module%2Bel8.4.0%2B10607%2Bf4da7515?arch=noarch\u0026epoch=2" } } }, { "category": "product_version", "name": "podman-docker-0:3.0.1-6.module+el8.4.0+10607+f4da7515.noarch", "product": { "name": "podman-docker-0:3.0.1-6.module+el8.4.0+10607+f4da7515.noarch", "product_id": "podman-docker-0:3.0.1-6.module+el8.4.0+10607+f4da7515.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman-docker@3.0.1-6.module%2Bel8.4.0%2B10607%2Bf4da7515?arch=noarch" } } }, { "category": "product_version", "name": "toolbox-0:0.0.8-1.module+el8.4.0+10607+f4da7515.noarch", "product": { "name": "toolbox-0:0.0.8-1.module+el8.4.0+10607+f4da7515.noarch", "product_id": "toolbox-0:0.0.8-1.module+el8.4.0+10607+f4da7515.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/toolbox@0.0.8-1.module%2Bel8.4.0%2B10607%2Bf4da7515?arch=noarch" } } }, { "category": "product_version", "name": "udica-0:0.2.4-1.module+el8.4.0+10607+f4da7515.noarch", "product": { "name": "udica-0:0.2.4-1.module+el8.4.0+10607+f4da7515.noarch", "product_id": "udica-0:0.2.4-1.module+el8.4.0+10607+f4da7515.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/udica@0.2.4-1.module%2Bel8.4.0%2B10607%2Bf4da7515?arch=noarch" } } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "conmon-debugsource-2:2.0.26-1.module+el8.4.0+10607+f4da7515.x86_64", "product": { "name": "conmon-debugsource-2:2.0.26-1.module+el8.4.0+10607+f4da7515.x86_64", "product_id": "conmon-debugsource-2:2.0.26-1.module+el8.4.0+10607+f4da7515.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/conmon-debugsource@2.0.26-1.module%2Bel8.4.0%2B10607%2Bf4da7515?arch=x86_64\u0026epoch=2" } } }, { "category": "product_version", "name": "containernetworking-plugins-0:0.9.1-1.module+el8.4.0+10607+f4da7515.x86_64", "product": { "name": "containernetworking-plugins-0:0.9.1-1.module+el8.4.0+10607+f4da7515.x86_64", "product_id": "containernetworking-plugins-0:0.9.1-1.module+el8.4.0+10607+f4da7515.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/containernetworking-plugins@0.9.1-1.module%2Bel8.4.0%2B10607%2Bf4da7515?arch=x86_64" } } }, { "category": "product_version", "name": "containernetworking-plugins-debuginfo-0:0.9.1-1.module+el8.4.0+10607+f4da7515.x86_64", "product": { "name": "containernetworking-plugins-debuginfo-0:0.9.1-1.module+el8.4.0+10607+f4da7515.x86_64", "product_id": "containernetworking-plugins-debuginfo-0:0.9.1-1.module+el8.4.0+10607+f4da7515.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/containernetworking-plugins-debuginfo@0.9.1-1.module%2Bel8.4.0%2B10607%2Bf4da7515?arch=x86_64" } } }, { "category": "product_version", "name": "containernetworking-plugins-debugsource-0:0.9.1-1.module+el8.4.0+10607+f4da7515.x86_64", "product": { "name": "containernetworking-plugins-debugsource-0:0.9.1-1.module+el8.4.0+10607+f4da7515.x86_64", "product_id": "containernetworking-plugins-debugsource-0:0.9.1-1.module+el8.4.0+10607+f4da7515.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/containernetworking-plugins-debugsource@0.9.1-1.module%2Bel8.4.0%2B10607%2Bf4da7515?arch=x86_64" } } }, { "category": "product_version", "name": "containers-common-1:1.2.2-8.module+el8.4.0+10607+f4da7515.x86_64", "product": { "name": "containers-common-1:1.2.2-8.module+el8.4.0+10607+f4da7515.x86_64", "product_id": "containers-common-1:1.2.2-8.module+el8.4.0+10607+f4da7515.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/containers-common@1.2.2-8.module%2Bel8.4.0%2B10607%2Bf4da7515?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "crit-0:3.15-1.module+el8.4.0+10607+f4da7515.x86_64", "product": { "name": "crit-0:3.15-1.module+el8.4.0+10607+f4da7515.x86_64", "product_id": "crit-0:3.15-1.module+el8.4.0+10607+f4da7515.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/crit@3.15-1.module%2Bel8.4.0%2B10607%2Bf4da7515?arch=x86_64" } } }, { "category": "product_version", "name": "criu-0:3.15-1.module+el8.4.0+10607+f4da7515.x86_64", "product": { "name": "criu-0:3.15-1.module+el8.4.0+10607+f4da7515.x86_64", "product_id": "criu-0:3.15-1.module+el8.4.0+10607+f4da7515.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/criu@3.15-1.module%2Bel8.4.0%2B10607%2Bf4da7515?arch=x86_64" } } }, { "category": "product_version", "name": "criu-debuginfo-0:3.15-1.module+el8.4.0+10607+f4da7515.x86_64", "product": { "name": "criu-debuginfo-0:3.15-1.module+el8.4.0+10607+f4da7515.x86_64", "product_id": "criu-debuginfo-0:3.15-1.module+el8.4.0+10607+f4da7515.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/criu-debuginfo@3.15-1.module%2Bel8.4.0%2B10607%2Bf4da7515?arch=x86_64" } } }, { "category": "product_version", "name": "criu-debugsource-0:3.15-1.module+el8.4.0+10607+f4da7515.x86_64", "product": { "name": "criu-debugsource-0:3.15-1.module+el8.4.0+10607+f4da7515.x86_64", "product_id": "criu-debugsource-0:3.15-1.module+el8.4.0+10607+f4da7515.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/criu-debugsource@3.15-1.module%2Bel8.4.0%2B10607%2Bf4da7515?arch=x86_64" } } }, { "category": "product_version", "name": "crun-0:0.18-1.module+el8.4.0+10607+f4da7515.x86_64", "product": { "name": "crun-0:0.18-1.module+el8.4.0+10607+f4da7515.x86_64", "product_id": "crun-0:0.18-1.module+el8.4.0+10607+f4da7515.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/crun@0.18-1.module%2Bel8.4.0%2B10607%2Bf4da7515?arch=x86_64" } } }, { "category": "product_version", "name": "crun-debuginfo-0:0.18-1.module+el8.4.0+10607+f4da7515.x86_64", "product": { "name": "crun-debuginfo-0:0.18-1.module+el8.4.0+10607+f4da7515.x86_64", "product_id": "crun-debuginfo-0:0.18-1.module+el8.4.0+10607+f4da7515.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/crun-debuginfo@0.18-1.module%2Bel8.4.0%2B10607%2Bf4da7515?arch=x86_64" } } }, { "category": "product_version", "name": "crun-debugsource-0:0.18-1.module+el8.4.0+10607+f4da7515.x86_64", "product": { "name": "crun-debugsource-0:0.18-1.module+el8.4.0+10607+f4da7515.x86_64", "product_id": "crun-debugsource-0:0.18-1.module+el8.4.0+10607+f4da7515.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/crun-debugsource@0.18-1.module%2Bel8.4.0%2B10607%2Bf4da7515?arch=x86_64" } } }, { "category": "product_version", "name": "fuse-overlayfs-0:1.4.0-2.module+el8.4.0+10607+f4da7515.x86_64", "product": { "name": "fuse-overlayfs-0:1.4.0-2.module+el8.4.0+10607+f4da7515.x86_64", "product_id": "fuse-overlayfs-0:1.4.0-2.module+el8.4.0+10607+f4da7515.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/fuse-overlayfs@1.4.0-2.module%2Bel8.4.0%2B10607%2Bf4da7515?arch=x86_64" } } }, { "category": "product_version", "name": "fuse-overlayfs-debuginfo-0:1.4.0-2.module+el8.4.0+10607+f4da7515.x86_64", "product": { "name": "fuse-overlayfs-debuginfo-0:1.4.0-2.module+el8.4.0+10607+f4da7515.x86_64", "product_id": "fuse-overlayfs-debuginfo-0:1.4.0-2.module+el8.4.0+10607+f4da7515.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/fuse-overlayfs-debuginfo@1.4.0-2.module%2Bel8.4.0%2B10607%2Bf4da7515?arch=x86_64" } } }, { "category": "product_version", "name": "fuse-overlayfs-debugsource-0:1.4.0-2.module+el8.4.0+10607+f4da7515.x86_64", "product": { "name": "fuse-overlayfs-debugsource-0:1.4.0-2.module+el8.4.0+10607+f4da7515.x86_64", "product_id": "fuse-overlayfs-debugsource-0:1.4.0-2.module+el8.4.0+10607+f4da7515.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/fuse-overlayfs-debugsource@1.4.0-2.module%2Bel8.4.0%2B10607%2Bf4da7515?arch=x86_64" } } }, { "category": "product_version", "name": "libslirp-0:4.3.1-1.module+el8.4.0+10607+f4da7515.x86_64", "product": { "name": "libslirp-0:4.3.1-1.module+el8.4.0+10607+f4da7515.x86_64", "product_id": "libslirp-0:4.3.1-1.module+el8.4.0+10607+f4da7515.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/libslirp@4.3.1-1.module%2Bel8.4.0%2B10607%2Bf4da7515?arch=x86_64" } } }, { "category": "product_version", "name": "libslirp-debuginfo-0:4.3.1-1.module+el8.4.0+10607+f4da7515.x86_64", "product": { "name": "libslirp-debuginfo-0:4.3.1-1.module+el8.4.0+10607+f4da7515.x86_64", "product_id": "libslirp-debuginfo-0:4.3.1-1.module+el8.4.0+10607+f4da7515.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/libslirp-debuginfo@4.3.1-1.module%2Bel8.4.0%2B10607%2Bf4da7515?arch=x86_64" } } }, { "category": "product_version", "name": "libslirp-debugsource-0:4.3.1-1.module+el8.4.0+10607+f4da7515.x86_64", "product": { "name": "libslirp-debugsource-0:4.3.1-1.module+el8.4.0+10607+f4da7515.x86_64", "product_id": "libslirp-debugsource-0:4.3.1-1.module+el8.4.0+10607+f4da7515.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/libslirp-debugsource@4.3.1-1.module%2Bel8.4.0%2B10607%2Bf4da7515?arch=x86_64" } } }, { "category": "product_version", "name": "libslirp-devel-0:4.3.1-1.module+el8.4.0+10607+f4da7515.x86_64", "product": { "name": "libslirp-devel-0:4.3.1-1.module+el8.4.0+10607+f4da7515.x86_64", "product_id": "libslirp-devel-0:4.3.1-1.module+el8.4.0+10607+f4da7515.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/libslirp-devel@4.3.1-1.module%2Bel8.4.0%2B10607%2Bf4da7515?arch=x86_64" } } }, { "category": "product_version", "name": "oci-seccomp-bpf-hook-0:1.2.0-2.module+el8.4.0+10607+f4da7515.x86_64", "product": { "name": "oci-seccomp-bpf-hook-0:1.2.0-2.module+el8.4.0+10607+f4da7515.x86_64", "product_id": "oci-seccomp-bpf-hook-0:1.2.0-2.module+el8.4.0+10607+f4da7515.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/oci-seccomp-bpf-hook@1.2.0-2.module%2Bel8.4.0%2B10607%2Bf4da7515?arch=x86_64" } } }, { "category": "product_version", "name": "oci-seccomp-bpf-hook-debuginfo-0:1.2.0-2.module+el8.4.0+10607+f4da7515.x86_64", "product": { "name": "oci-seccomp-bpf-hook-debuginfo-0:1.2.0-2.module+el8.4.0+10607+f4da7515.x86_64", "product_id": "oci-seccomp-bpf-hook-debuginfo-0:1.2.0-2.module+el8.4.0+10607+f4da7515.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/oci-seccomp-bpf-hook-debuginfo@1.2.0-2.module%2Bel8.4.0%2B10607%2Bf4da7515?arch=x86_64" } } }, { "category": "product_version", "name": "oci-seccomp-bpf-hook-debugsource-0:1.2.0-2.module+el8.4.0+10607+f4da7515.x86_64", "product": { "name": "oci-seccomp-bpf-hook-debugsource-0:1.2.0-2.module+el8.4.0+10607+f4da7515.x86_64", "product_id": "oci-seccomp-bpf-hook-debugsource-0:1.2.0-2.module+el8.4.0+10607+f4da7515.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/oci-seccomp-bpf-hook-debugsource@1.2.0-2.module%2Bel8.4.0%2B10607%2Bf4da7515?arch=x86_64" } } }, { "category": "product_version", "name": "podman-0:3.0.1-6.module+el8.4.0+10607+f4da7515.x86_64", "product": { "name": "podman-0:3.0.1-6.module+el8.4.0+10607+f4da7515.x86_64", "product_id": "podman-0:3.0.1-6.module+el8.4.0+10607+f4da7515.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman@3.0.1-6.module%2Bel8.4.0%2B10607%2Bf4da7515?arch=x86_64" } } }, { "category": "product_version", "name": "podman-catatonit-0:3.0.1-6.module+el8.4.0+10607+f4da7515.x86_64", "product": { "name": "podman-catatonit-0:3.0.1-6.module+el8.4.0+10607+f4da7515.x86_64", "product_id": "podman-catatonit-0:3.0.1-6.module+el8.4.0+10607+f4da7515.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman-catatonit@3.0.1-6.module%2Bel8.4.0%2B10607%2Bf4da7515?arch=x86_64" } } }, { "category": "product_version", "name": "podman-catatonit-debuginfo-0:3.0.1-6.module+el8.4.0+10607+f4da7515.x86_64", "product": { "name": "podman-catatonit-debuginfo-0:3.0.1-6.module+el8.4.0+10607+f4da7515.x86_64", "product_id": "podman-catatonit-debuginfo-0:3.0.1-6.module+el8.4.0+10607+f4da7515.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman-catatonit-debuginfo@3.0.1-6.module%2Bel8.4.0%2B10607%2Bf4da7515?arch=x86_64" } } }, { "category": "product_version", "name": "podman-debuginfo-0:3.0.1-6.module+el8.4.0+10607+f4da7515.x86_64", "product": { "name": "podman-debuginfo-0:3.0.1-6.module+el8.4.0+10607+f4da7515.x86_64", "product_id": "podman-debuginfo-0:3.0.1-6.module+el8.4.0+10607+f4da7515.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman-debuginfo@3.0.1-6.module%2Bel8.4.0%2B10607%2Bf4da7515?arch=x86_64" } } }, { "category": "product_version", "name": "podman-debugsource-0:3.0.1-6.module+el8.4.0+10607+f4da7515.x86_64", "product": { "name": "podman-debugsource-0:3.0.1-6.module+el8.4.0+10607+f4da7515.x86_64", "product_id": "podman-debugsource-0:3.0.1-6.module+el8.4.0+10607+f4da7515.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman-debugsource@3.0.1-6.module%2Bel8.4.0%2B10607%2Bf4da7515?arch=x86_64" } } }, { "category": "product_version", "name": "podman-plugins-0:3.0.1-6.module+el8.4.0+10607+f4da7515.x86_64", "product": { "name": "podman-plugins-0:3.0.1-6.module+el8.4.0+10607+f4da7515.x86_64", "product_id": "podman-plugins-0:3.0.1-6.module+el8.4.0+10607+f4da7515.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman-plugins@3.0.1-6.module%2Bel8.4.0%2B10607%2Bf4da7515?arch=x86_64" } } }, { "category": "product_version", "name": "podman-plugins-debuginfo-0:3.0.1-6.module+el8.4.0+10607+f4da7515.x86_64", "product": { "name": "podman-plugins-debuginfo-0:3.0.1-6.module+el8.4.0+10607+f4da7515.x86_64", "product_id": "podman-plugins-debuginfo-0:3.0.1-6.module+el8.4.0+10607+f4da7515.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman-plugins-debuginfo@3.0.1-6.module%2Bel8.4.0%2B10607%2Bf4da7515?arch=x86_64" } } }, { "category": "product_version", "name": "podman-remote-0:3.0.1-6.module+el8.4.0+10607+f4da7515.x86_64", "product": { "name": "podman-remote-0:3.0.1-6.module+el8.4.0+10607+f4da7515.x86_64", "product_id": "podman-remote-0:3.0.1-6.module+el8.4.0+10607+f4da7515.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman-remote@3.0.1-6.module%2Bel8.4.0%2B10607%2Bf4da7515?arch=x86_64" } } }, { "category": "product_version", "name": "podman-remote-debuginfo-0:3.0.1-6.module+el8.4.0+10607+f4da7515.x86_64", "product": { "name": "podman-remote-debuginfo-0:3.0.1-6.module+el8.4.0+10607+f4da7515.x86_64", "product_id": "podman-remote-debuginfo-0:3.0.1-6.module+el8.4.0+10607+f4da7515.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman-remote-debuginfo@3.0.1-6.module%2Bel8.4.0%2B10607%2Bf4da7515?arch=x86_64" } } }, { "category": "product_version", "name": "podman-tests-0:3.0.1-6.module+el8.4.0+10607+f4da7515.x86_64", "product": { "name": "podman-tests-0:3.0.1-6.module+el8.4.0+10607+f4da7515.x86_64", "product_id": "podman-tests-0:3.0.1-6.module+el8.4.0+10607+f4da7515.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman-tests@3.0.1-6.module%2Bel8.4.0%2B10607%2Bf4da7515?arch=x86_64" } } }, { "category": "product_version", "name": "python3-criu-0:3.15-1.module+el8.4.0+10607+f4da7515.x86_64", "product": { "name": "python3-criu-0:3.15-1.module+el8.4.0+10607+f4da7515.x86_64", "product_id": "python3-criu-0:3.15-1.module+el8.4.0+10607+f4da7515.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-criu@3.15-1.module%2Bel8.4.0%2B10607%2Bf4da7515?arch=x86_64" } } }, { "category": "product_version", "name": "runc-0:1.0.0-70.rc92.module+el8.4.0+10607+f4da7515.x86_64", "product": { "name": "runc-0:1.0.0-70.rc92.module+el8.4.0+10607+f4da7515.x86_64", "product_id": "runc-0:1.0.0-70.rc92.module+el8.4.0+10607+f4da7515.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/runc@1.0.0-70.rc92.module%2Bel8.4.0%2B10607%2Bf4da7515?arch=x86_64" } } }, { "category": "product_version", "name": "runc-debuginfo-0:1.0.0-70.rc92.module+el8.4.0+10607+f4da7515.x86_64", "product": { "name": "runc-debuginfo-0:1.0.0-70.rc92.module+el8.4.0+10607+f4da7515.x86_64", "product_id": "runc-debuginfo-0:1.0.0-70.rc92.module+el8.4.0+10607+f4da7515.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/runc-debuginfo@1.0.0-70.rc92.module%2Bel8.4.0%2B10607%2Bf4da7515?arch=x86_64" } } }, { "category": "product_version", "name": "runc-debugsource-0:1.0.0-70.rc92.module+el8.4.0+10607+f4da7515.x86_64", "product": { "name": "runc-debugsource-0:1.0.0-70.rc92.module+el8.4.0+10607+f4da7515.x86_64", "product_id": "runc-debugsource-0:1.0.0-70.rc92.module+el8.4.0+10607+f4da7515.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/runc-debugsource@1.0.0-70.rc92.module%2Bel8.4.0%2B10607%2Bf4da7515?arch=x86_64" } } }, { "category": "product_version", "name": "skopeo-1:1.2.2-8.module+el8.4.0+10607+f4da7515.x86_64", "product": { "name": "skopeo-1:1.2.2-8.module+el8.4.0+10607+f4da7515.x86_64", "product_id": "skopeo-1:1.2.2-8.module+el8.4.0+10607+f4da7515.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/skopeo@1.2.2-8.module%2Bel8.4.0%2B10607%2Bf4da7515?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "skopeo-debuginfo-1:1.2.2-8.module+el8.4.0+10607+f4da7515.x86_64", "product": { "name": "skopeo-debuginfo-1:1.2.2-8.module+el8.4.0+10607+f4da7515.x86_64", "product_id": "skopeo-debuginfo-1:1.2.2-8.module+el8.4.0+10607+f4da7515.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/skopeo-debuginfo@1.2.2-8.module%2Bel8.4.0%2B10607%2Bf4da7515?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "skopeo-debugsource-1:1.2.2-8.module+el8.4.0+10607+f4da7515.x86_64", "product": { "name": "skopeo-debugsource-1:1.2.2-8.module+el8.4.0+10607+f4da7515.x86_64", "product_id": "skopeo-debugsource-1:1.2.2-8.module+el8.4.0+10607+f4da7515.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/skopeo-debugsource@1.2.2-8.module%2Bel8.4.0%2B10607%2Bf4da7515?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "skopeo-tests-1:1.2.2-8.module+el8.4.0+10607+f4da7515.x86_64", "product": { "name": "skopeo-tests-1:1.2.2-8.module+el8.4.0+10607+f4da7515.x86_64", "product_id": "skopeo-tests-1:1.2.2-8.module+el8.4.0+10607+f4da7515.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/skopeo-tests@1.2.2-8.module%2Bel8.4.0%2B10607%2Bf4da7515?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "slirp4netns-0:1.1.8-1.module+el8.4.0+10607+f4da7515.x86_64", "product": { "name": "slirp4netns-0:1.1.8-1.module+el8.4.0+10607+f4da7515.x86_64", "product_id": "slirp4netns-0:1.1.8-1.module+el8.4.0+10607+f4da7515.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/slirp4netns@1.1.8-1.module%2Bel8.4.0%2B10607%2Bf4da7515?arch=x86_64" } } }, { "category": "product_version", "name": "slirp4netns-debuginfo-0:1.1.8-1.module+el8.4.0+10607+f4da7515.x86_64", "product": { "name": "slirp4netns-debuginfo-0:1.1.8-1.module+el8.4.0+10607+f4da7515.x86_64", "product_id": "slirp4netns-debuginfo-0:1.1.8-1.module+el8.4.0+10607+f4da7515.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/slirp4netns-debuginfo@1.1.8-1.module%2Bel8.4.0%2B10607%2Bf4da7515?arch=x86_64" } } }, { "category": "product_version", "name": "slirp4netns-debugsource-0:1.1.8-1.module+el8.4.0+10607+f4da7515.x86_64", "product": { "name": "slirp4netns-debugsource-0:1.1.8-1.module+el8.4.0+10607+f4da7515.x86_64", "product_id": "slirp4netns-debugsource-0:1.1.8-1.module+el8.4.0+10607+f4da7515.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/slirp4netns-debugsource@1.1.8-1.module%2Bel8.4.0%2B10607%2Bf4da7515?arch=x86_64" } } }, { "category": "product_version", "name": "buildah-0:1.19.7-1.module+el8.4.0+10607+f4da7515.x86_64", "product": { "name": "buildah-0:1.19.7-1.module+el8.4.0+10607+f4da7515.x86_64", "product_id": "buildah-0:1.19.7-1.module+el8.4.0+10607+f4da7515.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/buildah@1.19.7-1.module%2Bel8.4.0%2B10607%2Bf4da7515?arch=x86_64" } } }, { "category": "product_version", "name": "buildah-debuginfo-0:1.19.7-1.module+el8.4.0+10607+f4da7515.x86_64", "product": { "name": "buildah-debuginfo-0:1.19.7-1.module+el8.4.0+10607+f4da7515.x86_64", "product_id": "buildah-debuginfo-0:1.19.7-1.module+el8.4.0+10607+f4da7515.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/buildah-debuginfo@1.19.7-1.module%2Bel8.4.0%2B10607%2Bf4da7515?arch=x86_64" } } }, { "category": "product_version", "name": "buildah-debugsource-0:1.19.7-1.module+el8.4.0+10607+f4da7515.x86_64", "product": { "name": "buildah-debugsource-0:1.19.7-1.module+el8.4.0+10607+f4da7515.x86_64", "product_id": "buildah-debugsource-0:1.19.7-1.module+el8.4.0+10607+f4da7515.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/buildah-debugsource@1.19.7-1.module%2Bel8.4.0%2B10607%2Bf4da7515?arch=x86_64" } } }, { "category": "product_version", "name": "buildah-tests-0:1.19.7-1.module+el8.4.0+10607+f4da7515.x86_64", "product": { "name": "buildah-tests-0:1.19.7-1.module+el8.4.0+10607+f4da7515.x86_64", "product_id": "buildah-tests-0:1.19.7-1.module+el8.4.0+10607+f4da7515.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/buildah-tests@1.19.7-1.module%2Bel8.4.0%2B10607%2Bf4da7515?arch=x86_64" } } }, { "category": "product_version", "name": "buildah-tests-debuginfo-0:1.19.7-1.module+el8.4.0+10607+f4da7515.x86_64", "product": { "name": "buildah-tests-debuginfo-0:1.19.7-1.module+el8.4.0+10607+f4da7515.x86_64", "product_id": "buildah-tests-debuginfo-0:1.19.7-1.module+el8.4.0+10607+f4da7515.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/buildah-tests-debuginfo@1.19.7-1.module%2Bel8.4.0%2B10607%2Bf4da7515?arch=x86_64" } } }, { "category": "product_version", "name": "conmon-2:2.0.26-1.module+el8.4.0+10607+f4da7515.x86_64", "product": { "name": "conmon-2:2.0.26-1.module+el8.4.0+10607+f4da7515.x86_64", "product_id": "conmon-2:2.0.26-1.module+el8.4.0+10607+f4da7515.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/conmon@2.0.26-1.module%2Bel8.4.0%2B10607%2Bf4da7515?arch=x86_64\u0026epoch=2" } } }, { "category": "product_version", "name": "conmon-debuginfo-2:2.0.26-1.module+el8.4.0+10607+f4da7515.x86_64", "product": { "name": "conmon-debuginfo-2:2.0.26-1.module+el8.4.0+10607+f4da7515.x86_64", "product_id": "conmon-debuginfo-2:2.0.26-1.module+el8.4.0+10607+f4da7515.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/conmon-debuginfo@2.0.26-1.module%2Bel8.4.0%2B10607%2Bf4da7515?arch=x86_64\u0026epoch=2" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "buildah-0:1.19.7-1.module+el8.4.0+10607+f4da7515.aarch64", "product": { "name": "buildah-0:1.19.7-1.module+el8.4.0+10607+f4da7515.aarch64", "product_id": "buildah-0:1.19.7-1.module+el8.4.0+10607+f4da7515.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/buildah@1.19.7-1.module%2Bel8.4.0%2B10607%2Bf4da7515?arch=aarch64" } } }, { "category": "product_version", "name": "buildah-debuginfo-0:1.19.7-1.module+el8.4.0+10607+f4da7515.aarch64", "product": { "name": "buildah-debuginfo-0:1.19.7-1.module+el8.4.0+10607+f4da7515.aarch64", "product_id": "buildah-debuginfo-0:1.19.7-1.module+el8.4.0+10607+f4da7515.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/buildah-debuginfo@1.19.7-1.module%2Bel8.4.0%2B10607%2Bf4da7515?arch=aarch64" } } }, { "category": "product_version", "name": "buildah-debugsource-0:1.19.7-1.module+el8.4.0+10607+f4da7515.aarch64", "product": { "name": "buildah-debugsource-0:1.19.7-1.module+el8.4.0+10607+f4da7515.aarch64", "product_id": "buildah-debugsource-0:1.19.7-1.module+el8.4.0+10607+f4da7515.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/buildah-debugsource@1.19.7-1.module%2Bel8.4.0%2B10607%2Bf4da7515?arch=aarch64" } } }, { "category": "product_version", "name": "buildah-tests-0:1.19.7-1.module+el8.4.0+10607+f4da7515.aarch64", "product": { "name": "buildah-tests-0:1.19.7-1.module+el8.4.0+10607+f4da7515.aarch64", "product_id": "buildah-tests-0:1.19.7-1.module+el8.4.0+10607+f4da7515.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/buildah-tests@1.19.7-1.module%2Bel8.4.0%2B10607%2Bf4da7515?arch=aarch64" } } }, { "category": "product_version", "name": "buildah-tests-debuginfo-0:1.19.7-1.module+el8.4.0+10607+f4da7515.aarch64", "product": { "name": "buildah-tests-debuginfo-0:1.19.7-1.module+el8.4.0+10607+f4da7515.aarch64", "product_id": "buildah-tests-debuginfo-0:1.19.7-1.module+el8.4.0+10607+f4da7515.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/buildah-tests-debuginfo@1.19.7-1.module%2Bel8.4.0%2B10607%2Bf4da7515?arch=aarch64" } } }, { "category": "product_version", "name": "conmon-2:2.0.26-1.module+el8.4.0+10607+f4da7515.aarch64", "product": { "name": "conmon-2:2.0.26-1.module+el8.4.0+10607+f4da7515.aarch64", "product_id": "conmon-2:2.0.26-1.module+el8.4.0+10607+f4da7515.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/conmon@2.0.26-1.module%2Bel8.4.0%2B10607%2Bf4da7515?arch=aarch64\u0026epoch=2" } } }, { "category": "product_version", "name": "conmon-debuginfo-2:2.0.26-1.module+el8.4.0+10607+f4da7515.aarch64", "product": { "name": "conmon-debuginfo-2:2.0.26-1.module+el8.4.0+10607+f4da7515.aarch64", "product_id": "conmon-debuginfo-2:2.0.26-1.module+el8.4.0+10607+f4da7515.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/conmon-debuginfo@2.0.26-1.module%2Bel8.4.0%2B10607%2Bf4da7515?arch=aarch64\u0026epoch=2" } } }, { "category": "product_version", "name": "conmon-debugsource-2:2.0.26-1.module+el8.4.0+10607+f4da7515.aarch64", "product": { "name": "conmon-debugsource-2:2.0.26-1.module+el8.4.0+10607+f4da7515.aarch64", "product_id": "conmon-debugsource-2:2.0.26-1.module+el8.4.0+10607+f4da7515.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/conmon-debugsource@2.0.26-1.module%2Bel8.4.0%2B10607%2Bf4da7515?arch=aarch64\u0026epoch=2" } } }, { "category": "product_version", "name": "containernetworking-plugins-0:0.9.1-1.module+el8.4.0+10607+f4da7515.aarch64", "product": { "name": "containernetworking-plugins-0:0.9.1-1.module+el8.4.0+10607+f4da7515.aarch64", "product_id": "containernetworking-plugins-0:0.9.1-1.module+el8.4.0+10607+f4da7515.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/containernetworking-plugins@0.9.1-1.module%2Bel8.4.0%2B10607%2Bf4da7515?arch=aarch64" } } }, { "category": "product_version", "name": "containernetworking-plugins-debuginfo-0:0.9.1-1.module+el8.4.0+10607+f4da7515.aarch64", "product": { "name": "containernetworking-plugins-debuginfo-0:0.9.1-1.module+el8.4.0+10607+f4da7515.aarch64", "product_id": "containernetworking-plugins-debuginfo-0:0.9.1-1.module+el8.4.0+10607+f4da7515.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/containernetworking-plugins-debuginfo@0.9.1-1.module%2Bel8.4.0%2B10607%2Bf4da7515?arch=aarch64" } } }, { "category": "product_version", "name": "containernetworking-plugins-debugsource-0:0.9.1-1.module+el8.4.0+10607+f4da7515.aarch64", "product": { "name": "containernetworking-plugins-debugsource-0:0.9.1-1.module+el8.4.0+10607+f4da7515.aarch64", "product_id": "containernetworking-plugins-debugsource-0:0.9.1-1.module+el8.4.0+10607+f4da7515.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/containernetworking-plugins-debugsource@0.9.1-1.module%2Bel8.4.0%2B10607%2Bf4da7515?arch=aarch64" } } }, { "category": "product_version", "name": "containers-common-1:1.2.2-8.module+el8.4.0+10607+f4da7515.aarch64", "product": { "name": "containers-common-1:1.2.2-8.module+el8.4.0+10607+f4da7515.aarch64", "product_id": "containers-common-1:1.2.2-8.module+el8.4.0+10607+f4da7515.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/containers-common@1.2.2-8.module%2Bel8.4.0%2B10607%2Bf4da7515?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "crit-0:3.15-1.module+el8.4.0+10607+f4da7515.aarch64", "product": { "name": "crit-0:3.15-1.module+el8.4.0+10607+f4da7515.aarch64", "product_id": "crit-0:3.15-1.module+el8.4.0+10607+f4da7515.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/crit@3.15-1.module%2Bel8.4.0%2B10607%2Bf4da7515?arch=aarch64" } } }, { "category": "product_version", "name": "criu-0:3.15-1.module+el8.4.0+10607+f4da7515.aarch64", "product": { "name": "criu-0:3.15-1.module+el8.4.0+10607+f4da7515.aarch64", "product_id": "criu-0:3.15-1.module+el8.4.0+10607+f4da7515.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/criu@3.15-1.module%2Bel8.4.0%2B10607%2Bf4da7515?arch=aarch64" } } }, { "category": "product_version", "name": "criu-debuginfo-0:3.15-1.module+el8.4.0+10607+f4da7515.aarch64", "product": { "name": "criu-debuginfo-0:3.15-1.module+el8.4.0+10607+f4da7515.aarch64", "product_id": "criu-debuginfo-0:3.15-1.module+el8.4.0+10607+f4da7515.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/criu-debuginfo@3.15-1.module%2Bel8.4.0%2B10607%2Bf4da7515?arch=aarch64" } } }, { "category": "product_version", "name": "criu-debugsource-0:3.15-1.module+el8.4.0+10607+f4da7515.aarch64", "product": { "name": "criu-debugsource-0:3.15-1.module+el8.4.0+10607+f4da7515.aarch64", "product_id": "criu-debugsource-0:3.15-1.module+el8.4.0+10607+f4da7515.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/criu-debugsource@3.15-1.module%2Bel8.4.0%2B10607%2Bf4da7515?arch=aarch64" } } }, { "category": "product_version", "name": "crun-0:0.18-1.module+el8.4.0+10607+f4da7515.aarch64", "product": { "name": "crun-0:0.18-1.module+el8.4.0+10607+f4da7515.aarch64", "product_id": "crun-0:0.18-1.module+el8.4.0+10607+f4da7515.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/crun@0.18-1.module%2Bel8.4.0%2B10607%2Bf4da7515?arch=aarch64" } } }, { "category": "product_version", "name": "crun-debuginfo-0:0.18-1.module+el8.4.0+10607+f4da7515.aarch64", "product": { "name": "crun-debuginfo-0:0.18-1.module+el8.4.0+10607+f4da7515.aarch64", "product_id": "crun-debuginfo-0:0.18-1.module+el8.4.0+10607+f4da7515.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/crun-debuginfo@0.18-1.module%2Bel8.4.0%2B10607%2Bf4da7515?arch=aarch64" } } }, { "category": "product_version", "name": "crun-debugsource-0:0.18-1.module+el8.4.0+10607+f4da7515.aarch64", "product": { "name": "crun-debugsource-0:0.18-1.module+el8.4.0+10607+f4da7515.aarch64", "product_id": "crun-debugsource-0:0.18-1.module+el8.4.0+10607+f4da7515.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/crun-debugsource@0.18-1.module%2Bel8.4.0%2B10607%2Bf4da7515?arch=aarch64" } } }, { "category": "product_version", "name": "fuse-overlayfs-0:1.4.0-2.module+el8.4.0+10607+f4da7515.aarch64", "product": { "name": "fuse-overlayfs-0:1.4.0-2.module+el8.4.0+10607+f4da7515.aarch64", "product_id": "fuse-overlayfs-0:1.4.0-2.module+el8.4.0+10607+f4da7515.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/fuse-overlayfs@1.4.0-2.module%2Bel8.4.0%2B10607%2Bf4da7515?arch=aarch64" } } }, { "category": "product_version", "name": "fuse-overlayfs-debuginfo-0:1.4.0-2.module+el8.4.0+10607+f4da7515.aarch64", "product": { "name": "fuse-overlayfs-debuginfo-0:1.4.0-2.module+el8.4.0+10607+f4da7515.aarch64", "product_id": "fuse-overlayfs-debuginfo-0:1.4.0-2.module+el8.4.0+10607+f4da7515.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/fuse-overlayfs-debuginfo@1.4.0-2.module%2Bel8.4.0%2B10607%2Bf4da7515?arch=aarch64" } } }, { "category": "product_version", "name": "fuse-overlayfs-debugsource-0:1.4.0-2.module+el8.4.0+10607+f4da7515.aarch64", "product": { "name": "fuse-overlayfs-debugsource-0:1.4.0-2.module+el8.4.0+10607+f4da7515.aarch64", "product_id": "fuse-overlayfs-debugsource-0:1.4.0-2.module+el8.4.0+10607+f4da7515.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/fuse-overlayfs-debugsource@1.4.0-2.module%2Bel8.4.0%2B10607%2Bf4da7515?arch=aarch64" } } }, { "category": "product_version", "name": "libslirp-0:4.3.1-1.module+el8.4.0+10607+f4da7515.aarch64", "product": { "name": "libslirp-0:4.3.1-1.module+el8.4.0+10607+f4da7515.aarch64", "product_id": "libslirp-0:4.3.1-1.module+el8.4.0+10607+f4da7515.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/libslirp@4.3.1-1.module%2Bel8.4.0%2B10607%2Bf4da7515?arch=aarch64" } } }, { "category": "product_version", "name": "libslirp-debuginfo-0:4.3.1-1.module+el8.4.0+10607+f4da7515.aarch64", "product": { "name": "libslirp-debuginfo-0:4.3.1-1.module+el8.4.0+10607+f4da7515.aarch64", "product_id": "libslirp-debuginfo-0:4.3.1-1.module+el8.4.0+10607+f4da7515.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/libslirp-debuginfo@4.3.1-1.module%2Bel8.4.0%2B10607%2Bf4da7515?arch=aarch64" } } }, { "category": "product_version", "name": "libslirp-debugsource-0:4.3.1-1.module+el8.4.0+10607+f4da7515.aarch64", "product": { "name": "libslirp-debugsource-0:4.3.1-1.module+el8.4.0+10607+f4da7515.aarch64", "product_id": "libslirp-debugsource-0:4.3.1-1.module+el8.4.0+10607+f4da7515.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/libslirp-debugsource@4.3.1-1.module%2Bel8.4.0%2B10607%2Bf4da7515?arch=aarch64" } } }, { "category": "product_version", "name": "libslirp-devel-0:4.3.1-1.module+el8.4.0+10607+f4da7515.aarch64", "product": { "name": "libslirp-devel-0:4.3.1-1.module+el8.4.0+10607+f4da7515.aarch64", "product_id": "libslirp-devel-0:4.3.1-1.module+el8.4.0+10607+f4da7515.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/libslirp-devel@4.3.1-1.module%2Bel8.4.0%2B10607%2Bf4da7515?arch=aarch64" } } }, { "category": "product_version", "name": "oci-seccomp-bpf-hook-0:1.2.0-2.module+el8.4.0+10607+f4da7515.aarch64", "product": { "name": "oci-seccomp-bpf-hook-0:1.2.0-2.module+el8.4.0+10607+f4da7515.aarch64", "product_id": "oci-seccomp-bpf-hook-0:1.2.0-2.module+el8.4.0+10607+f4da7515.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/oci-seccomp-bpf-hook@1.2.0-2.module%2Bel8.4.0%2B10607%2Bf4da7515?arch=aarch64" } } }, { "category": "product_version", "name": "oci-seccomp-bpf-hook-debuginfo-0:1.2.0-2.module+el8.4.0+10607+f4da7515.aarch64", "product": { "name": "oci-seccomp-bpf-hook-debuginfo-0:1.2.0-2.module+el8.4.0+10607+f4da7515.aarch64", "product_id": "oci-seccomp-bpf-hook-debuginfo-0:1.2.0-2.module+el8.4.0+10607+f4da7515.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/oci-seccomp-bpf-hook-debuginfo@1.2.0-2.module%2Bel8.4.0%2B10607%2Bf4da7515?arch=aarch64" } } }, { "category": "product_version", "name": "oci-seccomp-bpf-hook-debugsource-0:1.2.0-2.module+el8.4.0+10607+f4da7515.aarch64", "product": { "name": "oci-seccomp-bpf-hook-debugsource-0:1.2.0-2.module+el8.4.0+10607+f4da7515.aarch64", "product_id": "oci-seccomp-bpf-hook-debugsource-0:1.2.0-2.module+el8.4.0+10607+f4da7515.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/oci-seccomp-bpf-hook-debugsource@1.2.0-2.module%2Bel8.4.0%2B10607%2Bf4da7515?arch=aarch64" } } }, { "category": "product_version", "name": "podman-0:3.0.1-6.module+el8.4.0+10607+f4da7515.aarch64", "product": { "name": "podman-0:3.0.1-6.module+el8.4.0+10607+f4da7515.aarch64", "product_id": "podman-0:3.0.1-6.module+el8.4.0+10607+f4da7515.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman@3.0.1-6.module%2Bel8.4.0%2B10607%2Bf4da7515?arch=aarch64" } } }, { "category": "product_version", "name": "podman-catatonit-0:3.0.1-6.module+el8.4.0+10607+f4da7515.aarch64", "product": { "name": "podman-catatonit-0:3.0.1-6.module+el8.4.0+10607+f4da7515.aarch64", "product_id": "podman-catatonit-0:3.0.1-6.module+el8.4.0+10607+f4da7515.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman-catatonit@3.0.1-6.module%2Bel8.4.0%2B10607%2Bf4da7515?arch=aarch64" } } }, { "category": "product_version", "name": "podman-catatonit-debuginfo-0:3.0.1-6.module+el8.4.0+10607+f4da7515.aarch64", "product": { "name": "podman-catatonit-debuginfo-0:3.0.1-6.module+el8.4.0+10607+f4da7515.aarch64", "product_id": "podman-catatonit-debuginfo-0:3.0.1-6.module+el8.4.0+10607+f4da7515.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman-catatonit-debuginfo@3.0.1-6.module%2Bel8.4.0%2B10607%2Bf4da7515?arch=aarch64" } } }, { "category": "product_version", "name": "podman-debuginfo-0:3.0.1-6.module+el8.4.0+10607+f4da7515.aarch64", "product": { "name": "podman-debuginfo-0:3.0.1-6.module+el8.4.0+10607+f4da7515.aarch64", "product_id": "podman-debuginfo-0:3.0.1-6.module+el8.4.0+10607+f4da7515.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman-debuginfo@3.0.1-6.module%2Bel8.4.0%2B10607%2Bf4da7515?arch=aarch64" } } }, { "category": "product_version", "name": "podman-debugsource-0:3.0.1-6.module+el8.4.0+10607+f4da7515.aarch64", "product": { "name": "podman-debugsource-0:3.0.1-6.module+el8.4.0+10607+f4da7515.aarch64", "product_id": "podman-debugsource-0:3.0.1-6.module+el8.4.0+10607+f4da7515.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman-debugsource@3.0.1-6.module%2Bel8.4.0%2B10607%2Bf4da7515?arch=aarch64" } } }, { "category": "product_version", "name": "podman-plugins-0:3.0.1-6.module+el8.4.0+10607+f4da7515.aarch64", "product": { "name": "podman-plugins-0:3.0.1-6.module+el8.4.0+10607+f4da7515.aarch64", "product_id": "podman-plugins-0:3.0.1-6.module+el8.4.0+10607+f4da7515.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman-plugins@3.0.1-6.module%2Bel8.4.0%2B10607%2Bf4da7515?arch=aarch64" } } }, { "category": "product_version", "name": "podman-plugins-debuginfo-0:3.0.1-6.module+el8.4.0+10607+f4da7515.aarch64", "product": { "name": "podman-plugins-debuginfo-0:3.0.1-6.module+el8.4.0+10607+f4da7515.aarch64", "product_id": "podman-plugins-debuginfo-0:3.0.1-6.module+el8.4.0+10607+f4da7515.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman-plugins-debuginfo@3.0.1-6.module%2Bel8.4.0%2B10607%2Bf4da7515?arch=aarch64" } } }, { "category": "product_version", "name": "podman-remote-0:3.0.1-6.module+el8.4.0+10607+f4da7515.aarch64", "product": { "name": "podman-remote-0:3.0.1-6.module+el8.4.0+10607+f4da7515.aarch64", "product_id": "podman-remote-0:3.0.1-6.module+el8.4.0+10607+f4da7515.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman-remote@3.0.1-6.module%2Bel8.4.0%2B10607%2Bf4da7515?arch=aarch64" } } }, { "category": "product_version", "name": "podman-remote-debuginfo-0:3.0.1-6.module+el8.4.0+10607+f4da7515.aarch64", "product": { "name": "podman-remote-debuginfo-0:3.0.1-6.module+el8.4.0+10607+f4da7515.aarch64", "product_id": "podman-remote-debuginfo-0:3.0.1-6.module+el8.4.0+10607+f4da7515.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman-remote-debuginfo@3.0.1-6.module%2Bel8.4.0%2B10607%2Bf4da7515?arch=aarch64" } } }, { "category": "product_version", "name": "podman-tests-0:3.0.1-6.module+el8.4.0+10607+f4da7515.aarch64", "product": { "name": "podman-tests-0:3.0.1-6.module+el8.4.0+10607+f4da7515.aarch64", "product_id": "podman-tests-0:3.0.1-6.module+el8.4.0+10607+f4da7515.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman-tests@3.0.1-6.module%2Bel8.4.0%2B10607%2Bf4da7515?arch=aarch64" } } }, { "category": "product_version", "name": "python3-criu-0:3.15-1.module+el8.4.0+10607+f4da7515.aarch64", "product": { "name": "python3-criu-0:3.15-1.module+el8.4.0+10607+f4da7515.aarch64", "product_id": "python3-criu-0:3.15-1.module+el8.4.0+10607+f4da7515.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-criu@3.15-1.module%2Bel8.4.0%2B10607%2Bf4da7515?arch=aarch64" } } }, { "category": "product_version", "name": "runc-0:1.0.0-70.rc92.module+el8.4.0+10607+f4da7515.aarch64", "product": { "name": "runc-0:1.0.0-70.rc92.module+el8.4.0+10607+f4da7515.aarch64", "product_id": "runc-0:1.0.0-70.rc92.module+el8.4.0+10607+f4da7515.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/runc@1.0.0-70.rc92.module%2Bel8.4.0%2B10607%2Bf4da7515?arch=aarch64" } } }, { "category": "product_version", "name": "runc-debuginfo-0:1.0.0-70.rc92.module+el8.4.0+10607+f4da7515.aarch64", "product": { "name": "runc-debuginfo-0:1.0.0-70.rc92.module+el8.4.0+10607+f4da7515.aarch64", "product_id": "runc-debuginfo-0:1.0.0-70.rc92.module+el8.4.0+10607+f4da7515.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/runc-debuginfo@1.0.0-70.rc92.module%2Bel8.4.0%2B10607%2Bf4da7515?arch=aarch64" } } }, { "category": "product_version", "name": "runc-debugsource-0:1.0.0-70.rc92.module+el8.4.0+10607+f4da7515.aarch64", "product": { "name": "runc-debugsource-0:1.0.0-70.rc92.module+el8.4.0+10607+f4da7515.aarch64", "product_id": "runc-debugsource-0:1.0.0-70.rc92.module+el8.4.0+10607+f4da7515.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/runc-debugsource@1.0.0-70.rc92.module%2Bel8.4.0%2B10607%2Bf4da7515?arch=aarch64" } } }, { "category": "product_version", "name": "skopeo-1:1.2.2-8.module+el8.4.0+10607+f4da7515.aarch64", "product": { "name": "skopeo-1:1.2.2-8.module+el8.4.0+10607+f4da7515.aarch64", "product_id": "skopeo-1:1.2.2-8.module+el8.4.0+10607+f4da7515.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/skopeo@1.2.2-8.module%2Bel8.4.0%2B10607%2Bf4da7515?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "skopeo-debuginfo-1:1.2.2-8.module+el8.4.0+10607+f4da7515.aarch64", "product": { "name": "skopeo-debuginfo-1:1.2.2-8.module+el8.4.0+10607+f4da7515.aarch64", "product_id": "skopeo-debuginfo-1:1.2.2-8.module+el8.4.0+10607+f4da7515.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/skopeo-debuginfo@1.2.2-8.module%2Bel8.4.0%2B10607%2Bf4da7515?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "skopeo-debugsource-1:1.2.2-8.module+el8.4.0+10607+f4da7515.aarch64", "product": { "name": "skopeo-debugsource-1:1.2.2-8.module+el8.4.0+10607+f4da7515.aarch64", "product_id": "skopeo-debugsource-1:1.2.2-8.module+el8.4.0+10607+f4da7515.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/skopeo-debugsource@1.2.2-8.module%2Bel8.4.0%2B10607%2Bf4da7515?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "skopeo-tests-1:1.2.2-8.module+el8.4.0+10607+f4da7515.aarch64", "product": { "name": "skopeo-tests-1:1.2.2-8.module+el8.4.0+10607+f4da7515.aarch64", "product_id": "skopeo-tests-1:1.2.2-8.module+el8.4.0+10607+f4da7515.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/skopeo-tests@1.2.2-8.module%2Bel8.4.0%2B10607%2Bf4da7515?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "slirp4netns-0:1.1.8-1.module+el8.4.0+10607+f4da7515.aarch64", "product": { "name": "slirp4netns-0:1.1.8-1.module+el8.4.0+10607+f4da7515.aarch64", "product_id": "slirp4netns-0:1.1.8-1.module+el8.4.0+10607+f4da7515.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/slirp4netns@1.1.8-1.module%2Bel8.4.0%2B10607%2Bf4da7515?arch=aarch64" } } }, { "category": "product_version", "name": "slirp4netns-debuginfo-0:1.1.8-1.module+el8.4.0+10607+f4da7515.aarch64", "product": { "name": "slirp4netns-debuginfo-0:1.1.8-1.module+el8.4.0+10607+f4da7515.aarch64", "product_id": "slirp4netns-debuginfo-0:1.1.8-1.module+el8.4.0+10607+f4da7515.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/slirp4netns-debuginfo@1.1.8-1.module%2Bel8.4.0%2B10607%2Bf4da7515?arch=aarch64" } } }, { "category": "product_version", "name": "slirp4netns-debugsource-0:1.1.8-1.module+el8.4.0+10607+f4da7515.aarch64", "product": { "name": "slirp4netns-debugsource-0:1.1.8-1.module+el8.4.0+10607+f4da7515.aarch64", "product_id": "slirp4netns-debugsource-0:1.1.8-1.module+el8.4.0+10607+f4da7515.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/slirp4netns-debugsource@1.1.8-1.module%2Bel8.4.0%2B10607%2Bf4da7515?arch=aarch64" } } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "buildah-0:1.19.7-1.module+el8.4.0+10607+f4da7515.src", "product": { "name": "buildah-0:1.19.7-1.module+el8.4.0+10607+f4da7515.src", "product_id": "buildah-0:1.19.7-1.module+el8.4.0+10607+f4da7515.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/buildah@1.19.7-1.module%2Bel8.4.0%2B10607%2Bf4da7515?arch=src" } } }, { "category": "product_version", "name": "cockpit-podman-0:29-2.module+el8.4.0+10607+f4da7515.src", "product": { "name": "cockpit-podman-0:29-2.module+el8.4.0+10607+f4da7515.src", "product_id": "cockpit-podman-0:29-2.module+el8.4.0+10607+f4da7515.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/cockpit-podman@29-2.module%2Bel8.4.0%2B10607%2Bf4da7515?arch=src" } } }, { "category": "product_version", "name": "conmon-2:2.0.26-1.module+el8.4.0+10607+f4da7515.src", "product": { "name": "conmon-2:2.0.26-1.module+el8.4.0+10607+f4da7515.src", "product_id": "conmon-2:2.0.26-1.module+el8.4.0+10607+f4da7515.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/conmon@2.0.26-1.module%2Bel8.4.0%2B10607%2Bf4da7515?arch=src\u0026epoch=2" } } }, { "category": "product_version", "name": "container-selinux-2:2.158.0-1.module+el8.4.0+10607+f4da7515.src", "product": { "name": "container-selinux-2:2.158.0-1.module+el8.4.0+10607+f4da7515.src", "product_id": "container-selinux-2:2.158.0-1.module+el8.4.0+10607+f4da7515.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/container-selinux@2.158.0-1.module%2Bel8.4.0%2B10607%2Bf4da7515?arch=src\u0026epoch=2" } } }, { "category": "product_version", "name": "containernetworking-plugins-0:0.9.1-1.module+el8.4.0+10607+f4da7515.src", "product": { "name": "containernetworking-plugins-0:0.9.1-1.module+el8.4.0+10607+f4da7515.src", "product_id": "containernetworking-plugins-0:0.9.1-1.module+el8.4.0+10607+f4da7515.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/containernetworking-plugins@0.9.1-1.module%2Bel8.4.0%2B10607%2Bf4da7515?arch=src" } } }, { "category": "product_version", "name": "criu-0:3.15-1.module+el8.4.0+10607+f4da7515.src", "product": { "name": "criu-0:3.15-1.module+el8.4.0+10607+f4da7515.src", "product_id": "criu-0:3.15-1.module+el8.4.0+10607+f4da7515.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/criu@3.15-1.module%2Bel8.4.0%2B10607%2Bf4da7515?arch=src" } } }, { "category": "product_version", "name": "crun-0:0.18-1.module+el8.4.0+10607+f4da7515.src", "product": { "name": "crun-0:0.18-1.module+el8.4.0+10607+f4da7515.src", "product_id": "crun-0:0.18-1.module+el8.4.0+10607+f4da7515.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/crun@0.18-1.module%2Bel8.4.0%2B10607%2Bf4da7515?arch=src" } } }, { "category": "product_version", "name": "fuse-overlayfs-0:1.4.0-2.module+el8.4.0+10607+f4da7515.src", "product": { "name": "fuse-overlayfs-0:1.4.0-2.module+el8.4.0+10607+f4da7515.src", "product_id": "fuse-overlayfs-0:1.4.0-2.module+el8.4.0+10607+f4da7515.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/fuse-overlayfs@1.4.0-2.module%2Bel8.4.0%2B10607%2Bf4da7515?arch=src" } } }, { "category": "product_version", "name": "libslirp-0:4.3.1-1.module+el8.4.0+10607+f4da7515.src", "product": { "name": "libslirp-0:4.3.1-1.module+el8.4.0+10607+f4da7515.src", "product_id": "libslirp-0:4.3.1-1.module+el8.4.0+10607+f4da7515.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/libslirp@4.3.1-1.module%2Bel8.4.0%2B10607%2Bf4da7515?arch=src" } } }, { "category": "product_version", "name": "oci-seccomp-bpf-hook-0:1.2.0-2.module+el8.4.0+10607+f4da7515.src", "product": { "name": "oci-seccomp-bpf-hook-0:1.2.0-2.module+el8.4.0+10607+f4da7515.src", "product_id": "oci-seccomp-bpf-hook-0:1.2.0-2.module+el8.4.0+10607+f4da7515.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/oci-seccomp-bpf-hook@1.2.0-2.module%2Bel8.4.0%2B10607%2Bf4da7515?arch=src" } } }, { "category": "product_version", "name": "podman-0:3.0.1-6.module+el8.4.0+10607+f4da7515.src", "product": { "name": "podman-0:3.0.1-6.module+el8.4.0+10607+f4da7515.src", "product_id": "podman-0:3.0.1-6.module+el8.4.0+10607+f4da7515.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman@3.0.1-6.module%2Bel8.4.0%2B10607%2Bf4da7515?arch=src" } } }, { "category": "product_version", "name": "runc-0:1.0.0-70.rc92.module+el8.4.0+10607+f4da7515.src", "product": { "name": "runc-0:1.0.0-70.rc92.module+el8.4.0+10607+f4da7515.src", "product_id": "runc-0:1.0.0-70.rc92.module+el8.4.0+10607+f4da7515.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/runc@1.0.0-70.rc92.module%2Bel8.4.0%2B10607%2Bf4da7515?arch=src" } } }, { "category": "product_version", "name": "skopeo-1:1.2.2-8.module+el8.4.0+10607+f4da7515.src", "product": { "name": "skopeo-1:1.2.2-8.module+el8.4.0+10607+f4da7515.src", "product_id": "skopeo-1:1.2.2-8.module+el8.4.0+10607+f4da7515.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/skopeo@1.2.2-8.module%2Bel8.4.0%2B10607%2Bf4da7515?arch=src\u0026epoch=1" } } }, { "category": "product_version", "name": "slirp4netns-0:1.1.8-1.module+el8.4.0+10607+f4da7515.src", "product": { "name": "slirp4netns-0:1.1.8-1.module+el8.4.0+10607+f4da7515.src", "product_id": "slirp4netns-0:1.1.8-1.module+el8.4.0+10607+f4da7515.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/slirp4netns@1.1.8-1.module%2Bel8.4.0%2B10607%2Bf4da7515?arch=src" } } }, { "category": "product_version", "name": "toolbox-0:0.0.8-1.module+el8.4.0+10607+f4da7515.src", "product": { "name": "toolbox-0:0.0.8-1.module+el8.4.0+10607+f4da7515.src", "product_id": "toolbox-0:0.0.8-1.module+el8.4.0+10607+f4da7515.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/toolbox@0.0.8-1.module%2Bel8.4.0%2B10607%2Bf4da7515?arch=src" } } }, { "category": "product_version", "name": "udica-0:0.2.4-1.module+el8.4.0+10607+f4da7515.src", "product": { "name": "udica-0:0.2.4-1.module+el8.4.0+10607+f4da7515.src", "product_id": "udica-0:0.2.4-1.module+el8.4.0+10607+f4da7515.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/udica@0.2.4-1.module%2Bel8.4.0%2B10607%2Bf4da7515?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "buildah-0:1.19.7-1.module+el8.4.0+10607+f4da7515.ppc64le", "product": { "name": "buildah-0:1.19.7-1.module+el8.4.0+10607+f4da7515.ppc64le", "product_id": "buildah-0:1.19.7-1.module+el8.4.0+10607+f4da7515.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/buildah@1.19.7-1.module%2Bel8.4.0%2B10607%2Bf4da7515?arch=ppc64le" } } }, { "category": "product_version", "name": "buildah-debuginfo-0:1.19.7-1.module+el8.4.0+10607+f4da7515.ppc64le", "product": { "name": "buildah-debuginfo-0:1.19.7-1.module+el8.4.0+10607+f4da7515.ppc64le", "product_id": "buildah-debuginfo-0:1.19.7-1.module+el8.4.0+10607+f4da7515.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/buildah-debuginfo@1.19.7-1.module%2Bel8.4.0%2B10607%2Bf4da7515?arch=ppc64le" } } }, { "category": "product_version", "name": "buildah-debugsource-0:1.19.7-1.module+el8.4.0+10607+f4da7515.ppc64le", "product": { "name": "buildah-debugsource-0:1.19.7-1.module+el8.4.0+10607+f4da7515.ppc64le", "product_id": "buildah-debugsource-0:1.19.7-1.module+el8.4.0+10607+f4da7515.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/buildah-debugsource@1.19.7-1.module%2Bel8.4.0%2B10607%2Bf4da7515?arch=ppc64le" } } }, { "category": "product_version", "name": "buildah-tests-0:1.19.7-1.module+el8.4.0+10607+f4da7515.ppc64le", "product": { "name": "buildah-tests-0:1.19.7-1.module+el8.4.0+10607+f4da7515.ppc64le", "product_id": "buildah-tests-0:1.19.7-1.module+el8.4.0+10607+f4da7515.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/buildah-tests@1.19.7-1.module%2Bel8.4.0%2B10607%2Bf4da7515?arch=ppc64le" } } }, { "category": "product_version", "name": "buildah-tests-debuginfo-0:1.19.7-1.module+el8.4.0+10607+f4da7515.ppc64le", "product": { "name": "buildah-tests-debuginfo-0:1.19.7-1.module+el8.4.0+10607+f4da7515.ppc64le", "product_id": "buildah-tests-debuginfo-0:1.19.7-1.module+el8.4.0+10607+f4da7515.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/buildah-tests-debuginfo@1.19.7-1.module%2Bel8.4.0%2B10607%2Bf4da7515?arch=ppc64le" } } }, { "category": "product_version", "name": "conmon-2:2.0.26-1.module+el8.4.0+10607+f4da7515.ppc64le", "product": { "name": "conmon-2:2.0.26-1.module+el8.4.0+10607+f4da7515.ppc64le", "product_id": "conmon-2:2.0.26-1.module+el8.4.0+10607+f4da7515.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/conmon@2.0.26-1.module%2Bel8.4.0%2B10607%2Bf4da7515?arch=ppc64le\u0026epoch=2" } } }, { "category": "product_version", "name": "conmon-debuginfo-2:2.0.26-1.module+el8.4.0+10607+f4da7515.ppc64le", "product": { "name": "conmon-debuginfo-2:2.0.26-1.module+el8.4.0+10607+f4da7515.ppc64le", "product_id": "conmon-debuginfo-2:2.0.26-1.module+el8.4.0+10607+f4da7515.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/conmon-debuginfo@2.0.26-1.module%2Bel8.4.0%2B10607%2Bf4da7515?arch=ppc64le\u0026epoch=2" } } }, { "category": "product_version", "name": "conmon-debugsource-2:2.0.26-1.module+el8.4.0+10607+f4da7515.ppc64le", "product": { "name": "conmon-debugsource-2:2.0.26-1.module+el8.4.0+10607+f4da7515.ppc64le", "product_id": "conmon-debugsource-2:2.0.26-1.module+el8.4.0+10607+f4da7515.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/conmon-debugsource@2.0.26-1.module%2Bel8.4.0%2B10607%2Bf4da7515?arch=ppc64le\u0026epoch=2" } } }, { "category": "product_version", "name": "containernetworking-plugins-0:0.9.1-1.module+el8.4.0+10607+f4da7515.ppc64le", "product": { "name": "containernetworking-plugins-0:0.9.1-1.module+el8.4.0+10607+f4da7515.ppc64le", "product_id": "containernetworking-plugins-0:0.9.1-1.module+el8.4.0+10607+f4da7515.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/containernetworking-plugins@0.9.1-1.module%2Bel8.4.0%2B10607%2Bf4da7515?arch=ppc64le" } } }, { "category": "product_version", "name": "containernetworking-plugins-debuginfo-0:0.9.1-1.module+el8.4.0+10607+f4da7515.ppc64le", "product": { "name": "containernetworking-plugins-debuginfo-0:0.9.1-1.module+el8.4.0+10607+f4da7515.ppc64le", "product_id": "containernetworking-plugins-debuginfo-0:0.9.1-1.module+el8.4.0+10607+f4da7515.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/containernetworking-plugins-debuginfo@0.9.1-1.module%2Bel8.4.0%2B10607%2Bf4da7515?arch=ppc64le" } } }, { "category": "product_version", "name": "containernetworking-plugins-debugsource-0:0.9.1-1.module+el8.4.0+10607+f4da7515.ppc64le", "product": { "name": "containernetworking-plugins-debugsource-0:0.9.1-1.module+el8.4.0+10607+f4da7515.ppc64le", "product_id": "containernetworking-plugins-debugsource-0:0.9.1-1.module+el8.4.0+10607+f4da7515.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/containernetworking-plugins-debugsource@0.9.1-1.module%2Bel8.4.0%2B10607%2Bf4da7515?arch=ppc64le" } } }, { "category": "product_version", "name": "containers-common-1:1.2.2-8.module+el8.4.0+10607+f4da7515.ppc64le", "product": { "name": "containers-common-1:1.2.2-8.module+el8.4.0+10607+f4da7515.ppc64le", "product_id": "containers-common-1:1.2.2-8.module+el8.4.0+10607+f4da7515.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/containers-common@1.2.2-8.module%2Bel8.4.0%2B10607%2Bf4da7515?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "crit-0:3.15-1.module+el8.4.0+10607+f4da7515.ppc64le", "product": { "name": "crit-0:3.15-1.module+el8.4.0+10607+f4da7515.ppc64le", "product_id": "crit-0:3.15-1.module+el8.4.0+10607+f4da7515.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/crit@3.15-1.module%2Bel8.4.0%2B10607%2Bf4da7515?arch=ppc64le" } } }, { "category": "product_version", "name": "criu-0:3.15-1.module+el8.4.0+10607+f4da7515.ppc64le", "product": { "name": "criu-0:3.15-1.module+el8.4.0+10607+f4da7515.ppc64le", "product_id": "criu-0:3.15-1.module+el8.4.0+10607+f4da7515.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/criu@3.15-1.module%2Bel8.4.0%2B10607%2Bf4da7515?arch=ppc64le" } } }, { "category": "product_version", "name": "criu-debuginfo-0:3.15-1.module+el8.4.0+10607+f4da7515.ppc64le", "product": { "name": "criu-debuginfo-0:3.15-1.module+el8.4.0+10607+f4da7515.ppc64le", "product_id": "criu-debuginfo-0:3.15-1.module+el8.4.0+10607+f4da7515.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/criu-debuginfo@3.15-1.module%2Bel8.4.0%2B10607%2Bf4da7515?arch=ppc64le" } } }, { "category": "product_version", "name": "criu-debugsource-0:3.15-1.module+el8.4.0+10607+f4da7515.ppc64le", "product": { "name": "criu-debugsource-0:3.15-1.module+el8.4.0+10607+f4da7515.ppc64le", "product_id": "criu-debugsource-0:3.15-1.module+el8.4.0+10607+f4da7515.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/criu-debugsource@3.15-1.module%2Bel8.4.0%2B10607%2Bf4da7515?arch=ppc64le" } } }, { "category": "product_version", "name": "crun-0:0.18-1.module+el8.4.0+10607+f4da7515.ppc64le", "product": { "name": "crun-0:0.18-1.module+el8.4.0+10607+f4da7515.ppc64le", "product_id": "crun-0:0.18-1.module+el8.4.0+10607+f4da7515.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/crun@0.18-1.module%2Bel8.4.0%2B10607%2Bf4da7515?arch=ppc64le" } } }, { "category": "product_version", "name": "crun-debuginfo-0:0.18-1.module+el8.4.0+10607+f4da7515.ppc64le", "product": { "name": "crun-debuginfo-0:0.18-1.module+el8.4.0+10607+f4da7515.ppc64le", "product_id": "crun-debuginfo-0:0.18-1.module+el8.4.0+10607+f4da7515.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/crun-debuginfo@0.18-1.module%2Bel8.4.0%2B10607%2Bf4da7515?arch=ppc64le" } } }, { "category": "product_version", "name": "crun-debugsource-0:0.18-1.module+el8.4.0+10607+f4da7515.ppc64le", "product": { "name": "crun-debugsource-0:0.18-1.module+el8.4.0+10607+f4da7515.ppc64le", "product_id": "crun-debugsource-0:0.18-1.module+el8.4.0+10607+f4da7515.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/crun-debugsource@0.18-1.module%2Bel8.4.0%2B10607%2Bf4da7515?arch=ppc64le" } } }, { "category": "product_version", "name": "fuse-overlayfs-0:1.4.0-2.module+el8.4.0+10607+f4da7515.ppc64le", "product": { "name": "fuse-overlayfs-0:1.4.0-2.module+el8.4.0+10607+f4da7515.ppc64le", "product_id": "fuse-overlayfs-0:1.4.0-2.module+el8.4.0+10607+f4da7515.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/fuse-overlayfs@1.4.0-2.module%2Bel8.4.0%2B10607%2Bf4da7515?arch=ppc64le" } } }, { "category": "product_version", "name": "fuse-overlayfs-debuginfo-0:1.4.0-2.module+el8.4.0+10607+f4da7515.ppc64le", "product": { "name": "fuse-overlayfs-debuginfo-0:1.4.0-2.module+el8.4.0+10607+f4da7515.ppc64le", "product_id": "fuse-overlayfs-debuginfo-0:1.4.0-2.module+el8.4.0+10607+f4da7515.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/fuse-overlayfs-debuginfo@1.4.0-2.module%2Bel8.4.0%2B10607%2Bf4da7515?arch=ppc64le" } } }, { "category": "product_version", "name": "fuse-overlayfs-debugsource-0:1.4.0-2.module+el8.4.0+10607+f4da7515.ppc64le", "product": { "name": "fuse-overlayfs-debugsource-0:1.4.0-2.module+el8.4.0+10607+f4da7515.ppc64le", "product_id": "fuse-overlayfs-debugsource-0:1.4.0-2.module+el8.4.0+10607+f4da7515.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/fuse-overlayfs-debugsource@1.4.0-2.module%2Bel8.4.0%2B10607%2Bf4da7515?arch=ppc64le" } } }, { "category": "product_version", "name": "libslirp-0:4.3.1-1.module+el8.4.0+10607+f4da7515.ppc64le", "product": { "name": "libslirp-0:4.3.1-1.module+el8.4.0+10607+f4da7515.ppc64le", "product_id": "libslirp-0:4.3.1-1.module+el8.4.0+10607+f4da7515.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/libslirp@4.3.1-1.module%2Bel8.4.0%2B10607%2Bf4da7515?arch=ppc64le" } } }, { "category": "product_version", "name": "libslirp-debuginfo-0:4.3.1-1.module+el8.4.0+10607+f4da7515.ppc64le", "product": { "name": "libslirp-debuginfo-0:4.3.1-1.module+el8.4.0+10607+f4da7515.ppc64le", "product_id": "libslirp-debuginfo-0:4.3.1-1.module+el8.4.0+10607+f4da7515.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/libslirp-debuginfo@4.3.1-1.module%2Bel8.4.0%2B10607%2Bf4da7515?arch=ppc64le" } } }, { "category": "product_version", "name": "libslirp-debugsource-0:4.3.1-1.module+el8.4.0+10607+f4da7515.ppc64le", "product": { "name": "libslirp-debugsource-0:4.3.1-1.module+el8.4.0+10607+f4da7515.ppc64le", "product_id": "libslirp-debugsource-0:4.3.1-1.module+el8.4.0+10607+f4da7515.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/libslirp-debugsource@4.3.1-1.module%2Bel8.4.0%2B10607%2Bf4da7515?arch=ppc64le" } } }, { "category": "product_version", "name": "libslirp-devel-0:4.3.1-1.module+el8.4.0+10607+f4da7515.ppc64le", "product": { "name": "libslirp-devel-0:4.3.1-1.module+el8.4.0+10607+f4da7515.ppc64le", "product_id": "libslirp-devel-0:4.3.1-1.module+el8.4.0+10607+f4da7515.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/libslirp-devel@4.3.1-1.module%2Bel8.4.0%2B10607%2Bf4da7515?arch=ppc64le" } } }, { "category": "product_version", "name": "oci-seccomp-bpf-hook-0:1.2.0-2.module+el8.4.0+10607+f4da7515.ppc64le", "product": { "name": "oci-seccomp-bpf-hook-0:1.2.0-2.module+el8.4.0+10607+f4da7515.ppc64le", "product_id": "oci-seccomp-bpf-hook-0:1.2.0-2.module+el8.4.0+10607+f4da7515.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/oci-seccomp-bpf-hook@1.2.0-2.module%2Bel8.4.0%2B10607%2Bf4da7515?arch=ppc64le" } } }, { "category": "product_version", "name": "oci-seccomp-bpf-hook-debuginfo-0:1.2.0-2.module+el8.4.0+10607+f4da7515.ppc64le", "product": { "name": "oci-seccomp-bpf-hook-debuginfo-0:1.2.0-2.module+el8.4.0+10607+f4da7515.ppc64le", "product_id": "oci-seccomp-bpf-hook-debuginfo-0:1.2.0-2.module+el8.4.0+10607+f4da7515.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/oci-seccomp-bpf-hook-debuginfo@1.2.0-2.module%2Bel8.4.0%2B10607%2Bf4da7515?arch=ppc64le" } } }, { "category": "product_version", "name": "oci-seccomp-bpf-hook-debugsource-0:1.2.0-2.module+el8.4.0+10607+f4da7515.ppc64le", "product": { "name": "oci-seccomp-bpf-hook-debugsource-0:1.2.0-2.module+el8.4.0+10607+f4da7515.ppc64le", "product_id": "oci-seccomp-bpf-hook-debugsource-0:1.2.0-2.module+el8.4.0+10607+f4da7515.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/oci-seccomp-bpf-hook-debugsource@1.2.0-2.module%2Bel8.4.0%2B10607%2Bf4da7515?arch=ppc64le" } } }, { "category": "product_version", "name": "podman-0:3.0.1-6.module+el8.4.0+10607+f4da7515.ppc64le", "product": { "name": "podman-0:3.0.1-6.module+el8.4.0+10607+f4da7515.ppc64le", "product_id": "podman-0:3.0.1-6.module+el8.4.0+10607+f4da7515.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman@3.0.1-6.module%2Bel8.4.0%2B10607%2Bf4da7515?arch=ppc64le" } } }, { "category": "product_version", "name": "podman-catatonit-0:3.0.1-6.module+el8.4.0+10607+f4da7515.ppc64le", "product": { "name": "podman-catatonit-0:3.0.1-6.module+el8.4.0+10607+f4da7515.ppc64le", "product_id": "podman-catatonit-0:3.0.1-6.module+el8.4.0+10607+f4da7515.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman-catatonit@3.0.1-6.module%2Bel8.4.0%2B10607%2Bf4da7515?arch=ppc64le" } } }, { "category": "product_version", "name": "podman-catatonit-debuginfo-0:3.0.1-6.module+el8.4.0+10607+f4da7515.ppc64le", "product": { "name": "podman-catatonit-debuginfo-0:3.0.1-6.module+el8.4.0+10607+f4da7515.ppc64le", "product_id": "podman-catatonit-debuginfo-0:3.0.1-6.module+el8.4.0+10607+f4da7515.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman-catatonit-debuginfo@3.0.1-6.module%2Bel8.4.0%2B10607%2Bf4da7515?arch=ppc64le" } } }, { "category": "product_version", "name": "podman-debuginfo-0:3.0.1-6.module+el8.4.0+10607+f4da7515.ppc64le", "product": { "name": "podman-debuginfo-0:3.0.1-6.module+el8.4.0+10607+f4da7515.ppc64le", "product_id": "podman-debuginfo-0:3.0.1-6.module+el8.4.0+10607+f4da7515.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman-debuginfo@3.0.1-6.module%2Bel8.4.0%2B10607%2Bf4da7515?arch=ppc64le" } } }, { "category": "product_version", "name": "podman-debugsource-0:3.0.1-6.module+el8.4.0+10607+f4da7515.ppc64le", "product": { "name": "podman-debugsource-0:3.0.1-6.module+el8.4.0+10607+f4da7515.ppc64le", "product_id": "podman-debugsource-0:3.0.1-6.module+el8.4.0+10607+f4da7515.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman-debugsource@3.0.1-6.module%2Bel8.4.0%2B10607%2Bf4da7515?arch=ppc64le" } } }, { "category": "product_version", "name": "podman-plugins-0:3.0.1-6.module+el8.4.0+10607+f4da7515.ppc64le", "product": { "name": "podman-plugins-0:3.0.1-6.module+el8.4.0+10607+f4da7515.ppc64le", "product_id": "podman-plugins-0:3.0.1-6.module+el8.4.0+10607+f4da7515.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman-plugins@3.0.1-6.module%2Bel8.4.0%2B10607%2Bf4da7515?arch=ppc64le" } } }, { "category": "product_version", "name": "podman-plugins-debuginfo-0:3.0.1-6.module+el8.4.0+10607+f4da7515.ppc64le", "product": { "name": "podman-plugins-debuginfo-0:3.0.1-6.module+el8.4.0+10607+f4da7515.ppc64le", "product_id": "podman-plugins-debuginfo-0:3.0.1-6.module+el8.4.0+10607+f4da7515.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman-plugins-debuginfo@3.0.1-6.module%2Bel8.4.0%2B10607%2Bf4da7515?arch=ppc64le" } } }, { "category": "product_version", "name": "podman-remote-0:3.0.1-6.module+el8.4.0+10607+f4da7515.ppc64le", "product": { "name": "podman-remote-0:3.0.1-6.module+el8.4.0+10607+f4da7515.ppc64le", "product_id": "podman-remote-0:3.0.1-6.module+el8.4.0+10607+f4da7515.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman-remote@3.0.1-6.module%2Bel8.4.0%2B10607%2Bf4da7515?arch=ppc64le" } } }, { "category": "product_version", "name": "podman-remote-debuginfo-0:3.0.1-6.module+el8.4.0+10607+f4da7515.ppc64le", "product": { "name": "podman-remote-debuginfo-0:3.0.1-6.module+el8.4.0+10607+f4da7515.ppc64le", "product_id": "podman-remote-debuginfo-0:3.0.1-6.module+el8.4.0+10607+f4da7515.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman-remote-debuginfo@3.0.1-6.module%2Bel8.4.0%2B10607%2Bf4da7515?arch=ppc64le" } } }, { "category": "product_version", "name": "podman-tests-0:3.0.1-6.module+el8.4.0+10607+f4da7515.ppc64le", "product": { "name": "podman-tests-0:3.0.1-6.module+el8.4.0+10607+f4da7515.ppc64le", "product_id": "podman-tests-0:3.0.1-6.module+el8.4.0+10607+f4da7515.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman-tests@3.0.1-6.module%2Bel8.4.0%2B10607%2Bf4da7515?arch=ppc64le" } } }, { "category": "product_version", "name": "python3-criu-0:3.15-1.module+el8.4.0+10607+f4da7515.ppc64le", "product": { "name": "python3-criu-0:3.15-1.module+el8.4.0+10607+f4da7515.ppc64le", "product_id": "python3-criu-0:3.15-1.module+el8.4.0+10607+f4da7515.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-criu@3.15-1.module%2Bel8.4.0%2B10607%2Bf4da7515?arch=ppc64le" } } }, { "category": "product_version", "name": "runc-0:1.0.0-70.rc92.module+el8.4.0+10607+f4da7515.ppc64le", "product": { "name": "runc-0:1.0.0-70.rc92.module+el8.4.0+10607+f4da7515.ppc64le", "product_id": "runc-0:1.0.0-70.rc92.module+el8.4.0+10607+f4da7515.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/runc@1.0.0-70.rc92.module%2Bel8.4.0%2B10607%2Bf4da7515?arch=ppc64le" } } }, { "category": "product_version", "name": "runc-debuginfo-0:1.0.0-70.rc92.module+el8.4.0+10607+f4da7515.ppc64le", "product": { "name": "runc-debuginfo-0:1.0.0-70.rc92.module+el8.4.0+10607+f4da7515.ppc64le", "product_id": "runc-debuginfo-0:1.0.0-70.rc92.module+el8.4.0+10607+f4da7515.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/runc-debuginfo@1.0.0-70.rc92.module%2Bel8.4.0%2B10607%2Bf4da7515?arch=ppc64le" } } }, { "category": "product_version", "name": "runc-debugsource-0:1.0.0-70.rc92.module+el8.4.0+10607+f4da7515.ppc64le", "product": { "name": "runc-debugsource-0:1.0.0-70.rc92.module+el8.4.0+10607+f4da7515.ppc64le", "product_id": "runc-debugsource-0:1.0.0-70.rc92.module+el8.4.0+10607+f4da7515.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/runc-debugsource@1.0.0-70.rc92.module%2Bel8.4.0%2B10607%2Bf4da7515?arch=ppc64le" } } }, { "category": "product_version", "name": "skopeo-1:1.2.2-8.module+el8.4.0+10607+f4da7515.ppc64le", "product": { "name": "skopeo-1:1.2.2-8.module+el8.4.0+10607+f4da7515.ppc64le", "product_id": "skopeo-1:1.2.2-8.module+el8.4.0+10607+f4da7515.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/skopeo@1.2.2-8.module%2Bel8.4.0%2B10607%2Bf4da7515?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "skopeo-debuginfo-1:1.2.2-8.module+el8.4.0+10607+f4da7515.ppc64le", "product": { "name": "skopeo-debuginfo-1:1.2.2-8.module+el8.4.0+10607+f4da7515.ppc64le", "product_id": "skopeo-debuginfo-1:1.2.2-8.module+el8.4.0+10607+f4da7515.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/skopeo-debuginfo@1.2.2-8.module%2Bel8.4.0%2B10607%2Bf4da7515?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "skopeo-debugsource-1:1.2.2-8.module+el8.4.0+10607+f4da7515.ppc64le", "product": { "name": "skopeo-debugsource-1:1.2.2-8.module+el8.4.0+10607+f4da7515.ppc64le", "product_id": "skopeo-debugsource-1:1.2.2-8.module+el8.4.0+10607+f4da7515.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/skopeo-debugsource@1.2.2-8.module%2Bel8.4.0%2B10607%2Bf4da7515?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "skopeo-tests-1:1.2.2-8.module+el8.4.0+10607+f4da7515.ppc64le", "product": { "name": "skopeo-tests-1:1.2.2-8.module+el8.4.0+10607+f4da7515.ppc64le", "product_id": "skopeo-tests-1:1.2.2-8.module+el8.4.0+10607+f4da7515.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/skopeo-tests@1.2.2-8.module%2Bel8.4.0%2B10607%2Bf4da7515?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "slirp4netns-0:1.1.8-1.module+el8.4.0+10607+f4da7515.ppc64le", "product": { "name": "slirp4netns-0:1.1.8-1.module+el8.4.0+10607+f4da7515.ppc64le", "product_id": "slirp4netns-0:1.1.8-1.module+el8.4.0+10607+f4da7515.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/slirp4netns@1.1.8-1.module%2Bel8.4.0%2B10607%2Bf4da7515?arch=ppc64le" } } }, { "category": "product_version", "name": "slirp4netns-debuginfo-0:1.1.8-1.module+el8.4.0+10607+f4da7515.ppc64le", "product": { "name": "slirp4netns-debuginfo-0:1.1.8-1.module+el8.4.0+10607+f4da7515.ppc64le", "product_id": "slirp4netns-debuginfo-0:1.1.8-1.module+el8.4.0+10607+f4da7515.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/slirp4netns-debuginfo@1.1.8-1.module%2Bel8.4.0%2B10607%2Bf4da7515?arch=ppc64le" } } }, { "category": "product_version", "name": "slirp4netns-debugsource-0:1.1.8-1.module+el8.4.0+10607+f4da7515.ppc64le", "product": { "name": "slirp4netns-debugsource-0:1.1.8-1.module+el8.4.0+10607+f4da7515.ppc64le", "product_id": "slirp4netns-debugsource-0:1.1.8-1.module+el8.4.0+10607+f4da7515.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/slirp4netns-debugsource@1.1.8-1.module%2Bel8.4.0%2B10607%2Bf4da7515?arch=ppc64le" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "buildah-0:1.19.7-1.module+el8.4.0+10607+f4da7515.s390x", "product": { "name": "buildah-0:1.19.7-1.module+el8.4.0+10607+f4da7515.s390x", "product_id": "buildah-0:1.19.7-1.module+el8.4.0+10607+f4da7515.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/buildah@1.19.7-1.module%2Bel8.4.0%2B10607%2Bf4da7515?arch=s390x" } } }, { "category": "product_version", "name": "buildah-debuginfo-0:1.19.7-1.module+el8.4.0+10607+f4da7515.s390x", "product": { "name": "buildah-debuginfo-0:1.19.7-1.module+el8.4.0+10607+f4da7515.s390x", "product_id": "buildah-debuginfo-0:1.19.7-1.module+el8.4.0+10607+f4da7515.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/buildah-debuginfo@1.19.7-1.module%2Bel8.4.0%2B10607%2Bf4da7515?arch=s390x" } } }, { "category": "product_version", "name": "buildah-debugsource-0:1.19.7-1.module+el8.4.0+10607+f4da7515.s390x", "product": { "name": "buildah-debugsource-0:1.19.7-1.module+el8.4.0+10607+f4da7515.s390x", "product_id": "buildah-debugsource-0:1.19.7-1.module+el8.4.0+10607+f4da7515.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/buildah-debugsource@1.19.7-1.module%2Bel8.4.0%2B10607%2Bf4da7515?arch=s390x" } } }, { "category": "product_version", "name": "buildah-tests-0:1.19.7-1.module+el8.4.0+10607+f4da7515.s390x", "product": { "name": "buildah-tests-0:1.19.7-1.module+el8.4.0+10607+f4da7515.s390x", "product_id": "buildah-tests-0:1.19.7-1.module+el8.4.0+10607+f4da7515.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/buildah-tests@1.19.7-1.module%2Bel8.4.0%2B10607%2Bf4da7515?arch=s390x" } } }, { "category": "product_version", "name": "buildah-tests-debuginfo-0:1.19.7-1.module+el8.4.0+10607+f4da7515.s390x", "product": { "name": "buildah-tests-debuginfo-0:1.19.7-1.module+el8.4.0+10607+f4da7515.s390x", "product_id": "buildah-tests-debuginfo-0:1.19.7-1.module+el8.4.0+10607+f4da7515.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/buildah-tests-debuginfo@1.19.7-1.module%2Bel8.4.0%2B10607%2Bf4da7515?arch=s390x" } } }, { "category": "product_version", "name": "conmon-2:2.0.26-1.module+el8.4.0+10607+f4da7515.s390x", "product": { "name": "conmon-2:2.0.26-1.module+el8.4.0+10607+f4da7515.s390x", "product_id": "conmon-2:2.0.26-1.module+el8.4.0+10607+f4da7515.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/conmon@2.0.26-1.module%2Bel8.4.0%2B10607%2Bf4da7515?arch=s390x\u0026epoch=2" } } }, { "category": "product_version", "name": "conmon-debuginfo-2:2.0.26-1.module+el8.4.0+10607+f4da7515.s390x", "product": { "name": "conmon-debuginfo-2:2.0.26-1.module+el8.4.0+10607+f4da7515.s390x", "product_id": "conmon-debuginfo-2:2.0.26-1.module+el8.4.0+10607+f4da7515.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/conmon-debuginfo@2.0.26-1.module%2Bel8.4.0%2B10607%2Bf4da7515?arch=s390x\u0026epoch=2" } } }, { "category": "product_version", "name": "conmon-debugsource-2:2.0.26-1.module+el8.4.0+10607+f4da7515.s390x", "product": { "name": "conmon-debugsource-2:2.0.26-1.module+el8.4.0+10607+f4da7515.s390x", "product_id": "conmon-debugsource-2:2.0.26-1.module+el8.4.0+10607+f4da7515.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/conmon-debugsource@2.0.26-1.module%2Bel8.4.0%2B10607%2Bf4da7515?arch=s390x\u0026epoch=2" } } }, { "category": "product_version", "name": "containernetworking-plugins-0:0.9.1-1.module+el8.4.0+10607+f4da7515.s390x", "product": { "name": "containernetworking-plugins-0:0.9.1-1.module+el8.4.0+10607+f4da7515.s390x", "product_id": "containernetworking-plugins-0:0.9.1-1.module+el8.4.0+10607+f4da7515.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/containernetworking-plugins@0.9.1-1.module%2Bel8.4.0%2B10607%2Bf4da7515?arch=s390x" } } }, { "category": "product_version", "name": "containernetworking-plugins-debuginfo-0:0.9.1-1.module+el8.4.0+10607+f4da7515.s390x", "product": { "name": "containernetworking-plugins-debuginfo-0:0.9.1-1.module+el8.4.0+10607+f4da7515.s390x", "product_id": "containernetworking-plugins-debuginfo-0:0.9.1-1.module+el8.4.0+10607+f4da7515.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/containernetworking-plugins-debuginfo@0.9.1-1.module%2Bel8.4.0%2B10607%2Bf4da7515?arch=s390x" } } }, { "category": "product_version", "name": "containernetworking-plugins-debugsource-0:0.9.1-1.module+el8.4.0+10607+f4da7515.s390x", "product": { "name": "containernetworking-plugins-debugsource-0:0.9.1-1.module+el8.4.0+10607+f4da7515.s390x", "product_id": "containernetworking-plugins-debugsource-0:0.9.1-1.module+el8.4.0+10607+f4da7515.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/containernetworking-plugins-debugsource@0.9.1-1.module%2Bel8.4.0%2B10607%2Bf4da7515?arch=s390x" } } }, { "category": "product_version", "name": "containers-common-1:1.2.2-8.module+el8.4.0+10607+f4da7515.s390x", "product": { "name": "containers-common-1:1.2.2-8.module+el8.4.0+10607+f4da7515.s390x", "product_id": "containers-common-1:1.2.2-8.module+el8.4.0+10607+f4da7515.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/containers-common@1.2.2-8.module%2Bel8.4.0%2B10607%2Bf4da7515?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "crit-0:3.15-1.module+el8.4.0+10607+f4da7515.s390x", "product": { "name": "crit-0:3.15-1.module+el8.4.0+10607+f4da7515.s390x", "product_id": "crit-0:3.15-1.module+el8.4.0+10607+f4da7515.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/crit@3.15-1.module%2Bel8.4.0%2B10607%2Bf4da7515?arch=s390x" } } }, { "category": "product_version", "name": "criu-0:3.15-1.module+el8.4.0+10607+f4da7515.s390x", "product": { "name": "criu-0:3.15-1.module+el8.4.0+10607+f4da7515.s390x", "product_id": "criu-0:3.15-1.module+el8.4.0+10607+f4da7515.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/criu@3.15-1.module%2Bel8.4.0%2B10607%2Bf4da7515?arch=s390x" } } }, { "category": "product_version", "name": "criu-debuginfo-0:3.15-1.module+el8.4.0+10607+f4da7515.s390x", "product": { "name": "criu-debuginfo-0:3.15-1.module+el8.4.0+10607+f4da7515.s390x", "product_id": "criu-debuginfo-0:3.15-1.module+el8.4.0+10607+f4da7515.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/criu-debuginfo@3.15-1.module%2Bel8.4.0%2B10607%2Bf4da7515?arch=s390x" } } }, { "category": "product_version", "name": "criu-debugsource-0:3.15-1.module+el8.4.0+10607+f4da7515.s390x", "product": { "name": "criu-debugsource-0:3.15-1.module+el8.4.0+10607+f4da7515.s390x", "product_id": "criu-debugsource-0:3.15-1.module+el8.4.0+10607+f4da7515.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/criu-debugsource@3.15-1.module%2Bel8.4.0%2B10607%2Bf4da7515?arch=s390x" } } }, { "category": "product_version", "name": "crun-0:0.18-1.module+el8.4.0+10607+f4da7515.s390x", "product": { "name": "crun-0:0.18-1.module+el8.4.0+10607+f4da7515.s390x", "product_id": "crun-0:0.18-1.module+el8.4.0+10607+f4da7515.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/crun@0.18-1.module%2Bel8.4.0%2B10607%2Bf4da7515?arch=s390x" } } }, { "category": "product_version", "name": "crun-debuginfo-0:0.18-1.module+el8.4.0+10607+f4da7515.s390x", "product": { "name": "crun-debuginfo-0:0.18-1.module+el8.4.0+10607+f4da7515.s390x", "product_id": "crun-debuginfo-0:0.18-1.module+el8.4.0+10607+f4da7515.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/crun-debuginfo@0.18-1.module%2Bel8.4.0%2B10607%2Bf4da7515?arch=s390x" } } }, { "category": "product_version", "name": "crun-debugsource-0:0.18-1.module+el8.4.0+10607+f4da7515.s390x", "product": { "name": "crun-debugsource-0:0.18-1.module+el8.4.0+10607+f4da7515.s390x", "product_id": "crun-debugsource-0:0.18-1.module+el8.4.0+10607+f4da7515.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/crun-debugsource@0.18-1.module%2Bel8.4.0%2B10607%2Bf4da7515?arch=s390x" } } }, { "category": "product_version", "name": "fuse-overlayfs-0:1.4.0-2.module+el8.4.0+10607+f4da7515.s390x", "product": { "name": "fuse-overlayfs-0:1.4.0-2.module+el8.4.0+10607+f4da7515.s390x", "product_id": "fuse-overlayfs-0:1.4.0-2.module+el8.4.0+10607+f4da7515.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/fuse-overlayfs@1.4.0-2.module%2Bel8.4.0%2B10607%2Bf4da7515?arch=s390x" } } }, { "category": "product_version", "name": "fuse-overlayfs-debuginfo-0:1.4.0-2.module+el8.4.0+10607+f4da7515.s390x", "product": { "name": "fuse-overlayfs-debuginfo-0:1.4.0-2.module+el8.4.0+10607+f4da7515.s390x", "product_id": "fuse-overlayfs-debuginfo-0:1.4.0-2.module+el8.4.0+10607+f4da7515.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/fuse-overlayfs-debuginfo@1.4.0-2.module%2Bel8.4.0%2B10607%2Bf4da7515?arch=s390x" } } }, { "category": "product_version", "name": "fuse-overlayfs-debugsource-0:1.4.0-2.module+el8.4.0+10607+f4da7515.s390x", "product": { "name": "fuse-overlayfs-debugsource-0:1.4.0-2.module+el8.4.0+10607+f4da7515.s390x", "product_id": "fuse-overlayfs-debugsource-0:1.4.0-2.module+el8.4.0+10607+f4da7515.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/fuse-overlayfs-debugsource@1.4.0-2.module%2Bel8.4.0%2B10607%2Bf4da7515?arch=s390x" } } }, { "category": "product_version", "name": "libslirp-0:4.3.1-1.module+el8.4.0+10607+f4da7515.s390x", "product": { "name": "libslirp-0:4.3.1-1.module+el8.4.0+10607+f4da7515.s390x", "product_id": "libslirp-0:4.3.1-1.module+el8.4.0+10607+f4da7515.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/libslirp@4.3.1-1.module%2Bel8.4.0%2B10607%2Bf4da7515?arch=s390x" } } }, { "category": "product_version", "name": "libslirp-debuginfo-0:4.3.1-1.module+el8.4.0+10607+f4da7515.s390x", "product": { "name": "libslirp-debuginfo-0:4.3.1-1.module+el8.4.0+10607+f4da7515.s390x", "product_id": "libslirp-debuginfo-0:4.3.1-1.module+el8.4.0+10607+f4da7515.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/libslirp-debuginfo@4.3.1-1.module%2Bel8.4.0%2B10607%2Bf4da7515?arch=s390x" } } }, { "category": "product_version", "name": "libslirp-debugsource-0:4.3.1-1.module+el8.4.0+10607+f4da7515.s390x", "product": { "name": "libslirp-debugsource-0:4.3.1-1.module+el8.4.0+10607+f4da7515.s390x", "product_id": "libslirp-debugsource-0:4.3.1-1.module+el8.4.0+10607+f4da7515.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/libslirp-debugsource@4.3.1-1.module%2Bel8.4.0%2B10607%2Bf4da7515?arch=s390x" } } }, { "category": "product_version", "name": "libslirp-devel-0:4.3.1-1.module+el8.4.0+10607+f4da7515.s390x", "product": { "name": "libslirp-devel-0:4.3.1-1.module+el8.4.0+10607+f4da7515.s390x", "product_id": "libslirp-devel-0:4.3.1-1.module+el8.4.0+10607+f4da7515.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/libslirp-devel@4.3.1-1.module%2Bel8.4.0%2B10607%2Bf4da7515?arch=s390x" } } }, { "category": "product_version", "name": "oci-seccomp-bpf-hook-0:1.2.0-2.module+el8.4.0+10607+f4da7515.s390x", "product": { "name": "oci-seccomp-bpf-hook-0:1.2.0-2.module+el8.4.0+10607+f4da7515.s390x", "product_id": "oci-seccomp-bpf-hook-0:1.2.0-2.module+el8.4.0+10607+f4da7515.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/oci-seccomp-bpf-hook@1.2.0-2.module%2Bel8.4.0%2B10607%2Bf4da7515?arch=s390x" } } }, { "category": "product_version", "name": "oci-seccomp-bpf-hook-debuginfo-0:1.2.0-2.module+el8.4.0+10607+f4da7515.s390x", "product": { "name": "oci-seccomp-bpf-hook-debuginfo-0:1.2.0-2.module+el8.4.0+10607+f4da7515.s390x", "product_id": "oci-seccomp-bpf-hook-debuginfo-0:1.2.0-2.module+el8.4.0+10607+f4da7515.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/oci-seccomp-bpf-hook-debuginfo@1.2.0-2.module%2Bel8.4.0%2B10607%2Bf4da7515?arch=s390x" } } }, { "category": "product_version", "name": "oci-seccomp-bpf-hook-debugsource-0:1.2.0-2.module+el8.4.0+10607+f4da7515.s390x", "product": { "name": "oci-seccomp-bpf-hook-debugsource-0:1.2.0-2.module+el8.4.0+10607+f4da7515.s390x", "product_id": "oci-seccomp-bpf-hook-debugsource-0:1.2.0-2.module+el8.4.0+10607+f4da7515.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/oci-seccomp-bpf-hook-debugsource@1.2.0-2.module%2Bel8.4.0%2B10607%2Bf4da7515?arch=s390x" } } }, { "category": "product_version", "name": "podman-0:3.0.1-6.module+el8.4.0+10607+f4da7515.s390x", "product": { "name": "podman-0:3.0.1-6.module+el8.4.0+10607+f4da7515.s390x", "product_id": "podman-0:3.0.1-6.module+el8.4.0+10607+f4da7515.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman@3.0.1-6.module%2Bel8.4.0%2B10607%2Bf4da7515?arch=s390x" } } }, { "category": "product_version", "name": "podman-catatonit-0:3.0.1-6.module+el8.4.0+10607+f4da7515.s390x", "product": { "name": "podman-catatonit-0:3.0.1-6.module+el8.4.0+10607+f4da7515.s390x", "product_id": "podman-catatonit-0:3.0.1-6.module+el8.4.0+10607+f4da7515.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman-catatonit@3.0.1-6.module%2Bel8.4.0%2B10607%2Bf4da7515?arch=s390x" } } }, { "category": "product_version", "name": "podman-catatonit-debuginfo-0:3.0.1-6.module+el8.4.0+10607+f4da7515.s390x", "product": { "name": "podman-catatonit-debuginfo-0:3.0.1-6.module+el8.4.0+10607+f4da7515.s390x", "product_id": "podman-catatonit-debuginfo-0:3.0.1-6.module+el8.4.0+10607+f4da7515.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman-catatonit-debuginfo@3.0.1-6.module%2Bel8.4.0%2B10607%2Bf4da7515?arch=s390x" } } }, { "category": "product_version", "name": "podman-debuginfo-0:3.0.1-6.module+el8.4.0+10607+f4da7515.s390x", "product": { "name": "podman-debuginfo-0:3.0.1-6.module+el8.4.0+10607+f4da7515.s390x", "product_id": "podman-debuginfo-0:3.0.1-6.module+el8.4.0+10607+f4da7515.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman-debuginfo@3.0.1-6.module%2Bel8.4.0%2B10607%2Bf4da7515?arch=s390x" } } }, { "category": "product_version", "name": "podman-debugsource-0:3.0.1-6.module+el8.4.0+10607+f4da7515.s390x", "product": { "name": "podman-debugsource-0:3.0.1-6.module+el8.4.0+10607+f4da7515.s390x", "product_id": "podman-debugsource-0:3.0.1-6.module+el8.4.0+10607+f4da7515.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman-debugsource@3.0.1-6.module%2Bel8.4.0%2B10607%2Bf4da7515?arch=s390x" } } }, { "category": "product_version", "name": "podman-plugins-0:3.0.1-6.module+el8.4.0+10607+f4da7515.s390x", "product": { "name": "podman-plugins-0:3.0.1-6.module+el8.4.0+10607+f4da7515.s390x", "product_id": "podman-plugins-0:3.0.1-6.module+el8.4.0+10607+f4da7515.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman-plugins@3.0.1-6.module%2Bel8.4.0%2B10607%2Bf4da7515?arch=s390x" } } }, { "category": "product_version", "name": "podman-plugins-debuginfo-0:3.0.1-6.module+el8.4.0+10607+f4da7515.s390x", "product": { "name": "podman-plugins-debuginfo-0:3.0.1-6.module+el8.4.0+10607+f4da7515.s390x", "product_id": "podman-plugins-debuginfo-0:3.0.1-6.module+el8.4.0+10607+f4da7515.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman-plugins-debuginfo@3.0.1-6.module%2Bel8.4.0%2B10607%2Bf4da7515?arch=s390x" } } }, { "category": "product_version", "name": "podman-remote-0:3.0.1-6.module+el8.4.0+10607+f4da7515.s390x", "product": { "name": "podman-remote-0:3.0.1-6.module+el8.4.0+10607+f4da7515.s390x", "product_id": "podman-remote-0:3.0.1-6.module+el8.4.0+10607+f4da7515.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman-remote@3.0.1-6.module%2Bel8.4.0%2B10607%2Bf4da7515?arch=s390x" } } }, { "category": "product_version", "name": "podman-remote-debuginfo-0:3.0.1-6.module+el8.4.0+10607+f4da7515.s390x", "product": { "name": "podman-remote-debuginfo-0:3.0.1-6.module+el8.4.0+10607+f4da7515.s390x", "product_id": "podman-remote-debuginfo-0:3.0.1-6.module+el8.4.0+10607+f4da7515.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman-remote-debuginfo@3.0.1-6.module%2Bel8.4.0%2B10607%2Bf4da7515?arch=s390x" } } }, { "category": "product_version", "name": "podman-tests-0:3.0.1-6.module+el8.4.0+10607+f4da7515.s390x", "product": { "name": "podman-tests-0:3.0.1-6.module+el8.4.0+10607+f4da7515.s390x", "product_id": "podman-tests-0:3.0.1-6.module+el8.4.0+10607+f4da7515.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman-tests@3.0.1-6.module%2Bel8.4.0%2B10607%2Bf4da7515?arch=s390x" } } }, { "category": "product_version", "name": "python3-criu-0:3.15-1.module+el8.4.0+10607+f4da7515.s390x", "product": { "name": "python3-criu-0:3.15-1.module+el8.4.0+10607+f4da7515.s390x", "product_id": "python3-criu-0:3.15-1.module+el8.4.0+10607+f4da7515.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-criu@3.15-1.module%2Bel8.4.0%2B10607%2Bf4da7515?arch=s390x" } } }, { "category": "product_version", "name": "runc-0:1.0.0-70.rc92.module+el8.4.0+10607+f4da7515.s390x", "product": { "name": "runc-0:1.0.0-70.rc92.module+el8.4.0+10607+f4da7515.s390x", "product_id": "runc-0:1.0.0-70.rc92.module+el8.4.0+10607+f4da7515.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/runc@1.0.0-70.rc92.module%2Bel8.4.0%2B10607%2Bf4da7515?arch=s390x" } } }, { "category": "product_version", "name": "runc-debuginfo-0:1.0.0-70.rc92.module+el8.4.0+10607+f4da7515.s390x", "product": { "name": "runc-debuginfo-0:1.0.0-70.rc92.module+el8.4.0+10607+f4da7515.s390x", "product_id": "runc-debuginfo-0:1.0.0-70.rc92.module+el8.4.0+10607+f4da7515.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/runc-debuginfo@1.0.0-70.rc92.module%2Bel8.4.0%2B10607%2Bf4da7515?arch=s390x" } } }, { "category": "product_version", "name": "runc-debugsource-0:1.0.0-70.rc92.module+el8.4.0+10607+f4da7515.s390x", "product": { "name": "runc-debugsource-0:1.0.0-70.rc92.module+el8.4.0+10607+f4da7515.s390x", "product_id": "runc-debugsource-0:1.0.0-70.rc92.module+el8.4.0+10607+f4da7515.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/runc-debugsource@1.0.0-70.rc92.module%2Bel8.4.0%2B10607%2Bf4da7515?arch=s390x" } } }, { "category": "product_version", "name": "skopeo-1:1.2.2-8.module+el8.4.0+10607+f4da7515.s390x", "product": { "name": "skopeo-1:1.2.2-8.module+el8.4.0+10607+f4da7515.s390x", "product_id": "skopeo-1:1.2.2-8.module+el8.4.0+10607+f4da7515.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/skopeo@1.2.2-8.module%2Bel8.4.0%2B10607%2Bf4da7515?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "skopeo-debuginfo-1:1.2.2-8.module+el8.4.0+10607+f4da7515.s390x", "product": { "name": "skopeo-debuginfo-1:1.2.2-8.module+el8.4.0+10607+f4da7515.s390x", "product_id": "skopeo-debuginfo-1:1.2.2-8.module+el8.4.0+10607+f4da7515.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/skopeo-debuginfo@1.2.2-8.module%2Bel8.4.0%2B10607%2Bf4da7515?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "skopeo-debugsource-1:1.2.2-8.module+el8.4.0+10607+f4da7515.s390x", "product": { "name": "skopeo-debugsource-1:1.2.2-8.module+el8.4.0+10607+f4da7515.s390x", "product_id": "skopeo-debugsource-1:1.2.2-8.module+el8.4.0+10607+f4da7515.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/skopeo-debugsource@1.2.2-8.module%2Bel8.4.0%2B10607%2Bf4da7515?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "skopeo-tests-1:1.2.2-8.module+el8.4.0+10607+f4da7515.s390x", "product": { "name": "skopeo-tests-1:1.2.2-8.module+el8.4.0+10607+f4da7515.s390x", "product_id": "skopeo-tests-1:1.2.2-8.module+el8.4.0+10607+f4da7515.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/skopeo-tests@1.2.2-8.module%2Bel8.4.0%2B10607%2Bf4da7515?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "slirp4netns-0:1.1.8-1.module+el8.4.0+10607+f4da7515.s390x", "product": { "name": "slirp4netns-0:1.1.8-1.module+el8.4.0+10607+f4da7515.s390x", "product_id": "slirp4netns-0:1.1.8-1.module+el8.4.0+10607+f4da7515.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/slirp4netns@1.1.8-1.module%2Bel8.4.0%2B10607%2Bf4da7515?arch=s390x" } } }, { "category": "product_version", "name": "slirp4netns-debuginfo-0:1.1.8-1.module+el8.4.0+10607+f4da7515.s390x", "product": { "name": "slirp4netns-debuginfo-0:1.1.8-1.module+el8.4.0+10607+f4da7515.s390x", "product_id": "slirp4netns-debuginfo-0:1.1.8-1.module+el8.4.0+10607+f4da7515.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/slirp4netns-debuginfo@1.1.8-1.module%2Bel8.4.0%2B10607%2Bf4da7515?arch=s390x" } } }, { "category": "product_version", "name": "slirp4netns-debugsource-0:1.1.8-1.module+el8.4.0+10607+f4da7515.s390x", "product": { "name": "slirp4netns-debugsource-0:1.1.8-1.module+el8.4.0+10607+f4da7515.s390x", "product_id": "slirp4netns-debugsource-0:1.1.8-1.module+el8.4.0+10607+f4da7515.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/slirp4netns-debugsource@1.1.8-1.module%2Bel8.4.0%2B10607%2Bf4da7515?arch=s390x" } } } ], "category": "architecture", "name": "s390x" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "container-tools:rhel8:8040020210407081426:59631bd5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5" }, "product_reference": "container-tools:rhel8:8040020210407081426:59631bd5", "relates_to_product_reference": "AppStream-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "buildah-0:1.19.7-1.module+el8.4.0+10607+f4da7515.aarch64 as a component of container-tools:rhel8:8040020210407081426:59631bd5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:buildah-0:1.19.7-1.module+el8.4.0+10607+f4da7515.aarch64" }, "product_reference": "buildah-0:1.19.7-1.module+el8.4.0+10607+f4da7515.aarch64", "relates_to_product_reference": "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5" }, { "category": "default_component_of", "full_product_name": { "name": "buildah-0:1.19.7-1.module+el8.4.0+10607+f4da7515.ppc64le as a component of container-tools:rhel8:8040020210407081426:59631bd5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:buildah-0:1.19.7-1.module+el8.4.0+10607+f4da7515.ppc64le" }, "product_reference": "buildah-0:1.19.7-1.module+el8.4.0+10607+f4da7515.ppc64le", "relates_to_product_reference": "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5" }, { "category": "default_component_of", "full_product_name": { "name": "buildah-0:1.19.7-1.module+el8.4.0+10607+f4da7515.s390x as a component of container-tools:rhel8:8040020210407081426:59631bd5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:buildah-0:1.19.7-1.module+el8.4.0+10607+f4da7515.s390x" }, "product_reference": "buildah-0:1.19.7-1.module+el8.4.0+10607+f4da7515.s390x", "relates_to_product_reference": "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5" }, { "category": "default_component_of", "full_product_name": { "name": "buildah-0:1.19.7-1.module+el8.4.0+10607+f4da7515.src as a component of container-tools:rhel8:8040020210407081426:59631bd5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:buildah-0:1.19.7-1.module+el8.4.0+10607+f4da7515.src" }, "product_reference": "buildah-0:1.19.7-1.module+el8.4.0+10607+f4da7515.src", "relates_to_product_reference": "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5" }, { "category": "default_component_of", "full_product_name": { "name": "buildah-0:1.19.7-1.module+el8.4.0+10607+f4da7515.x86_64 as a component of container-tools:rhel8:8040020210407081426:59631bd5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:buildah-0:1.19.7-1.module+el8.4.0+10607+f4da7515.x86_64" }, "product_reference": "buildah-0:1.19.7-1.module+el8.4.0+10607+f4da7515.x86_64", "relates_to_product_reference": "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5" }, { "category": "default_component_of", "full_product_name": { "name": "buildah-debuginfo-0:1.19.7-1.module+el8.4.0+10607+f4da7515.aarch64 as a component of container-tools:rhel8:8040020210407081426:59631bd5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:buildah-debuginfo-0:1.19.7-1.module+el8.4.0+10607+f4da7515.aarch64" }, "product_reference": "buildah-debuginfo-0:1.19.7-1.module+el8.4.0+10607+f4da7515.aarch64", "relates_to_product_reference": "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5" }, { "category": "default_component_of", "full_product_name": { "name": "buildah-debuginfo-0:1.19.7-1.module+el8.4.0+10607+f4da7515.ppc64le as a component of container-tools:rhel8:8040020210407081426:59631bd5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:buildah-debuginfo-0:1.19.7-1.module+el8.4.0+10607+f4da7515.ppc64le" }, "product_reference": "buildah-debuginfo-0:1.19.7-1.module+el8.4.0+10607+f4da7515.ppc64le", "relates_to_product_reference": "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5" }, { "category": "default_component_of", "full_product_name": { "name": "buildah-debuginfo-0:1.19.7-1.module+el8.4.0+10607+f4da7515.s390x as a component of container-tools:rhel8:8040020210407081426:59631bd5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:buildah-debuginfo-0:1.19.7-1.module+el8.4.0+10607+f4da7515.s390x" }, "product_reference": "buildah-debuginfo-0:1.19.7-1.module+el8.4.0+10607+f4da7515.s390x", "relates_to_product_reference": "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5" }, { "category": "default_component_of", "full_product_name": { "name": "buildah-debuginfo-0:1.19.7-1.module+el8.4.0+10607+f4da7515.x86_64 as a component of container-tools:rhel8:8040020210407081426:59631bd5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:buildah-debuginfo-0:1.19.7-1.module+el8.4.0+10607+f4da7515.x86_64" }, "product_reference": "buildah-debuginfo-0:1.19.7-1.module+el8.4.0+10607+f4da7515.x86_64", "relates_to_product_reference": "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5" }, { "category": "default_component_of", "full_product_name": { "name": "buildah-debugsource-0:1.19.7-1.module+el8.4.0+10607+f4da7515.aarch64 as a component of container-tools:rhel8:8040020210407081426:59631bd5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:buildah-debugsource-0:1.19.7-1.module+el8.4.0+10607+f4da7515.aarch64" }, "product_reference": "buildah-debugsource-0:1.19.7-1.module+el8.4.0+10607+f4da7515.aarch64", "relates_to_product_reference": "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5" }, { "category": "default_component_of", "full_product_name": { "name": "buildah-debugsource-0:1.19.7-1.module+el8.4.0+10607+f4da7515.ppc64le as a component of container-tools:rhel8:8040020210407081426:59631bd5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:buildah-debugsource-0:1.19.7-1.module+el8.4.0+10607+f4da7515.ppc64le" }, "product_reference": "buildah-debugsource-0:1.19.7-1.module+el8.4.0+10607+f4da7515.ppc64le", "relates_to_product_reference": "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5" }, { "category": "default_component_of", "full_product_name": { "name": "buildah-debugsource-0:1.19.7-1.module+el8.4.0+10607+f4da7515.s390x as a component of container-tools:rhel8:8040020210407081426:59631bd5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:buildah-debugsource-0:1.19.7-1.module+el8.4.0+10607+f4da7515.s390x" }, "product_reference": "buildah-debugsource-0:1.19.7-1.module+el8.4.0+10607+f4da7515.s390x", "relates_to_product_reference": "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5" }, { "category": "default_component_of", "full_product_name": { "name": "buildah-debugsource-0:1.19.7-1.module+el8.4.0+10607+f4da7515.x86_64 as a component of container-tools:rhel8:8040020210407081426:59631bd5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:buildah-debugsource-0:1.19.7-1.module+el8.4.0+10607+f4da7515.x86_64" }, "product_reference": "buildah-debugsource-0:1.19.7-1.module+el8.4.0+10607+f4da7515.x86_64", "relates_to_product_reference": "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5" }, { "category": "default_component_of", "full_product_name": { "name": "buildah-tests-0:1.19.7-1.module+el8.4.0+10607+f4da7515.aarch64 as a component of container-tools:rhel8:8040020210407081426:59631bd5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:buildah-tests-0:1.19.7-1.module+el8.4.0+10607+f4da7515.aarch64" }, "product_reference": "buildah-tests-0:1.19.7-1.module+el8.4.0+10607+f4da7515.aarch64", "relates_to_product_reference": "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5" }, { "category": "default_component_of", "full_product_name": { "name": "buildah-tests-0:1.19.7-1.module+el8.4.0+10607+f4da7515.ppc64le as a component of container-tools:rhel8:8040020210407081426:59631bd5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:buildah-tests-0:1.19.7-1.module+el8.4.0+10607+f4da7515.ppc64le" }, "product_reference": "buildah-tests-0:1.19.7-1.module+el8.4.0+10607+f4da7515.ppc64le", "relates_to_product_reference": "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5" }, { "category": "default_component_of", "full_product_name": { "name": "buildah-tests-0:1.19.7-1.module+el8.4.0+10607+f4da7515.s390x as a component of container-tools:rhel8:8040020210407081426:59631bd5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:buildah-tests-0:1.19.7-1.module+el8.4.0+10607+f4da7515.s390x" }, "product_reference": "buildah-tests-0:1.19.7-1.module+el8.4.0+10607+f4da7515.s390x", "relates_to_product_reference": "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5" }, { "category": "default_component_of", "full_product_name": { "name": "buildah-tests-0:1.19.7-1.module+el8.4.0+10607+f4da7515.x86_64 as a component of container-tools:rhel8:8040020210407081426:59631bd5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:buildah-tests-0:1.19.7-1.module+el8.4.0+10607+f4da7515.x86_64" }, "product_reference": "buildah-tests-0:1.19.7-1.module+el8.4.0+10607+f4da7515.x86_64", "relates_to_product_reference": "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5" }, { "category": "default_component_of", "full_product_name": { "name": "buildah-tests-debuginfo-0:1.19.7-1.module+el8.4.0+10607+f4da7515.aarch64 as a component of container-tools:rhel8:8040020210407081426:59631bd5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:buildah-tests-debuginfo-0:1.19.7-1.module+el8.4.0+10607+f4da7515.aarch64" }, "product_reference": "buildah-tests-debuginfo-0:1.19.7-1.module+el8.4.0+10607+f4da7515.aarch64", "relates_to_product_reference": "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5" }, { "category": "default_component_of", "full_product_name": { "name": "buildah-tests-debuginfo-0:1.19.7-1.module+el8.4.0+10607+f4da7515.ppc64le as a component of container-tools:rhel8:8040020210407081426:59631bd5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:buildah-tests-debuginfo-0:1.19.7-1.module+el8.4.0+10607+f4da7515.ppc64le" }, "product_reference": "buildah-tests-debuginfo-0:1.19.7-1.module+el8.4.0+10607+f4da7515.ppc64le", "relates_to_product_reference": "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5" }, { "category": "default_component_of", "full_product_name": { "name": "buildah-tests-debuginfo-0:1.19.7-1.module+el8.4.0+10607+f4da7515.s390x as a component of container-tools:rhel8:8040020210407081426:59631bd5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:buildah-tests-debuginfo-0:1.19.7-1.module+el8.4.0+10607+f4da7515.s390x" }, "product_reference": "buildah-tests-debuginfo-0:1.19.7-1.module+el8.4.0+10607+f4da7515.s390x", "relates_to_product_reference": "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5" }, { "category": "default_component_of", "full_product_name": { "name": "buildah-tests-debuginfo-0:1.19.7-1.module+el8.4.0+10607+f4da7515.x86_64 as a component of container-tools:rhel8:8040020210407081426:59631bd5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:buildah-tests-debuginfo-0:1.19.7-1.module+el8.4.0+10607+f4da7515.x86_64" }, "product_reference": "buildah-tests-debuginfo-0:1.19.7-1.module+el8.4.0+10607+f4da7515.x86_64", "relates_to_product_reference": "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5" }, { "category": "default_component_of", "full_product_name": { "name": "cockpit-podman-0:29-2.module+el8.4.0+10607+f4da7515.noarch as a component of container-tools:rhel8:8040020210407081426:59631bd5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:cockpit-podman-0:29-2.module+el8.4.0+10607+f4da7515.noarch" }, "product_reference": "cockpit-podman-0:29-2.module+el8.4.0+10607+f4da7515.noarch", "relates_to_product_reference": "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5" }, { "category": "default_component_of", "full_product_name": { "name": "cockpit-podman-0:29-2.module+el8.4.0+10607+f4da7515.src as a component of container-tools:rhel8:8040020210407081426:59631bd5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:cockpit-podman-0:29-2.module+el8.4.0+10607+f4da7515.src" }, "product_reference": "cockpit-podman-0:29-2.module+el8.4.0+10607+f4da7515.src", "relates_to_product_reference": "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5" }, { "category": "default_component_of", "full_product_name": { "name": "conmon-2:2.0.26-1.module+el8.4.0+10607+f4da7515.aarch64 as a component of container-tools:rhel8:8040020210407081426:59631bd5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:conmon-2:2.0.26-1.module+el8.4.0+10607+f4da7515.aarch64" }, "product_reference": "conmon-2:2.0.26-1.module+el8.4.0+10607+f4da7515.aarch64", "relates_to_product_reference": "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5" }, { "category": "default_component_of", "full_product_name": { "name": "conmon-2:2.0.26-1.module+el8.4.0+10607+f4da7515.ppc64le as a component of container-tools:rhel8:8040020210407081426:59631bd5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:conmon-2:2.0.26-1.module+el8.4.0+10607+f4da7515.ppc64le" }, "product_reference": "conmon-2:2.0.26-1.module+el8.4.0+10607+f4da7515.ppc64le", "relates_to_product_reference": "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5" }, { "category": "default_component_of", "full_product_name": { "name": "conmon-2:2.0.26-1.module+el8.4.0+10607+f4da7515.s390x as a component of container-tools:rhel8:8040020210407081426:59631bd5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:conmon-2:2.0.26-1.module+el8.4.0+10607+f4da7515.s390x" }, "product_reference": "conmon-2:2.0.26-1.module+el8.4.0+10607+f4da7515.s390x", "relates_to_product_reference": "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5" }, { "category": "default_component_of", "full_product_name": { "name": "conmon-2:2.0.26-1.module+el8.4.0+10607+f4da7515.src as a component of container-tools:rhel8:8040020210407081426:59631bd5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:conmon-2:2.0.26-1.module+el8.4.0+10607+f4da7515.src" }, "product_reference": "conmon-2:2.0.26-1.module+el8.4.0+10607+f4da7515.src", "relates_to_product_reference": "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5" }, { "category": "default_component_of", "full_product_name": { "name": "conmon-2:2.0.26-1.module+el8.4.0+10607+f4da7515.x86_64 as a component of container-tools:rhel8:8040020210407081426:59631bd5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:conmon-2:2.0.26-1.module+el8.4.0+10607+f4da7515.x86_64" }, "product_reference": "conmon-2:2.0.26-1.module+el8.4.0+10607+f4da7515.x86_64", "relates_to_product_reference": "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5" }, { "category": "default_component_of", "full_product_name": { "name": "conmon-debuginfo-2:2.0.26-1.module+el8.4.0+10607+f4da7515.aarch64 as a component of container-tools:rhel8:8040020210407081426:59631bd5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:conmon-debuginfo-2:2.0.26-1.module+el8.4.0+10607+f4da7515.aarch64" }, "product_reference": "conmon-debuginfo-2:2.0.26-1.module+el8.4.0+10607+f4da7515.aarch64", "relates_to_product_reference": "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5" }, { "category": "default_component_of", "full_product_name": { "name": "conmon-debuginfo-2:2.0.26-1.module+el8.4.0+10607+f4da7515.ppc64le as a component of container-tools:rhel8:8040020210407081426:59631bd5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:conmon-debuginfo-2:2.0.26-1.module+el8.4.0+10607+f4da7515.ppc64le" }, "product_reference": "conmon-debuginfo-2:2.0.26-1.module+el8.4.0+10607+f4da7515.ppc64le", "relates_to_product_reference": "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5" }, { "category": "default_component_of", "full_product_name": { "name": "conmon-debuginfo-2:2.0.26-1.module+el8.4.0+10607+f4da7515.s390x as a component of container-tools:rhel8:8040020210407081426:59631bd5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:conmon-debuginfo-2:2.0.26-1.module+el8.4.0+10607+f4da7515.s390x" }, "product_reference": "conmon-debuginfo-2:2.0.26-1.module+el8.4.0+10607+f4da7515.s390x", "relates_to_product_reference": "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5" }, { "category": "default_component_of", "full_product_name": { "name": "conmon-debuginfo-2:2.0.26-1.module+el8.4.0+10607+f4da7515.x86_64 as a component of container-tools:rhel8:8040020210407081426:59631bd5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:conmon-debuginfo-2:2.0.26-1.module+el8.4.0+10607+f4da7515.x86_64" }, "product_reference": "conmon-debuginfo-2:2.0.26-1.module+el8.4.0+10607+f4da7515.x86_64", "relates_to_product_reference": "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5" }, { "category": "default_component_of", "full_product_name": { "name": "conmon-debugsource-2:2.0.26-1.module+el8.4.0+10607+f4da7515.aarch64 as a component of container-tools:rhel8:8040020210407081426:59631bd5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:conmon-debugsource-2:2.0.26-1.module+el8.4.0+10607+f4da7515.aarch64" }, "product_reference": "conmon-debugsource-2:2.0.26-1.module+el8.4.0+10607+f4da7515.aarch64", "relates_to_product_reference": "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5" }, { "category": "default_component_of", "full_product_name": { "name": "conmon-debugsource-2:2.0.26-1.module+el8.4.0+10607+f4da7515.ppc64le as a component of container-tools:rhel8:8040020210407081426:59631bd5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:conmon-debugsource-2:2.0.26-1.module+el8.4.0+10607+f4da7515.ppc64le" }, "product_reference": "conmon-debugsource-2:2.0.26-1.module+el8.4.0+10607+f4da7515.ppc64le", "relates_to_product_reference": "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5" }, { "category": "default_component_of", "full_product_name": { "name": "conmon-debugsource-2:2.0.26-1.module+el8.4.0+10607+f4da7515.s390x as a component of container-tools:rhel8:8040020210407081426:59631bd5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:conmon-debugsource-2:2.0.26-1.module+el8.4.0+10607+f4da7515.s390x" }, "product_reference": "conmon-debugsource-2:2.0.26-1.module+el8.4.0+10607+f4da7515.s390x", "relates_to_product_reference": "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5" }, { "category": "default_component_of", "full_product_name": { "name": "conmon-debugsource-2:2.0.26-1.module+el8.4.0+10607+f4da7515.x86_64 as a component of container-tools:rhel8:8040020210407081426:59631bd5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:conmon-debugsource-2:2.0.26-1.module+el8.4.0+10607+f4da7515.x86_64" }, "product_reference": "conmon-debugsource-2:2.0.26-1.module+el8.4.0+10607+f4da7515.x86_64", "relates_to_product_reference": "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5" }, { "category": "default_component_of", "full_product_name": { "name": "container-selinux-2:2.158.0-1.module+el8.4.0+10607+f4da7515.noarch as a component of container-tools:rhel8:8040020210407081426:59631bd5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:container-selinux-2:2.158.0-1.module+el8.4.0+10607+f4da7515.noarch" }, "product_reference": "container-selinux-2:2.158.0-1.module+el8.4.0+10607+f4da7515.noarch", "relates_to_product_reference": "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5" }, { "category": "default_component_of", "full_product_name": { "name": "container-selinux-2:2.158.0-1.module+el8.4.0+10607+f4da7515.src as a component of container-tools:rhel8:8040020210407081426:59631bd5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:container-selinux-2:2.158.0-1.module+el8.4.0+10607+f4da7515.src" }, "product_reference": "container-selinux-2:2.158.0-1.module+el8.4.0+10607+f4da7515.src", "relates_to_product_reference": "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5" }, { "category": "default_component_of", "full_product_name": { "name": "containernetworking-plugins-0:0.9.1-1.module+el8.4.0+10607+f4da7515.aarch64 as a component of container-tools:rhel8:8040020210407081426:59631bd5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:containernetworking-plugins-0:0.9.1-1.module+el8.4.0+10607+f4da7515.aarch64" }, "product_reference": "containernetworking-plugins-0:0.9.1-1.module+el8.4.0+10607+f4da7515.aarch64", "relates_to_product_reference": "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5" }, { "category": "default_component_of", "full_product_name": { "name": "containernetworking-plugins-0:0.9.1-1.module+el8.4.0+10607+f4da7515.ppc64le as a component of container-tools:rhel8:8040020210407081426:59631bd5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:containernetworking-plugins-0:0.9.1-1.module+el8.4.0+10607+f4da7515.ppc64le" }, "product_reference": "containernetworking-plugins-0:0.9.1-1.module+el8.4.0+10607+f4da7515.ppc64le", "relates_to_product_reference": "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5" }, { "category": "default_component_of", "full_product_name": { "name": "containernetworking-plugins-0:0.9.1-1.module+el8.4.0+10607+f4da7515.s390x as a component of container-tools:rhel8:8040020210407081426:59631bd5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:containernetworking-plugins-0:0.9.1-1.module+el8.4.0+10607+f4da7515.s390x" }, "product_reference": "containernetworking-plugins-0:0.9.1-1.module+el8.4.0+10607+f4da7515.s390x", "relates_to_product_reference": "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5" }, { "category": "default_component_of", "full_product_name": { "name": "containernetworking-plugins-0:0.9.1-1.module+el8.4.0+10607+f4da7515.src as a component of container-tools:rhel8:8040020210407081426:59631bd5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:containernetworking-plugins-0:0.9.1-1.module+el8.4.0+10607+f4da7515.src" }, "product_reference": "containernetworking-plugins-0:0.9.1-1.module+el8.4.0+10607+f4da7515.src", "relates_to_product_reference": "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5" }, { "category": "default_component_of", "full_product_name": { "name": "containernetworking-plugins-0:0.9.1-1.module+el8.4.0+10607+f4da7515.x86_64 as a component of container-tools:rhel8:8040020210407081426:59631bd5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:containernetworking-plugins-0:0.9.1-1.module+el8.4.0+10607+f4da7515.x86_64" }, "product_reference": "containernetworking-plugins-0:0.9.1-1.module+el8.4.0+10607+f4da7515.x86_64", "relates_to_product_reference": "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5" }, { "category": "default_component_of", "full_product_name": { "name": "containernetworking-plugins-debuginfo-0:0.9.1-1.module+el8.4.0+10607+f4da7515.aarch64 as a component of container-tools:rhel8:8040020210407081426:59631bd5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:containernetworking-plugins-debuginfo-0:0.9.1-1.module+el8.4.0+10607+f4da7515.aarch64" }, "product_reference": "containernetworking-plugins-debuginfo-0:0.9.1-1.module+el8.4.0+10607+f4da7515.aarch64", "relates_to_product_reference": "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5" }, { "category": "default_component_of", "full_product_name": { "name": "containernetworking-plugins-debuginfo-0:0.9.1-1.module+el8.4.0+10607+f4da7515.ppc64le as a component of container-tools:rhel8:8040020210407081426:59631bd5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:containernetworking-plugins-debuginfo-0:0.9.1-1.module+el8.4.0+10607+f4da7515.ppc64le" }, "product_reference": "containernetworking-plugins-debuginfo-0:0.9.1-1.module+el8.4.0+10607+f4da7515.ppc64le", "relates_to_product_reference": "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5" }, { "category": "default_component_of", "full_product_name": { "name": "containernetworking-plugins-debuginfo-0:0.9.1-1.module+el8.4.0+10607+f4da7515.s390x as a component of container-tools:rhel8:8040020210407081426:59631bd5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:containernetworking-plugins-debuginfo-0:0.9.1-1.module+el8.4.0+10607+f4da7515.s390x" }, "product_reference": "containernetworking-plugins-debuginfo-0:0.9.1-1.module+el8.4.0+10607+f4da7515.s390x", "relates_to_product_reference": "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5" }, { "category": "default_component_of", "full_product_name": { "name": "containernetworking-plugins-debuginfo-0:0.9.1-1.module+el8.4.0+10607+f4da7515.x86_64 as a component of container-tools:rhel8:8040020210407081426:59631bd5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:containernetworking-plugins-debuginfo-0:0.9.1-1.module+el8.4.0+10607+f4da7515.x86_64" }, "product_reference": "containernetworking-plugins-debuginfo-0:0.9.1-1.module+el8.4.0+10607+f4da7515.x86_64", "relates_to_product_reference": "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5" }, { "category": "default_component_of", "full_product_name": { "name": "containernetworking-plugins-debugsource-0:0.9.1-1.module+el8.4.0+10607+f4da7515.aarch64 as a component of container-tools:rhel8:8040020210407081426:59631bd5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:containernetworking-plugins-debugsource-0:0.9.1-1.module+el8.4.0+10607+f4da7515.aarch64" }, "product_reference": "containernetworking-plugins-debugsource-0:0.9.1-1.module+el8.4.0+10607+f4da7515.aarch64", "relates_to_product_reference": "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5" }, { "category": "default_component_of", "full_product_name": { "name": "containernetworking-plugins-debugsource-0:0.9.1-1.module+el8.4.0+10607+f4da7515.ppc64le as a component of container-tools:rhel8:8040020210407081426:59631bd5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:containernetworking-plugins-debugsource-0:0.9.1-1.module+el8.4.0+10607+f4da7515.ppc64le" }, "product_reference": "containernetworking-plugins-debugsource-0:0.9.1-1.module+el8.4.0+10607+f4da7515.ppc64le", "relates_to_product_reference": "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5" }, { "category": "default_component_of", "full_product_name": { "name": "containernetworking-plugins-debugsource-0:0.9.1-1.module+el8.4.0+10607+f4da7515.s390x as a component of container-tools:rhel8:8040020210407081426:59631bd5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:containernetworking-plugins-debugsource-0:0.9.1-1.module+el8.4.0+10607+f4da7515.s390x" }, "product_reference": "containernetworking-plugins-debugsource-0:0.9.1-1.module+el8.4.0+10607+f4da7515.s390x", "relates_to_product_reference": "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5" }, { "category": "default_component_of", "full_product_name": { "name": "containernetworking-plugins-debugsource-0:0.9.1-1.module+el8.4.0+10607+f4da7515.x86_64 as a component of container-tools:rhel8:8040020210407081426:59631bd5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:containernetworking-plugins-debugsource-0:0.9.1-1.module+el8.4.0+10607+f4da7515.x86_64" }, "product_reference": "containernetworking-plugins-debugsource-0:0.9.1-1.module+el8.4.0+10607+f4da7515.x86_64", "relates_to_product_reference": "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5" }, { "category": "default_component_of", "full_product_name": { "name": "containers-common-1:1.2.2-8.module+el8.4.0+10607+f4da7515.aarch64 as a component of container-tools:rhel8:8040020210407081426:59631bd5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:containers-common-1:1.2.2-8.module+el8.4.0+10607+f4da7515.aarch64" }, "product_reference": "containers-common-1:1.2.2-8.module+el8.4.0+10607+f4da7515.aarch64", "relates_to_product_reference": "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5" }, { "category": "default_component_of", "full_product_name": { "name": "containers-common-1:1.2.2-8.module+el8.4.0+10607+f4da7515.ppc64le as a component of container-tools:rhel8:8040020210407081426:59631bd5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:containers-common-1:1.2.2-8.module+el8.4.0+10607+f4da7515.ppc64le" }, "product_reference": "containers-common-1:1.2.2-8.module+el8.4.0+10607+f4da7515.ppc64le", "relates_to_product_reference": "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5" }, { "category": "default_component_of", "full_product_name": { "name": "containers-common-1:1.2.2-8.module+el8.4.0+10607+f4da7515.s390x as a component of container-tools:rhel8:8040020210407081426:59631bd5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:containers-common-1:1.2.2-8.module+el8.4.0+10607+f4da7515.s390x" }, "product_reference": "containers-common-1:1.2.2-8.module+el8.4.0+10607+f4da7515.s390x", "relates_to_product_reference": "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5" }, { "category": "default_component_of", "full_product_name": { "name": "containers-common-1:1.2.2-8.module+el8.4.0+10607+f4da7515.x86_64 as a component of container-tools:rhel8:8040020210407081426:59631bd5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:containers-common-1:1.2.2-8.module+el8.4.0+10607+f4da7515.x86_64" }, "product_reference": "containers-common-1:1.2.2-8.module+el8.4.0+10607+f4da7515.x86_64", "relates_to_product_reference": "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5" }, { "category": "default_component_of", "full_product_name": { "name": "crit-0:3.15-1.module+el8.4.0+10607+f4da7515.aarch64 as a component of container-tools:rhel8:8040020210407081426:59631bd5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:crit-0:3.15-1.module+el8.4.0+10607+f4da7515.aarch64" }, "product_reference": "crit-0:3.15-1.module+el8.4.0+10607+f4da7515.aarch64", "relates_to_product_reference": "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5" }, { "category": "default_component_of", "full_product_name": { "name": "crit-0:3.15-1.module+el8.4.0+10607+f4da7515.ppc64le as a component of container-tools:rhel8:8040020210407081426:59631bd5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:crit-0:3.15-1.module+el8.4.0+10607+f4da7515.ppc64le" }, "product_reference": "crit-0:3.15-1.module+el8.4.0+10607+f4da7515.ppc64le", "relates_to_product_reference": "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5" }, { "category": "default_component_of", "full_product_name": { "name": "crit-0:3.15-1.module+el8.4.0+10607+f4da7515.s390x as a component of container-tools:rhel8:8040020210407081426:59631bd5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:crit-0:3.15-1.module+el8.4.0+10607+f4da7515.s390x" }, "product_reference": "crit-0:3.15-1.module+el8.4.0+10607+f4da7515.s390x", "relates_to_product_reference": "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5" }, { "category": "default_component_of", "full_product_name": { "name": "crit-0:3.15-1.module+el8.4.0+10607+f4da7515.x86_64 as a component of container-tools:rhel8:8040020210407081426:59631bd5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:crit-0:3.15-1.module+el8.4.0+10607+f4da7515.x86_64" }, "product_reference": "crit-0:3.15-1.module+el8.4.0+10607+f4da7515.x86_64", "relates_to_product_reference": "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5" }, { "category": "default_component_of", "full_product_name": { "name": "criu-0:3.15-1.module+el8.4.0+10607+f4da7515.aarch64 as a component of container-tools:rhel8:8040020210407081426:59631bd5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:criu-0:3.15-1.module+el8.4.0+10607+f4da7515.aarch64" }, "product_reference": "criu-0:3.15-1.module+el8.4.0+10607+f4da7515.aarch64", "relates_to_product_reference": "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5" }, { "category": "default_component_of", "full_product_name": { "name": "criu-0:3.15-1.module+el8.4.0+10607+f4da7515.ppc64le as a component of container-tools:rhel8:8040020210407081426:59631bd5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:criu-0:3.15-1.module+el8.4.0+10607+f4da7515.ppc64le" }, "product_reference": "criu-0:3.15-1.module+el8.4.0+10607+f4da7515.ppc64le", "relates_to_product_reference": "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5" }, { "category": "default_component_of", "full_product_name": { "name": "criu-0:3.15-1.module+el8.4.0+10607+f4da7515.s390x as a component of container-tools:rhel8:8040020210407081426:59631bd5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:criu-0:3.15-1.module+el8.4.0+10607+f4da7515.s390x" }, "product_reference": "criu-0:3.15-1.module+el8.4.0+10607+f4da7515.s390x", "relates_to_product_reference": "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5" }, { "category": "default_component_of", "full_product_name": { "name": "criu-0:3.15-1.module+el8.4.0+10607+f4da7515.src as a component of container-tools:rhel8:8040020210407081426:59631bd5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:criu-0:3.15-1.module+el8.4.0+10607+f4da7515.src" }, "product_reference": "criu-0:3.15-1.module+el8.4.0+10607+f4da7515.src", "relates_to_product_reference": "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5" }, { "category": "default_component_of", "full_product_name": { "name": "criu-0:3.15-1.module+el8.4.0+10607+f4da7515.x86_64 as a component of container-tools:rhel8:8040020210407081426:59631bd5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:criu-0:3.15-1.module+el8.4.0+10607+f4da7515.x86_64" }, "product_reference": "criu-0:3.15-1.module+el8.4.0+10607+f4da7515.x86_64", "relates_to_product_reference": "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5" }, { "category": "default_component_of", "full_product_name": { "name": "criu-debuginfo-0:3.15-1.module+el8.4.0+10607+f4da7515.aarch64 as a component of container-tools:rhel8:8040020210407081426:59631bd5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:criu-debuginfo-0:3.15-1.module+el8.4.0+10607+f4da7515.aarch64" }, "product_reference": "criu-debuginfo-0:3.15-1.module+el8.4.0+10607+f4da7515.aarch64", "relates_to_product_reference": "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5" }, { "category": "default_component_of", "full_product_name": { "name": "criu-debuginfo-0:3.15-1.module+el8.4.0+10607+f4da7515.ppc64le as a component of container-tools:rhel8:8040020210407081426:59631bd5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:criu-debuginfo-0:3.15-1.module+el8.4.0+10607+f4da7515.ppc64le" }, "product_reference": "criu-debuginfo-0:3.15-1.module+el8.4.0+10607+f4da7515.ppc64le", "relates_to_product_reference": "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5" }, { "category": "default_component_of", "full_product_name": { "name": "criu-debuginfo-0:3.15-1.module+el8.4.0+10607+f4da7515.s390x as a component of container-tools:rhel8:8040020210407081426:59631bd5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:criu-debuginfo-0:3.15-1.module+el8.4.0+10607+f4da7515.s390x" }, "product_reference": "criu-debuginfo-0:3.15-1.module+el8.4.0+10607+f4da7515.s390x", "relates_to_product_reference": "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5" }, { "category": "default_component_of", "full_product_name": { "name": "criu-debuginfo-0:3.15-1.module+el8.4.0+10607+f4da7515.x86_64 as a component of container-tools:rhel8:8040020210407081426:59631bd5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:criu-debuginfo-0:3.15-1.module+el8.4.0+10607+f4da7515.x86_64" }, "product_reference": "criu-debuginfo-0:3.15-1.module+el8.4.0+10607+f4da7515.x86_64", "relates_to_product_reference": "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5" }, { "category": "default_component_of", "full_product_name": { "name": "criu-debugsource-0:3.15-1.module+el8.4.0+10607+f4da7515.aarch64 as a component of container-tools:rhel8:8040020210407081426:59631bd5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:criu-debugsource-0:3.15-1.module+el8.4.0+10607+f4da7515.aarch64" }, "product_reference": "criu-debugsource-0:3.15-1.module+el8.4.0+10607+f4da7515.aarch64", "relates_to_product_reference": "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5" }, { "category": "default_component_of", "full_product_name": { "name": "criu-debugsource-0:3.15-1.module+el8.4.0+10607+f4da7515.ppc64le as a component of container-tools:rhel8:8040020210407081426:59631bd5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:criu-debugsource-0:3.15-1.module+el8.4.0+10607+f4da7515.ppc64le" }, "product_reference": "criu-debugsource-0:3.15-1.module+el8.4.0+10607+f4da7515.ppc64le", "relates_to_product_reference": "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5" }, { "category": "default_component_of", "full_product_name": { "name": "criu-debugsource-0:3.15-1.module+el8.4.0+10607+f4da7515.s390x as a component of container-tools:rhel8:8040020210407081426:59631bd5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:criu-debugsource-0:3.15-1.module+el8.4.0+10607+f4da7515.s390x" }, "product_reference": "criu-debugsource-0:3.15-1.module+el8.4.0+10607+f4da7515.s390x", "relates_to_product_reference": "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5" }, { "category": "default_component_of", "full_product_name": { "name": "criu-debugsource-0:3.15-1.module+el8.4.0+10607+f4da7515.x86_64 as a component of container-tools:rhel8:8040020210407081426:59631bd5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:criu-debugsource-0:3.15-1.module+el8.4.0+10607+f4da7515.x86_64" }, "product_reference": "criu-debugsource-0:3.15-1.module+el8.4.0+10607+f4da7515.x86_64", "relates_to_product_reference": "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5" }, { "category": "default_component_of", "full_product_name": { "name": "crun-0:0.18-1.module+el8.4.0+10607+f4da7515.aarch64 as a component of container-tools:rhel8:8040020210407081426:59631bd5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:crun-0:0.18-1.module+el8.4.0+10607+f4da7515.aarch64" }, "product_reference": "crun-0:0.18-1.module+el8.4.0+10607+f4da7515.aarch64", "relates_to_product_reference": "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5" }, { "category": "default_component_of", "full_product_name": { "name": "crun-0:0.18-1.module+el8.4.0+10607+f4da7515.ppc64le as a component of container-tools:rhel8:8040020210407081426:59631bd5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:crun-0:0.18-1.module+el8.4.0+10607+f4da7515.ppc64le" }, "product_reference": "crun-0:0.18-1.module+el8.4.0+10607+f4da7515.ppc64le", "relates_to_product_reference": "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5" }, { "category": "default_component_of", "full_product_name": { "name": "crun-0:0.18-1.module+el8.4.0+10607+f4da7515.s390x as a component of container-tools:rhel8:8040020210407081426:59631bd5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:crun-0:0.18-1.module+el8.4.0+10607+f4da7515.s390x" }, "product_reference": "crun-0:0.18-1.module+el8.4.0+10607+f4da7515.s390x", "relates_to_product_reference": "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5" }, { "category": "default_component_of", "full_product_name": { "name": "crun-0:0.18-1.module+el8.4.0+10607+f4da7515.src as a component of container-tools:rhel8:8040020210407081426:59631bd5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:crun-0:0.18-1.module+el8.4.0+10607+f4da7515.src" }, "product_reference": "crun-0:0.18-1.module+el8.4.0+10607+f4da7515.src", "relates_to_product_reference": "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5" }, { "category": "default_component_of", "full_product_name": { "name": "crun-0:0.18-1.module+el8.4.0+10607+f4da7515.x86_64 as a component of container-tools:rhel8:8040020210407081426:59631bd5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:crun-0:0.18-1.module+el8.4.0+10607+f4da7515.x86_64" }, "product_reference": "crun-0:0.18-1.module+el8.4.0+10607+f4da7515.x86_64", "relates_to_product_reference": "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5" }, { "category": "default_component_of", "full_product_name": { "name": "crun-debuginfo-0:0.18-1.module+el8.4.0+10607+f4da7515.aarch64 as a component of container-tools:rhel8:8040020210407081426:59631bd5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:crun-debuginfo-0:0.18-1.module+el8.4.0+10607+f4da7515.aarch64" }, "product_reference": "crun-debuginfo-0:0.18-1.module+el8.4.0+10607+f4da7515.aarch64", "relates_to_product_reference": "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5" }, { "category": "default_component_of", "full_product_name": { "name": "crun-debuginfo-0:0.18-1.module+el8.4.0+10607+f4da7515.ppc64le as a component of container-tools:rhel8:8040020210407081426:59631bd5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:crun-debuginfo-0:0.18-1.module+el8.4.0+10607+f4da7515.ppc64le" }, "product_reference": "crun-debuginfo-0:0.18-1.module+el8.4.0+10607+f4da7515.ppc64le", "relates_to_product_reference": "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5" }, { "category": "default_component_of", "full_product_name": { "name": "crun-debuginfo-0:0.18-1.module+el8.4.0+10607+f4da7515.s390x as a component of container-tools:rhel8:8040020210407081426:59631bd5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:crun-debuginfo-0:0.18-1.module+el8.4.0+10607+f4da7515.s390x" }, "product_reference": "crun-debuginfo-0:0.18-1.module+el8.4.0+10607+f4da7515.s390x", "relates_to_product_reference": "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5" }, { "category": "default_component_of", "full_product_name": { "name": "crun-debuginfo-0:0.18-1.module+el8.4.0+10607+f4da7515.x86_64 as a component of container-tools:rhel8:8040020210407081426:59631bd5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:crun-debuginfo-0:0.18-1.module+el8.4.0+10607+f4da7515.x86_64" }, "product_reference": "crun-debuginfo-0:0.18-1.module+el8.4.0+10607+f4da7515.x86_64", "relates_to_product_reference": "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5" }, { "category": "default_component_of", "full_product_name": { "name": "crun-debugsource-0:0.18-1.module+el8.4.0+10607+f4da7515.aarch64 as a component of container-tools:rhel8:8040020210407081426:59631bd5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:crun-debugsource-0:0.18-1.module+el8.4.0+10607+f4da7515.aarch64" }, "product_reference": "crun-debugsource-0:0.18-1.module+el8.4.0+10607+f4da7515.aarch64", "relates_to_product_reference": "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5" }, { "category": "default_component_of", "full_product_name": { "name": "crun-debugsource-0:0.18-1.module+el8.4.0+10607+f4da7515.ppc64le as a component of container-tools:rhel8:8040020210407081426:59631bd5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:crun-debugsource-0:0.18-1.module+el8.4.0+10607+f4da7515.ppc64le" }, "product_reference": "crun-debugsource-0:0.18-1.module+el8.4.0+10607+f4da7515.ppc64le", "relates_to_product_reference": "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5" }, { "category": "default_component_of", "full_product_name": { "name": "crun-debugsource-0:0.18-1.module+el8.4.0+10607+f4da7515.s390x as a component of container-tools:rhel8:8040020210407081426:59631bd5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:crun-debugsource-0:0.18-1.module+el8.4.0+10607+f4da7515.s390x" }, "product_reference": "crun-debugsource-0:0.18-1.module+el8.4.0+10607+f4da7515.s390x", "relates_to_product_reference": "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5" }, { "category": "default_component_of", "full_product_name": { "name": "crun-debugsource-0:0.18-1.module+el8.4.0+10607+f4da7515.x86_64 as a component of container-tools:rhel8:8040020210407081426:59631bd5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:crun-debugsource-0:0.18-1.module+el8.4.0+10607+f4da7515.x86_64" }, "product_reference": "crun-debugsource-0:0.18-1.module+el8.4.0+10607+f4da7515.x86_64", "relates_to_product_reference": "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5" }, { "category": "default_component_of", "full_product_name": { "name": "fuse-overlayfs-0:1.4.0-2.module+el8.4.0+10607+f4da7515.aarch64 as a component of container-tools:rhel8:8040020210407081426:59631bd5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:fuse-overlayfs-0:1.4.0-2.module+el8.4.0+10607+f4da7515.aarch64" }, "product_reference": "fuse-overlayfs-0:1.4.0-2.module+el8.4.0+10607+f4da7515.aarch64", "relates_to_product_reference": "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5" }, { "category": "default_component_of", "full_product_name": { "name": "fuse-overlayfs-0:1.4.0-2.module+el8.4.0+10607+f4da7515.ppc64le as a component of container-tools:rhel8:8040020210407081426:59631bd5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:fuse-overlayfs-0:1.4.0-2.module+el8.4.0+10607+f4da7515.ppc64le" }, "product_reference": "fuse-overlayfs-0:1.4.0-2.module+el8.4.0+10607+f4da7515.ppc64le", "relates_to_product_reference": "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5" }, { "category": "default_component_of", "full_product_name": { "name": "fuse-overlayfs-0:1.4.0-2.module+el8.4.0+10607+f4da7515.s390x as a component of container-tools:rhel8:8040020210407081426:59631bd5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:fuse-overlayfs-0:1.4.0-2.module+el8.4.0+10607+f4da7515.s390x" }, "product_reference": "fuse-overlayfs-0:1.4.0-2.module+el8.4.0+10607+f4da7515.s390x", "relates_to_product_reference": "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5" }, { "category": "default_component_of", "full_product_name": { "name": "fuse-overlayfs-0:1.4.0-2.module+el8.4.0+10607+f4da7515.src as a component of container-tools:rhel8:8040020210407081426:59631bd5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:fuse-overlayfs-0:1.4.0-2.module+el8.4.0+10607+f4da7515.src" }, "product_reference": "fuse-overlayfs-0:1.4.0-2.module+el8.4.0+10607+f4da7515.src", "relates_to_product_reference": "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5" }, { "category": "default_component_of", "full_product_name": { "name": "fuse-overlayfs-0:1.4.0-2.module+el8.4.0+10607+f4da7515.x86_64 as a component of container-tools:rhel8:8040020210407081426:59631bd5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:fuse-overlayfs-0:1.4.0-2.module+el8.4.0+10607+f4da7515.x86_64" }, "product_reference": "fuse-overlayfs-0:1.4.0-2.module+el8.4.0+10607+f4da7515.x86_64", "relates_to_product_reference": "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5" }, { "category": "default_component_of", "full_product_name": { "name": "fuse-overlayfs-debuginfo-0:1.4.0-2.module+el8.4.0+10607+f4da7515.aarch64 as a component of container-tools:rhel8:8040020210407081426:59631bd5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:fuse-overlayfs-debuginfo-0:1.4.0-2.module+el8.4.0+10607+f4da7515.aarch64" }, "product_reference": "fuse-overlayfs-debuginfo-0:1.4.0-2.module+el8.4.0+10607+f4da7515.aarch64", "relates_to_product_reference": "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5" }, { "category": "default_component_of", "full_product_name": { "name": "fuse-overlayfs-debuginfo-0:1.4.0-2.module+el8.4.0+10607+f4da7515.ppc64le as a component of container-tools:rhel8:8040020210407081426:59631bd5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:fuse-overlayfs-debuginfo-0:1.4.0-2.module+el8.4.0+10607+f4da7515.ppc64le" }, "product_reference": "fuse-overlayfs-debuginfo-0:1.4.0-2.module+el8.4.0+10607+f4da7515.ppc64le", "relates_to_product_reference": "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5" }, { "category": "default_component_of", "full_product_name": { "name": "fuse-overlayfs-debuginfo-0:1.4.0-2.module+el8.4.0+10607+f4da7515.s390x as a component of container-tools:rhel8:8040020210407081426:59631bd5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:fuse-overlayfs-debuginfo-0:1.4.0-2.module+el8.4.0+10607+f4da7515.s390x" }, "product_reference": "fuse-overlayfs-debuginfo-0:1.4.0-2.module+el8.4.0+10607+f4da7515.s390x", "relates_to_product_reference": "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5" }, { "category": "default_component_of", "full_product_name": { "name": "fuse-overlayfs-debuginfo-0:1.4.0-2.module+el8.4.0+10607+f4da7515.x86_64 as a component of container-tools:rhel8:8040020210407081426:59631bd5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:fuse-overlayfs-debuginfo-0:1.4.0-2.module+el8.4.0+10607+f4da7515.x86_64" }, "product_reference": "fuse-overlayfs-debuginfo-0:1.4.0-2.module+el8.4.0+10607+f4da7515.x86_64", "relates_to_product_reference": "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5" }, { "category": "default_component_of", "full_product_name": { "name": "fuse-overlayfs-debugsource-0:1.4.0-2.module+el8.4.0+10607+f4da7515.aarch64 as a component of container-tools:rhel8:8040020210407081426:59631bd5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:fuse-overlayfs-debugsource-0:1.4.0-2.module+el8.4.0+10607+f4da7515.aarch64" }, "product_reference": "fuse-overlayfs-debugsource-0:1.4.0-2.module+el8.4.0+10607+f4da7515.aarch64", "relates_to_product_reference": "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5" }, { "category": "default_component_of", "full_product_name": { "name": "fuse-overlayfs-debugsource-0:1.4.0-2.module+el8.4.0+10607+f4da7515.ppc64le as a component of container-tools:rhel8:8040020210407081426:59631bd5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:fuse-overlayfs-debugsource-0:1.4.0-2.module+el8.4.0+10607+f4da7515.ppc64le" }, "product_reference": "fuse-overlayfs-debugsource-0:1.4.0-2.module+el8.4.0+10607+f4da7515.ppc64le", "relates_to_product_reference": "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5" }, { "category": "default_component_of", "full_product_name": { "name": "fuse-overlayfs-debugsource-0:1.4.0-2.module+el8.4.0+10607+f4da7515.s390x as a component of container-tools:rhel8:8040020210407081426:59631bd5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:fuse-overlayfs-debugsource-0:1.4.0-2.module+el8.4.0+10607+f4da7515.s390x" }, "product_reference": "fuse-overlayfs-debugsource-0:1.4.0-2.module+el8.4.0+10607+f4da7515.s390x", "relates_to_product_reference": "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5" }, { "category": "default_component_of", "full_product_name": { "name": "fuse-overlayfs-debugsource-0:1.4.0-2.module+el8.4.0+10607+f4da7515.x86_64 as a component of container-tools:rhel8:8040020210407081426:59631bd5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:fuse-overlayfs-debugsource-0:1.4.0-2.module+el8.4.0+10607+f4da7515.x86_64" }, "product_reference": "fuse-overlayfs-debugsource-0:1.4.0-2.module+el8.4.0+10607+f4da7515.x86_64", "relates_to_product_reference": "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5" }, { "category": "default_component_of", "full_product_name": { "name": "libslirp-0:4.3.1-1.module+el8.4.0+10607+f4da7515.aarch64 as a component of container-tools:rhel8:8040020210407081426:59631bd5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:libslirp-0:4.3.1-1.module+el8.4.0+10607+f4da7515.aarch64" }, "product_reference": "libslirp-0:4.3.1-1.module+el8.4.0+10607+f4da7515.aarch64", "relates_to_product_reference": "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5" }, { "category": "default_component_of", "full_product_name": { "name": "libslirp-0:4.3.1-1.module+el8.4.0+10607+f4da7515.ppc64le as a component of container-tools:rhel8:8040020210407081426:59631bd5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:libslirp-0:4.3.1-1.module+el8.4.0+10607+f4da7515.ppc64le" }, "product_reference": "libslirp-0:4.3.1-1.module+el8.4.0+10607+f4da7515.ppc64le", "relates_to_product_reference": "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5" }, { "category": "default_component_of", "full_product_name": { "name": "libslirp-0:4.3.1-1.module+el8.4.0+10607+f4da7515.s390x as a component of container-tools:rhel8:8040020210407081426:59631bd5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:libslirp-0:4.3.1-1.module+el8.4.0+10607+f4da7515.s390x" }, "product_reference": "libslirp-0:4.3.1-1.module+el8.4.0+10607+f4da7515.s390x", "relates_to_product_reference": "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5" }, { "category": "default_component_of", "full_product_name": { "name": "libslirp-0:4.3.1-1.module+el8.4.0+10607+f4da7515.src as a component of container-tools:rhel8:8040020210407081426:59631bd5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:libslirp-0:4.3.1-1.module+el8.4.0+10607+f4da7515.src" }, "product_reference": "libslirp-0:4.3.1-1.module+el8.4.0+10607+f4da7515.src", "relates_to_product_reference": "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5" }, { "category": "default_component_of", "full_product_name": { "name": "libslirp-0:4.3.1-1.module+el8.4.0+10607+f4da7515.x86_64 as a component of container-tools:rhel8:8040020210407081426:59631bd5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:libslirp-0:4.3.1-1.module+el8.4.0+10607+f4da7515.x86_64" }, "product_reference": "libslirp-0:4.3.1-1.module+el8.4.0+10607+f4da7515.x86_64", "relates_to_product_reference": "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5" }, { "category": "default_component_of", "full_product_name": { "name": "libslirp-debuginfo-0:4.3.1-1.module+el8.4.0+10607+f4da7515.aarch64 as a component of container-tools:rhel8:8040020210407081426:59631bd5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:libslirp-debuginfo-0:4.3.1-1.module+el8.4.0+10607+f4da7515.aarch64" }, "product_reference": "libslirp-debuginfo-0:4.3.1-1.module+el8.4.0+10607+f4da7515.aarch64", "relates_to_product_reference": "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5" }, { "category": "default_component_of", "full_product_name": { "name": "libslirp-debuginfo-0:4.3.1-1.module+el8.4.0+10607+f4da7515.ppc64le as a component of container-tools:rhel8:8040020210407081426:59631bd5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:libslirp-debuginfo-0:4.3.1-1.module+el8.4.0+10607+f4da7515.ppc64le" }, "product_reference": "libslirp-debuginfo-0:4.3.1-1.module+el8.4.0+10607+f4da7515.ppc64le", "relates_to_product_reference": "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5" }, { "category": "default_component_of", "full_product_name": { "name": "libslirp-debuginfo-0:4.3.1-1.module+el8.4.0+10607+f4da7515.s390x as a component of container-tools:rhel8:8040020210407081426:59631bd5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:libslirp-debuginfo-0:4.3.1-1.module+el8.4.0+10607+f4da7515.s390x" }, "product_reference": "libslirp-debuginfo-0:4.3.1-1.module+el8.4.0+10607+f4da7515.s390x", "relates_to_product_reference": "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5" }, { "category": "default_component_of", "full_product_name": { "name": "libslirp-debuginfo-0:4.3.1-1.module+el8.4.0+10607+f4da7515.x86_64 as a component of container-tools:rhel8:8040020210407081426:59631bd5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:libslirp-debuginfo-0:4.3.1-1.module+el8.4.0+10607+f4da7515.x86_64" }, "product_reference": "libslirp-debuginfo-0:4.3.1-1.module+el8.4.0+10607+f4da7515.x86_64", "relates_to_product_reference": "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5" }, { "category": "default_component_of", "full_product_name": { "name": "libslirp-debugsource-0:4.3.1-1.module+el8.4.0+10607+f4da7515.aarch64 as a component of container-tools:rhel8:8040020210407081426:59631bd5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:libslirp-debugsource-0:4.3.1-1.module+el8.4.0+10607+f4da7515.aarch64" }, "product_reference": "libslirp-debugsource-0:4.3.1-1.module+el8.4.0+10607+f4da7515.aarch64", "relates_to_product_reference": "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5" }, { "category": "default_component_of", "full_product_name": { "name": "libslirp-debugsource-0:4.3.1-1.module+el8.4.0+10607+f4da7515.ppc64le as a component of container-tools:rhel8:8040020210407081426:59631bd5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:libslirp-debugsource-0:4.3.1-1.module+el8.4.0+10607+f4da7515.ppc64le" }, "product_reference": "libslirp-debugsource-0:4.3.1-1.module+el8.4.0+10607+f4da7515.ppc64le", "relates_to_product_reference": "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5" }, { "category": "default_component_of", "full_product_name": { "name": "libslirp-debugsource-0:4.3.1-1.module+el8.4.0+10607+f4da7515.s390x as a component of container-tools:rhel8:8040020210407081426:59631bd5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:libslirp-debugsource-0:4.3.1-1.module+el8.4.0+10607+f4da7515.s390x" }, "product_reference": "libslirp-debugsource-0:4.3.1-1.module+el8.4.0+10607+f4da7515.s390x", "relates_to_product_reference": "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5" }, { "category": "default_component_of", "full_product_name": { "name": "libslirp-debugsource-0:4.3.1-1.module+el8.4.0+10607+f4da7515.x86_64 as a component of container-tools:rhel8:8040020210407081426:59631bd5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:libslirp-debugsource-0:4.3.1-1.module+el8.4.0+10607+f4da7515.x86_64" }, "product_reference": "libslirp-debugsource-0:4.3.1-1.module+el8.4.0+10607+f4da7515.x86_64", "relates_to_product_reference": "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5" }, { "category": "default_component_of", "full_product_name": { "name": "libslirp-devel-0:4.3.1-1.module+el8.4.0+10607+f4da7515.aarch64 as a component of container-tools:rhel8:8040020210407081426:59631bd5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:libslirp-devel-0:4.3.1-1.module+el8.4.0+10607+f4da7515.aarch64" }, "product_reference": "libslirp-devel-0:4.3.1-1.module+el8.4.0+10607+f4da7515.aarch64", "relates_to_product_reference": "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5" }, { "category": "default_component_of", "full_product_name": { "name": "libslirp-devel-0:4.3.1-1.module+el8.4.0+10607+f4da7515.ppc64le as a component of container-tools:rhel8:8040020210407081426:59631bd5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:libslirp-devel-0:4.3.1-1.module+el8.4.0+10607+f4da7515.ppc64le" }, "product_reference": "libslirp-devel-0:4.3.1-1.module+el8.4.0+10607+f4da7515.ppc64le", "relates_to_product_reference": "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5" }, { "category": "default_component_of", "full_product_name": { "name": "libslirp-devel-0:4.3.1-1.module+el8.4.0+10607+f4da7515.s390x as a component of container-tools:rhel8:8040020210407081426:59631bd5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:libslirp-devel-0:4.3.1-1.module+el8.4.0+10607+f4da7515.s390x" }, "product_reference": "libslirp-devel-0:4.3.1-1.module+el8.4.0+10607+f4da7515.s390x", "relates_to_product_reference": "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5" }, { "category": "default_component_of", "full_product_name": { "name": "libslirp-devel-0:4.3.1-1.module+el8.4.0+10607+f4da7515.x86_64 as a component of container-tools:rhel8:8040020210407081426:59631bd5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:libslirp-devel-0:4.3.1-1.module+el8.4.0+10607+f4da7515.x86_64" }, "product_reference": "libslirp-devel-0:4.3.1-1.module+el8.4.0+10607+f4da7515.x86_64", "relates_to_product_reference": "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5" }, { "category": "default_component_of", "full_product_name": { "name": "oci-seccomp-bpf-hook-0:1.2.0-2.module+el8.4.0+10607+f4da7515.aarch64 as a component of container-tools:rhel8:8040020210407081426:59631bd5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:oci-seccomp-bpf-hook-0:1.2.0-2.module+el8.4.0+10607+f4da7515.aarch64" }, "product_reference": "oci-seccomp-bpf-hook-0:1.2.0-2.module+el8.4.0+10607+f4da7515.aarch64", "relates_to_product_reference": "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5" }, { "category": "default_component_of", "full_product_name": { "name": "oci-seccomp-bpf-hook-0:1.2.0-2.module+el8.4.0+10607+f4da7515.ppc64le as a component of container-tools:rhel8:8040020210407081426:59631bd5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:oci-seccomp-bpf-hook-0:1.2.0-2.module+el8.4.0+10607+f4da7515.ppc64le" }, "product_reference": "oci-seccomp-bpf-hook-0:1.2.0-2.module+el8.4.0+10607+f4da7515.ppc64le", "relates_to_product_reference": "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5" }, { "category": "default_component_of", "full_product_name": { "name": "oci-seccomp-bpf-hook-0:1.2.0-2.module+el8.4.0+10607+f4da7515.s390x as a component of container-tools:rhel8:8040020210407081426:59631bd5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:oci-seccomp-bpf-hook-0:1.2.0-2.module+el8.4.0+10607+f4da7515.s390x" }, "product_reference": "oci-seccomp-bpf-hook-0:1.2.0-2.module+el8.4.0+10607+f4da7515.s390x", "relates_to_product_reference": "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5" }, { "category": "default_component_of", "full_product_name": { "name": "oci-seccomp-bpf-hook-0:1.2.0-2.module+el8.4.0+10607+f4da7515.src as a component of container-tools:rhel8:8040020210407081426:59631bd5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:oci-seccomp-bpf-hook-0:1.2.0-2.module+el8.4.0+10607+f4da7515.src" }, "product_reference": "oci-seccomp-bpf-hook-0:1.2.0-2.module+el8.4.0+10607+f4da7515.src", "relates_to_product_reference": "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5" }, { "category": "default_component_of", "full_product_name": { "name": "oci-seccomp-bpf-hook-0:1.2.0-2.module+el8.4.0+10607+f4da7515.x86_64 as a component of container-tools:rhel8:8040020210407081426:59631bd5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:oci-seccomp-bpf-hook-0:1.2.0-2.module+el8.4.0+10607+f4da7515.x86_64" }, "product_reference": "oci-seccomp-bpf-hook-0:1.2.0-2.module+el8.4.0+10607+f4da7515.x86_64", "relates_to_product_reference": "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5" }, { "category": "default_component_of", "full_product_name": { "name": "oci-seccomp-bpf-hook-debuginfo-0:1.2.0-2.module+el8.4.0+10607+f4da7515.aarch64 as a component of container-tools:rhel8:8040020210407081426:59631bd5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:oci-seccomp-bpf-hook-debuginfo-0:1.2.0-2.module+el8.4.0+10607+f4da7515.aarch64" }, "product_reference": "oci-seccomp-bpf-hook-debuginfo-0:1.2.0-2.module+el8.4.0+10607+f4da7515.aarch64", "relates_to_product_reference": "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5" }, { "category": "default_component_of", "full_product_name": { "name": "oci-seccomp-bpf-hook-debuginfo-0:1.2.0-2.module+el8.4.0+10607+f4da7515.ppc64le as a component of container-tools:rhel8:8040020210407081426:59631bd5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:oci-seccomp-bpf-hook-debuginfo-0:1.2.0-2.module+el8.4.0+10607+f4da7515.ppc64le" }, "product_reference": "oci-seccomp-bpf-hook-debuginfo-0:1.2.0-2.module+el8.4.0+10607+f4da7515.ppc64le", "relates_to_product_reference": "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5" }, { "category": "default_component_of", "full_product_name": { "name": "oci-seccomp-bpf-hook-debuginfo-0:1.2.0-2.module+el8.4.0+10607+f4da7515.s390x as a component of container-tools:rhel8:8040020210407081426:59631bd5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:oci-seccomp-bpf-hook-debuginfo-0:1.2.0-2.module+el8.4.0+10607+f4da7515.s390x" }, "product_reference": "oci-seccomp-bpf-hook-debuginfo-0:1.2.0-2.module+el8.4.0+10607+f4da7515.s390x", "relates_to_product_reference": "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5" }, { "category": "default_component_of", "full_product_name": { "name": "oci-seccomp-bpf-hook-debuginfo-0:1.2.0-2.module+el8.4.0+10607+f4da7515.x86_64 as a component of container-tools:rhel8:8040020210407081426:59631bd5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:oci-seccomp-bpf-hook-debuginfo-0:1.2.0-2.module+el8.4.0+10607+f4da7515.x86_64" }, "product_reference": "oci-seccomp-bpf-hook-debuginfo-0:1.2.0-2.module+el8.4.0+10607+f4da7515.x86_64", "relates_to_product_reference": "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5" }, { "category": "default_component_of", "full_product_name": { "name": "oci-seccomp-bpf-hook-debugsource-0:1.2.0-2.module+el8.4.0+10607+f4da7515.aarch64 as a component of container-tools:rhel8:8040020210407081426:59631bd5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:oci-seccomp-bpf-hook-debugsource-0:1.2.0-2.module+el8.4.0+10607+f4da7515.aarch64" }, "product_reference": "oci-seccomp-bpf-hook-debugsource-0:1.2.0-2.module+el8.4.0+10607+f4da7515.aarch64", "relates_to_product_reference": "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5" }, { "category": "default_component_of", "full_product_name": { "name": "oci-seccomp-bpf-hook-debugsource-0:1.2.0-2.module+el8.4.0+10607+f4da7515.ppc64le as a component of container-tools:rhel8:8040020210407081426:59631bd5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:oci-seccomp-bpf-hook-debugsource-0:1.2.0-2.module+el8.4.0+10607+f4da7515.ppc64le" }, "product_reference": "oci-seccomp-bpf-hook-debugsource-0:1.2.0-2.module+el8.4.0+10607+f4da7515.ppc64le", "relates_to_product_reference": "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5" }, { "category": "default_component_of", "full_product_name": { "name": "oci-seccomp-bpf-hook-debugsource-0:1.2.0-2.module+el8.4.0+10607+f4da7515.s390x as a component of container-tools:rhel8:8040020210407081426:59631bd5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:oci-seccomp-bpf-hook-debugsource-0:1.2.0-2.module+el8.4.0+10607+f4da7515.s390x" }, "product_reference": "oci-seccomp-bpf-hook-debugsource-0:1.2.0-2.module+el8.4.0+10607+f4da7515.s390x", "relates_to_product_reference": "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5" }, { "category": "default_component_of", "full_product_name": { "name": "oci-seccomp-bpf-hook-debugsource-0:1.2.0-2.module+el8.4.0+10607+f4da7515.x86_64 as a component of container-tools:rhel8:8040020210407081426:59631bd5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:oci-seccomp-bpf-hook-debugsource-0:1.2.0-2.module+el8.4.0+10607+f4da7515.x86_64" }, "product_reference": "oci-seccomp-bpf-hook-debugsource-0:1.2.0-2.module+el8.4.0+10607+f4da7515.x86_64", "relates_to_product_reference": "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5" }, { "category": "default_component_of", "full_product_name": { "name": "podman-0:3.0.1-6.module+el8.4.0+10607+f4da7515.aarch64 as a component of container-tools:rhel8:8040020210407081426:59631bd5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:podman-0:3.0.1-6.module+el8.4.0+10607+f4da7515.aarch64" }, "product_reference": "podman-0:3.0.1-6.module+el8.4.0+10607+f4da7515.aarch64", "relates_to_product_reference": "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5" }, { "category": "default_component_of", "full_product_name": { "name": "podman-0:3.0.1-6.module+el8.4.0+10607+f4da7515.ppc64le as a component of container-tools:rhel8:8040020210407081426:59631bd5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:podman-0:3.0.1-6.module+el8.4.0+10607+f4da7515.ppc64le" }, "product_reference": "podman-0:3.0.1-6.module+el8.4.0+10607+f4da7515.ppc64le", "relates_to_product_reference": "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5" }, { "category": "default_component_of", "full_product_name": { "name": "podman-0:3.0.1-6.module+el8.4.0+10607+f4da7515.s390x as a component of container-tools:rhel8:8040020210407081426:59631bd5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:podman-0:3.0.1-6.module+el8.4.0+10607+f4da7515.s390x" }, "product_reference": "podman-0:3.0.1-6.module+el8.4.0+10607+f4da7515.s390x", "relates_to_product_reference": "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5" }, { "category": "default_component_of", "full_product_name": { "name": "podman-0:3.0.1-6.module+el8.4.0+10607+f4da7515.src as a component of container-tools:rhel8:8040020210407081426:59631bd5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:podman-0:3.0.1-6.module+el8.4.0+10607+f4da7515.src" }, "product_reference": "podman-0:3.0.1-6.module+el8.4.0+10607+f4da7515.src", "relates_to_product_reference": "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5" }, { "category": "default_component_of", "full_product_name": { "name": "podman-0:3.0.1-6.module+el8.4.0+10607+f4da7515.x86_64 as a component of container-tools:rhel8:8040020210407081426:59631bd5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:podman-0:3.0.1-6.module+el8.4.0+10607+f4da7515.x86_64" }, "product_reference": "podman-0:3.0.1-6.module+el8.4.0+10607+f4da7515.x86_64", "relates_to_product_reference": "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5" }, { "category": "default_component_of", "full_product_name": { "name": "podman-catatonit-0:3.0.1-6.module+el8.4.0+10607+f4da7515.aarch64 as a component of container-tools:rhel8:8040020210407081426:59631bd5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:podman-catatonit-0:3.0.1-6.module+el8.4.0+10607+f4da7515.aarch64" }, "product_reference": "podman-catatonit-0:3.0.1-6.module+el8.4.0+10607+f4da7515.aarch64", "relates_to_product_reference": "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5" }, { "category": "default_component_of", "full_product_name": { "name": "podman-catatonit-0:3.0.1-6.module+el8.4.0+10607+f4da7515.ppc64le as a component of container-tools:rhel8:8040020210407081426:59631bd5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:podman-catatonit-0:3.0.1-6.module+el8.4.0+10607+f4da7515.ppc64le" }, "product_reference": "podman-catatonit-0:3.0.1-6.module+el8.4.0+10607+f4da7515.ppc64le", "relates_to_product_reference": "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5" }, { "category": "default_component_of", "full_product_name": { "name": "podman-catatonit-0:3.0.1-6.module+el8.4.0+10607+f4da7515.s390x as a component of container-tools:rhel8:8040020210407081426:59631bd5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:podman-catatonit-0:3.0.1-6.module+el8.4.0+10607+f4da7515.s390x" }, "product_reference": "podman-catatonit-0:3.0.1-6.module+el8.4.0+10607+f4da7515.s390x", "relates_to_product_reference": "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5" }, { "category": "default_component_of", "full_product_name": { "name": "podman-catatonit-0:3.0.1-6.module+el8.4.0+10607+f4da7515.x86_64 as a component of container-tools:rhel8:8040020210407081426:59631bd5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:podman-catatonit-0:3.0.1-6.module+el8.4.0+10607+f4da7515.x86_64" }, "product_reference": "podman-catatonit-0:3.0.1-6.module+el8.4.0+10607+f4da7515.x86_64", "relates_to_product_reference": "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5" }, { "category": "default_component_of", "full_product_name": { "name": "podman-catatonit-debuginfo-0:3.0.1-6.module+el8.4.0+10607+f4da7515.aarch64 as a component of container-tools:rhel8:8040020210407081426:59631bd5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:podman-catatonit-debuginfo-0:3.0.1-6.module+el8.4.0+10607+f4da7515.aarch64" }, "product_reference": "podman-catatonit-debuginfo-0:3.0.1-6.module+el8.4.0+10607+f4da7515.aarch64", "relates_to_product_reference": "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5" }, { "category": "default_component_of", "full_product_name": { "name": "podman-catatonit-debuginfo-0:3.0.1-6.module+el8.4.0+10607+f4da7515.ppc64le as a component of container-tools:rhel8:8040020210407081426:59631bd5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:podman-catatonit-debuginfo-0:3.0.1-6.module+el8.4.0+10607+f4da7515.ppc64le" }, "product_reference": "podman-catatonit-debuginfo-0:3.0.1-6.module+el8.4.0+10607+f4da7515.ppc64le", "relates_to_product_reference": "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5" }, { "category": "default_component_of", "full_product_name": { "name": "podman-catatonit-debuginfo-0:3.0.1-6.module+el8.4.0+10607+f4da7515.s390x as a component of container-tools:rhel8:8040020210407081426:59631bd5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:podman-catatonit-debuginfo-0:3.0.1-6.module+el8.4.0+10607+f4da7515.s390x" }, "product_reference": "podman-catatonit-debuginfo-0:3.0.1-6.module+el8.4.0+10607+f4da7515.s390x", "relates_to_product_reference": "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5" }, { "category": "default_component_of", "full_product_name": { "name": "podman-catatonit-debuginfo-0:3.0.1-6.module+el8.4.0+10607+f4da7515.x86_64 as a component of container-tools:rhel8:8040020210407081426:59631bd5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:podman-catatonit-debuginfo-0:3.0.1-6.module+el8.4.0+10607+f4da7515.x86_64" }, "product_reference": "podman-catatonit-debuginfo-0:3.0.1-6.module+el8.4.0+10607+f4da7515.x86_64", "relates_to_product_reference": "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5" }, { "category": "default_component_of", "full_product_name": { "name": "podman-debuginfo-0:3.0.1-6.module+el8.4.0+10607+f4da7515.aarch64 as a component of container-tools:rhel8:8040020210407081426:59631bd5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:podman-debuginfo-0:3.0.1-6.module+el8.4.0+10607+f4da7515.aarch64" }, "product_reference": "podman-debuginfo-0:3.0.1-6.module+el8.4.0+10607+f4da7515.aarch64", "relates_to_product_reference": "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5" }, { "category": "default_component_of", "full_product_name": { "name": "podman-debuginfo-0:3.0.1-6.module+el8.4.0+10607+f4da7515.ppc64le as a component of container-tools:rhel8:8040020210407081426:59631bd5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:podman-debuginfo-0:3.0.1-6.module+el8.4.0+10607+f4da7515.ppc64le" }, "product_reference": "podman-debuginfo-0:3.0.1-6.module+el8.4.0+10607+f4da7515.ppc64le", "relates_to_product_reference": "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5" }, { "category": "default_component_of", "full_product_name": { "name": "podman-debuginfo-0:3.0.1-6.module+el8.4.0+10607+f4da7515.s390x as a component of container-tools:rhel8:8040020210407081426:59631bd5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:podman-debuginfo-0:3.0.1-6.module+el8.4.0+10607+f4da7515.s390x" }, "product_reference": "podman-debuginfo-0:3.0.1-6.module+el8.4.0+10607+f4da7515.s390x", "relates_to_product_reference": "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5" }, { "category": "default_component_of", "full_product_name": { "name": "podman-debuginfo-0:3.0.1-6.module+el8.4.0+10607+f4da7515.x86_64 as a component of container-tools:rhel8:8040020210407081426:59631bd5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:podman-debuginfo-0:3.0.1-6.module+el8.4.0+10607+f4da7515.x86_64" }, "product_reference": "podman-debuginfo-0:3.0.1-6.module+el8.4.0+10607+f4da7515.x86_64", "relates_to_product_reference": "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5" }, { "category": "default_component_of", "full_product_name": { "name": "podman-debugsource-0:3.0.1-6.module+el8.4.0+10607+f4da7515.aarch64 as a component of container-tools:rhel8:8040020210407081426:59631bd5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:podman-debugsource-0:3.0.1-6.module+el8.4.0+10607+f4da7515.aarch64" }, "product_reference": "podman-debugsource-0:3.0.1-6.module+el8.4.0+10607+f4da7515.aarch64", "relates_to_product_reference": "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5" }, { "category": "default_component_of", "full_product_name": { "name": "podman-debugsource-0:3.0.1-6.module+el8.4.0+10607+f4da7515.ppc64le as a component of container-tools:rhel8:8040020210407081426:59631bd5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:podman-debugsource-0:3.0.1-6.module+el8.4.0+10607+f4da7515.ppc64le" }, "product_reference": "podman-debugsource-0:3.0.1-6.module+el8.4.0+10607+f4da7515.ppc64le", "relates_to_product_reference": "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5" }, { "category": "default_component_of", "full_product_name": { "name": "podman-debugsource-0:3.0.1-6.module+el8.4.0+10607+f4da7515.s390x as a component of container-tools:rhel8:8040020210407081426:59631bd5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:podman-debugsource-0:3.0.1-6.module+el8.4.0+10607+f4da7515.s390x" }, "product_reference": "podman-debugsource-0:3.0.1-6.module+el8.4.0+10607+f4da7515.s390x", "relates_to_product_reference": "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5" }, { "category": "default_component_of", "full_product_name": { "name": "podman-debugsource-0:3.0.1-6.module+el8.4.0+10607+f4da7515.x86_64 as a component of container-tools:rhel8:8040020210407081426:59631bd5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:podman-debugsource-0:3.0.1-6.module+el8.4.0+10607+f4da7515.x86_64" }, "product_reference": "podman-debugsource-0:3.0.1-6.module+el8.4.0+10607+f4da7515.x86_64", "relates_to_product_reference": "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5" }, { "category": "default_component_of", "full_product_name": { "name": "podman-docker-0:3.0.1-6.module+el8.4.0+10607+f4da7515.noarch as a component of container-tools:rhel8:8040020210407081426:59631bd5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:podman-docker-0:3.0.1-6.module+el8.4.0+10607+f4da7515.noarch" }, "product_reference": "podman-docker-0:3.0.1-6.module+el8.4.0+10607+f4da7515.noarch", "relates_to_product_reference": "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5" }, { "category": "default_component_of", "full_product_name": { "name": "podman-plugins-0:3.0.1-6.module+el8.4.0+10607+f4da7515.aarch64 as a component of container-tools:rhel8:8040020210407081426:59631bd5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:podman-plugins-0:3.0.1-6.module+el8.4.0+10607+f4da7515.aarch64" }, "product_reference": "podman-plugins-0:3.0.1-6.module+el8.4.0+10607+f4da7515.aarch64", "relates_to_product_reference": "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5" }, { "category": "default_component_of", "full_product_name": { "name": "podman-plugins-0:3.0.1-6.module+el8.4.0+10607+f4da7515.ppc64le as a component of container-tools:rhel8:8040020210407081426:59631bd5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:podman-plugins-0:3.0.1-6.module+el8.4.0+10607+f4da7515.ppc64le" }, "product_reference": "podman-plugins-0:3.0.1-6.module+el8.4.0+10607+f4da7515.ppc64le", "relates_to_product_reference": "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5" }, { "category": "default_component_of", "full_product_name": { "name": "podman-plugins-0:3.0.1-6.module+el8.4.0+10607+f4da7515.s390x as a component of container-tools:rhel8:8040020210407081426:59631bd5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:podman-plugins-0:3.0.1-6.module+el8.4.0+10607+f4da7515.s390x" }, "product_reference": "podman-plugins-0:3.0.1-6.module+el8.4.0+10607+f4da7515.s390x", "relates_to_product_reference": "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5" }, { "category": "default_component_of", "full_product_name": { "name": "podman-plugins-0:3.0.1-6.module+el8.4.0+10607+f4da7515.x86_64 as a component of container-tools:rhel8:8040020210407081426:59631bd5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:podman-plugins-0:3.0.1-6.module+el8.4.0+10607+f4da7515.x86_64" }, "product_reference": "podman-plugins-0:3.0.1-6.module+el8.4.0+10607+f4da7515.x86_64", "relates_to_product_reference": "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5" }, { "category": "default_component_of", "full_product_name": { "name": "podman-plugins-debuginfo-0:3.0.1-6.module+el8.4.0+10607+f4da7515.aarch64 as a component of container-tools:rhel8:8040020210407081426:59631bd5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:podman-plugins-debuginfo-0:3.0.1-6.module+el8.4.0+10607+f4da7515.aarch64" }, "product_reference": "podman-plugins-debuginfo-0:3.0.1-6.module+el8.4.0+10607+f4da7515.aarch64", "relates_to_product_reference": "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5" }, { "category": "default_component_of", "full_product_name": { "name": "podman-plugins-debuginfo-0:3.0.1-6.module+el8.4.0+10607+f4da7515.ppc64le as a component of container-tools:rhel8:8040020210407081426:59631bd5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:podman-plugins-debuginfo-0:3.0.1-6.module+el8.4.0+10607+f4da7515.ppc64le" }, "product_reference": "podman-plugins-debuginfo-0:3.0.1-6.module+el8.4.0+10607+f4da7515.ppc64le", "relates_to_product_reference": "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5" }, { "category": "default_component_of", "full_product_name": { "name": "podman-plugins-debuginfo-0:3.0.1-6.module+el8.4.0+10607+f4da7515.s390x as a component of container-tools:rhel8:8040020210407081426:59631bd5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:podman-plugins-debuginfo-0:3.0.1-6.module+el8.4.0+10607+f4da7515.s390x" }, "product_reference": "podman-plugins-debuginfo-0:3.0.1-6.module+el8.4.0+10607+f4da7515.s390x", "relates_to_product_reference": "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5" }, { "category": "default_component_of", "full_product_name": { "name": "podman-plugins-debuginfo-0:3.0.1-6.module+el8.4.0+10607+f4da7515.x86_64 as a component of container-tools:rhel8:8040020210407081426:59631bd5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:podman-plugins-debuginfo-0:3.0.1-6.module+el8.4.0+10607+f4da7515.x86_64" }, "product_reference": "podman-plugins-debuginfo-0:3.0.1-6.module+el8.4.0+10607+f4da7515.x86_64", "relates_to_product_reference": "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5" }, { "category": "default_component_of", "full_product_name": { "name": "podman-remote-0:3.0.1-6.module+el8.4.0+10607+f4da7515.aarch64 as a component of container-tools:rhel8:8040020210407081426:59631bd5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:podman-remote-0:3.0.1-6.module+el8.4.0+10607+f4da7515.aarch64" }, "product_reference": "podman-remote-0:3.0.1-6.module+el8.4.0+10607+f4da7515.aarch64", "relates_to_product_reference": "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5" }, { "category": "default_component_of", "full_product_name": { "name": "podman-remote-0:3.0.1-6.module+el8.4.0+10607+f4da7515.ppc64le as a component of container-tools:rhel8:8040020210407081426:59631bd5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:podman-remote-0:3.0.1-6.module+el8.4.0+10607+f4da7515.ppc64le" }, "product_reference": "podman-remote-0:3.0.1-6.module+el8.4.0+10607+f4da7515.ppc64le", "relates_to_product_reference": "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5" }, { "category": "default_component_of", "full_product_name": { "name": "podman-remote-0:3.0.1-6.module+el8.4.0+10607+f4da7515.s390x as a component of container-tools:rhel8:8040020210407081426:59631bd5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:podman-remote-0:3.0.1-6.module+el8.4.0+10607+f4da7515.s390x" }, "product_reference": "podman-remote-0:3.0.1-6.module+el8.4.0+10607+f4da7515.s390x", "relates_to_product_reference": "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5" }, { "category": "default_component_of", "full_product_name": { "name": "podman-remote-0:3.0.1-6.module+el8.4.0+10607+f4da7515.x86_64 as a component of container-tools:rhel8:8040020210407081426:59631bd5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:podman-remote-0:3.0.1-6.module+el8.4.0+10607+f4da7515.x86_64" }, "product_reference": "podman-remote-0:3.0.1-6.module+el8.4.0+10607+f4da7515.x86_64", "relates_to_product_reference": "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5" }, { "category": "default_component_of", "full_product_name": { "name": "podman-remote-debuginfo-0:3.0.1-6.module+el8.4.0+10607+f4da7515.aarch64 as a component of container-tools:rhel8:8040020210407081426:59631bd5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:podman-remote-debuginfo-0:3.0.1-6.module+el8.4.0+10607+f4da7515.aarch64" }, "product_reference": "podman-remote-debuginfo-0:3.0.1-6.module+el8.4.0+10607+f4da7515.aarch64", "relates_to_product_reference": "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5" }, { "category": "default_component_of", "full_product_name": { "name": "podman-remote-debuginfo-0:3.0.1-6.module+el8.4.0+10607+f4da7515.ppc64le as a component of container-tools:rhel8:8040020210407081426:59631bd5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:podman-remote-debuginfo-0:3.0.1-6.module+el8.4.0+10607+f4da7515.ppc64le" }, "product_reference": "podman-remote-debuginfo-0:3.0.1-6.module+el8.4.0+10607+f4da7515.ppc64le", "relates_to_product_reference": "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5" }, { "category": "default_component_of", "full_product_name": { "name": "podman-remote-debuginfo-0:3.0.1-6.module+el8.4.0+10607+f4da7515.s390x as a component of container-tools:rhel8:8040020210407081426:59631bd5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:podman-remote-debuginfo-0:3.0.1-6.module+el8.4.0+10607+f4da7515.s390x" }, "product_reference": "podman-remote-debuginfo-0:3.0.1-6.module+el8.4.0+10607+f4da7515.s390x", "relates_to_product_reference": "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5" }, { "category": "default_component_of", "full_product_name": { "name": "podman-remote-debuginfo-0:3.0.1-6.module+el8.4.0+10607+f4da7515.x86_64 as a component of container-tools:rhel8:8040020210407081426:59631bd5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:podman-remote-debuginfo-0:3.0.1-6.module+el8.4.0+10607+f4da7515.x86_64" }, "product_reference": "podman-remote-debuginfo-0:3.0.1-6.module+el8.4.0+10607+f4da7515.x86_64", "relates_to_product_reference": "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5" }, { "category": "default_component_of", "full_product_name": { "name": "podman-tests-0:3.0.1-6.module+el8.4.0+10607+f4da7515.aarch64 as a component of container-tools:rhel8:8040020210407081426:59631bd5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:podman-tests-0:3.0.1-6.module+el8.4.0+10607+f4da7515.aarch64" }, "product_reference": "podman-tests-0:3.0.1-6.module+el8.4.0+10607+f4da7515.aarch64", "relates_to_product_reference": "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5" }, { "category": "default_component_of", "full_product_name": { "name": "podman-tests-0:3.0.1-6.module+el8.4.0+10607+f4da7515.ppc64le as a component of container-tools:rhel8:8040020210407081426:59631bd5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:podman-tests-0:3.0.1-6.module+el8.4.0+10607+f4da7515.ppc64le" }, "product_reference": "podman-tests-0:3.0.1-6.module+el8.4.0+10607+f4da7515.ppc64le", "relates_to_product_reference": "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5" }, { "category": "default_component_of", "full_product_name": { "name": "podman-tests-0:3.0.1-6.module+el8.4.0+10607+f4da7515.s390x as a component of container-tools:rhel8:8040020210407081426:59631bd5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:podman-tests-0:3.0.1-6.module+el8.4.0+10607+f4da7515.s390x" }, "product_reference": "podman-tests-0:3.0.1-6.module+el8.4.0+10607+f4da7515.s390x", "relates_to_product_reference": "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5" }, { "category": "default_component_of", "full_product_name": { "name": "podman-tests-0:3.0.1-6.module+el8.4.0+10607+f4da7515.x86_64 as a component of container-tools:rhel8:8040020210407081426:59631bd5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:podman-tests-0:3.0.1-6.module+el8.4.0+10607+f4da7515.x86_64" }, "product_reference": "podman-tests-0:3.0.1-6.module+el8.4.0+10607+f4da7515.x86_64", "relates_to_product_reference": "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5" }, { "category": "default_component_of", "full_product_name": { "name": "python3-criu-0:3.15-1.module+el8.4.0+10607+f4da7515.aarch64 as a component of container-tools:rhel8:8040020210407081426:59631bd5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:python3-criu-0:3.15-1.module+el8.4.0+10607+f4da7515.aarch64" }, "product_reference": "python3-criu-0:3.15-1.module+el8.4.0+10607+f4da7515.aarch64", "relates_to_product_reference": "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5" }, { "category": "default_component_of", "full_product_name": { "name": "python3-criu-0:3.15-1.module+el8.4.0+10607+f4da7515.ppc64le as a component of container-tools:rhel8:8040020210407081426:59631bd5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:python3-criu-0:3.15-1.module+el8.4.0+10607+f4da7515.ppc64le" }, "product_reference": "python3-criu-0:3.15-1.module+el8.4.0+10607+f4da7515.ppc64le", "relates_to_product_reference": "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5" }, { "category": "default_component_of", "full_product_name": { "name": "python3-criu-0:3.15-1.module+el8.4.0+10607+f4da7515.s390x as a component of container-tools:rhel8:8040020210407081426:59631bd5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:python3-criu-0:3.15-1.module+el8.4.0+10607+f4da7515.s390x" }, "product_reference": "python3-criu-0:3.15-1.module+el8.4.0+10607+f4da7515.s390x", "relates_to_product_reference": "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5" }, { "category": "default_component_of", "full_product_name": { "name": "python3-criu-0:3.15-1.module+el8.4.0+10607+f4da7515.x86_64 as a component of container-tools:rhel8:8040020210407081426:59631bd5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:python3-criu-0:3.15-1.module+el8.4.0+10607+f4da7515.x86_64" }, "product_reference": "python3-criu-0:3.15-1.module+el8.4.0+10607+f4da7515.x86_64", "relates_to_product_reference": "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5" }, { "category": "default_component_of", "full_product_name": { "name": "runc-0:1.0.0-70.rc92.module+el8.4.0+10607+f4da7515.aarch64 as a component of container-tools:rhel8:8040020210407081426:59631bd5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:runc-0:1.0.0-70.rc92.module+el8.4.0+10607+f4da7515.aarch64" }, "product_reference": "runc-0:1.0.0-70.rc92.module+el8.4.0+10607+f4da7515.aarch64", "relates_to_product_reference": "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5" }, { "category": "default_component_of", "full_product_name": { "name": "runc-0:1.0.0-70.rc92.module+el8.4.0+10607+f4da7515.ppc64le as a component of container-tools:rhel8:8040020210407081426:59631bd5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:runc-0:1.0.0-70.rc92.module+el8.4.0+10607+f4da7515.ppc64le" }, "product_reference": "runc-0:1.0.0-70.rc92.module+el8.4.0+10607+f4da7515.ppc64le", "relates_to_product_reference": "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5" }, { "category": "default_component_of", "full_product_name": { "name": "runc-0:1.0.0-70.rc92.module+el8.4.0+10607+f4da7515.s390x as a component of container-tools:rhel8:8040020210407081426:59631bd5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:runc-0:1.0.0-70.rc92.module+el8.4.0+10607+f4da7515.s390x" }, "product_reference": "runc-0:1.0.0-70.rc92.module+el8.4.0+10607+f4da7515.s390x", "relates_to_product_reference": "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5" }, { "category": "default_component_of", "full_product_name": { "name": "runc-0:1.0.0-70.rc92.module+el8.4.0+10607+f4da7515.src as a component of container-tools:rhel8:8040020210407081426:59631bd5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:runc-0:1.0.0-70.rc92.module+el8.4.0+10607+f4da7515.src" }, "product_reference": "runc-0:1.0.0-70.rc92.module+el8.4.0+10607+f4da7515.src", "relates_to_product_reference": "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5" }, { "category": "default_component_of", "full_product_name": { "name": "runc-0:1.0.0-70.rc92.module+el8.4.0+10607+f4da7515.x86_64 as a component of container-tools:rhel8:8040020210407081426:59631bd5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:runc-0:1.0.0-70.rc92.module+el8.4.0+10607+f4da7515.x86_64" }, "product_reference": "runc-0:1.0.0-70.rc92.module+el8.4.0+10607+f4da7515.x86_64", "relates_to_product_reference": "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5" }, { "category": "default_component_of", "full_product_name": { "name": "runc-debuginfo-0:1.0.0-70.rc92.module+el8.4.0+10607+f4da7515.aarch64 as a component of container-tools:rhel8:8040020210407081426:59631bd5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:runc-debuginfo-0:1.0.0-70.rc92.module+el8.4.0+10607+f4da7515.aarch64" }, "product_reference": "runc-debuginfo-0:1.0.0-70.rc92.module+el8.4.0+10607+f4da7515.aarch64", "relates_to_product_reference": "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5" }, { "category": "default_component_of", "full_product_name": { "name": "runc-debuginfo-0:1.0.0-70.rc92.module+el8.4.0+10607+f4da7515.ppc64le as a component of container-tools:rhel8:8040020210407081426:59631bd5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:runc-debuginfo-0:1.0.0-70.rc92.module+el8.4.0+10607+f4da7515.ppc64le" }, "product_reference": "runc-debuginfo-0:1.0.0-70.rc92.module+el8.4.0+10607+f4da7515.ppc64le", "relates_to_product_reference": "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5" }, { "category": "default_component_of", "full_product_name": { "name": "runc-debuginfo-0:1.0.0-70.rc92.module+el8.4.0+10607+f4da7515.s390x as a component of container-tools:rhel8:8040020210407081426:59631bd5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:runc-debuginfo-0:1.0.0-70.rc92.module+el8.4.0+10607+f4da7515.s390x" }, "product_reference": "runc-debuginfo-0:1.0.0-70.rc92.module+el8.4.0+10607+f4da7515.s390x", "relates_to_product_reference": "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5" }, { "category": "default_component_of", "full_product_name": { "name": "runc-debuginfo-0:1.0.0-70.rc92.module+el8.4.0+10607+f4da7515.x86_64 as a component of container-tools:rhel8:8040020210407081426:59631bd5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:runc-debuginfo-0:1.0.0-70.rc92.module+el8.4.0+10607+f4da7515.x86_64" }, "product_reference": "runc-debuginfo-0:1.0.0-70.rc92.module+el8.4.0+10607+f4da7515.x86_64", "relates_to_product_reference": "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5" }, { "category": "default_component_of", "full_product_name": { "name": "runc-debugsource-0:1.0.0-70.rc92.module+el8.4.0+10607+f4da7515.aarch64 as a component of container-tools:rhel8:8040020210407081426:59631bd5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:runc-debugsource-0:1.0.0-70.rc92.module+el8.4.0+10607+f4da7515.aarch64" }, "product_reference": "runc-debugsource-0:1.0.0-70.rc92.module+el8.4.0+10607+f4da7515.aarch64", "relates_to_product_reference": "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5" }, { "category": "default_component_of", "full_product_name": { "name": "runc-debugsource-0:1.0.0-70.rc92.module+el8.4.0+10607+f4da7515.ppc64le as a component of container-tools:rhel8:8040020210407081426:59631bd5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:runc-debugsource-0:1.0.0-70.rc92.module+el8.4.0+10607+f4da7515.ppc64le" }, "product_reference": "runc-debugsource-0:1.0.0-70.rc92.module+el8.4.0+10607+f4da7515.ppc64le", "relates_to_product_reference": "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5" }, { "category": "default_component_of", "full_product_name": { "name": "runc-debugsource-0:1.0.0-70.rc92.module+el8.4.0+10607+f4da7515.s390x as a component of container-tools:rhel8:8040020210407081426:59631bd5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:runc-debugsource-0:1.0.0-70.rc92.module+el8.4.0+10607+f4da7515.s390x" }, "product_reference": "runc-debugsource-0:1.0.0-70.rc92.module+el8.4.0+10607+f4da7515.s390x", "relates_to_product_reference": "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5" }, { "category": "default_component_of", "full_product_name": { "name": "runc-debugsource-0:1.0.0-70.rc92.module+el8.4.0+10607+f4da7515.x86_64 as a component of container-tools:rhel8:8040020210407081426:59631bd5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:runc-debugsource-0:1.0.0-70.rc92.module+el8.4.0+10607+f4da7515.x86_64" }, "product_reference": "runc-debugsource-0:1.0.0-70.rc92.module+el8.4.0+10607+f4da7515.x86_64", "relates_to_product_reference": "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5" }, { "category": "default_component_of", "full_product_name": { "name": "skopeo-1:1.2.2-8.module+el8.4.0+10607+f4da7515.aarch64 as a component of container-tools:rhel8:8040020210407081426:59631bd5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:skopeo-1:1.2.2-8.module+el8.4.0+10607+f4da7515.aarch64" }, "product_reference": "skopeo-1:1.2.2-8.module+el8.4.0+10607+f4da7515.aarch64", "relates_to_product_reference": "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5" }, { "category": "default_component_of", "full_product_name": { "name": "skopeo-1:1.2.2-8.module+el8.4.0+10607+f4da7515.ppc64le as a component of container-tools:rhel8:8040020210407081426:59631bd5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:skopeo-1:1.2.2-8.module+el8.4.0+10607+f4da7515.ppc64le" }, "product_reference": "skopeo-1:1.2.2-8.module+el8.4.0+10607+f4da7515.ppc64le", "relates_to_product_reference": "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5" }, { "category": "default_component_of", "full_product_name": { "name": "skopeo-1:1.2.2-8.module+el8.4.0+10607+f4da7515.s390x as a component of container-tools:rhel8:8040020210407081426:59631bd5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:skopeo-1:1.2.2-8.module+el8.4.0+10607+f4da7515.s390x" }, "product_reference": "skopeo-1:1.2.2-8.module+el8.4.0+10607+f4da7515.s390x", "relates_to_product_reference": "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5" }, { "category": "default_component_of", "full_product_name": { "name": "skopeo-1:1.2.2-8.module+el8.4.0+10607+f4da7515.src as a component of container-tools:rhel8:8040020210407081426:59631bd5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:skopeo-1:1.2.2-8.module+el8.4.0+10607+f4da7515.src" }, "product_reference": "skopeo-1:1.2.2-8.module+el8.4.0+10607+f4da7515.src", "relates_to_product_reference": "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5" }, { "category": "default_component_of", "full_product_name": { "name": "skopeo-1:1.2.2-8.module+el8.4.0+10607+f4da7515.x86_64 as a component of container-tools:rhel8:8040020210407081426:59631bd5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:skopeo-1:1.2.2-8.module+el8.4.0+10607+f4da7515.x86_64" }, "product_reference": "skopeo-1:1.2.2-8.module+el8.4.0+10607+f4da7515.x86_64", "relates_to_product_reference": "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5" }, { "category": "default_component_of", "full_product_name": { "name": "skopeo-debuginfo-1:1.2.2-8.module+el8.4.0+10607+f4da7515.aarch64 as a component of container-tools:rhel8:8040020210407081426:59631bd5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:skopeo-debuginfo-1:1.2.2-8.module+el8.4.0+10607+f4da7515.aarch64" }, "product_reference": "skopeo-debuginfo-1:1.2.2-8.module+el8.4.0+10607+f4da7515.aarch64", "relates_to_product_reference": "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5" }, { "category": "default_component_of", "full_product_name": { "name": "skopeo-debuginfo-1:1.2.2-8.module+el8.4.0+10607+f4da7515.ppc64le as a component of container-tools:rhel8:8040020210407081426:59631bd5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:skopeo-debuginfo-1:1.2.2-8.module+el8.4.0+10607+f4da7515.ppc64le" }, "product_reference": "skopeo-debuginfo-1:1.2.2-8.module+el8.4.0+10607+f4da7515.ppc64le", "relates_to_product_reference": "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5" }, { "category": "default_component_of", "full_product_name": { "name": "skopeo-debuginfo-1:1.2.2-8.module+el8.4.0+10607+f4da7515.s390x as a component of container-tools:rhel8:8040020210407081426:59631bd5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:skopeo-debuginfo-1:1.2.2-8.module+el8.4.0+10607+f4da7515.s390x" }, "product_reference": "skopeo-debuginfo-1:1.2.2-8.module+el8.4.0+10607+f4da7515.s390x", "relates_to_product_reference": "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5" }, { "category": "default_component_of", "full_product_name": { "name": "skopeo-debuginfo-1:1.2.2-8.module+el8.4.0+10607+f4da7515.x86_64 as a component of container-tools:rhel8:8040020210407081426:59631bd5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:skopeo-debuginfo-1:1.2.2-8.module+el8.4.0+10607+f4da7515.x86_64" }, "product_reference": "skopeo-debuginfo-1:1.2.2-8.module+el8.4.0+10607+f4da7515.x86_64", "relates_to_product_reference": "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5" }, { "category": "default_component_of", "full_product_name": { "name": "skopeo-debugsource-1:1.2.2-8.module+el8.4.0+10607+f4da7515.aarch64 as a component of container-tools:rhel8:8040020210407081426:59631bd5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:skopeo-debugsource-1:1.2.2-8.module+el8.4.0+10607+f4da7515.aarch64" }, "product_reference": "skopeo-debugsource-1:1.2.2-8.module+el8.4.0+10607+f4da7515.aarch64", "relates_to_product_reference": "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5" }, { "category": "default_component_of", "full_product_name": { "name": "skopeo-debugsource-1:1.2.2-8.module+el8.4.0+10607+f4da7515.ppc64le as a component of container-tools:rhel8:8040020210407081426:59631bd5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:skopeo-debugsource-1:1.2.2-8.module+el8.4.0+10607+f4da7515.ppc64le" }, "product_reference": "skopeo-debugsource-1:1.2.2-8.module+el8.4.0+10607+f4da7515.ppc64le", "relates_to_product_reference": "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5" }, { "category": "default_component_of", "full_product_name": { "name": "skopeo-debugsource-1:1.2.2-8.module+el8.4.0+10607+f4da7515.s390x as a component of container-tools:rhel8:8040020210407081426:59631bd5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:skopeo-debugsource-1:1.2.2-8.module+el8.4.0+10607+f4da7515.s390x" }, "product_reference": "skopeo-debugsource-1:1.2.2-8.module+el8.4.0+10607+f4da7515.s390x", "relates_to_product_reference": "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5" }, { "category": "default_component_of", "full_product_name": { "name": "skopeo-debugsource-1:1.2.2-8.module+el8.4.0+10607+f4da7515.x86_64 as a component of container-tools:rhel8:8040020210407081426:59631bd5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:skopeo-debugsource-1:1.2.2-8.module+el8.4.0+10607+f4da7515.x86_64" }, "product_reference": "skopeo-debugsource-1:1.2.2-8.module+el8.4.0+10607+f4da7515.x86_64", "relates_to_product_reference": "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5" }, { "category": "default_component_of", "full_product_name": { "name": "skopeo-tests-1:1.2.2-8.module+el8.4.0+10607+f4da7515.aarch64 as a component of container-tools:rhel8:8040020210407081426:59631bd5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:skopeo-tests-1:1.2.2-8.module+el8.4.0+10607+f4da7515.aarch64" }, "product_reference": "skopeo-tests-1:1.2.2-8.module+el8.4.0+10607+f4da7515.aarch64", "relates_to_product_reference": "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5" }, { "category": "default_component_of", "full_product_name": { "name": "skopeo-tests-1:1.2.2-8.module+el8.4.0+10607+f4da7515.ppc64le as a component of container-tools:rhel8:8040020210407081426:59631bd5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:skopeo-tests-1:1.2.2-8.module+el8.4.0+10607+f4da7515.ppc64le" }, "product_reference": "skopeo-tests-1:1.2.2-8.module+el8.4.0+10607+f4da7515.ppc64le", "relates_to_product_reference": "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5" }, { "category": "default_component_of", "full_product_name": { "name": "skopeo-tests-1:1.2.2-8.module+el8.4.0+10607+f4da7515.s390x as a component of container-tools:rhel8:8040020210407081426:59631bd5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:skopeo-tests-1:1.2.2-8.module+el8.4.0+10607+f4da7515.s390x" }, "product_reference": "skopeo-tests-1:1.2.2-8.module+el8.4.0+10607+f4da7515.s390x", "relates_to_product_reference": "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5" }, { "category": "default_component_of", "full_product_name": { "name": "skopeo-tests-1:1.2.2-8.module+el8.4.0+10607+f4da7515.x86_64 as a component of container-tools:rhel8:8040020210407081426:59631bd5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:skopeo-tests-1:1.2.2-8.module+el8.4.0+10607+f4da7515.x86_64" }, "product_reference": "skopeo-tests-1:1.2.2-8.module+el8.4.0+10607+f4da7515.x86_64", "relates_to_product_reference": "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5" }, { "category": "default_component_of", "full_product_name": { "name": "slirp4netns-0:1.1.8-1.module+el8.4.0+10607+f4da7515.aarch64 as a component of container-tools:rhel8:8040020210407081426:59631bd5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:slirp4netns-0:1.1.8-1.module+el8.4.0+10607+f4da7515.aarch64" }, "product_reference": "slirp4netns-0:1.1.8-1.module+el8.4.0+10607+f4da7515.aarch64", "relates_to_product_reference": "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5" }, { "category": "default_component_of", "full_product_name": { "name": "slirp4netns-0:1.1.8-1.module+el8.4.0+10607+f4da7515.ppc64le as a component of container-tools:rhel8:8040020210407081426:59631bd5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:slirp4netns-0:1.1.8-1.module+el8.4.0+10607+f4da7515.ppc64le" }, "product_reference": "slirp4netns-0:1.1.8-1.module+el8.4.0+10607+f4da7515.ppc64le", "relates_to_product_reference": "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5" }, { "category": "default_component_of", "full_product_name": { "name": "slirp4netns-0:1.1.8-1.module+el8.4.0+10607+f4da7515.s390x as a component of container-tools:rhel8:8040020210407081426:59631bd5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:slirp4netns-0:1.1.8-1.module+el8.4.0+10607+f4da7515.s390x" }, "product_reference": "slirp4netns-0:1.1.8-1.module+el8.4.0+10607+f4da7515.s390x", "relates_to_product_reference": "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5" }, { "category": "default_component_of", "full_product_name": { "name": "slirp4netns-0:1.1.8-1.module+el8.4.0+10607+f4da7515.src as a component of container-tools:rhel8:8040020210407081426:59631bd5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:slirp4netns-0:1.1.8-1.module+el8.4.0+10607+f4da7515.src" }, "product_reference": "slirp4netns-0:1.1.8-1.module+el8.4.0+10607+f4da7515.src", "relates_to_product_reference": "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5" }, { "category": "default_component_of", "full_product_name": { "name": "slirp4netns-0:1.1.8-1.module+el8.4.0+10607+f4da7515.x86_64 as a component of container-tools:rhel8:8040020210407081426:59631bd5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:slirp4netns-0:1.1.8-1.module+el8.4.0+10607+f4da7515.x86_64" }, "product_reference": "slirp4netns-0:1.1.8-1.module+el8.4.0+10607+f4da7515.x86_64", "relates_to_product_reference": "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5" }, { "category": "default_component_of", "full_product_name": { "name": "slirp4netns-debuginfo-0:1.1.8-1.module+el8.4.0+10607+f4da7515.aarch64 as a component of container-tools:rhel8:8040020210407081426:59631bd5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:slirp4netns-debuginfo-0:1.1.8-1.module+el8.4.0+10607+f4da7515.aarch64" }, "product_reference": "slirp4netns-debuginfo-0:1.1.8-1.module+el8.4.0+10607+f4da7515.aarch64", "relates_to_product_reference": "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5" }, { "category": "default_component_of", "full_product_name": { "name": "slirp4netns-debuginfo-0:1.1.8-1.module+el8.4.0+10607+f4da7515.ppc64le as a component of container-tools:rhel8:8040020210407081426:59631bd5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:slirp4netns-debuginfo-0:1.1.8-1.module+el8.4.0+10607+f4da7515.ppc64le" }, "product_reference": "slirp4netns-debuginfo-0:1.1.8-1.module+el8.4.0+10607+f4da7515.ppc64le", "relates_to_product_reference": "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5" }, { "category": "default_component_of", "full_product_name": { "name": "slirp4netns-debuginfo-0:1.1.8-1.module+el8.4.0+10607+f4da7515.s390x as a component of container-tools:rhel8:8040020210407081426:59631bd5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:slirp4netns-debuginfo-0:1.1.8-1.module+el8.4.0+10607+f4da7515.s390x" }, "product_reference": "slirp4netns-debuginfo-0:1.1.8-1.module+el8.4.0+10607+f4da7515.s390x", "relates_to_product_reference": "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5" }, { "category": "default_component_of", "full_product_name": { "name": "slirp4netns-debuginfo-0:1.1.8-1.module+el8.4.0+10607+f4da7515.x86_64 as a component of container-tools:rhel8:8040020210407081426:59631bd5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:slirp4netns-debuginfo-0:1.1.8-1.module+el8.4.0+10607+f4da7515.x86_64" }, "product_reference": "slirp4netns-debuginfo-0:1.1.8-1.module+el8.4.0+10607+f4da7515.x86_64", "relates_to_product_reference": "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5" }, { "category": "default_component_of", "full_product_name": { "name": "slirp4netns-debugsource-0:1.1.8-1.module+el8.4.0+10607+f4da7515.aarch64 as a component of container-tools:rhel8:8040020210407081426:59631bd5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:slirp4netns-debugsource-0:1.1.8-1.module+el8.4.0+10607+f4da7515.aarch64" }, "product_reference": "slirp4netns-debugsource-0:1.1.8-1.module+el8.4.0+10607+f4da7515.aarch64", "relates_to_product_reference": "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5" }, { "category": "default_component_of", "full_product_name": { "name": "slirp4netns-debugsource-0:1.1.8-1.module+el8.4.0+10607+f4da7515.ppc64le as a component of container-tools:rhel8:8040020210407081426:59631bd5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:slirp4netns-debugsource-0:1.1.8-1.module+el8.4.0+10607+f4da7515.ppc64le" }, "product_reference": "slirp4netns-debugsource-0:1.1.8-1.module+el8.4.0+10607+f4da7515.ppc64le", "relates_to_product_reference": "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5" }, { "category": "default_component_of", "full_product_name": { "name": "slirp4netns-debugsource-0:1.1.8-1.module+el8.4.0+10607+f4da7515.s390x as a component of container-tools:rhel8:8040020210407081426:59631bd5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:slirp4netns-debugsource-0:1.1.8-1.module+el8.4.0+10607+f4da7515.s390x" }, "product_reference": "slirp4netns-debugsource-0:1.1.8-1.module+el8.4.0+10607+f4da7515.s390x", "relates_to_product_reference": "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5" }, { "category": "default_component_of", "full_product_name": { "name": "slirp4netns-debugsource-0:1.1.8-1.module+el8.4.0+10607+f4da7515.x86_64 as a component of container-tools:rhel8:8040020210407081426:59631bd5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:slirp4netns-debugsource-0:1.1.8-1.module+el8.4.0+10607+f4da7515.x86_64" }, "product_reference": "slirp4netns-debugsource-0:1.1.8-1.module+el8.4.0+10607+f4da7515.x86_64", "relates_to_product_reference": "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5" }, { "category": "default_component_of", "full_product_name": { "name": "toolbox-0:0.0.8-1.module+el8.4.0+10607+f4da7515.noarch as a component of container-tools:rhel8:8040020210407081426:59631bd5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:toolbox-0:0.0.8-1.module+el8.4.0+10607+f4da7515.noarch" }, "product_reference": "toolbox-0:0.0.8-1.module+el8.4.0+10607+f4da7515.noarch", "relates_to_product_reference": "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5" }, { "category": "default_component_of", "full_product_name": { "name": "toolbox-0:0.0.8-1.module+el8.4.0+10607+f4da7515.src as a component of container-tools:rhel8:8040020210407081426:59631bd5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:toolbox-0:0.0.8-1.module+el8.4.0+10607+f4da7515.src" }, "product_reference": "toolbox-0:0.0.8-1.module+el8.4.0+10607+f4da7515.src", "relates_to_product_reference": "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5" }, { "category": "default_component_of", "full_product_name": { "name": "udica-0:0.2.4-1.module+el8.4.0+10607+f4da7515.noarch as a component of container-tools:rhel8:8040020210407081426:59631bd5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:udica-0:0.2.4-1.module+el8.4.0+10607+f4da7515.noarch" }, "product_reference": "udica-0:0.2.4-1.module+el8.4.0+10607+f4da7515.noarch", "relates_to_product_reference": "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5" }, { "category": "default_component_of", "full_product_name": { "name": "udica-0:0.2.4-1.module+el8.4.0+10607+f4da7515.src as a component of container-tools:rhel8:8040020210407081426:59631bd5 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:udica-0:0.2.4-1.module+el8.4.0+10607+f4da7515.src" }, "product_reference": "udica-0:0.2.4-1.module+el8.4.0+10607+f4da7515.src", "relates_to_product_reference": "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5" } ] }, "vulnerabilities": [ { "cve": "CVE-2020-29652", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "discovery_date": "2020-12-17T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1908883" } ], "notes": [ { "category": "description", "text": "A null pointer dereference vulnerability was found in golang. When using the library\u0027s ssh server without specifying an option for GSSAPIWithMICConfig, it is possible for an attacker to craft an ssh client connection using the `gssapi-with-mic` authentication method and cause the server to panic resulting in a denial of service. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: crypto/ssh: crafted authentication request can lead to nil pointer dereference", "title": "Vulnerability summary" }, { "category": "other", "text": "A large number of products include the affected package, but do not make use of the vulnerable SSH server code. Accordingly, the flaw itself is rated as \"Important\", but these products themselves all have a \"Low\" severity rating.\n\nAdditionally, a number of products include golang.org/x/crypto (or even golang.org/x/crypto/ssh/terminal) but not specifically golang.org/x/crypto/ssh/server.go in the final build. As this would result in a very large number of entries of not affected products, only products which include the ssh server code (golang.org/x/crypto/ssh/server.go) have been represented here. \n\nRed Hat Enterprise Linux 8 container-tools:rhel8/containernetworking-plugins is not affected because although it uses some functionality from golang.org/x/crypto, it does not use or import anything from golang.org/x/crypto/ssh/*.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:buildah-0:1.19.7-1.module+el8.4.0+10607+f4da7515.aarch64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:buildah-0:1.19.7-1.module+el8.4.0+10607+f4da7515.ppc64le", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:buildah-0:1.19.7-1.module+el8.4.0+10607+f4da7515.s390x", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:buildah-0:1.19.7-1.module+el8.4.0+10607+f4da7515.src", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:buildah-0:1.19.7-1.module+el8.4.0+10607+f4da7515.x86_64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:buildah-debuginfo-0:1.19.7-1.module+el8.4.0+10607+f4da7515.aarch64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:buildah-debuginfo-0:1.19.7-1.module+el8.4.0+10607+f4da7515.ppc64le", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:buildah-debuginfo-0:1.19.7-1.module+el8.4.0+10607+f4da7515.s390x", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:buildah-debuginfo-0:1.19.7-1.module+el8.4.0+10607+f4da7515.x86_64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:buildah-debugsource-0:1.19.7-1.module+el8.4.0+10607+f4da7515.aarch64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:buildah-debugsource-0:1.19.7-1.module+el8.4.0+10607+f4da7515.ppc64le", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:buildah-debugsource-0:1.19.7-1.module+el8.4.0+10607+f4da7515.s390x", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:buildah-debugsource-0:1.19.7-1.module+el8.4.0+10607+f4da7515.x86_64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:buildah-tests-0:1.19.7-1.module+el8.4.0+10607+f4da7515.aarch64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:buildah-tests-0:1.19.7-1.module+el8.4.0+10607+f4da7515.ppc64le", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:buildah-tests-0:1.19.7-1.module+el8.4.0+10607+f4da7515.s390x", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:buildah-tests-0:1.19.7-1.module+el8.4.0+10607+f4da7515.x86_64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:buildah-tests-debuginfo-0:1.19.7-1.module+el8.4.0+10607+f4da7515.aarch64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:buildah-tests-debuginfo-0:1.19.7-1.module+el8.4.0+10607+f4da7515.ppc64le", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:buildah-tests-debuginfo-0:1.19.7-1.module+el8.4.0+10607+f4da7515.s390x", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:buildah-tests-debuginfo-0:1.19.7-1.module+el8.4.0+10607+f4da7515.x86_64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:cockpit-podman-0:29-2.module+el8.4.0+10607+f4da7515.noarch", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:cockpit-podman-0:29-2.module+el8.4.0+10607+f4da7515.src", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:conmon-2:2.0.26-1.module+el8.4.0+10607+f4da7515.aarch64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:conmon-2:2.0.26-1.module+el8.4.0+10607+f4da7515.ppc64le", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:conmon-2:2.0.26-1.module+el8.4.0+10607+f4da7515.s390x", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:conmon-2:2.0.26-1.module+el8.4.0+10607+f4da7515.src", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:conmon-2:2.0.26-1.module+el8.4.0+10607+f4da7515.x86_64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:conmon-debuginfo-2:2.0.26-1.module+el8.4.0+10607+f4da7515.aarch64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:conmon-debuginfo-2:2.0.26-1.module+el8.4.0+10607+f4da7515.ppc64le", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:conmon-debuginfo-2:2.0.26-1.module+el8.4.0+10607+f4da7515.s390x", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:conmon-debuginfo-2:2.0.26-1.module+el8.4.0+10607+f4da7515.x86_64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:conmon-debugsource-2:2.0.26-1.module+el8.4.0+10607+f4da7515.aarch64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:conmon-debugsource-2:2.0.26-1.module+el8.4.0+10607+f4da7515.ppc64le", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:conmon-debugsource-2:2.0.26-1.module+el8.4.0+10607+f4da7515.s390x", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:conmon-debugsource-2:2.0.26-1.module+el8.4.0+10607+f4da7515.x86_64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:container-selinux-2:2.158.0-1.module+el8.4.0+10607+f4da7515.noarch", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:container-selinux-2:2.158.0-1.module+el8.4.0+10607+f4da7515.src", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:containernetworking-plugins-0:0.9.1-1.module+el8.4.0+10607+f4da7515.aarch64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:containernetworking-plugins-0:0.9.1-1.module+el8.4.0+10607+f4da7515.ppc64le", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:containernetworking-plugins-0:0.9.1-1.module+el8.4.0+10607+f4da7515.s390x", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:containernetworking-plugins-0:0.9.1-1.module+el8.4.0+10607+f4da7515.src", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:containernetworking-plugins-0:0.9.1-1.module+el8.4.0+10607+f4da7515.x86_64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:containernetworking-plugins-debuginfo-0:0.9.1-1.module+el8.4.0+10607+f4da7515.aarch64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:containernetworking-plugins-debuginfo-0:0.9.1-1.module+el8.4.0+10607+f4da7515.ppc64le", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:containernetworking-plugins-debuginfo-0:0.9.1-1.module+el8.4.0+10607+f4da7515.s390x", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:containernetworking-plugins-debuginfo-0:0.9.1-1.module+el8.4.0+10607+f4da7515.x86_64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:containernetworking-plugins-debugsource-0:0.9.1-1.module+el8.4.0+10607+f4da7515.aarch64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:containernetworking-plugins-debugsource-0:0.9.1-1.module+el8.4.0+10607+f4da7515.ppc64le", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:containernetworking-plugins-debugsource-0:0.9.1-1.module+el8.4.0+10607+f4da7515.s390x", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:containernetworking-plugins-debugsource-0:0.9.1-1.module+el8.4.0+10607+f4da7515.x86_64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:containers-common-1:1.2.2-8.module+el8.4.0+10607+f4da7515.aarch64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:containers-common-1:1.2.2-8.module+el8.4.0+10607+f4da7515.ppc64le", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:containers-common-1:1.2.2-8.module+el8.4.0+10607+f4da7515.s390x", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:containers-common-1:1.2.2-8.module+el8.4.0+10607+f4da7515.x86_64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:crit-0:3.15-1.module+el8.4.0+10607+f4da7515.aarch64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:crit-0:3.15-1.module+el8.4.0+10607+f4da7515.ppc64le", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:crit-0:3.15-1.module+el8.4.0+10607+f4da7515.s390x", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:crit-0:3.15-1.module+el8.4.0+10607+f4da7515.x86_64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:criu-0:3.15-1.module+el8.4.0+10607+f4da7515.aarch64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:criu-0:3.15-1.module+el8.4.0+10607+f4da7515.ppc64le", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:criu-0:3.15-1.module+el8.4.0+10607+f4da7515.s390x", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:criu-0:3.15-1.module+el8.4.0+10607+f4da7515.src", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:criu-0:3.15-1.module+el8.4.0+10607+f4da7515.x86_64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:criu-debuginfo-0:3.15-1.module+el8.4.0+10607+f4da7515.aarch64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:criu-debuginfo-0:3.15-1.module+el8.4.0+10607+f4da7515.ppc64le", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:criu-debuginfo-0:3.15-1.module+el8.4.0+10607+f4da7515.s390x", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:criu-debuginfo-0:3.15-1.module+el8.4.0+10607+f4da7515.x86_64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:criu-debugsource-0:3.15-1.module+el8.4.0+10607+f4da7515.aarch64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:criu-debugsource-0:3.15-1.module+el8.4.0+10607+f4da7515.ppc64le", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:criu-debugsource-0:3.15-1.module+el8.4.0+10607+f4da7515.s390x", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:criu-debugsource-0:3.15-1.module+el8.4.0+10607+f4da7515.x86_64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:crun-0:0.18-1.module+el8.4.0+10607+f4da7515.aarch64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:crun-0:0.18-1.module+el8.4.0+10607+f4da7515.ppc64le", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:crun-0:0.18-1.module+el8.4.0+10607+f4da7515.s390x", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:crun-0:0.18-1.module+el8.4.0+10607+f4da7515.src", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:crun-0:0.18-1.module+el8.4.0+10607+f4da7515.x86_64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:crun-debuginfo-0:0.18-1.module+el8.4.0+10607+f4da7515.aarch64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:crun-debuginfo-0:0.18-1.module+el8.4.0+10607+f4da7515.ppc64le", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:crun-debuginfo-0:0.18-1.module+el8.4.0+10607+f4da7515.s390x", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:crun-debuginfo-0:0.18-1.module+el8.4.0+10607+f4da7515.x86_64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:crun-debugsource-0:0.18-1.module+el8.4.0+10607+f4da7515.aarch64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:crun-debugsource-0:0.18-1.module+el8.4.0+10607+f4da7515.ppc64le", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:crun-debugsource-0:0.18-1.module+el8.4.0+10607+f4da7515.s390x", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:crun-debugsource-0:0.18-1.module+el8.4.0+10607+f4da7515.x86_64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:fuse-overlayfs-0:1.4.0-2.module+el8.4.0+10607+f4da7515.aarch64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:fuse-overlayfs-0:1.4.0-2.module+el8.4.0+10607+f4da7515.ppc64le", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:fuse-overlayfs-0:1.4.0-2.module+el8.4.0+10607+f4da7515.s390x", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:fuse-overlayfs-0:1.4.0-2.module+el8.4.0+10607+f4da7515.src", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:fuse-overlayfs-0:1.4.0-2.module+el8.4.0+10607+f4da7515.x86_64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:fuse-overlayfs-debuginfo-0:1.4.0-2.module+el8.4.0+10607+f4da7515.aarch64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:fuse-overlayfs-debuginfo-0:1.4.0-2.module+el8.4.0+10607+f4da7515.ppc64le", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:fuse-overlayfs-debuginfo-0:1.4.0-2.module+el8.4.0+10607+f4da7515.s390x", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:fuse-overlayfs-debuginfo-0:1.4.0-2.module+el8.4.0+10607+f4da7515.x86_64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:fuse-overlayfs-debugsource-0:1.4.0-2.module+el8.4.0+10607+f4da7515.aarch64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:fuse-overlayfs-debugsource-0:1.4.0-2.module+el8.4.0+10607+f4da7515.ppc64le", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:fuse-overlayfs-debugsource-0:1.4.0-2.module+el8.4.0+10607+f4da7515.s390x", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:fuse-overlayfs-debugsource-0:1.4.0-2.module+el8.4.0+10607+f4da7515.x86_64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:libslirp-0:4.3.1-1.module+el8.4.0+10607+f4da7515.aarch64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:libslirp-0:4.3.1-1.module+el8.4.0+10607+f4da7515.ppc64le", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:libslirp-0:4.3.1-1.module+el8.4.0+10607+f4da7515.s390x", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:libslirp-0:4.3.1-1.module+el8.4.0+10607+f4da7515.src", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:libslirp-0:4.3.1-1.module+el8.4.0+10607+f4da7515.x86_64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:libslirp-debuginfo-0:4.3.1-1.module+el8.4.0+10607+f4da7515.aarch64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:libslirp-debuginfo-0:4.3.1-1.module+el8.4.0+10607+f4da7515.ppc64le", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:libslirp-debuginfo-0:4.3.1-1.module+el8.4.0+10607+f4da7515.s390x", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:libslirp-debuginfo-0:4.3.1-1.module+el8.4.0+10607+f4da7515.x86_64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:libslirp-debugsource-0:4.3.1-1.module+el8.4.0+10607+f4da7515.aarch64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:libslirp-debugsource-0:4.3.1-1.module+el8.4.0+10607+f4da7515.ppc64le", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:libslirp-debugsource-0:4.3.1-1.module+el8.4.0+10607+f4da7515.s390x", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:libslirp-debugsource-0:4.3.1-1.module+el8.4.0+10607+f4da7515.x86_64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:libslirp-devel-0:4.3.1-1.module+el8.4.0+10607+f4da7515.aarch64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:libslirp-devel-0:4.3.1-1.module+el8.4.0+10607+f4da7515.ppc64le", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:libslirp-devel-0:4.3.1-1.module+el8.4.0+10607+f4da7515.s390x", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:libslirp-devel-0:4.3.1-1.module+el8.4.0+10607+f4da7515.x86_64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:oci-seccomp-bpf-hook-0:1.2.0-2.module+el8.4.0+10607+f4da7515.aarch64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:oci-seccomp-bpf-hook-0:1.2.0-2.module+el8.4.0+10607+f4da7515.ppc64le", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:oci-seccomp-bpf-hook-0:1.2.0-2.module+el8.4.0+10607+f4da7515.s390x", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:oci-seccomp-bpf-hook-0:1.2.0-2.module+el8.4.0+10607+f4da7515.src", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:oci-seccomp-bpf-hook-0:1.2.0-2.module+el8.4.0+10607+f4da7515.x86_64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:oci-seccomp-bpf-hook-debuginfo-0:1.2.0-2.module+el8.4.0+10607+f4da7515.aarch64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:oci-seccomp-bpf-hook-debuginfo-0:1.2.0-2.module+el8.4.0+10607+f4da7515.ppc64le", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:oci-seccomp-bpf-hook-debuginfo-0:1.2.0-2.module+el8.4.0+10607+f4da7515.s390x", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:oci-seccomp-bpf-hook-debuginfo-0:1.2.0-2.module+el8.4.0+10607+f4da7515.x86_64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:oci-seccomp-bpf-hook-debugsource-0:1.2.0-2.module+el8.4.0+10607+f4da7515.aarch64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:oci-seccomp-bpf-hook-debugsource-0:1.2.0-2.module+el8.4.0+10607+f4da7515.ppc64le", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:oci-seccomp-bpf-hook-debugsource-0:1.2.0-2.module+el8.4.0+10607+f4da7515.s390x", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:oci-seccomp-bpf-hook-debugsource-0:1.2.0-2.module+el8.4.0+10607+f4da7515.x86_64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:podman-0:3.0.1-6.module+el8.4.0+10607+f4da7515.aarch64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:podman-0:3.0.1-6.module+el8.4.0+10607+f4da7515.ppc64le", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:podman-0:3.0.1-6.module+el8.4.0+10607+f4da7515.s390x", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:podman-0:3.0.1-6.module+el8.4.0+10607+f4da7515.src", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:podman-0:3.0.1-6.module+el8.4.0+10607+f4da7515.x86_64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:podman-catatonit-0:3.0.1-6.module+el8.4.0+10607+f4da7515.aarch64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:podman-catatonit-0:3.0.1-6.module+el8.4.0+10607+f4da7515.ppc64le", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:podman-catatonit-0:3.0.1-6.module+el8.4.0+10607+f4da7515.s390x", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:podman-catatonit-0:3.0.1-6.module+el8.4.0+10607+f4da7515.x86_64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:podman-catatonit-debuginfo-0:3.0.1-6.module+el8.4.0+10607+f4da7515.aarch64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:podman-catatonit-debuginfo-0:3.0.1-6.module+el8.4.0+10607+f4da7515.ppc64le", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:podman-catatonit-debuginfo-0:3.0.1-6.module+el8.4.0+10607+f4da7515.s390x", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:podman-catatonit-debuginfo-0:3.0.1-6.module+el8.4.0+10607+f4da7515.x86_64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:podman-debuginfo-0:3.0.1-6.module+el8.4.0+10607+f4da7515.aarch64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:podman-debuginfo-0:3.0.1-6.module+el8.4.0+10607+f4da7515.ppc64le", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:podman-debuginfo-0:3.0.1-6.module+el8.4.0+10607+f4da7515.s390x", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:podman-debuginfo-0:3.0.1-6.module+el8.4.0+10607+f4da7515.x86_64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:podman-debugsource-0:3.0.1-6.module+el8.4.0+10607+f4da7515.aarch64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:podman-debugsource-0:3.0.1-6.module+el8.4.0+10607+f4da7515.ppc64le", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:podman-debugsource-0:3.0.1-6.module+el8.4.0+10607+f4da7515.s390x", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:podman-debugsource-0:3.0.1-6.module+el8.4.0+10607+f4da7515.x86_64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:podman-docker-0:3.0.1-6.module+el8.4.0+10607+f4da7515.noarch", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:podman-plugins-0:3.0.1-6.module+el8.4.0+10607+f4da7515.aarch64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:podman-plugins-0:3.0.1-6.module+el8.4.0+10607+f4da7515.ppc64le", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:podman-plugins-0:3.0.1-6.module+el8.4.0+10607+f4da7515.s390x", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:podman-plugins-0:3.0.1-6.module+el8.4.0+10607+f4da7515.x86_64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:podman-plugins-debuginfo-0:3.0.1-6.module+el8.4.0+10607+f4da7515.aarch64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:podman-plugins-debuginfo-0:3.0.1-6.module+el8.4.0+10607+f4da7515.ppc64le", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:podman-plugins-debuginfo-0:3.0.1-6.module+el8.4.0+10607+f4da7515.s390x", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:podman-plugins-debuginfo-0:3.0.1-6.module+el8.4.0+10607+f4da7515.x86_64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:podman-remote-0:3.0.1-6.module+el8.4.0+10607+f4da7515.aarch64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:podman-remote-0:3.0.1-6.module+el8.4.0+10607+f4da7515.ppc64le", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:podman-remote-0:3.0.1-6.module+el8.4.0+10607+f4da7515.s390x", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:podman-remote-0:3.0.1-6.module+el8.4.0+10607+f4da7515.x86_64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:podman-remote-debuginfo-0:3.0.1-6.module+el8.4.0+10607+f4da7515.aarch64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:podman-remote-debuginfo-0:3.0.1-6.module+el8.4.0+10607+f4da7515.ppc64le", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:podman-remote-debuginfo-0:3.0.1-6.module+el8.4.0+10607+f4da7515.s390x", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:podman-remote-debuginfo-0:3.0.1-6.module+el8.4.0+10607+f4da7515.x86_64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:podman-tests-0:3.0.1-6.module+el8.4.0+10607+f4da7515.aarch64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:podman-tests-0:3.0.1-6.module+el8.4.0+10607+f4da7515.ppc64le", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:podman-tests-0:3.0.1-6.module+el8.4.0+10607+f4da7515.s390x", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:podman-tests-0:3.0.1-6.module+el8.4.0+10607+f4da7515.x86_64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:python3-criu-0:3.15-1.module+el8.4.0+10607+f4da7515.aarch64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:python3-criu-0:3.15-1.module+el8.4.0+10607+f4da7515.ppc64le", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:python3-criu-0:3.15-1.module+el8.4.0+10607+f4da7515.s390x", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:python3-criu-0:3.15-1.module+el8.4.0+10607+f4da7515.x86_64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:runc-0:1.0.0-70.rc92.module+el8.4.0+10607+f4da7515.aarch64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:runc-0:1.0.0-70.rc92.module+el8.4.0+10607+f4da7515.ppc64le", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:runc-0:1.0.0-70.rc92.module+el8.4.0+10607+f4da7515.s390x", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:runc-0:1.0.0-70.rc92.module+el8.4.0+10607+f4da7515.src", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:runc-0:1.0.0-70.rc92.module+el8.4.0+10607+f4da7515.x86_64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:runc-debuginfo-0:1.0.0-70.rc92.module+el8.4.0+10607+f4da7515.aarch64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:runc-debuginfo-0:1.0.0-70.rc92.module+el8.4.0+10607+f4da7515.ppc64le", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:runc-debuginfo-0:1.0.0-70.rc92.module+el8.4.0+10607+f4da7515.s390x", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:runc-debuginfo-0:1.0.0-70.rc92.module+el8.4.0+10607+f4da7515.x86_64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:runc-debugsource-0:1.0.0-70.rc92.module+el8.4.0+10607+f4da7515.aarch64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:runc-debugsource-0:1.0.0-70.rc92.module+el8.4.0+10607+f4da7515.ppc64le", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:runc-debugsource-0:1.0.0-70.rc92.module+el8.4.0+10607+f4da7515.s390x", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:runc-debugsource-0:1.0.0-70.rc92.module+el8.4.0+10607+f4da7515.x86_64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:skopeo-1:1.2.2-8.module+el8.4.0+10607+f4da7515.aarch64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:skopeo-1:1.2.2-8.module+el8.4.0+10607+f4da7515.ppc64le", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:skopeo-1:1.2.2-8.module+el8.4.0+10607+f4da7515.s390x", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:skopeo-1:1.2.2-8.module+el8.4.0+10607+f4da7515.src", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:skopeo-1:1.2.2-8.module+el8.4.0+10607+f4da7515.x86_64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:skopeo-debuginfo-1:1.2.2-8.module+el8.4.0+10607+f4da7515.aarch64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:skopeo-debuginfo-1:1.2.2-8.module+el8.4.0+10607+f4da7515.ppc64le", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:skopeo-debuginfo-1:1.2.2-8.module+el8.4.0+10607+f4da7515.s390x", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:skopeo-debuginfo-1:1.2.2-8.module+el8.4.0+10607+f4da7515.x86_64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:skopeo-debugsource-1:1.2.2-8.module+el8.4.0+10607+f4da7515.aarch64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:skopeo-debugsource-1:1.2.2-8.module+el8.4.0+10607+f4da7515.ppc64le", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:skopeo-debugsource-1:1.2.2-8.module+el8.4.0+10607+f4da7515.s390x", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:skopeo-debugsource-1:1.2.2-8.module+el8.4.0+10607+f4da7515.x86_64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:skopeo-tests-1:1.2.2-8.module+el8.4.0+10607+f4da7515.aarch64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:skopeo-tests-1:1.2.2-8.module+el8.4.0+10607+f4da7515.ppc64le", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:skopeo-tests-1:1.2.2-8.module+el8.4.0+10607+f4da7515.s390x", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:skopeo-tests-1:1.2.2-8.module+el8.4.0+10607+f4da7515.x86_64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:slirp4netns-0:1.1.8-1.module+el8.4.0+10607+f4da7515.aarch64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:slirp4netns-0:1.1.8-1.module+el8.4.0+10607+f4da7515.ppc64le", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:slirp4netns-0:1.1.8-1.module+el8.4.0+10607+f4da7515.s390x", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:slirp4netns-0:1.1.8-1.module+el8.4.0+10607+f4da7515.src", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:slirp4netns-0:1.1.8-1.module+el8.4.0+10607+f4da7515.x86_64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:slirp4netns-debuginfo-0:1.1.8-1.module+el8.4.0+10607+f4da7515.aarch64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:slirp4netns-debuginfo-0:1.1.8-1.module+el8.4.0+10607+f4da7515.ppc64le", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:slirp4netns-debuginfo-0:1.1.8-1.module+el8.4.0+10607+f4da7515.s390x", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:slirp4netns-debuginfo-0:1.1.8-1.module+el8.4.0+10607+f4da7515.x86_64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:slirp4netns-debugsource-0:1.1.8-1.module+el8.4.0+10607+f4da7515.aarch64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:slirp4netns-debugsource-0:1.1.8-1.module+el8.4.0+10607+f4da7515.ppc64le", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:slirp4netns-debugsource-0:1.1.8-1.module+el8.4.0+10607+f4da7515.s390x", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:slirp4netns-debugsource-0:1.1.8-1.module+el8.4.0+10607+f4da7515.x86_64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:toolbox-0:0.0.8-1.module+el8.4.0+10607+f4da7515.noarch", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:toolbox-0:0.0.8-1.module+el8.4.0+10607+f4da7515.src", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:udica-0:0.2.4-1.module+el8.4.0+10607+f4da7515.noarch", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:udica-0:0.2.4-1.module+el8.4.0+10607+f4da7515.src" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-29652" }, { "category": "external", "summary": "RHBZ#1908883", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1908883" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-29652", "url": "https://www.cve.org/CVERecord?id=CVE-2020-29652" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-29652", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-29652" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/ouZIlBimOsE?pli=1", "url": "https://groups.google.com/g/golang-announce/c/ouZIlBimOsE?pli=1" } ], "release_date": "2020-12-16T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:buildah-0:1.19.7-1.module+el8.4.0+10607+f4da7515.aarch64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:buildah-0:1.19.7-1.module+el8.4.0+10607+f4da7515.ppc64le", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:buildah-0:1.19.7-1.module+el8.4.0+10607+f4da7515.s390x", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:buildah-0:1.19.7-1.module+el8.4.0+10607+f4da7515.src", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:buildah-0:1.19.7-1.module+el8.4.0+10607+f4da7515.x86_64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:buildah-debuginfo-0:1.19.7-1.module+el8.4.0+10607+f4da7515.aarch64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:buildah-debuginfo-0:1.19.7-1.module+el8.4.0+10607+f4da7515.ppc64le", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:buildah-debuginfo-0:1.19.7-1.module+el8.4.0+10607+f4da7515.s390x", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:buildah-debuginfo-0:1.19.7-1.module+el8.4.0+10607+f4da7515.x86_64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:buildah-debugsource-0:1.19.7-1.module+el8.4.0+10607+f4da7515.aarch64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:buildah-debugsource-0:1.19.7-1.module+el8.4.0+10607+f4da7515.ppc64le", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:buildah-debugsource-0:1.19.7-1.module+el8.4.0+10607+f4da7515.s390x", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:buildah-debugsource-0:1.19.7-1.module+el8.4.0+10607+f4da7515.x86_64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:buildah-tests-0:1.19.7-1.module+el8.4.0+10607+f4da7515.aarch64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:buildah-tests-0:1.19.7-1.module+el8.4.0+10607+f4da7515.ppc64le", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:buildah-tests-0:1.19.7-1.module+el8.4.0+10607+f4da7515.s390x", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:buildah-tests-0:1.19.7-1.module+el8.4.0+10607+f4da7515.x86_64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:buildah-tests-debuginfo-0:1.19.7-1.module+el8.4.0+10607+f4da7515.aarch64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:buildah-tests-debuginfo-0:1.19.7-1.module+el8.4.0+10607+f4da7515.ppc64le", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:buildah-tests-debuginfo-0:1.19.7-1.module+el8.4.0+10607+f4da7515.s390x", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:buildah-tests-debuginfo-0:1.19.7-1.module+el8.4.0+10607+f4da7515.x86_64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:cockpit-podman-0:29-2.module+el8.4.0+10607+f4da7515.noarch", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:cockpit-podman-0:29-2.module+el8.4.0+10607+f4da7515.src", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:conmon-2:2.0.26-1.module+el8.4.0+10607+f4da7515.aarch64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:conmon-2:2.0.26-1.module+el8.4.0+10607+f4da7515.ppc64le", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:conmon-2:2.0.26-1.module+el8.4.0+10607+f4da7515.s390x", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:conmon-2:2.0.26-1.module+el8.4.0+10607+f4da7515.src", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:conmon-2:2.0.26-1.module+el8.4.0+10607+f4da7515.x86_64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:conmon-debuginfo-2:2.0.26-1.module+el8.4.0+10607+f4da7515.aarch64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:conmon-debuginfo-2:2.0.26-1.module+el8.4.0+10607+f4da7515.ppc64le", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:conmon-debuginfo-2:2.0.26-1.module+el8.4.0+10607+f4da7515.s390x", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:conmon-debuginfo-2:2.0.26-1.module+el8.4.0+10607+f4da7515.x86_64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:conmon-debugsource-2:2.0.26-1.module+el8.4.0+10607+f4da7515.aarch64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:conmon-debugsource-2:2.0.26-1.module+el8.4.0+10607+f4da7515.ppc64le", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:conmon-debugsource-2:2.0.26-1.module+el8.4.0+10607+f4da7515.s390x", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:conmon-debugsource-2:2.0.26-1.module+el8.4.0+10607+f4da7515.x86_64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:container-selinux-2:2.158.0-1.module+el8.4.0+10607+f4da7515.noarch", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:container-selinux-2:2.158.0-1.module+el8.4.0+10607+f4da7515.src", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:containernetworking-plugins-0:0.9.1-1.module+el8.4.0+10607+f4da7515.aarch64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:containernetworking-plugins-0:0.9.1-1.module+el8.4.0+10607+f4da7515.ppc64le", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:containernetworking-plugins-0:0.9.1-1.module+el8.4.0+10607+f4da7515.s390x", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:containernetworking-plugins-0:0.9.1-1.module+el8.4.0+10607+f4da7515.src", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:containernetworking-plugins-0:0.9.1-1.module+el8.4.0+10607+f4da7515.x86_64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:containernetworking-plugins-debuginfo-0:0.9.1-1.module+el8.4.0+10607+f4da7515.aarch64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:containernetworking-plugins-debuginfo-0:0.9.1-1.module+el8.4.0+10607+f4da7515.ppc64le", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:containernetworking-plugins-debuginfo-0:0.9.1-1.module+el8.4.0+10607+f4da7515.s390x", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:containernetworking-plugins-debuginfo-0:0.9.1-1.module+el8.4.0+10607+f4da7515.x86_64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:containernetworking-plugins-debugsource-0:0.9.1-1.module+el8.4.0+10607+f4da7515.aarch64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:containernetworking-plugins-debugsource-0:0.9.1-1.module+el8.4.0+10607+f4da7515.ppc64le", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:containernetworking-plugins-debugsource-0:0.9.1-1.module+el8.4.0+10607+f4da7515.s390x", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:containernetworking-plugins-debugsource-0:0.9.1-1.module+el8.4.0+10607+f4da7515.x86_64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:containers-common-1:1.2.2-8.module+el8.4.0+10607+f4da7515.aarch64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:containers-common-1:1.2.2-8.module+el8.4.0+10607+f4da7515.ppc64le", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:containers-common-1:1.2.2-8.module+el8.4.0+10607+f4da7515.s390x", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:containers-common-1:1.2.2-8.module+el8.4.0+10607+f4da7515.x86_64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:crit-0:3.15-1.module+el8.4.0+10607+f4da7515.aarch64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:crit-0:3.15-1.module+el8.4.0+10607+f4da7515.ppc64le", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:crit-0:3.15-1.module+el8.4.0+10607+f4da7515.s390x", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:crit-0:3.15-1.module+el8.4.0+10607+f4da7515.x86_64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:criu-0:3.15-1.module+el8.4.0+10607+f4da7515.aarch64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:criu-0:3.15-1.module+el8.4.0+10607+f4da7515.ppc64le", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:criu-0:3.15-1.module+el8.4.0+10607+f4da7515.s390x", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:criu-0:3.15-1.module+el8.4.0+10607+f4da7515.src", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:criu-0:3.15-1.module+el8.4.0+10607+f4da7515.x86_64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:criu-debuginfo-0:3.15-1.module+el8.4.0+10607+f4da7515.aarch64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:criu-debuginfo-0:3.15-1.module+el8.4.0+10607+f4da7515.ppc64le", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:criu-debuginfo-0:3.15-1.module+el8.4.0+10607+f4da7515.s390x", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:criu-debuginfo-0:3.15-1.module+el8.4.0+10607+f4da7515.x86_64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:criu-debugsource-0:3.15-1.module+el8.4.0+10607+f4da7515.aarch64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:criu-debugsource-0:3.15-1.module+el8.4.0+10607+f4da7515.ppc64le", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:criu-debugsource-0:3.15-1.module+el8.4.0+10607+f4da7515.s390x", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:criu-debugsource-0:3.15-1.module+el8.4.0+10607+f4da7515.x86_64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:crun-0:0.18-1.module+el8.4.0+10607+f4da7515.aarch64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:crun-0:0.18-1.module+el8.4.0+10607+f4da7515.ppc64le", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:crun-0:0.18-1.module+el8.4.0+10607+f4da7515.s390x", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:crun-0:0.18-1.module+el8.4.0+10607+f4da7515.src", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:crun-0:0.18-1.module+el8.4.0+10607+f4da7515.x86_64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:crun-debuginfo-0:0.18-1.module+el8.4.0+10607+f4da7515.aarch64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:crun-debuginfo-0:0.18-1.module+el8.4.0+10607+f4da7515.ppc64le", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:crun-debuginfo-0:0.18-1.module+el8.4.0+10607+f4da7515.s390x", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:crun-debuginfo-0:0.18-1.module+el8.4.0+10607+f4da7515.x86_64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:crun-debugsource-0:0.18-1.module+el8.4.0+10607+f4da7515.aarch64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:crun-debugsource-0:0.18-1.module+el8.4.0+10607+f4da7515.ppc64le", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:crun-debugsource-0:0.18-1.module+el8.4.0+10607+f4da7515.s390x", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:crun-debugsource-0:0.18-1.module+el8.4.0+10607+f4da7515.x86_64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:fuse-overlayfs-0:1.4.0-2.module+el8.4.0+10607+f4da7515.aarch64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:fuse-overlayfs-0:1.4.0-2.module+el8.4.0+10607+f4da7515.ppc64le", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:fuse-overlayfs-0:1.4.0-2.module+el8.4.0+10607+f4da7515.s390x", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:fuse-overlayfs-0:1.4.0-2.module+el8.4.0+10607+f4da7515.src", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:fuse-overlayfs-0:1.4.0-2.module+el8.4.0+10607+f4da7515.x86_64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:fuse-overlayfs-debuginfo-0:1.4.0-2.module+el8.4.0+10607+f4da7515.aarch64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:fuse-overlayfs-debuginfo-0:1.4.0-2.module+el8.4.0+10607+f4da7515.ppc64le", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:fuse-overlayfs-debuginfo-0:1.4.0-2.module+el8.4.0+10607+f4da7515.s390x", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:fuse-overlayfs-debuginfo-0:1.4.0-2.module+el8.4.0+10607+f4da7515.x86_64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:fuse-overlayfs-debugsource-0:1.4.0-2.module+el8.4.0+10607+f4da7515.aarch64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:fuse-overlayfs-debugsource-0:1.4.0-2.module+el8.4.0+10607+f4da7515.ppc64le", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:fuse-overlayfs-debugsource-0:1.4.0-2.module+el8.4.0+10607+f4da7515.s390x", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:fuse-overlayfs-debugsource-0:1.4.0-2.module+el8.4.0+10607+f4da7515.x86_64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:libslirp-0:4.3.1-1.module+el8.4.0+10607+f4da7515.aarch64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:libslirp-0:4.3.1-1.module+el8.4.0+10607+f4da7515.ppc64le", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:libslirp-0:4.3.1-1.module+el8.4.0+10607+f4da7515.s390x", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:libslirp-0:4.3.1-1.module+el8.4.0+10607+f4da7515.src", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:libslirp-0:4.3.1-1.module+el8.4.0+10607+f4da7515.x86_64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:libslirp-debuginfo-0:4.3.1-1.module+el8.4.0+10607+f4da7515.aarch64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:libslirp-debuginfo-0:4.3.1-1.module+el8.4.0+10607+f4da7515.ppc64le", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:libslirp-debuginfo-0:4.3.1-1.module+el8.4.0+10607+f4da7515.s390x", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:libslirp-debuginfo-0:4.3.1-1.module+el8.4.0+10607+f4da7515.x86_64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:libslirp-debugsource-0:4.3.1-1.module+el8.4.0+10607+f4da7515.aarch64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:libslirp-debugsource-0:4.3.1-1.module+el8.4.0+10607+f4da7515.ppc64le", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:libslirp-debugsource-0:4.3.1-1.module+el8.4.0+10607+f4da7515.s390x", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:libslirp-debugsource-0:4.3.1-1.module+el8.4.0+10607+f4da7515.x86_64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:libslirp-devel-0:4.3.1-1.module+el8.4.0+10607+f4da7515.aarch64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:libslirp-devel-0:4.3.1-1.module+el8.4.0+10607+f4da7515.ppc64le", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:libslirp-devel-0:4.3.1-1.module+el8.4.0+10607+f4da7515.s390x", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:libslirp-devel-0:4.3.1-1.module+el8.4.0+10607+f4da7515.x86_64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:oci-seccomp-bpf-hook-0:1.2.0-2.module+el8.4.0+10607+f4da7515.aarch64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:oci-seccomp-bpf-hook-0:1.2.0-2.module+el8.4.0+10607+f4da7515.ppc64le", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:oci-seccomp-bpf-hook-0:1.2.0-2.module+el8.4.0+10607+f4da7515.s390x", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:oci-seccomp-bpf-hook-0:1.2.0-2.module+el8.4.0+10607+f4da7515.src", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:oci-seccomp-bpf-hook-0:1.2.0-2.module+el8.4.0+10607+f4da7515.x86_64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:oci-seccomp-bpf-hook-debuginfo-0:1.2.0-2.module+el8.4.0+10607+f4da7515.aarch64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:oci-seccomp-bpf-hook-debuginfo-0:1.2.0-2.module+el8.4.0+10607+f4da7515.ppc64le", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:oci-seccomp-bpf-hook-debuginfo-0:1.2.0-2.module+el8.4.0+10607+f4da7515.s390x", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:oci-seccomp-bpf-hook-debuginfo-0:1.2.0-2.module+el8.4.0+10607+f4da7515.x86_64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:oci-seccomp-bpf-hook-debugsource-0:1.2.0-2.module+el8.4.0+10607+f4da7515.aarch64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:oci-seccomp-bpf-hook-debugsource-0:1.2.0-2.module+el8.4.0+10607+f4da7515.ppc64le", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:oci-seccomp-bpf-hook-debugsource-0:1.2.0-2.module+el8.4.0+10607+f4da7515.s390x", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:oci-seccomp-bpf-hook-debugsource-0:1.2.0-2.module+el8.4.0+10607+f4da7515.x86_64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:podman-0:3.0.1-6.module+el8.4.0+10607+f4da7515.aarch64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:podman-0:3.0.1-6.module+el8.4.0+10607+f4da7515.ppc64le", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:podman-0:3.0.1-6.module+el8.4.0+10607+f4da7515.s390x", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:podman-0:3.0.1-6.module+el8.4.0+10607+f4da7515.src", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:podman-0:3.0.1-6.module+el8.4.0+10607+f4da7515.x86_64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:podman-catatonit-0:3.0.1-6.module+el8.4.0+10607+f4da7515.aarch64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:podman-catatonit-0:3.0.1-6.module+el8.4.0+10607+f4da7515.ppc64le", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:podman-catatonit-0:3.0.1-6.module+el8.4.0+10607+f4da7515.s390x", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:podman-catatonit-0:3.0.1-6.module+el8.4.0+10607+f4da7515.x86_64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:podman-catatonit-debuginfo-0:3.0.1-6.module+el8.4.0+10607+f4da7515.aarch64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:podman-catatonit-debuginfo-0:3.0.1-6.module+el8.4.0+10607+f4da7515.ppc64le", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:podman-catatonit-debuginfo-0:3.0.1-6.module+el8.4.0+10607+f4da7515.s390x", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:podman-catatonit-debuginfo-0:3.0.1-6.module+el8.4.0+10607+f4da7515.x86_64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:podman-debuginfo-0:3.0.1-6.module+el8.4.0+10607+f4da7515.aarch64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:podman-debuginfo-0:3.0.1-6.module+el8.4.0+10607+f4da7515.ppc64le", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:podman-debuginfo-0:3.0.1-6.module+el8.4.0+10607+f4da7515.s390x", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:podman-debuginfo-0:3.0.1-6.module+el8.4.0+10607+f4da7515.x86_64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:podman-debugsource-0:3.0.1-6.module+el8.4.0+10607+f4da7515.aarch64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:podman-debugsource-0:3.0.1-6.module+el8.4.0+10607+f4da7515.ppc64le", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:podman-debugsource-0:3.0.1-6.module+el8.4.0+10607+f4da7515.s390x", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:podman-debugsource-0:3.0.1-6.module+el8.4.0+10607+f4da7515.x86_64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:podman-docker-0:3.0.1-6.module+el8.4.0+10607+f4da7515.noarch", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:podman-plugins-0:3.0.1-6.module+el8.4.0+10607+f4da7515.aarch64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:podman-plugins-0:3.0.1-6.module+el8.4.0+10607+f4da7515.ppc64le", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:podman-plugins-0:3.0.1-6.module+el8.4.0+10607+f4da7515.s390x", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:podman-plugins-0:3.0.1-6.module+el8.4.0+10607+f4da7515.x86_64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:podman-plugins-debuginfo-0:3.0.1-6.module+el8.4.0+10607+f4da7515.aarch64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:podman-plugins-debuginfo-0:3.0.1-6.module+el8.4.0+10607+f4da7515.ppc64le", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:podman-plugins-debuginfo-0:3.0.1-6.module+el8.4.0+10607+f4da7515.s390x", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:podman-plugins-debuginfo-0:3.0.1-6.module+el8.4.0+10607+f4da7515.x86_64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:podman-remote-0:3.0.1-6.module+el8.4.0+10607+f4da7515.aarch64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:podman-remote-0:3.0.1-6.module+el8.4.0+10607+f4da7515.ppc64le", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:podman-remote-0:3.0.1-6.module+el8.4.0+10607+f4da7515.s390x", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:podman-remote-0:3.0.1-6.module+el8.4.0+10607+f4da7515.x86_64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:podman-remote-debuginfo-0:3.0.1-6.module+el8.4.0+10607+f4da7515.aarch64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:podman-remote-debuginfo-0:3.0.1-6.module+el8.4.0+10607+f4da7515.ppc64le", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:podman-remote-debuginfo-0:3.0.1-6.module+el8.4.0+10607+f4da7515.s390x", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:podman-remote-debuginfo-0:3.0.1-6.module+el8.4.0+10607+f4da7515.x86_64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:podman-tests-0:3.0.1-6.module+el8.4.0+10607+f4da7515.aarch64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:podman-tests-0:3.0.1-6.module+el8.4.0+10607+f4da7515.ppc64le", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:podman-tests-0:3.0.1-6.module+el8.4.0+10607+f4da7515.s390x", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:podman-tests-0:3.0.1-6.module+el8.4.0+10607+f4da7515.x86_64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:python3-criu-0:3.15-1.module+el8.4.0+10607+f4da7515.aarch64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:python3-criu-0:3.15-1.module+el8.4.0+10607+f4da7515.ppc64le", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:python3-criu-0:3.15-1.module+el8.4.0+10607+f4da7515.s390x", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:python3-criu-0:3.15-1.module+el8.4.0+10607+f4da7515.x86_64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:runc-0:1.0.0-70.rc92.module+el8.4.0+10607+f4da7515.aarch64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:runc-0:1.0.0-70.rc92.module+el8.4.0+10607+f4da7515.ppc64le", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:runc-0:1.0.0-70.rc92.module+el8.4.0+10607+f4da7515.s390x", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:runc-0:1.0.0-70.rc92.module+el8.4.0+10607+f4da7515.src", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:runc-0:1.0.0-70.rc92.module+el8.4.0+10607+f4da7515.x86_64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:runc-debuginfo-0:1.0.0-70.rc92.module+el8.4.0+10607+f4da7515.aarch64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:runc-debuginfo-0:1.0.0-70.rc92.module+el8.4.0+10607+f4da7515.ppc64le", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:runc-debuginfo-0:1.0.0-70.rc92.module+el8.4.0+10607+f4da7515.s390x", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:runc-debuginfo-0:1.0.0-70.rc92.module+el8.4.0+10607+f4da7515.x86_64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:runc-debugsource-0:1.0.0-70.rc92.module+el8.4.0+10607+f4da7515.aarch64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:runc-debugsource-0:1.0.0-70.rc92.module+el8.4.0+10607+f4da7515.ppc64le", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:runc-debugsource-0:1.0.0-70.rc92.module+el8.4.0+10607+f4da7515.s390x", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:runc-debugsource-0:1.0.0-70.rc92.module+el8.4.0+10607+f4da7515.x86_64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:skopeo-1:1.2.2-8.module+el8.4.0+10607+f4da7515.aarch64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:skopeo-1:1.2.2-8.module+el8.4.0+10607+f4da7515.ppc64le", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:skopeo-1:1.2.2-8.module+el8.4.0+10607+f4da7515.s390x", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:skopeo-1:1.2.2-8.module+el8.4.0+10607+f4da7515.src", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:skopeo-1:1.2.2-8.module+el8.4.0+10607+f4da7515.x86_64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:skopeo-debuginfo-1:1.2.2-8.module+el8.4.0+10607+f4da7515.aarch64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:skopeo-debuginfo-1:1.2.2-8.module+el8.4.0+10607+f4da7515.ppc64le", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:skopeo-debuginfo-1:1.2.2-8.module+el8.4.0+10607+f4da7515.s390x", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:skopeo-debuginfo-1:1.2.2-8.module+el8.4.0+10607+f4da7515.x86_64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:skopeo-debugsource-1:1.2.2-8.module+el8.4.0+10607+f4da7515.aarch64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:skopeo-debugsource-1:1.2.2-8.module+el8.4.0+10607+f4da7515.ppc64le", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:skopeo-debugsource-1:1.2.2-8.module+el8.4.0+10607+f4da7515.s390x", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:skopeo-debugsource-1:1.2.2-8.module+el8.4.0+10607+f4da7515.x86_64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:skopeo-tests-1:1.2.2-8.module+el8.4.0+10607+f4da7515.aarch64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:skopeo-tests-1:1.2.2-8.module+el8.4.0+10607+f4da7515.ppc64le", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:skopeo-tests-1:1.2.2-8.module+el8.4.0+10607+f4da7515.s390x", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:skopeo-tests-1:1.2.2-8.module+el8.4.0+10607+f4da7515.x86_64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:slirp4netns-0:1.1.8-1.module+el8.4.0+10607+f4da7515.aarch64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:slirp4netns-0:1.1.8-1.module+el8.4.0+10607+f4da7515.ppc64le", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:slirp4netns-0:1.1.8-1.module+el8.4.0+10607+f4da7515.s390x", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:slirp4netns-0:1.1.8-1.module+el8.4.0+10607+f4da7515.src", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:slirp4netns-0:1.1.8-1.module+el8.4.0+10607+f4da7515.x86_64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:slirp4netns-debuginfo-0:1.1.8-1.module+el8.4.0+10607+f4da7515.aarch64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:slirp4netns-debuginfo-0:1.1.8-1.module+el8.4.0+10607+f4da7515.ppc64le", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:slirp4netns-debuginfo-0:1.1.8-1.module+el8.4.0+10607+f4da7515.s390x", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:slirp4netns-debuginfo-0:1.1.8-1.module+el8.4.0+10607+f4da7515.x86_64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:slirp4netns-debugsource-0:1.1.8-1.module+el8.4.0+10607+f4da7515.aarch64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:slirp4netns-debugsource-0:1.1.8-1.module+el8.4.0+10607+f4da7515.ppc64le", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:slirp4netns-debugsource-0:1.1.8-1.module+el8.4.0+10607+f4da7515.s390x", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:slirp4netns-debugsource-0:1.1.8-1.module+el8.4.0+10607+f4da7515.x86_64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:toolbox-0:0.0.8-1.module+el8.4.0+10607+f4da7515.noarch", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:toolbox-0:0.0.8-1.module+el8.4.0+10607+f4da7515.src", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:udica-0:0.2.4-1.module+el8.4.0+10607+f4da7515.noarch", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:udica-0:0.2.4-1.module+el8.4.0+10607+f4da7515.src" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:1796" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:buildah-0:1.19.7-1.module+el8.4.0+10607+f4da7515.aarch64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:buildah-0:1.19.7-1.module+el8.4.0+10607+f4da7515.ppc64le", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:buildah-0:1.19.7-1.module+el8.4.0+10607+f4da7515.s390x", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:buildah-0:1.19.7-1.module+el8.4.0+10607+f4da7515.src", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:buildah-0:1.19.7-1.module+el8.4.0+10607+f4da7515.x86_64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:buildah-debuginfo-0:1.19.7-1.module+el8.4.0+10607+f4da7515.aarch64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:buildah-debuginfo-0:1.19.7-1.module+el8.4.0+10607+f4da7515.ppc64le", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:buildah-debuginfo-0:1.19.7-1.module+el8.4.0+10607+f4da7515.s390x", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:buildah-debuginfo-0:1.19.7-1.module+el8.4.0+10607+f4da7515.x86_64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:buildah-debugsource-0:1.19.7-1.module+el8.4.0+10607+f4da7515.aarch64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:buildah-debugsource-0:1.19.7-1.module+el8.4.0+10607+f4da7515.ppc64le", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:buildah-debugsource-0:1.19.7-1.module+el8.4.0+10607+f4da7515.s390x", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:buildah-debugsource-0:1.19.7-1.module+el8.4.0+10607+f4da7515.x86_64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:buildah-tests-0:1.19.7-1.module+el8.4.0+10607+f4da7515.aarch64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:buildah-tests-0:1.19.7-1.module+el8.4.0+10607+f4da7515.ppc64le", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:buildah-tests-0:1.19.7-1.module+el8.4.0+10607+f4da7515.s390x", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:buildah-tests-0:1.19.7-1.module+el8.4.0+10607+f4da7515.x86_64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:buildah-tests-debuginfo-0:1.19.7-1.module+el8.4.0+10607+f4da7515.aarch64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:buildah-tests-debuginfo-0:1.19.7-1.module+el8.4.0+10607+f4da7515.ppc64le", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:buildah-tests-debuginfo-0:1.19.7-1.module+el8.4.0+10607+f4da7515.s390x", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:buildah-tests-debuginfo-0:1.19.7-1.module+el8.4.0+10607+f4da7515.x86_64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:cockpit-podman-0:29-2.module+el8.4.0+10607+f4da7515.noarch", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:cockpit-podman-0:29-2.module+el8.4.0+10607+f4da7515.src", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:conmon-2:2.0.26-1.module+el8.4.0+10607+f4da7515.aarch64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:conmon-2:2.0.26-1.module+el8.4.0+10607+f4da7515.ppc64le", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:conmon-2:2.0.26-1.module+el8.4.0+10607+f4da7515.s390x", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:conmon-2:2.0.26-1.module+el8.4.0+10607+f4da7515.src", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:conmon-2:2.0.26-1.module+el8.4.0+10607+f4da7515.x86_64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:conmon-debuginfo-2:2.0.26-1.module+el8.4.0+10607+f4da7515.aarch64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:conmon-debuginfo-2:2.0.26-1.module+el8.4.0+10607+f4da7515.ppc64le", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:conmon-debuginfo-2:2.0.26-1.module+el8.4.0+10607+f4da7515.s390x", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:conmon-debuginfo-2:2.0.26-1.module+el8.4.0+10607+f4da7515.x86_64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:conmon-debugsource-2:2.0.26-1.module+el8.4.0+10607+f4da7515.aarch64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:conmon-debugsource-2:2.0.26-1.module+el8.4.0+10607+f4da7515.ppc64le", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:conmon-debugsource-2:2.0.26-1.module+el8.4.0+10607+f4da7515.s390x", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:conmon-debugsource-2:2.0.26-1.module+el8.4.0+10607+f4da7515.x86_64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:container-selinux-2:2.158.0-1.module+el8.4.0+10607+f4da7515.noarch", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:container-selinux-2:2.158.0-1.module+el8.4.0+10607+f4da7515.src", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:containernetworking-plugins-0:0.9.1-1.module+el8.4.0+10607+f4da7515.aarch64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:containernetworking-plugins-0:0.9.1-1.module+el8.4.0+10607+f4da7515.ppc64le", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:containernetworking-plugins-0:0.9.1-1.module+el8.4.0+10607+f4da7515.s390x", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:containernetworking-plugins-0:0.9.1-1.module+el8.4.0+10607+f4da7515.src", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:containernetworking-plugins-0:0.9.1-1.module+el8.4.0+10607+f4da7515.x86_64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:containernetworking-plugins-debuginfo-0:0.9.1-1.module+el8.4.0+10607+f4da7515.aarch64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:containernetworking-plugins-debuginfo-0:0.9.1-1.module+el8.4.0+10607+f4da7515.ppc64le", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:containernetworking-plugins-debuginfo-0:0.9.1-1.module+el8.4.0+10607+f4da7515.s390x", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:containernetworking-plugins-debuginfo-0:0.9.1-1.module+el8.4.0+10607+f4da7515.x86_64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:containernetworking-plugins-debugsource-0:0.9.1-1.module+el8.4.0+10607+f4da7515.aarch64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:containernetworking-plugins-debugsource-0:0.9.1-1.module+el8.4.0+10607+f4da7515.ppc64le", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:containernetworking-plugins-debugsource-0:0.9.1-1.module+el8.4.0+10607+f4da7515.s390x", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:containernetworking-plugins-debugsource-0:0.9.1-1.module+el8.4.0+10607+f4da7515.x86_64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:containers-common-1:1.2.2-8.module+el8.4.0+10607+f4da7515.aarch64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:containers-common-1:1.2.2-8.module+el8.4.0+10607+f4da7515.ppc64le", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:containers-common-1:1.2.2-8.module+el8.4.0+10607+f4da7515.s390x", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:containers-common-1:1.2.2-8.module+el8.4.0+10607+f4da7515.x86_64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:crit-0:3.15-1.module+el8.4.0+10607+f4da7515.aarch64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:crit-0:3.15-1.module+el8.4.0+10607+f4da7515.ppc64le", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:crit-0:3.15-1.module+el8.4.0+10607+f4da7515.s390x", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:crit-0:3.15-1.module+el8.4.0+10607+f4da7515.x86_64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:criu-0:3.15-1.module+el8.4.0+10607+f4da7515.aarch64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:criu-0:3.15-1.module+el8.4.0+10607+f4da7515.ppc64le", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:criu-0:3.15-1.module+el8.4.0+10607+f4da7515.s390x", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:criu-0:3.15-1.module+el8.4.0+10607+f4da7515.src", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:criu-0:3.15-1.module+el8.4.0+10607+f4da7515.x86_64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:criu-debuginfo-0:3.15-1.module+el8.4.0+10607+f4da7515.aarch64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:criu-debuginfo-0:3.15-1.module+el8.4.0+10607+f4da7515.ppc64le", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:criu-debuginfo-0:3.15-1.module+el8.4.0+10607+f4da7515.s390x", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:criu-debuginfo-0:3.15-1.module+el8.4.0+10607+f4da7515.x86_64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:criu-debugsource-0:3.15-1.module+el8.4.0+10607+f4da7515.aarch64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:criu-debugsource-0:3.15-1.module+el8.4.0+10607+f4da7515.ppc64le", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:criu-debugsource-0:3.15-1.module+el8.4.0+10607+f4da7515.s390x", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:criu-debugsource-0:3.15-1.module+el8.4.0+10607+f4da7515.x86_64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:crun-0:0.18-1.module+el8.4.0+10607+f4da7515.aarch64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:crun-0:0.18-1.module+el8.4.0+10607+f4da7515.ppc64le", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:crun-0:0.18-1.module+el8.4.0+10607+f4da7515.s390x", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:crun-0:0.18-1.module+el8.4.0+10607+f4da7515.src", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:crun-0:0.18-1.module+el8.4.0+10607+f4da7515.x86_64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:crun-debuginfo-0:0.18-1.module+el8.4.0+10607+f4da7515.aarch64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:crun-debuginfo-0:0.18-1.module+el8.4.0+10607+f4da7515.ppc64le", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:crun-debuginfo-0:0.18-1.module+el8.4.0+10607+f4da7515.s390x", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:crun-debuginfo-0:0.18-1.module+el8.4.0+10607+f4da7515.x86_64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:crun-debugsource-0:0.18-1.module+el8.4.0+10607+f4da7515.aarch64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:crun-debugsource-0:0.18-1.module+el8.4.0+10607+f4da7515.ppc64le", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:crun-debugsource-0:0.18-1.module+el8.4.0+10607+f4da7515.s390x", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:crun-debugsource-0:0.18-1.module+el8.4.0+10607+f4da7515.x86_64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:fuse-overlayfs-0:1.4.0-2.module+el8.4.0+10607+f4da7515.aarch64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:fuse-overlayfs-0:1.4.0-2.module+el8.4.0+10607+f4da7515.ppc64le", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:fuse-overlayfs-0:1.4.0-2.module+el8.4.0+10607+f4da7515.s390x", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:fuse-overlayfs-0:1.4.0-2.module+el8.4.0+10607+f4da7515.src", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:fuse-overlayfs-0:1.4.0-2.module+el8.4.0+10607+f4da7515.x86_64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:fuse-overlayfs-debuginfo-0:1.4.0-2.module+el8.4.0+10607+f4da7515.aarch64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:fuse-overlayfs-debuginfo-0:1.4.0-2.module+el8.4.0+10607+f4da7515.ppc64le", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:fuse-overlayfs-debuginfo-0:1.4.0-2.module+el8.4.0+10607+f4da7515.s390x", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:fuse-overlayfs-debuginfo-0:1.4.0-2.module+el8.4.0+10607+f4da7515.x86_64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:fuse-overlayfs-debugsource-0:1.4.0-2.module+el8.4.0+10607+f4da7515.aarch64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:fuse-overlayfs-debugsource-0:1.4.0-2.module+el8.4.0+10607+f4da7515.ppc64le", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:fuse-overlayfs-debugsource-0:1.4.0-2.module+el8.4.0+10607+f4da7515.s390x", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:fuse-overlayfs-debugsource-0:1.4.0-2.module+el8.4.0+10607+f4da7515.x86_64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:libslirp-0:4.3.1-1.module+el8.4.0+10607+f4da7515.aarch64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:libslirp-0:4.3.1-1.module+el8.4.0+10607+f4da7515.ppc64le", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:libslirp-0:4.3.1-1.module+el8.4.0+10607+f4da7515.s390x", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:libslirp-0:4.3.1-1.module+el8.4.0+10607+f4da7515.src", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:libslirp-0:4.3.1-1.module+el8.4.0+10607+f4da7515.x86_64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:libslirp-debuginfo-0:4.3.1-1.module+el8.4.0+10607+f4da7515.aarch64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:libslirp-debuginfo-0:4.3.1-1.module+el8.4.0+10607+f4da7515.ppc64le", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:libslirp-debuginfo-0:4.3.1-1.module+el8.4.0+10607+f4da7515.s390x", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:libslirp-debuginfo-0:4.3.1-1.module+el8.4.0+10607+f4da7515.x86_64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:libslirp-debugsource-0:4.3.1-1.module+el8.4.0+10607+f4da7515.aarch64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:libslirp-debugsource-0:4.3.1-1.module+el8.4.0+10607+f4da7515.ppc64le", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:libslirp-debugsource-0:4.3.1-1.module+el8.4.0+10607+f4da7515.s390x", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:libslirp-debugsource-0:4.3.1-1.module+el8.4.0+10607+f4da7515.x86_64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:libslirp-devel-0:4.3.1-1.module+el8.4.0+10607+f4da7515.aarch64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:libslirp-devel-0:4.3.1-1.module+el8.4.0+10607+f4da7515.ppc64le", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:libslirp-devel-0:4.3.1-1.module+el8.4.0+10607+f4da7515.s390x", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:libslirp-devel-0:4.3.1-1.module+el8.4.0+10607+f4da7515.x86_64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:oci-seccomp-bpf-hook-0:1.2.0-2.module+el8.4.0+10607+f4da7515.aarch64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:oci-seccomp-bpf-hook-0:1.2.0-2.module+el8.4.0+10607+f4da7515.ppc64le", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:oci-seccomp-bpf-hook-0:1.2.0-2.module+el8.4.0+10607+f4da7515.s390x", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:oci-seccomp-bpf-hook-0:1.2.0-2.module+el8.4.0+10607+f4da7515.src", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:oci-seccomp-bpf-hook-0:1.2.0-2.module+el8.4.0+10607+f4da7515.x86_64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:oci-seccomp-bpf-hook-debuginfo-0:1.2.0-2.module+el8.4.0+10607+f4da7515.aarch64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:oci-seccomp-bpf-hook-debuginfo-0:1.2.0-2.module+el8.4.0+10607+f4da7515.ppc64le", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:oci-seccomp-bpf-hook-debuginfo-0:1.2.0-2.module+el8.4.0+10607+f4da7515.s390x", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:oci-seccomp-bpf-hook-debuginfo-0:1.2.0-2.module+el8.4.0+10607+f4da7515.x86_64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:oci-seccomp-bpf-hook-debugsource-0:1.2.0-2.module+el8.4.0+10607+f4da7515.aarch64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:oci-seccomp-bpf-hook-debugsource-0:1.2.0-2.module+el8.4.0+10607+f4da7515.ppc64le", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:oci-seccomp-bpf-hook-debugsource-0:1.2.0-2.module+el8.4.0+10607+f4da7515.s390x", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:oci-seccomp-bpf-hook-debugsource-0:1.2.0-2.module+el8.4.0+10607+f4da7515.x86_64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:podman-0:3.0.1-6.module+el8.4.0+10607+f4da7515.aarch64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:podman-0:3.0.1-6.module+el8.4.0+10607+f4da7515.ppc64le", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:podman-0:3.0.1-6.module+el8.4.0+10607+f4da7515.s390x", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:podman-0:3.0.1-6.module+el8.4.0+10607+f4da7515.src", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:podman-0:3.0.1-6.module+el8.4.0+10607+f4da7515.x86_64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:podman-catatonit-0:3.0.1-6.module+el8.4.0+10607+f4da7515.aarch64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:podman-catatonit-0:3.0.1-6.module+el8.4.0+10607+f4da7515.ppc64le", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:podman-catatonit-0:3.0.1-6.module+el8.4.0+10607+f4da7515.s390x", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:podman-catatonit-0:3.0.1-6.module+el8.4.0+10607+f4da7515.x86_64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:podman-catatonit-debuginfo-0:3.0.1-6.module+el8.4.0+10607+f4da7515.aarch64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:podman-catatonit-debuginfo-0:3.0.1-6.module+el8.4.0+10607+f4da7515.ppc64le", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:podman-catatonit-debuginfo-0:3.0.1-6.module+el8.4.0+10607+f4da7515.s390x", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:podman-catatonit-debuginfo-0:3.0.1-6.module+el8.4.0+10607+f4da7515.x86_64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:podman-debuginfo-0:3.0.1-6.module+el8.4.0+10607+f4da7515.aarch64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:podman-debuginfo-0:3.0.1-6.module+el8.4.0+10607+f4da7515.ppc64le", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:podman-debuginfo-0:3.0.1-6.module+el8.4.0+10607+f4da7515.s390x", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:podman-debuginfo-0:3.0.1-6.module+el8.4.0+10607+f4da7515.x86_64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:podman-debugsource-0:3.0.1-6.module+el8.4.0+10607+f4da7515.aarch64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:podman-debugsource-0:3.0.1-6.module+el8.4.0+10607+f4da7515.ppc64le", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:podman-debugsource-0:3.0.1-6.module+el8.4.0+10607+f4da7515.s390x", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:podman-debugsource-0:3.0.1-6.module+el8.4.0+10607+f4da7515.x86_64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:podman-docker-0:3.0.1-6.module+el8.4.0+10607+f4da7515.noarch", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:podman-plugins-0:3.0.1-6.module+el8.4.0+10607+f4da7515.aarch64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:podman-plugins-0:3.0.1-6.module+el8.4.0+10607+f4da7515.ppc64le", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:podman-plugins-0:3.0.1-6.module+el8.4.0+10607+f4da7515.s390x", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:podman-plugins-0:3.0.1-6.module+el8.4.0+10607+f4da7515.x86_64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:podman-plugins-debuginfo-0:3.0.1-6.module+el8.4.0+10607+f4da7515.aarch64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:podman-plugins-debuginfo-0:3.0.1-6.module+el8.4.0+10607+f4da7515.ppc64le", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:podman-plugins-debuginfo-0:3.0.1-6.module+el8.4.0+10607+f4da7515.s390x", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:podman-plugins-debuginfo-0:3.0.1-6.module+el8.4.0+10607+f4da7515.x86_64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:podman-remote-0:3.0.1-6.module+el8.4.0+10607+f4da7515.aarch64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:podman-remote-0:3.0.1-6.module+el8.4.0+10607+f4da7515.ppc64le", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:podman-remote-0:3.0.1-6.module+el8.4.0+10607+f4da7515.s390x", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:podman-remote-0:3.0.1-6.module+el8.4.0+10607+f4da7515.x86_64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:podman-remote-debuginfo-0:3.0.1-6.module+el8.4.0+10607+f4da7515.aarch64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:podman-remote-debuginfo-0:3.0.1-6.module+el8.4.0+10607+f4da7515.ppc64le", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:podman-remote-debuginfo-0:3.0.1-6.module+el8.4.0+10607+f4da7515.s390x", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:podman-remote-debuginfo-0:3.0.1-6.module+el8.4.0+10607+f4da7515.x86_64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:podman-tests-0:3.0.1-6.module+el8.4.0+10607+f4da7515.aarch64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:podman-tests-0:3.0.1-6.module+el8.4.0+10607+f4da7515.ppc64le", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:podman-tests-0:3.0.1-6.module+el8.4.0+10607+f4da7515.s390x", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:podman-tests-0:3.0.1-6.module+el8.4.0+10607+f4da7515.x86_64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:python3-criu-0:3.15-1.module+el8.4.0+10607+f4da7515.aarch64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:python3-criu-0:3.15-1.module+el8.4.0+10607+f4da7515.ppc64le", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:python3-criu-0:3.15-1.module+el8.4.0+10607+f4da7515.s390x", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:python3-criu-0:3.15-1.module+el8.4.0+10607+f4da7515.x86_64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:runc-0:1.0.0-70.rc92.module+el8.4.0+10607+f4da7515.aarch64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:runc-0:1.0.0-70.rc92.module+el8.4.0+10607+f4da7515.ppc64le", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:runc-0:1.0.0-70.rc92.module+el8.4.0+10607+f4da7515.s390x", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:runc-0:1.0.0-70.rc92.module+el8.4.0+10607+f4da7515.src", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:runc-0:1.0.0-70.rc92.module+el8.4.0+10607+f4da7515.x86_64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:runc-debuginfo-0:1.0.0-70.rc92.module+el8.4.0+10607+f4da7515.aarch64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:runc-debuginfo-0:1.0.0-70.rc92.module+el8.4.0+10607+f4da7515.ppc64le", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:runc-debuginfo-0:1.0.0-70.rc92.module+el8.4.0+10607+f4da7515.s390x", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:runc-debuginfo-0:1.0.0-70.rc92.module+el8.4.0+10607+f4da7515.x86_64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:runc-debugsource-0:1.0.0-70.rc92.module+el8.4.0+10607+f4da7515.aarch64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:runc-debugsource-0:1.0.0-70.rc92.module+el8.4.0+10607+f4da7515.ppc64le", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:runc-debugsource-0:1.0.0-70.rc92.module+el8.4.0+10607+f4da7515.s390x", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:runc-debugsource-0:1.0.0-70.rc92.module+el8.4.0+10607+f4da7515.x86_64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:skopeo-1:1.2.2-8.module+el8.4.0+10607+f4da7515.aarch64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:skopeo-1:1.2.2-8.module+el8.4.0+10607+f4da7515.ppc64le", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:skopeo-1:1.2.2-8.module+el8.4.0+10607+f4da7515.s390x", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:skopeo-1:1.2.2-8.module+el8.4.0+10607+f4da7515.src", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:skopeo-1:1.2.2-8.module+el8.4.0+10607+f4da7515.x86_64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:skopeo-debuginfo-1:1.2.2-8.module+el8.4.0+10607+f4da7515.aarch64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:skopeo-debuginfo-1:1.2.2-8.module+el8.4.0+10607+f4da7515.ppc64le", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:skopeo-debuginfo-1:1.2.2-8.module+el8.4.0+10607+f4da7515.s390x", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:skopeo-debuginfo-1:1.2.2-8.module+el8.4.0+10607+f4da7515.x86_64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:skopeo-debugsource-1:1.2.2-8.module+el8.4.0+10607+f4da7515.aarch64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:skopeo-debugsource-1:1.2.2-8.module+el8.4.0+10607+f4da7515.ppc64le", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:skopeo-debugsource-1:1.2.2-8.module+el8.4.0+10607+f4da7515.s390x", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:skopeo-debugsource-1:1.2.2-8.module+el8.4.0+10607+f4da7515.x86_64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:skopeo-tests-1:1.2.2-8.module+el8.4.0+10607+f4da7515.aarch64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:skopeo-tests-1:1.2.2-8.module+el8.4.0+10607+f4da7515.ppc64le", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:skopeo-tests-1:1.2.2-8.module+el8.4.0+10607+f4da7515.s390x", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:skopeo-tests-1:1.2.2-8.module+el8.4.0+10607+f4da7515.x86_64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:slirp4netns-0:1.1.8-1.module+el8.4.0+10607+f4da7515.aarch64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:slirp4netns-0:1.1.8-1.module+el8.4.0+10607+f4da7515.ppc64le", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:slirp4netns-0:1.1.8-1.module+el8.4.0+10607+f4da7515.s390x", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:slirp4netns-0:1.1.8-1.module+el8.4.0+10607+f4da7515.src", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:slirp4netns-0:1.1.8-1.module+el8.4.0+10607+f4da7515.x86_64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:slirp4netns-debuginfo-0:1.1.8-1.module+el8.4.0+10607+f4da7515.aarch64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:slirp4netns-debuginfo-0:1.1.8-1.module+el8.4.0+10607+f4da7515.ppc64le", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:slirp4netns-debuginfo-0:1.1.8-1.module+el8.4.0+10607+f4da7515.s390x", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:slirp4netns-debuginfo-0:1.1.8-1.module+el8.4.0+10607+f4da7515.x86_64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:slirp4netns-debugsource-0:1.1.8-1.module+el8.4.0+10607+f4da7515.aarch64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:slirp4netns-debugsource-0:1.1.8-1.module+el8.4.0+10607+f4da7515.ppc64le", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:slirp4netns-debugsource-0:1.1.8-1.module+el8.4.0+10607+f4da7515.s390x", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:slirp4netns-debugsource-0:1.1.8-1.module+el8.4.0+10607+f4da7515.x86_64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:toolbox-0:0.0.8-1.module+el8.4.0+10607+f4da7515.noarch", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:toolbox-0:0.0.8-1.module+el8.4.0+10607+f4da7515.src", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:udica-0:0.2.4-1.module+el8.4.0+10607+f4da7515.noarch", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:udica-0:0.2.4-1.module+el8.4.0+10607+f4da7515.src" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "golang: crypto/ssh: crafted authentication request can lead to nil pointer dereference" }, { "cve": "CVE-2021-20199", "cwe": { "id": "CWE-346", "name": "Origin Validation Error" }, "discovery_date": "2021-01-21T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1919050" } ], "notes": [ { "category": "description", "text": "A flaw was found in podman. Rootless containers receive all traffic with a source IP address of 127.0.0.1 (including from remote hosts) which impact containerized applications that trust localhost (127.0.01) connections by default and do not require authentication. The highest threat from this vulnerability is to data integrity.", "title": "Vulnerability description" }, { "category": "summary", "text": "podman: Remote traffic to rootless containers is seen as orginating from localhost", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue does not affect Podman prior to version 1.8.0. Podman shipped in the following products are therefore not affected:\n\n* Red Hat Enterprise Linux 7 Extras\n* Red Hat Enterprise Linux 8 Container Tools stream 1.0\n* Red Hat Enterprise Linux 8 Container Tools stream 2.0\n* OpenShift Container Platform 3.11\n* OpenShift Container Platform 4.1 to 4.5", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:buildah-0:1.19.7-1.module+el8.4.0+10607+f4da7515.aarch64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:buildah-0:1.19.7-1.module+el8.4.0+10607+f4da7515.ppc64le", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:buildah-0:1.19.7-1.module+el8.4.0+10607+f4da7515.s390x", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:buildah-0:1.19.7-1.module+el8.4.0+10607+f4da7515.src", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:buildah-0:1.19.7-1.module+el8.4.0+10607+f4da7515.x86_64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:buildah-debuginfo-0:1.19.7-1.module+el8.4.0+10607+f4da7515.aarch64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:buildah-debuginfo-0:1.19.7-1.module+el8.4.0+10607+f4da7515.ppc64le", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:buildah-debuginfo-0:1.19.7-1.module+el8.4.0+10607+f4da7515.s390x", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:buildah-debuginfo-0:1.19.7-1.module+el8.4.0+10607+f4da7515.x86_64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:buildah-debugsource-0:1.19.7-1.module+el8.4.0+10607+f4da7515.aarch64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:buildah-debugsource-0:1.19.7-1.module+el8.4.0+10607+f4da7515.ppc64le", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:buildah-debugsource-0:1.19.7-1.module+el8.4.0+10607+f4da7515.s390x", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:buildah-debugsource-0:1.19.7-1.module+el8.4.0+10607+f4da7515.x86_64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:buildah-tests-0:1.19.7-1.module+el8.4.0+10607+f4da7515.aarch64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:buildah-tests-0:1.19.7-1.module+el8.4.0+10607+f4da7515.ppc64le", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:buildah-tests-0:1.19.7-1.module+el8.4.0+10607+f4da7515.s390x", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:buildah-tests-0:1.19.7-1.module+el8.4.0+10607+f4da7515.x86_64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:buildah-tests-debuginfo-0:1.19.7-1.module+el8.4.0+10607+f4da7515.aarch64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:buildah-tests-debuginfo-0:1.19.7-1.module+el8.4.0+10607+f4da7515.ppc64le", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:buildah-tests-debuginfo-0:1.19.7-1.module+el8.4.0+10607+f4da7515.s390x", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:buildah-tests-debuginfo-0:1.19.7-1.module+el8.4.0+10607+f4da7515.x86_64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:cockpit-podman-0:29-2.module+el8.4.0+10607+f4da7515.noarch", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:cockpit-podman-0:29-2.module+el8.4.0+10607+f4da7515.src", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:conmon-2:2.0.26-1.module+el8.4.0+10607+f4da7515.aarch64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:conmon-2:2.0.26-1.module+el8.4.0+10607+f4da7515.ppc64le", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:conmon-2:2.0.26-1.module+el8.4.0+10607+f4da7515.s390x", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:conmon-2:2.0.26-1.module+el8.4.0+10607+f4da7515.src", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:conmon-2:2.0.26-1.module+el8.4.0+10607+f4da7515.x86_64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:conmon-debuginfo-2:2.0.26-1.module+el8.4.0+10607+f4da7515.aarch64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:conmon-debuginfo-2:2.0.26-1.module+el8.4.0+10607+f4da7515.ppc64le", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:conmon-debuginfo-2:2.0.26-1.module+el8.4.0+10607+f4da7515.s390x", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:conmon-debuginfo-2:2.0.26-1.module+el8.4.0+10607+f4da7515.x86_64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:conmon-debugsource-2:2.0.26-1.module+el8.4.0+10607+f4da7515.aarch64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:conmon-debugsource-2:2.0.26-1.module+el8.4.0+10607+f4da7515.ppc64le", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:conmon-debugsource-2:2.0.26-1.module+el8.4.0+10607+f4da7515.s390x", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:conmon-debugsource-2:2.0.26-1.module+el8.4.0+10607+f4da7515.x86_64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:container-selinux-2:2.158.0-1.module+el8.4.0+10607+f4da7515.noarch", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:container-selinux-2:2.158.0-1.module+el8.4.0+10607+f4da7515.src", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:containernetworking-plugins-0:0.9.1-1.module+el8.4.0+10607+f4da7515.aarch64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:containernetworking-plugins-0:0.9.1-1.module+el8.4.0+10607+f4da7515.ppc64le", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:containernetworking-plugins-0:0.9.1-1.module+el8.4.0+10607+f4da7515.s390x", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:containernetworking-plugins-0:0.9.1-1.module+el8.4.0+10607+f4da7515.src", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:containernetworking-plugins-0:0.9.1-1.module+el8.4.0+10607+f4da7515.x86_64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:containernetworking-plugins-debuginfo-0:0.9.1-1.module+el8.4.0+10607+f4da7515.aarch64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:containernetworking-plugins-debuginfo-0:0.9.1-1.module+el8.4.0+10607+f4da7515.ppc64le", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:containernetworking-plugins-debuginfo-0:0.9.1-1.module+el8.4.0+10607+f4da7515.s390x", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:containernetworking-plugins-debuginfo-0:0.9.1-1.module+el8.4.0+10607+f4da7515.x86_64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:containernetworking-plugins-debugsource-0:0.9.1-1.module+el8.4.0+10607+f4da7515.aarch64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:containernetworking-plugins-debugsource-0:0.9.1-1.module+el8.4.0+10607+f4da7515.ppc64le", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:containernetworking-plugins-debugsource-0:0.9.1-1.module+el8.4.0+10607+f4da7515.s390x", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:containernetworking-plugins-debugsource-0:0.9.1-1.module+el8.4.0+10607+f4da7515.x86_64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:containers-common-1:1.2.2-8.module+el8.4.0+10607+f4da7515.aarch64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:containers-common-1:1.2.2-8.module+el8.4.0+10607+f4da7515.ppc64le", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:containers-common-1:1.2.2-8.module+el8.4.0+10607+f4da7515.s390x", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:containers-common-1:1.2.2-8.module+el8.4.0+10607+f4da7515.x86_64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:crit-0:3.15-1.module+el8.4.0+10607+f4da7515.aarch64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:crit-0:3.15-1.module+el8.4.0+10607+f4da7515.ppc64le", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:crit-0:3.15-1.module+el8.4.0+10607+f4da7515.s390x", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:crit-0:3.15-1.module+el8.4.0+10607+f4da7515.x86_64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:criu-0:3.15-1.module+el8.4.0+10607+f4da7515.aarch64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:criu-0:3.15-1.module+el8.4.0+10607+f4da7515.ppc64le", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:criu-0:3.15-1.module+el8.4.0+10607+f4da7515.s390x", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:criu-0:3.15-1.module+el8.4.0+10607+f4da7515.src", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:criu-0:3.15-1.module+el8.4.0+10607+f4da7515.x86_64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:criu-debuginfo-0:3.15-1.module+el8.4.0+10607+f4da7515.aarch64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:criu-debuginfo-0:3.15-1.module+el8.4.0+10607+f4da7515.ppc64le", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:criu-debuginfo-0:3.15-1.module+el8.4.0+10607+f4da7515.s390x", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:criu-debuginfo-0:3.15-1.module+el8.4.0+10607+f4da7515.x86_64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:criu-debugsource-0:3.15-1.module+el8.4.0+10607+f4da7515.aarch64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:criu-debugsource-0:3.15-1.module+el8.4.0+10607+f4da7515.ppc64le", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:criu-debugsource-0:3.15-1.module+el8.4.0+10607+f4da7515.s390x", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:criu-debugsource-0:3.15-1.module+el8.4.0+10607+f4da7515.x86_64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:crun-0:0.18-1.module+el8.4.0+10607+f4da7515.aarch64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:crun-0:0.18-1.module+el8.4.0+10607+f4da7515.ppc64le", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:crun-0:0.18-1.module+el8.4.0+10607+f4da7515.s390x", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:crun-0:0.18-1.module+el8.4.0+10607+f4da7515.src", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:crun-0:0.18-1.module+el8.4.0+10607+f4da7515.x86_64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:crun-debuginfo-0:0.18-1.module+el8.4.0+10607+f4da7515.aarch64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:crun-debuginfo-0:0.18-1.module+el8.4.0+10607+f4da7515.ppc64le", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:crun-debuginfo-0:0.18-1.module+el8.4.0+10607+f4da7515.s390x", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:crun-debuginfo-0:0.18-1.module+el8.4.0+10607+f4da7515.x86_64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:crun-debugsource-0:0.18-1.module+el8.4.0+10607+f4da7515.aarch64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:crun-debugsource-0:0.18-1.module+el8.4.0+10607+f4da7515.ppc64le", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:crun-debugsource-0:0.18-1.module+el8.4.0+10607+f4da7515.s390x", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:crun-debugsource-0:0.18-1.module+el8.4.0+10607+f4da7515.x86_64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:fuse-overlayfs-0:1.4.0-2.module+el8.4.0+10607+f4da7515.aarch64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:fuse-overlayfs-0:1.4.0-2.module+el8.4.0+10607+f4da7515.ppc64le", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:fuse-overlayfs-0:1.4.0-2.module+el8.4.0+10607+f4da7515.s390x", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:fuse-overlayfs-0:1.4.0-2.module+el8.4.0+10607+f4da7515.src", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:fuse-overlayfs-0:1.4.0-2.module+el8.4.0+10607+f4da7515.x86_64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:fuse-overlayfs-debuginfo-0:1.4.0-2.module+el8.4.0+10607+f4da7515.aarch64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:fuse-overlayfs-debuginfo-0:1.4.0-2.module+el8.4.0+10607+f4da7515.ppc64le", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:fuse-overlayfs-debuginfo-0:1.4.0-2.module+el8.4.0+10607+f4da7515.s390x", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:fuse-overlayfs-debuginfo-0:1.4.0-2.module+el8.4.0+10607+f4da7515.x86_64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:fuse-overlayfs-debugsource-0:1.4.0-2.module+el8.4.0+10607+f4da7515.aarch64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:fuse-overlayfs-debugsource-0:1.4.0-2.module+el8.4.0+10607+f4da7515.ppc64le", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:fuse-overlayfs-debugsource-0:1.4.0-2.module+el8.4.0+10607+f4da7515.s390x", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:fuse-overlayfs-debugsource-0:1.4.0-2.module+el8.4.0+10607+f4da7515.x86_64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:libslirp-0:4.3.1-1.module+el8.4.0+10607+f4da7515.aarch64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:libslirp-0:4.3.1-1.module+el8.4.0+10607+f4da7515.ppc64le", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:libslirp-0:4.3.1-1.module+el8.4.0+10607+f4da7515.s390x", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:libslirp-0:4.3.1-1.module+el8.4.0+10607+f4da7515.src", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:libslirp-0:4.3.1-1.module+el8.4.0+10607+f4da7515.x86_64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:libslirp-debuginfo-0:4.3.1-1.module+el8.4.0+10607+f4da7515.aarch64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:libslirp-debuginfo-0:4.3.1-1.module+el8.4.0+10607+f4da7515.ppc64le", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:libslirp-debuginfo-0:4.3.1-1.module+el8.4.0+10607+f4da7515.s390x", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:libslirp-debuginfo-0:4.3.1-1.module+el8.4.0+10607+f4da7515.x86_64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:libslirp-debugsource-0:4.3.1-1.module+el8.4.0+10607+f4da7515.aarch64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:libslirp-debugsource-0:4.3.1-1.module+el8.4.0+10607+f4da7515.ppc64le", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:libslirp-debugsource-0:4.3.1-1.module+el8.4.0+10607+f4da7515.s390x", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:libslirp-debugsource-0:4.3.1-1.module+el8.4.0+10607+f4da7515.x86_64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:libslirp-devel-0:4.3.1-1.module+el8.4.0+10607+f4da7515.aarch64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:libslirp-devel-0:4.3.1-1.module+el8.4.0+10607+f4da7515.ppc64le", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:libslirp-devel-0:4.3.1-1.module+el8.4.0+10607+f4da7515.s390x", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:libslirp-devel-0:4.3.1-1.module+el8.4.0+10607+f4da7515.x86_64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:oci-seccomp-bpf-hook-0:1.2.0-2.module+el8.4.0+10607+f4da7515.aarch64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:oci-seccomp-bpf-hook-0:1.2.0-2.module+el8.4.0+10607+f4da7515.ppc64le", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:oci-seccomp-bpf-hook-0:1.2.0-2.module+el8.4.0+10607+f4da7515.s390x", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:oci-seccomp-bpf-hook-0:1.2.0-2.module+el8.4.0+10607+f4da7515.src", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:oci-seccomp-bpf-hook-0:1.2.0-2.module+el8.4.0+10607+f4da7515.x86_64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:oci-seccomp-bpf-hook-debuginfo-0:1.2.0-2.module+el8.4.0+10607+f4da7515.aarch64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:oci-seccomp-bpf-hook-debuginfo-0:1.2.0-2.module+el8.4.0+10607+f4da7515.ppc64le", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:oci-seccomp-bpf-hook-debuginfo-0:1.2.0-2.module+el8.4.0+10607+f4da7515.s390x", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:oci-seccomp-bpf-hook-debuginfo-0:1.2.0-2.module+el8.4.0+10607+f4da7515.x86_64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:oci-seccomp-bpf-hook-debugsource-0:1.2.0-2.module+el8.4.0+10607+f4da7515.aarch64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:oci-seccomp-bpf-hook-debugsource-0:1.2.0-2.module+el8.4.0+10607+f4da7515.ppc64le", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:oci-seccomp-bpf-hook-debugsource-0:1.2.0-2.module+el8.4.0+10607+f4da7515.s390x", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:oci-seccomp-bpf-hook-debugsource-0:1.2.0-2.module+el8.4.0+10607+f4da7515.x86_64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:podman-0:3.0.1-6.module+el8.4.0+10607+f4da7515.aarch64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:podman-0:3.0.1-6.module+el8.4.0+10607+f4da7515.ppc64le", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:podman-0:3.0.1-6.module+el8.4.0+10607+f4da7515.s390x", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:podman-0:3.0.1-6.module+el8.4.0+10607+f4da7515.src", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:podman-0:3.0.1-6.module+el8.4.0+10607+f4da7515.x86_64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:podman-catatonit-0:3.0.1-6.module+el8.4.0+10607+f4da7515.aarch64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:podman-catatonit-0:3.0.1-6.module+el8.4.0+10607+f4da7515.ppc64le", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:podman-catatonit-0:3.0.1-6.module+el8.4.0+10607+f4da7515.s390x", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:podman-catatonit-0:3.0.1-6.module+el8.4.0+10607+f4da7515.x86_64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:podman-catatonit-debuginfo-0:3.0.1-6.module+el8.4.0+10607+f4da7515.aarch64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:podman-catatonit-debuginfo-0:3.0.1-6.module+el8.4.0+10607+f4da7515.ppc64le", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:podman-catatonit-debuginfo-0:3.0.1-6.module+el8.4.0+10607+f4da7515.s390x", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:podman-catatonit-debuginfo-0:3.0.1-6.module+el8.4.0+10607+f4da7515.x86_64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:podman-debuginfo-0:3.0.1-6.module+el8.4.0+10607+f4da7515.aarch64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:podman-debuginfo-0:3.0.1-6.module+el8.4.0+10607+f4da7515.ppc64le", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:podman-debuginfo-0:3.0.1-6.module+el8.4.0+10607+f4da7515.s390x", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:podman-debuginfo-0:3.0.1-6.module+el8.4.0+10607+f4da7515.x86_64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:podman-debugsource-0:3.0.1-6.module+el8.4.0+10607+f4da7515.aarch64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:podman-debugsource-0:3.0.1-6.module+el8.4.0+10607+f4da7515.ppc64le", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:podman-debugsource-0:3.0.1-6.module+el8.4.0+10607+f4da7515.s390x", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:podman-debugsource-0:3.0.1-6.module+el8.4.0+10607+f4da7515.x86_64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:podman-docker-0:3.0.1-6.module+el8.4.0+10607+f4da7515.noarch", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:podman-plugins-0:3.0.1-6.module+el8.4.0+10607+f4da7515.aarch64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:podman-plugins-0:3.0.1-6.module+el8.4.0+10607+f4da7515.ppc64le", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:podman-plugins-0:3.0.1-6.module+el8.4.0+10607+f4da7515.s390x", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:podman-plugins-0:3.0.1-6.module+el8.4.0+10607+f4da7515.x86_64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:podman-plugins-debuginfo-0:3.0.1-6.module+el8.4.0+10607+f4da7515.aarch64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:podman-plugins-debuginfo-0:3.0.1-6.module+el8.4.0+10607+f4da7515.ppc64le", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:podman-plugins-debuginfo-0:3.0.1-6.module+el8.4.0+10607+f4da7515.s390x", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:podman-plugins-debuginfo-0:3.0.1-6.module+el8.4.0+10607+f4da7515.x86_64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:podman-remote-0:3.0.1-6.module+el8.4.0+10607+f4da7515.aarch64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:podman-remote-0:3.0.1-6.module+el8.4.0+10607+f4da7515.ppc64le", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:podman-remote-0:3.0.1-6.module+el8.4.0+10607+f4da7515.s390x", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:podman-remote-0:3.0.1-6.module+el8.4.0+10607+f4da7515.x86_64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:podman-remote-debuginfo-0:3.0.1-6.module+el8.4.0+10607+f4da7515.aarch64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:podman-remote-debuginfo-0:3.0.1-6.module+el8.4.0+10607+f4da7515.ppc64le", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:podman-remote-debuginfo-0:3.0.1-6.module+el8.4.0+10607+f4da7515.s390x", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:podman-remote-debuginfo-0:3.0.1-6.module+el8.4.0+10607+f4da7515.x86_64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:podman-tests-0:3.0.1-6.module+el8.4.0+10607+f4da7515.aarch64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:podman-tests-0:3.0.1-6.module+el8.4.0+10607+f4da7515.ppc64le", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:podman-tests-0:3.0.1-6.module+el8.4.0+10607+f4da7515.s390x", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:podman-tests-0:3.0.1-6.module+el8.4.0+10607+f4da7515.x86_64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:python3-criu-0:3.15-1.module+el8.4.0+10607+f4da7515.aarch64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:python3-criu-0:3.15-1.module+el8.4.0+10607+f4da7515.ppc64le", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:python3-criu-0:3.15-1.module+el8.4.0+10607+f4da7515.s390x", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:python3-criu-0:3.15-1.module+el8.4.0+10607+f4da7515.x86_64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:runc-0:1.0.0-70.rc92.module+el8.4.0+10607+f4da7515.aarch64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:runc-0:1.0.0-70.rc92.module+el8.4.0+10607+f4da7515.ppc64le", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:runc-0:1.0.0-70.rc92.module+el8.4.0+10607+f4da7515.s390x", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:runc-0:1.0.0-70.rc92.module+el8.4.0+10607+f4da7515.src", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:runc-0:1.0.0-70.rc92.module+el8.4.0+10607+f4da7515.x86_64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:runc-debuginfo-0:1.0.0-70.rc92.module+el8.4.0+10607+f4da7515.aarch64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:runc-debuginfo-0:1.0.0-70.rc92.module+el8.4.0+10607+f4da7515.ppc64le", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:runc-debuginfo-0:1.0.0-70.rc92.module+el8.4.0+10607+f4da7515.s390x", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:runc-debuginfo-0:1.0.0-70.rc92.module+el8.4.0+10607+f4da7515.x86_64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:runc-debugsource-0:1.0.0-70.rc92.module+el8.4.0+10607+f4da7515.aarch64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:runc-debugsource-0:1.0.0-70.rc92.module+el8.4.0+10607+f4da7515.ppc64le", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:runc-debugsource-0:1.0.0-70.rc92.module+el8.4.0+10607+f4da7515.s390x", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:runc-debugsource-0:1.0.0-70.rc92.module+el8.4.0+10607+f4da7515.x86_64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:skopeo-1:1.2.2-8.module+el8.4.0+10607+f4da7515.aarch64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:skopeo-1:1.2.2-8.module+el8.4.0+10607+f4da7515.ppc64le", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:skopeo-1:1.2.2-8.module+el8.4.0+10607+f4da7515.s390x", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:skopeo-1:1.2.2-8.module+el8.4.0+10607+f4da7515.src", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:skopeo-1:1.2.2-8.module+el8.4.0+10607+f4da7515.x86_64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:skopeo-debuginfo-1:1.2.2-8.module+el8.4.0+10607+f4da7515.aarch64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:skopeo-debuginfo-1:1.2.2-8.module+el8.4.0+10607+f4da7515.ppc64le", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:skopeo-debuginfo-1:1.2.2-8.module+el8.4.0+10607+f4da7515.s390x", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:skopeo-debuginfo-1:1.2.2-8.module+el8.4.0+10607+f4da7515.x86_64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:skopeo-debugsource-1:1.2.2-8.module+el8.4.0+10607+f4da7515.aarch64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:skopeo-debugsource-1:1.2.2-8.module+el8.4.0+10607+f4da7515.ppc64le", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:skopeo-debugsource-1:1.2.2-8.module+el8.4.0+10607+f4da7515.s390x", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:skopeo-debugsource-1:1.2.2-8.module+el8.4.0+10607+f4da7515.x86_64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:skopeo-tests-1:1.2.2-8.module+el8.4.0+10607+f4da7515.aarch64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:skopeo-tests-1:1.2.2-8.module+el8.4.0+10607+f4da7515.ppc64le", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:skopeo-tests-1:1.2.2-8.module+el8.4.0+10607+f4da7515.s390x", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:skopeo-tests-1:1.2.2-8.module+el8.4.0+10607+f4da7515.x86_64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:slirp4netns-0:1.1.8-1.module+el8.4.0+10607+f4da7515.aarch64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:slirp4netns-0:1.1.8-1.module+el8.4.0+10607+f4da7515.ppc64le", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:slirp4netns-0:1.1.8-1.module+el8.4.0+10607+f4da7515.s390x", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:slirp4netns-0:1.1.8-1.module+el8.4.0+10607+f4da7515.src", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:slirp4netns-0:1.1.8-1.module+el8.4.0+10607+f4da7515.x86_64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:slirp4netns-debuginfo-0:1.1.8-1.module+el8.4.0+10607+f4da7515.aarch64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:slirp4netns-debuginfo-0:1.1.8-1.module+el8.4.0+10607+f4da7515.ppc64le", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:slirp4netns-debuginfo-0:1.1.8-1.module+el8.4.0+10607+f4da7515.s390x", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:slirp4netns-debuginfo-0:1.1.8-1.module+el8.4.0+10607+f4da7515.x86_64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:slirp4netns-debugsource-0:1.1.8-1.module+el8.4.0+10607+f4da7515.aarch64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:slirp4netns-debugsource-0:1.1.8-1.module+el8.4.0+10607+f4da7515.ppc64le", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:slirp4netns-debugsource-0:1.1.8-1.module+el8.4.0+10607+f4da7515.s390x", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:slirp4netns-debugsource-0:1.1.8-1.module+el8.4.0+10607+f4da7515.x86_64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:toolbox-0:0.0.8-1.module+el8.4.0+10607+f4da7515.noarch", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:toolbox-0:0.0.8-1.module+el8.4.0+10607+f4da7515.src", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:udica-0:0.2.4-1.module+el8.4.0+10607+f4da7515.noarch", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:udica-0:0.2.4-1.module+el8.4.0+10607+f4da7515.src" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-20199" }, { "category": "external", "summary": "RHBZ#1919050", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1919050" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-20199", "url": "https://www.cve.org/CVERecord?id=CVE-2021-20199" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-20199", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-20199" } ], "release_date": "2021-01-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:buildah-0:1.19.7-1.module+el8.4.0+10607+f4da7515.aarch64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:buildah-0:1.19.7-1.module+el8.4.0+10607+f4da7515.ppc64le", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:buildah-0:1.19.7-1.module+el8.4.0+10607+f4da7515.s390x", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:buildah-0:1.19.7-1.module+el8.4.0+10607+f4da7515.src", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:buildah-0:1.19.7-1.module+el8.4.0+10607+f4da7515.x86_64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:buildah-debuginfo-0:1.19.7-1.module+el8.4.0+10607+f4da7515.aarch64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:buildah-debuginfo-0:1.19.7-1.module+el8.4.0+10607+f4da7515.ppc64le", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:buildah-debuginfo-0:1.19.7-1.module+el8.4.0+10607+f4da7515.s390x", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:buildah-debuginfo-0:1.19.7-1.module+el8.4.0+10607+f4da7515.x86_64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:buildah-debugsource-0:1.19.7-1.module+el8.4.0+10607+f4da7515.aarch64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:buildah-debugsource-0:1.19.7-1.module+el8.4.0+10607+f4da7515.ppc64le", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:buildah-debugsource-0:1.19.7-1.module+el8.4.0+10607+f4da7515.s390x", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:buildah-debugsource-0:1.19.7-1.module+el8.4.0+10607+f4da7515.x86_64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:buildah-tests-0:1.19.7-1.module+el8.4.0+10607+f4da7515.aarch64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:buildah-tests-0:1.19.7-1.module+el8.4.0+10607+f4da7515.ppc64le", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:buildah-tests-0:1.19.7-1.module+el8.4.0+10607+f4da7515.s390x", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:buildah-tests-0:1.19.7-1.module+el8.4.0+10607+f4da7515.x86_64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:buildah-tests-debuginfo-0:1.19.7-1.module+el8.4.0+10607+f4da7515.aarch64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:buildah-tests-debuginfo-0:1.19.7-1.module+el8.4.0+10607+f4da7515.ppc64le", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:buildah-tests-debuginfo-0:1.19.7-1.module+el8.4.0+10607+f4da7515.s390x", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:buildah-tests-debuginfo-0:1.19.7-1.module+el8.4.0+10607+f4da7515.x86_64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:cockpit-podman-0:29-2.module+el8.4.0+10607+f4da7515.noarch", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:cockpit-podman-0:29-2.module+el8.4.0+10607+f4da7515.src", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:conmon-2:2.0.26-1.module+el8.4.0+10607+f4da7515.aarch64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:conmon-2:2.0.26-1.module+el8.4.0+10607+f4da7515.ppc64le", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:conmon-2:2.0.26-1.module+el8.4.0+10607+f4da7515.s390x", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:conmon-2:2.0.26-1.module+el8.4.0+10607+f4da7515.src", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:conmon-2:2.0.26-1.module+el8.4.0+10607+f4da7515.x86_64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:conmon-debuginfo-2:2.0.26-1.module+el8.4.0+10607+f4da7515.aarch64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:conmon-debuginfo-2:2.0.26-1.module+el8.4.0+10607+f4da7515.ppc64le", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:conmon-debuginfo-2:2.0.26-1.module+el8.4.0+10607+f4da7515.s390x", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:conmon-debuginfo-2:2.0.26-1.module+el8.4.0+10607+f4da7515.x86_64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:conmon-debugsource-2:2.0.26-1.module+el8.4.0+10607+f4da7515.aarch64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:conmon-debugsource-2:2.0.26-1.module+el8.4.0+10607+f4da7515.ppc64le", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:conmon-debugsource-2:2.0.26-1.module+el8.4.0+10607+f4da7515.s390x", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:conmon-debugsource-2:2.0.26-1.module+el8.4.0+10607+f4da7515.x86_64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:container-selinux-2:2.158.0-1.module+el8.4.0+10607+f4da7515.noarch", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:container-selinux-2:2.158.0-1.module+el8.4.0+10607+f4da7515.src", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:containernetworking-plugins-0:0.9.1-1.module+el8.4.0+10607+f4da7515.aarch64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:containernetworking-plugins-0:0.9.1-1.module+el8.4.0+10607+f4da7515.ppc64le", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:containernetworking-plugins-0:0.9.1-1.module+el8.4.0+10607+f4da7515.s390x", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:containernetworking-plugins-0:0.9.1-1.module+el8.4.0+10607+f4da7515.src", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:containernetworking-plugins-0:0.9.1-1.module+el8.4.0+10607+f4da7515.x86_64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:containernetworking-plugins-debuginfo-0:0.9.1-1.module+el8.4.0+10607+f4da7515.aarch64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:containernetworking-plugins-debuginfo-0:0.9.1-1.module+el8.4.0+10607+f4da7515.ppc64le", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:containernetworking-plugins-debuginfo-0:0.9.1-1.module+el8.4.0+10607+f4da7515.s390x", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:containernetworking-plugins-debuginfo-0:0.9.1-1.module+el8.4.0+10607+f4da7515.x86_64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:containernetworking-plugins-debugsource-0:0.9.1-1.module+el8.4.0+10607+f4da7515.aarch64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:containernetworking-plugins-debugsource-0:0.9.1-1.module+el8.4.0+10607+f4da7515.ppc64le", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:containernetworking-plugins-debugsource-0:0.9.1-1.module+el8.4.0+10607+f4da7515.s390x", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:containernetworking-plugins-debugsource-0:0.9.1-1.module+el8.4.0+10607+f4da7515.x86_64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:containers-common-1:1.2.2-8.module+el8.4.0+10607+f4da7515.aarch64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:containers-common-1:1.2.2-8.module+el8.4.0+10607+f4da7515.ppc64le", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:containers-common-1:1.2.2-8.module+el8.4.0+10607+f4da7515.s390x", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:containers-common-1:1.2.2-8.module+el8.4.0+10607+f4da7515.x86_64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:crit-0:3.15-1.module+el8.4.0+10607+f4da7515.aarch64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:crit-0:3.15-1.module+el8.4.0+10607+f4da7515.ppc64le", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:crit-0:3.15-1.module+el8.4.0+10607+f4da7515.s390x", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:crit-0:3.15-1.module+el8.4.0+10607+f4da7515.x86_64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:criu-0:3.15-1.module+el8.4.0+10607+f4da7515.aarch64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:criu-0:3.15-1.module+el8.4.0+10607+f4da7515.ppc64le", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:criu-0:3.15-1.module+el8.4.0+10607+f4da7515.s390x", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:criu-0:3.15-1.module+el8.4.0+10607+f4da7515.src", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:criu-0:3.15-1.module+el8.4.0+10607+f4da7515.x86_64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:criu-debuginfo-0:3.15-1.module+el8.4.0+10607+f4da7515.aarch64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:criu-debuginfo-0:3.15-1.module+el8.4.0+10607+f4da7515.ppc64le", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:criu-debuginfo-0:3.15-1.module+el8.4.0+10607+f4da7515.s390x", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:criu-debuginfo-0:3.15-1.module+el8.4.0+10607+f4da7515.x86_64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:criu-debugsource-0:3.15-1.module+el8.4.0+10607+f4da7515.aarch64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:criu-debugsource-0:3.15-1.module+el8.4.0+10607+f4da7515.ppc64le", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:criu-debugsource-0:3.15-1.module+el8.4.0+10607+f4da7515.s390x", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:criu-debugsource-0:3.15-1.module+el8.4.0+10607+f4da7515.x86_64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:crun-0:0.18-1.module+el8.4.0+10607+f4da7515.aarch64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:crun-0:0.18-1.module+el8.4.0+10607+f4da7515.ppc64le", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:crun-0:0.18-1.module+el8.4.0+10607+f4da7515.s390x", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:crun-0:0.18-1.module+el8.4.0+10607+f4da7515.src", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:crun-0:0.18-1.module+el8.4.0+10607+f4da7515.x86_64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:crun-debuginfo-0:0.18-1.module+el8.4.0+10607+f4da7515.aarch64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:crun-debuginfo-0:0.18-1.module+el8.4.0+10607+f4da7515.ppc64le", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:crun-debuginfo-0:0.18-1.module+el8.4.0+10607+f4da7515.s390x", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:crun-debuginfo-0:0.18-1.module+el8.4.0+10607+f4da7515.x86_64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:crun-debugsource-0:0.18-1.module+el8.4.0+10607+f4da7515.aarch64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:crun-debugsource-0:0.18-1.module+el8.4.0+10607+f4da7515.ppc64le", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:crun-debugsource-0:0.18-1.module+el8.4.0+10607+f4da7515.s390x", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:crun-debugsource-0:0.18-1.module+el8.4.0+10607+f4da7515.x86_64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:fuse-overlayfs-0:1.4.0-2.module+el8.4.0+10607+f4da7515.aarch64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:fuse-overlayfs-0:1.4.0-2.module+el8.4.0+10607+f4da7515.ppc64le", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:fuse-overlayfs-0:1.4.0-2.module+el8.4.0+10607+f4da7515.s390x", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:fuse-overlayfs-0:1.4.0-2.module+el8.4.0+10607+f4da7515.src", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:fuse-overlayfs-0:1.4.0-2.module+el8.4.0+10607+f4da7515.x86_64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:fuse-overlayfs-debuginfo-0:1.4.0-2.module+el8.4.0+10607+f4da7515.aarch64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:fuse-overlayfs-debuginfo-0:1.4.0-2.module+el8.4.0+10607+f4da7515.ppc64le", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:fuse-overlayfs-debuginfo-0:1.4.0-2.module+el8.4.0+10607+f4da7515.s390x", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:fuse-overlayfs-debuginfo-0:1.4.0-2.module+el8.4.0+10607+f4da7515.x86_64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:fuse-overlayfs-debugsource-0:1.4.0-2.module+el8.4.0+10607+f4da7515.aarch64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:fuse-overlayfs-debugsource-0:1.4.0-2.module+el8.4.0+10607+f4da7515.ppc64le", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:fuse-overlayfs-debugsource-0:1.4.0-2.module+el8.4.0+10607+f4da7515.s390x", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:fuse-overlayfs-debugsource-0:1.4.0-2.module+el8.4.0+10607+f4da7515.x86_64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:libslirp-0:4.3.1-1.module+el8.4.0+10607+f4da7515.aarch64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:libslirp-0:4.3.1-1.module+el8.4.0+10607+f4da7515.ppc64le", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:libslirp-0:4.3.1-1.module+el8.4.0+10607+f4da7515.s390x", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:libslirp-0:4.3.1-1.module+el8.4.0+10607+f4da7515.src", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:libslirp-0:4.3.1-1.module+el8.4.0+10607+f4da7515.x86_64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:libslirp-debuginfo-0:4.3.1-1.module+el8.4.0+10607+f4da7515.aarch64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:libslirp-debuginfo-0:4.3.1-1.module+el8.4.0+10607+f4da7515.ppc64le", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:libslirp-debuginfo-0:4.3.1-1.module+el8.4.0+10607+f4da7515.s390x", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:libslirp-debuginfo-0:4.3.1-1.module+el8.4.0+10607+f4da7515.x86_64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:libslirp-debugsource-0:4.3.1-1.module+el8.4.0+10607+f4da7515.aarch64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:libslirp-debugsource-0:4.3.1-1.module+el8.4.0+10607+f4da7515.ppc64le", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:libslirp-debugsource-0:4.3.1-1.module+el8.4.0+10607+f4da7515.s390x", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:libslirp-debugsource-0:4.3.1-1.module+el8.4.0+10607+f4da7515.x86_64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:libslirp-devel-0:4.3.1-1.module+el8.4.0+10607+f4da7515.aarch64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:libslirp-devel-0:4.3.1-1.module+el8.4.0+10607+f4da7515.ppc64le", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:libslirp-devel-0:4.3.1-1.module+el8.4.0+10607+f4da7515.s390x", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:libslirp-devel-0:4.3.1-1.module+el8.4.0+10607+f4da7515.x86_64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:oci-seccomp-bpf-hook-0:1.2.0-2.module+el8.4.0+10607+f4da7515.aarch64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:oci-seccomp-bpf-hook-0:1.2.0-2.module+el8.4.0+10607+f4da7515.ppc64le", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:oci-seccomp-bpf-hook-0:1.2.0-2.module+el8.4.0+10607+f4da7515.s390x", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:oci-seccomp-bpf-hook-0:1.2.0-2.module+el8.4.0+10607+f4da7515.src", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:oci-seccomp-bpf-hook-0:1.2.0-2.module+el8.4.0+10607+f4da7515.x86_64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:oci-seccomp-bpf-hook-debuginfo-0:1.2.0-2.module+el8.4.0+10607+f4da7515.aarch64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:oci-seccomp-bpf-hook-debuginfo-0:1.2.0-2.module+el8.4.0+10607+f4da7515.ppc64le", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:oci-seccomp-bpf-hook-debuginfo-0:1.2.0-2.module+el8.4.0+10607+f4da7515.s390x", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:oci-seccomp-bpf-hook-debuginfo-0:1.2.0-2.module+el8.4.0+10607+f4da7515.x86_64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:oci-seccomp-bpf-hook-debugsource-0:1.2.0-2.module+el8.4.0+10607+f4da7515.aarch64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:oci-seccomp-bpf-hook-debugsource-0:1.2.0-2.module+el8.4.0+10607+f4da7515.ppc64le", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:oci-seccomp-bpf-hook-debugsource-0:1.2.0-2.module+el8.4.0+10607+f4da7515.s390x", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:oci-seccomp-bpf-hook-debugsource-0:1.2.0-2.module+el8.4.0+10607+f4da7515.x86_64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:podman-0:3.0.1-6.module+el8.4.0+10607+f4da7515.aarch64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:podman-0:3.0.1-6.module+el8.4.0+10607+f4da7515.ppc64le", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:podman-0:3.0.1-6.module+el8.4.0+10607+f4da7515.s390x", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:podman-0:3.0.1-6.module+el8.4.0+10607+f4da7515.src", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:podman-0:3.0.1-6.module+el8.4.0+10607+f4da7515.x86_64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:podman-catatonit-0:3.0.1-6.module+el8.4.0+10607+f4da7515.aarch64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:podman-catatonit-0:3.0.1-6.module+el8.4.0+10607+f4da7515.ppc64le", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:podman-catatonit-0:3.0.1-6.module+el8.4.0+10607+f4da7515.s390x", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:podman-catatonit-0:3.0.1-6.module+el8.4.0+10607+f4da7515.x86_64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:podman-catatonit-debuginfo-0:3.0.1-6.module+el8.4.0+10607+f4da7515.aarch64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:podman-catatonit-debuginfo-0:3.0.1-6.module+el8.4.0+10607+f4da7515.ppc64le", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:podman-catatonit-debuginfo-0:3.0.1-6.module+el8.4.0+10607+f4da7515.s390x", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:podman-catatonit-debuginfo-0:3.0.1-6.module+el8.4.0+10607+f4da7515.x86_64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:podman-debuginfo-0:3.0.1-6.module+el8.4.0+10607+f4da7515.aarch64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:podman-debuginfo-0:3.0.1-6.module+el8.4.0+10607+f4da7515.ppc64le", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:podman-debuginfo-0:3.0.1-6.module+el8.4.0+10607+f4da7515.s390x", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:podman-debuginfo-0:3.0.1-6.module+el8.4.0+10607+f4da7515.x86_64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:podman-debugsource-0:3.0.1-6.module+el8.4.0+10607+f4da7515.aarch64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:podman-debugsource-0:3.0.1-6.module+el8.4.0+10607+f4da7515.ppc64le", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:podman-debugsource-0:3.0.1-6.module+el8.4.0+10607+f4da7515.s390x", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:podman-debugsource-0:3.0.1-6.module+el8.4.0+10607+f4da7515.x86_64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:podman-docker-0:3.0.1-6.module+el8.4.0+10607+f4da7515.noarch", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:podman-plugins-0:3.0.1-6.module+el8.4.0+10607+f4da7515.aarch64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:podman-plugins-0:3.0.1-6.module+el8.4.0+10607+f4da7515.ppc64le", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:podman-plugins-0:3.0.1-6.module+el8.4.0+10607+f4da7515.s390x", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:podman-plugins-0:3.0.1-6.module+el8.4.0+10607+f4da7515.x86_64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:podman-plugins-debuginfo-0:3.0.1-6.module+el8.4.0+10607+f4da7515.aarch64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:podman-plugins-debuginfo-0:3.0.1-6.module+el8.4.0+10607+f4da7515.ppc64le", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:podman-plugins-debuginfo-0:3.0.1-6.module+el8.4.0+10607+f4da7515.s390x", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:podman-plugins-debuginfo-0:3.0.1-6.module+el8.4.0+10607+f4da7515.x86_64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:podman-remote-0:3.0.1-6.module+el8.4.0+10607+f4da7515.aarch64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:podman-remote-0:3.0.1-6.module+el8.4.0+10607+f4da7515.ppc64le", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:podman-remote-0:3.0.1-6.module+el8.4.0+10607+f4da7515.s390x", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:podman-remote-0:3.0.1-6.module+el8.4.0+10607+f4da7515.x86_64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:podman-remote-debuginfo-0:3.0.1-6.module+el8.4.0+10607+f4da7515.aarch64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:podman-remote-debuginfo-0:3.0.1-6.module+el8.4.0+10607+f4da7515.ppc64le", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:podman-remote-debuginfo-0:3.0.1-6.module+el8.4.0+10607+f4da7515.s390x", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:podman-remote-debuginfo-0:3.0.1-6.module+el8.4.0+10607+f4da7515.x86_64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:podman-tests-0:3.0.1-6.module+el8.4.0+10607+f4da7515.aarch64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:podman-tests-0:3.0.1-6.module+el8.4.0+10607+f4da7515.ppc64le", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:podman-tests-0:3.0.1-6.module+el8.4.0+10607+f4da7515.s390x", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:podman-tests-0:3.0.1-6.module+el8.4.0+10607+f4da7515.x86_64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:python3-criu-0:3.15-1.module+el8.4.0+10607+f4da7515.aarch64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:python3-criu-0:3.15-1.module+el8.4.0+10607+f4da7515.ppc64le", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:python3-criu-0:3.15-1.module+el8.4.0+10607+f4da7515.s390x", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:python3-criu-0:3.15-1.module+el8.4.0+10607+f4da7515.x86_64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:runc-0:1.0.0-70.rc92.module+el8.4.0+10607+f4da7515.aarch64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:runc-0:1.0.0-70.rc92.module+el8.4.0+10607+f4da7515.ppc64le", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:runc-0:1.0.0-70.rc92.module+el8.4.0+10607+f4da7515.s390x", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:runc-0:1.0.0-70.rc92.module+el8.4.0+10607+f4da7515.src", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:runc-0:1.0.0-70.rc92.module+el8.4.0+10607+f4da7515.x86_64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:runc-debuginfo-0:1.0.0-70.rc92.module+el8.4.0+10607+f4da7515.aarch64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:runc-debuginfo-0:1.0.0-70.rc92.module+el8.4.0+10607+f4da7515.ppc64le", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:runc-debuginfo-0:1.0.0-70.rc92.module+el8.4.0+10607+f4da7515.s390x", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:runc-debuginfo-0:1.0.0-70.rc92.module+el8.4.0+10607+f4da7515.x86_64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:runc-debugsource-0:1.0.0-70.rc92.module+el8.4.0+10607+f4da7515.aarch64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:runc-debugsource-0:1.0.0-70.rc92.module+el8.4.0+10607+f4da7515.ppc64le", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:runc-debugsource-0:1.0.0-70.rc92.module+el8.4.0+10607+f4da7515.s390x", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:runc-debugsource-0:1.0.0-70.rc92.module+el8.4.0+10607+f4da7515.x86_64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:skopeo-1:1.2.2-8.module+el8.4.0+10607+f4da7515.aarch64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:skopeo-1:1.2.2-8.module+el8.4.0+10607+f4da7515.ppc64le", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:skopeo-1:1.2.2-8.module+el8.4.0+10607+f4da7515.s390x", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:skopeo-1:1.2.2-8.module+el8.4.0+10607+f4da7515.src", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:skopeo-1:1.2.2-8.module+el8.4.0+10607+f4da7515.x86_64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:skopeo-debuginfo-1:1.2.2-8.module+el8.4.0+10607+f4da7515.aarch64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:skopeo-debuginfo-1:1.2.2-8.module+el8.4.0+10607+f4da7515.ppc64le", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:skopeo-debuginfo-1:1.2.2-8.module+el8.4.0+10607+f4da7515.s390x", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:skopeo-debuginfo-1:1.2.2-8.module+el8.4.0+10607+f4da7515.x86_64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:skopeo-debugsource-1:1.2.2-8.module+el8.4.0+10607+f4da7515.aarch64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:skopeo-debugsource-1:1.2.2-8.module+el8.4.0+10607+f4da7515.ppc64le", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:skopeo-debugsource-1:1.2.2-8.module+el8.4.0+10607+f4da7515.s390x", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:skopeo-debugsource-1:1.2.2-8.module+el8.4.0+10607+f4da7515.x86_64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:skopeo-tests-1:1.2.2-8.module+el8.4.0+10607+f4da7515.aarch64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:skopeo-tests-1:1.2.2-8.module+el8.4.0+10607+f4da7515.ppc64le", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:skopeo-tests-1:1.2.2-8.module+el8.4.0+10607+f4da7515.s390x", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:skopeo-tests-1:1.2.2-8.module+el8.4.0+10607+f4da7515.x86_64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:slirp4netns-0:1.1.8-1.module+el8.4.0+10607+f4da7515.aarch64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:slirp4netns-0:1.1.8-1.module+el8.4.0+10607+f4da7515.ppc64le", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:slirp4netns-0:1.1.8-1.module+el8.4.0+10607+f4da7515.s390x", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:slirp4netns-0:1.1.8-1.module+el8.4.0+10607+f4da7515.src", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:slirp4netns-0:1.1.8-1.module+el8.4.0+10607+f4da7515.x86_64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:slirp4netns-debuginfo-0:1.1.8-1.module+el8.4.0+10607+f4da7515.aarch64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:slirp4netns-debuginfo-0:1.1.8-1.module+el8.4.0+10607+f4da7515.ppc64le", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:slirp4netns-debuginfo-0:1.1.8-1.module+el8.4.0+10607+f4da7515.s390x", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:slirp4netns-debuginfo-0:1.1.8-1.module+el8.4.0+10607+f4da7515.x86_64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:slirp4netns-debugsource-0:1.1.8-1.module+el8.4.0+10607+f4da7515.aarch64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:slirp4netns-debugsource-0:1.1.8-1.module+el8.4.0+10607+f4da7515.ppc64le", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:slirp4netns-debugsource-0:1.1.8-1.module+el8.4.0+10607+f4da7515.s390x", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:slirp4netns-debugsource-0:1.1.8-1.module+el8.4.0+10607+f4da7515.x86_64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:toolbox-0:0.0.8-1.module+el8.4.0+10607+f4da7515.noarch", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:toolbox-0:0.0.8-1.module+el8.4.0+10607+f4da7515.src", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:udica-0:0.2.4-1.module+el8.4.0+10607+f4da7515.noarch", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:udica-0:0.2.4-1.module+el8.4.0+10607+f4da7515.src" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:1796" }, { "category": "workaround", "details": "Configure containerized applications to require authentication for connections from all sources, including localhost.", "product_ids": [ "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:buildah-0:1.19.7-1.module+el8.4.0+10607+f4da7515.aarch64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:buildah-0:1.19.7-1.module+el8.4.0+10607+f4da7515.ppc64le", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:buildah-0:1.19.7-1.module+el8.4.0+10607+f4da7515.s390x", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:buildah-0:1.19.7-1.module+el8.4.0+10607+f4da7515.src", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:buildah-0:1.19.7-1.module+el8.4.0+10607+f4da7515.x86_64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:buildah-debuginfo-0:1.19.7-1.module+el8.4.0+10607+f4da7515.aarch64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:buildah-debuginfo-0:1.19.7-1.module+el8.4.0+10607+f4da7515.ppc64le", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:buildah-debuginfo-0:1.19.7-1.module+el8.4.0+10607+f4da7515.s390x", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:buildah-debuginfo-0:1.19.7-1.module+el8.4.0+10607+f4da7515.x86_64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:buildah-debugsource-0:1.19.7-1.module+el8.4.0+10607+f4da7515.aarch64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:buildah-debugsource-0:1.19.7-1.module+el8.4.0+10607+f4da7515.ppc64le", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:buildah-debugsource-0:1.19.7-1.module+el8.4.0+10607+f4da7515.s390x", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:buildah-debugsource-0:1.19.7-1.module+el8.4.0+10607+f4da7515.x86_64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:buildah-tests-0:1.19.7-1.module+el8.4.0+10607+f4da7515.aarch64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:buildah-tests-0:1.19.7-1.module+el8.4.0+10607+f4da7515.ppc64le", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:buildah-tests-0:1.19.7-1.module+el8.4.0+10607+f4da7515.s390x", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:buildah-tests-0:1.19.7-1.module+el8.4.0+10607+f4da7515.x86_64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:buildah-tests-debuginfo-0:1.19.7-1.module+el8.4.0+10607+f4da7515.aarch64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:buildah-tests-debuginfo-0:1.19.7-1.module+el8.4.0+10607+f4da7515.ppc64le", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:buildah-tests-debuginfo-0:1.19.7-1.module+el8.4.0+10607+f4da7515.s390x", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:buildah-tests-debuginfo-0:1.19.7-1.module+el8.4.0+10607+f4da7515.x86_64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:cockpit-podman-0:29-2.module+el8.4.0+10607+f4da7515.noarch", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:cockpit-podman-0:29-2.module+el8.4.0+10607+f4da7515.src", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:conmon-2:2.0.26-1.module+el8.4.0+10607+f4da7515.aarch64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:conmon-2:2.0.26-1.module+el8.4.0+10607+f4da7515.ppc64le", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:conmon-2:2.0.26-1.module+el8.4.0+10607+f4da7515.s390x", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:conmon-2:2.0.26-1.module+el8.4.0+10607+f4da7515.src", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:conmon-2:2.0.26-1.module+el8.4.0+10607+f4da7515.x86_64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:conmon-debuginfo-2:2.0.26-1.module+el8.4.0+10607+f4da7515.aarch64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:conmon-debuginfo-2:2.0.26-1.module+el8.4.0+10607+f4da7515.ppc64le", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:conmon-debuginfo-2:2.0.26-1.module+el8.4.0+10607+f4da7515.s390x", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:conmon-debuginfo-2:2.0.26-1.module+el8.4.0+10607+f4da7515.x86_64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:conmon-debugsource-2:2.0.26-1.module+el8.4.0+10607+f4da7515.aarch64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:conmon-debugsource-2:2.0.26-1.module+el8.4.0+10607+f4da7515.ppc64le", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:conmon-debugsource-2:2.0.26-1.module+el8.4.0+10607+f4da7515.s390x", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:conmon-debugsource-2:2.0.26-1.module+el8.4.0+10607+f4da7515.x86_64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:container-selinux-2:2.158.0-1.module+el8.4.0+10607+f4da7515.noarch", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:container-selinux-2:2.158.0-1.module+el8.4.0+10607+f4da7515.src", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:containernetworking-plugins-0:0.9.1-1.module+el8.4.0+10607+f4da7515.aarch64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:containernetworking-plugins-0:0.9.1-1.module+el8.4.0+10607+f4da7515.ppc64le", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:containernetworking-plugins-0:0.9.1-1.module+el8.4.0+10607+f4da7515.s390x", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:containernetworking-plugins-0:0.9.1-1.module+el8.4.0+10607+f4da7515.src", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:containernetworking-plugins-0:0.9.1-1.module+el8.4.0+10607+f4da7515.x86_64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:containernetworking-plugins-debuginfo-0:0.9.1-1.module+el8.4.0+10607+f4da7515.aarch64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:containernetworking-plugins-debuginfo-0:0.9.1-1.module+el8.4.0+10607+f4da7515.ppc64le", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:containernetworking-plugins-debuginfo-0:0.9.1-1.module+el8.4.0+10607+f4da7515.s390x", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:containernetworking-plugins-debuginfo-0:0.9.1-1.module+el8.4.0+10607+f4da7515.x86_64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:containernetworking-plugins-debugsource-0:0.9.1-1.module+el8.4.0+10607+f4da7515.aarch64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:containernetworking-plugins-debugsource-0:0.9.1-1.module+el8.4.0+10607+f4da7515.ppc64le", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:containernetworking-plugins-debugsource-0:0.9.1-1.module+el8.4.0+10607+f4da7515.s390x", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:containernetworking-plugins-debugsource-0:0.9.1-1.module+el8.4.0+10607+f4da7515.x86_64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:containers-common-1:1.2.2-8.module+el8.4.0+10607+f4da7515.aarch64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:containers-common-1:1.2.2-8.module+el8.4.0+10607+f4da7515.ppc64le", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:containers-common-1:1.2.2-8.module+el8.4.0+10607+f4da7515.s390x", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:containers-common-1:1.2.2-8.module+el8.4.0+10607+f4da7515.x86_64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:crit-0:3.15-1.module+el8.4.0+10607+f4da7515.aarch64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:crit-0:3.15-1.module+el8.4.0+10607+f4da7515.ppc64le", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:crit-0:3.15-1.module+el8.4.0+10607+f4da7515.s390x", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:crit-0:3.15-1.module+el8.4.0+10607+f4da7515.x86_64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:criu-0:3.15-1.module+el8.4.0+10607+f4da7515.aarch64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:criu-0:3.15-1.module+el8.4.0+10607+f4da7515.ppc64le", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:criu-0:3.15-1.module+el8.4.0+10607+f4da7515.s390x", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:criu-0:3.15-1.module+el8.4.0+10607+f4da7515.src", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:criu-0:3.15-1.module+el8.4.0+10607+f4da7515.x86_64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:criu-debuginfo-0:3.15-1.module+el8.4.0+10607+f4da7515.aarch64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:criu-debuginfo-0:3.15-1.module+el8.4.0+10607+f4da7515.ppc64le", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:criu-debuginfo-0:3.15-1.module+el8.4.0+10607+f4da7515.s390x", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:criu-debuginfo-0:3.15-1.module+el8.4.0+10607+f4da7515.x86_64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:criu-debugsource-0:3.15-1.module+el8.4.0+10607+f4da7515.aarch64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:criu-debugsource-0:3.15-1.module+el8.4.0+10607+f4da7515.ppc64le", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:criu-debugsource-0:3.15-1.module+el8.4.0+10607+f4da7515.s390x", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:criu-debugsource-0:3.15-1.module+el8.4.0+10607+f4da7515.x86_64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:crun-0:0.18-1.module+el8.4.0+10607+f4da7515.aarch64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:crun-0:0.18-1.module+el8.4.0+10607+f4da7515.ppc64le", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:crun-0:0.18-1.module+el8.4.0+10607+f4da7515.s390x", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:crun-0:0.18-1.module+el8.4.0+10607+f4da7515.src", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:crun-0:0.18-1.module+el8.4.0+10607+f4da7515.x86_64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:crun-debuginfo-0:0.18-1.module+el8.4.0+10607+f4da7515.aarch64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:crun-debuginfo-0:0.18-1.module+el8.4.0+10607+f4da7515.ppc64le", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:crun-debuginfo-0:0.18-1.module+el8.4.0+10607+f4da7515.s390x", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:crun-debuginfo-0:0.18-1.module+el8.4.0+10607+f4da7515.x86_64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:crun-debugsource-0:0.18-1.module+el8.4.0+10607+f4da7515.aarch64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:crun-debugsource-0:0.18-1.module+el8.4.0+10607+f4da7515.ppc64le", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:crun-debugsource-0:0.18-1.module+el8.4.0+10607+f4da7515.s390x", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:crun-debugsource-0:0.18-1.module+el8.4.0+10607+f4da7515.x86_64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:fuse-overlayfs-0:1.4.0-2.module+el8.4.0+10607+f4da7515.aarch64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:fuse-overlayfs-0:1.4.0-2.module+el8.4.0+10607+f4da7515.ppc64le", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:fuse-overlayfs-0:1.4.0-2.module+el8.4.0+10607+f4da7515.s390x", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:fuse-overlayfs-0:1.4.0-2.module+el8.4.0+10607+f4da7515.src", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:fuse-overlayfs-0:1.4.0-2.module+el8.4.0+10607+f4da7515.x86_64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:fuse-overlayfs-debuginfo-0:1.4.0-2.module+el8.4.0+10607+f4da7515.aarch64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:fuse-overlayfs-debuginfo-0:1.4.0-2.module+el8.4.0+10607+f4da7515.ppc64le", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:fuse-overlayfs-debuginfo-0:1.4.0-2.module+el8.4.0+10607+f4da7515.s390x", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:fuse-overlayfs-debuginfo-0:1.4.0-2.module+el8.4.0+10607+f4da7515.x86_64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:fuse-overlayfs-debugsource-0:1.4.0-2.module+el8.4.0+10607+f4da7515.aarch64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:fuse-overlayfs-debugsource-0:1.4.0-2.module+el8.4.0+10607+f4da7515.ppc64le", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:fuse-overlayfs-debugsource-0:1.4.0-2.module+el8.4.0+10607+f4da7515.s390x", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:fuse-overlayfs-debugsource-0:1.4.0-2.module+el8.4.0+10607+f4da7515.x86_64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:libslirp-0:4.3.1-1.module+el8.4.0+10607+f4da7515.aarch64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:libslirp-0:4.3.1-1.module+el8.4.0+10607+f4da7515.ppc64le", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:libslirp-0:4.3.1-1.module+el8.4.0+10607+f4da7515.s390x", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:libslirp-0:4.3.1-1.module+el8.4.0+10607+f4da7515.src", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:libslirp-0:4.3.1-1.module+el8.4.0+10607+f4da7515.x86_64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:libslirp-debuginfo-0:4.3.1-1.module+el8.4.0+10607+f4da7515.aarch64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:libslirp-debuginfo-0:4.3.1-1.module+el8.4.0+10607+f4da7515.ppc64le", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:libslirp-debuginfo-0:4.3.1-1.module+el8.4.0+10607+f4da7515.s390x", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:libslirp-debuginfo-0:4.3.1-1.module+el8.4.0+10607+f4da7515.x86_64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:libslirp-debugsource-0:4.3.1-1.module+el8.4.0+10607+f4da7515.aarch64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:libslirp-debugsource-0:4.3.1-1.module+el8.4.0+10607+f4da7515.ppc64le", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:libslirp-debugsource-0:4.3.1-1.module+el8.4.0+10607+f4da7515.s390x", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:libslirp-debugsource-0:4.3.1-1.module+el8.4.0+10607+f4da7515.x86_64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:libslirp-devel-0:4.3.1-1.module+el8.4.0+10607+f4da7515.aarch64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:libslirp-devel-0:4.3.1-1.module+el8.4.0+10607+f4da7515.ppc64le", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:libslirp-devel-0:4.3.1-1.module+el8.4.0+10607+f4da7515.s390x", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:libslirp-devel-0:4.3.1-1.module+el8.4.0+10607+f4da7515.x86_64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:oci-seccomp-bpf-hook-0:1.2.0-2.module+el8.4.0+10607+f4da7515.aarch64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:oci-seccomp-bpf-hook-0:1.2.0-2.module+el8.4.0+10607+f4da7515.ppc64le", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:oci-seccomp-bpf-hook-0:1.2.0-2.module+el8.4.0+10607+f4da7515.s390x", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:oci-seccomp-bpf-hook-0:1.2.0-2.module+el8.4.0+10607+f4da7515.src", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:oci-seccomp-bpf-hook-0:1.2.0-2.module+el8.4.0+10607+f4da7515.x86_64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:oci-seccomp-bpf-hook-debuginfo-0:1.2.0-2.module+el8.4.0+10607+f4da7515.aarch64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:oci-seccomp-bpf-hook-debuginfo-0:1.2.0-2.module+el8.4.0+10607+f4da7515.ppc64le", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:oci-seccomp-bpf-hook-debuginfo-0:1.2.0-2.module+el8.4.0+10607+f4da7515.s390x", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:oci-seccomp-bpf-hook-debuginfo-0:1.2.0-2.module+el8.4.0+10607+f4da7515.x86_64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:oci-seccomp-bpf-hook-debugsource-0:1.2.0-2.module+el8.4.0+10607+f4da7515.aarch64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:oci-seccomp-bpf-hook-debugsource-0:1.2.0-2.module+el8.4.0+10607+f4da7515.ppc64le", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:oci-seccomp-bpf-hook-debugsource-0:1.2.0-2.module+el8.4.0+10607+f4da7515.s390x", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:oci-seccomp-bpf-hook-debugsource-0:1.2.0-2.module+el8.4.0+10607+f4da7515.x86_64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:podman-0:3.0.1-6.module+el8.4.0+10607+f4da7515.aarch64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:podman-0:3.0.1-6.module+el8.4.0+10607+f4da7515.ppc64le", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:podman-0:3.0.1-6.module+el8.4.0+10607+f4da7515.s390x", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:podman-0:3.0.1-6.module+el8.4.0+10607+f4da7515.src", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:podman-0:3.0.1-6.module+el8.4.0+10607+f4da7515.x86_64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:podman-catatonit-0:3.0.1-6.module+el8.4.0+10607+f4da7515.aarch64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:podman-catatonit-0:3.0.1-6.module+el8.4.0+10607+f4da7515.ppc64le", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:podman-catatonit-0:3.0.1-6.module+el8.4.0+10607+f4da7515.s390x", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:podman-catatonit-0:3.0.1-6.module+el8.4.0+10607+f4da7515.x86_64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:podman-catatonit-debuginfo-0:3.0.1-6.module+el8.4.0+10607+f4da7515.aarch64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:podman-catatonit-debuginfo-0:3.0.1-6.module+el8.4.0+10607+f4da7515.ppc64le", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:podman-catatonit-debuginfo-0:3.0.1-6.module+el8.4.0+10607+f4da7515.s390x", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:podman-catatonit-debuginfo-0:3.0.1-6.module+el8.4.0+10607+f4da7515.x86_64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:podman-debuginfo-0:3.0.1-6.module+el8.4.0+10607+f4da7515.aarch64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:podman-debuginfo-0:3.0.1-6.module+el8.4.0+10607+f4da7515.ppc64le", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:podman-debuginfo-0:3.0.1-6.module+el8.4.0+10607+f4da7515.s390x", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:podman-debuginfo-0:3.0.1-6.module+el8.4.0+10607+f4da7515.x86_64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:podman-debugsource-0:3.0.1-6.module+el8.4.0+10607+f4da7515.aarch64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:podman-debugsource-0:3.0.1-6.module+el8.4.0+10607+f4da7515.ppc64le", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:podman-debugsource-0:3.0.1-6.module+el8.4.0+10607+f4da7515.s390x", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:podman-debugsource-0:3.0.1-6.module+el8.4.0+10607+f4da7515.x86_64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:podman-docker-0:3.0.1-6.module+el8.4.0+10607+f4da7515.noarch", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:podman-plugins-0:3.0.1-6.module+el8.4.0+10607+f4da7515.aarch64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:podman-plugins-0:3.0.1-6.module+el8.4.0+10607+f4da7515.ppc64le", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:podman-plugins-0:3.0.1-6.module+el8.4.0+10607+f4da7515.s390x", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:podman-plugins-0:3.0.1-6.module+el8.4.0+10607+f4da7515.x86_64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:podman-plugins-debuginfo-0:3.0.1-6.module+el8.4.0+10607+f4da7515.aarch64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:podman-plugins-debuginfo-0:3.0.1-6.module+el8.4.0+10607+f4da7515.ppc64le", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:podman-plugins-debuginfo-0:3.0.1-6.module+el8.4.0+10607+f4da7515.s390x", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:podman-plugins-debuginfo-0:3.0.1-6.module+el8.4.0+10607+f4da7515.x86_64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:podman-remote-0:3.0.1-6.module+el8.4.0+10607+f4da7515.aarch64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:podman-remote-0:3.0.1-6.module+el8.4.0+10607+f4da7515.ppc64le", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:podman-remote-0:3.0.1-6.module+el8.4.0+10607+f4da7515.s390x", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:podman-remote-0:3.0.1-6.module+el8.4.0+10607+f4da7515.x86_64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:podman-remote-debuginfo-0:3.0.1-6.module+el8.4.0+10607+f4da7515.aarch64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:podman-remote-debuginfo-0:3.0.1-6.module+el8.4.0+10607+f4da7515.ppc64le", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:podman-remote-debuginfo-0:3.0.1-6.module+el8.4.0+10607+f4da7515.s390x", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:podman-remote-debuginfo-0:3.0.1-6.module+el8.4.0+10607+f4da7515.x86_64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:podman-tests-0:3.0.1-6.module+el8.4.0+10607+f4da7515.aarch64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:podman-tests-0:3.0.1-6.module+el8.4.0+10607+f4da7515.ppc64le", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:podman-tests-0:3.0.1-6.module+el8.4.0+10607+f4da7515.s390x", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:podman-tests-0:3.0.1-6.module+el8.4.0+10607+f4da7515.x86_64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:python3-criu-0:3.15-1.module+el8.4.0+10607+f4da7515.aarch64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:python3-criu-0:3.15-1.module+el8.4.0+10607+f4da7515.ppc64le", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:python3-criu-0:3.15-1.module+el8.4.0+10607+f4da7515.s390x", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:python3-criu-0:3.15-1.module+el8.4.0+10607+f4da7515.x86_64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:runc-0:1.0.0-70.rc92.module+el8.4.0+10607+f4da7515.aarch64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:runc-0:1.0.0-70.rc92.module+el8.4.0+10607+f4da7515.ppc64le", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:runc-0:1.0.0-70.rc92.module+el8.4.0+10607+f4da7515.s390x", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:runc-0:1.0.0-70.rc92.module+el8.4.0+10607+f4da7515.src", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:runc-0:1.0.0-70.rc92.module+el8.4.0+10607+f4da7515.x86_64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:runc-debuginfo-0:1.0.0-70.rc92.module+el8.4.0+10607+f4da7515.aarch64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:runc-debuginfo-0:1.0.0-70.rc92.module+el8.4.0+10607+f4da7515.ppc64le", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:runc-debuginfo-0:1.0.0-70.rc92.module+el8.4.0+10607+f4da7515.s390x", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:runc-debuginfo-0:1.0.0-70.rc92.module+el8.4.0+10607+f4da7515.x86_64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:runc-debugsource-0:1.0.0-70.rc92.module+el8.4.0+10607+f4da7515.aarch64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:runc-debugsource-0:1.0.0-70.rc92.module+el8.4.0+10607+f4da7515.ppc64le", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:runc-debugsource-0:1.0.0-70.rc92.module+el8.4.0+10607+f4da7515.s390x", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:runc-debugsource-0:1.0.0-70.rc92.module+el8.4.0+10607+f4da7515.x86_64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:skopeo-1:1.2.2-8.module+el8.4.0+10607+f4da7515.aarch64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:skopeo-1:1.2.2-8.module+el8.4.0+10607+f4da7515.ppc64le", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:skopeo-1:1.2.2-8.module+el8.4.0+10607+f4da7515.s390x", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:skopeo-1:1.2.2-8.module+el8.4.0+10607+f4da7515.src", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:skopeo-1:1.2.2-8.module+el8.4.0+10607+f4da7515.x86_64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:skopeo-debuginfo-1:1.2.2-8.module+el8.4.0+10607+f4da7515.aarch64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:skopeo-debuginfo-1:1.2.2-8.module+el8.4.0+10607+f4da7515.ppc64le", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:skopeo-debuginfo-1:1.2.2-8.module+el8.4.0+10607+f4da7515.s390x", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:skopeo-debuginfo-1:1.2.2-8.module+el8.4.0+10607+f4da7515.x86_64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:skopeo-debugsource-1:1.2.2-8.module+el8.4.0+10607+f4da7515.aarch64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:skopeo-debugsource-1:1.2.2-8.module+el8.4.0+10607+f4da7515.ppc64le", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:skopeo-debugsource-1:1.2.2-8.module+el8.4.0+10607+f4da7515.s390x", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:skopeo-debugsource-1:1.2.2-8.module+el8.4.0+10607+f4da7515.x86_64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:skopeo-tests-1:1.2.2-8.module+el8.4.0+10607+f4da7515.aarch64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:skopeo-tests-1:1.2.2-8.module+el8.4.0+10607+f4da7515.ppc64le", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:skopeo-tests-1:1.2.2-8.module+el8.4.0+10607+f4da7515.s390x", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:skopeo-tests-1:1.2.2-8.module+el8.4.0+10607+f4da7515.x86_64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:slirp4netns-0:1.1.8-1.module+el8.4.0+10607+f4da7515.aarch64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:slirp4netns-0:1.1.8-1.module+el8.4.0+10607+f4da7515.ppc64le", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:slirp4netns-0:1.1.8-1.module+el8.4.0+10607+f4da7515.s390x", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:slirp4netns-0:1.1.8-1.module+el8.4.0+10607+f4da7515.src", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:slirp4netns-0:1.1.8-1.module+el8.4.0+10607+f4da7515.x86_64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:slirp4netns-debuginfo-0:1.1.8-1.module+el8.4.0+10607+f4da7515.aarch64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:slirp4netns-debuginfo-0:1.1.8-1.module+el8.4.0+10607+f4da7515.ppc64le", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:slirp4netns-debuginfo-0:1.1.8-1.module+el8.4.0+10607+f4da7515.s390x", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:slirp4netns-debuginfo-0:1.1.8-1.module+el8.4.0+10607+f4da7515.x86_64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:slirp4netns-debugsource-0:1.1.8-1.module+el8.4.0+10607+f4da7515.aarch64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:slirp4netns-debugsource-0:1.1.8-1.module+el8.4.0+10607+f4da7515.ppc64le", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:slirp4netns-debugsource-0:1.1.8-1.module+el8.4.0+10607+f4da7515.s390x", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:slirp4netns-debugsource-0:1.1.8-1.module+el8.4.0+10607+f4da7515.x86_64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:toolbox-0:0.0.8-1.module+el8.4.0+10607+f4da7515.noarch", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:toolbox-0:0.0.8-1.module+el8.4.0+10607+f4da7515.src", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:udica-0:0.2.4-1.module+el8.4.0+10607+f4da7515.noarch", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:udica-0:0.2.4-1.module+el8.4.0+10607+f4da7515.src" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:buildah-0:1.19.7-1.module+el8.4.0+10607+f4da7515.aarch64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:buildah-0:1.19.7-1.module+el8.4.0+10607+f4da7515.ppc64le", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:buildah-0:1.19.7-1.module+el8.4.0+10607+f4da7515.s390x", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:buildah-0:1.19.7-1.module+el8.4.0+10607+f4da7515.src", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:buildah-0:1.19.7-1.module+el8.4.0+10607+f4da7515.x86_64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:buildah-debuginfo-0:1.19.7-1.module+el8.4.0+10607+f4da7515.aarch64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:buildah-debuginfo-0:1.19.7-1.module+el8.4.0+10607+f4da7515.ppc64le", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:buildah-debuginfo-0:1.19.7-1.module+el8.4.0+10607+f4da7515.s390x", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:buildah-debuginfo-0:1.19.7-1.module+el8.4.0+10607+f4da7515.x86_64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:buildah-debugsource-0:1.19.7-1.module+el8.4.0+10607+f4da7515.aarch64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:buildah-debugsource-0:1.19.7-1.module+el8.4.0+10607+f4da7515.ppc64le", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:buildah-debugsource-0:1.19.7-1.module+el8.4.0+10607+f4da7515.s390x", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:buildah-debugsource-0:1.19.7-1.module+el8.4.0+10607+f4da7515.x86_64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:buildah-tests-0:1.19.7-1.module+el8.4.0+10607+f4da7515.aarch64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:buildah-tests-0:1.19.7-1.module+el8.4.0+10607+f4da7515.ppc64le", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:buildah-tests-0:1.19.7-1.module+el8.4.0+10607+f4da7515.s390x", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:buildah-tests-0:1.19.7-1.module+el8.4.0+10607+f4da7515.x86_64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:buildah-tests-debuginfo-0:1.19.7-1.module+el8.4.0+10607+f4da7515.aarch64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:buildah-tests-debuginfo-0:1.19.7-1.module+el8.4.0+10607+f4da7515.ppc64le", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:buildah-tests-debuginfo-0:1.19.7-1.module+el8.4.0+10607+f4da7515.s390x", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:buildah-tests-debuginfo-0:1.19.7-1.module+el8.4.0+10607+f4da7515.x86_64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:cockpit-podman-0:29-2.module+el8.4.0+10607+f4da7515.noarch", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:cockpit-podman-0:29-2.module+el8.4.0+10607+f4da7515.src", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:conmon-2:2.0.26-1.module+el8.4.0+10607+f4da7515.aarch64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:conmon-2:2.0.26-1.module+el8.4.0+10607+f4da7515.ppc64le", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:conmon-2:2.0.26-1.module+el8.4.0+10607+f4da7515.s390x", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:conmon-2:2.0.26-1.module+el8.4.0+10607+f4da7515.src", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:conmon-2:2.0.26-1.module+el8.4.0+10607+f4da7515.x86_64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:conmon-debuginfo-2:2.0.26-1.module+el8.4.0+10607+f4da7515.aarch64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:conmon-debuginfo-2:2.0.26-1.module+el8.4.0+10607+f4da7515.ppc64le", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:conmon-debuginfo-2:2.0.26-1.module+el8.4.0+10607+f4da7515.s390x", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:conmon-debuginfo-2:2.0.26-1.module+el8.4.0+10607+f4da7515.x86_64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:conmon-debugsource-2:2.0.26-1.module+el8.4.0+10607+f4da7515.aarch64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:conmon-debugsource-2:2.0.26-1.module+el8.4.0+10607+f4da7515.ppc64le", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:conmon-debugsource-2:2.0.26-1.module+el8.4.0+10607+f4da7515.s390x", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:conmon-debugsource-2:2.0.26-1.module+el8.4.0+10607+f4da7515.x86_64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:container-selinux-2:2.158.0-1.module+el8.4.0+10607+f4da7515.noarch", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:container-selinux-2:2.158.0-1.module+el8.4.0+10607+f4da7515.src", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:containernetworking-plugins-0:0.9.1-1.module+el8.4.0+10607+f4da7515.aarch64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:containernetworking-plugins-0:0.9.1-1.module+el8.4.0+10607+f4da7515.ppc64le", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:containernetworking-plugins-0:0.9.1-1.module+el8.4.0+10607+f4da7515.s390x", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:containernetworking-plugins-0:0.9.1-1.module+el8.4.0+10607+f4da7515.src", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:containernetworking-plugins-0:0.9.1-1.module+el8.4.0+10607+f4da7515.x86_64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:containernetworking-plugins-debuginfo-0:0.9.1-1.module+el8.4.0+10607+f4da7515.aarch64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:containernetworking-plugins-debuginfo-0:0.9.1-1.module+el8.4.0+10607+f4da7515.ppc64le", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:containernetworking-plugins-debuginfo-0:0.9.1-1.module+el8.4.0+10607+f4da7515.s390x", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:containernetworking-plugins-debuginfo-0:0.9.1-1.module+el8.4.0+10607+f4da7515.x86_64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:containernetworking-plugins-debugsource-0:0.9.1-1.module+el8.4.0+10607+f4da7515.aarch64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:containernetworking-plugins-debugsource-0:0.9.1-1.module+el8.4.0+10607+f4da7515.ppc64le", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:containernetworking-plugins-debugsource-0:0.9.1-1.module+el8.4.0+10607+f4da7515.s390x", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:containernetworking-plugins-debugsource-0:0.9.1-1.module+el8.4.0+10607+f4da7515.x86_64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:containers-common-1:1.2.2-8.module+el8.4.0+10607+f4da7515.aarch64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:containers-common-1:1.2.2-8.module+el8.4.0+10607+f4da7515.ppc64le", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:containers-common-1:1.2.2-8.module+el8.4.0+10607+f4da7515.s390x", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:containers-common-1:1.2.2-8.module+el8.4.0+10607+f4da7515.x86_64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:crit-0:3.15-1.module+el8.4.0+10607+f4da7515.aarch64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:crit-0:3.15-1.module+el8.4.0+10607+f4da7515.ppc64le", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:crit-0:3.15-1.module+el8.4.0+10607+f4da7515.s390x", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:crit-0:3.15-1.module+el8.4.0+10607+f4da7515.x86_64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:criu-0:3.15-1.module+el8.4.0+10607+f4da7515.aarch64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:criu-0:3.15-1.module+el8.4.0+10607+f4da7515.ppc64le", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:criu-0:3.15-1.module+el8.4.0+10607+f4da7515.s390x", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:criu-0:3.15-1.module+el8.4.0+10607+f4da7515.src", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:criu-0:3.15-1.module+el8.4.0+10607+f4da7515.x86_64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:criu-debuginfo-0:3.15-1.module+el8.4.0+10607+f4da7515.aarch64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:criu-debuginfo-0:3.15-1.module+el8.4.0+10607+f4da7515.ppc64le", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:criu-debuginfo-0:3.15-1.module+el8.4.0+10607+f4da7515.s390x", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:criu-debuginfo-0:3.15-1.module+el8.4.0+10607+f4da7515.x86_64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:criu-debugsource-0:3.15-1.module+el8.4.0+10607+f4da7515.aarch64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:criu-debugsource-0:3.15-1.module+el8.4.0+10607+f4da7515.ppc64le", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:criu-debugsource-0:3.15-1.module+el8.4.0+10607+f4da7515.s390x", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:criu-debugsource-0:3.15-1.module+el8.4.0+10607+f4da7515.x86_64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:crun-0:0.18-1.module+el8.4.0+10607+f4da7515.aarch64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:crun-0:0.18-1.module+el8.4.0+10607+f4da7515.ppc64le", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:crun-0:0.18-1.module+el8.4.0+10607+f4da7515.s390x", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:crun-0:0.18-1.module+el8.4.0+10607+f4da7515.src", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:crun-0:0.18-1.module+el8.4.0+10607+f4da7515.x86_64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:crun-debuginfo-0:0.18-1.module+el8.4.0+10607+f4da7515.aarch64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:crun-debuginfo-0:0.18-1.module+el8.4.0+10607+f4da7515.ppc64le", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:crun-debuginfo-0:0.18-1.module+el8.4.0+10607+f4da7515.s390x", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:crun-debuginfo-0:0.18-1.module+el8.4.0+10607+f4da7515.x86_64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:crun-debugsource-0:0.18-1.module+el8.4.0+10607+f4da7515.aarch64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:crun-debugsource-0:0.18-1.module+el8.4.0+10607+f4da7515.ppc64le", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:crun-debugsource-0:0.18-1.module+el8.4.0+10607+f4da7515.s390x", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:crun-debugsource-0:0.18-1.module+el8.4.0+10607+f4da7515.x86_64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:fuse-overlayfs-0:1.4.0-2.module+el8.4.0+10607+f4da7515.aarch64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:fuse-overlayfs-0:1.4.0-2.module+el8.4.0+10607+f4da7515.ppc64le", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:fuse-overlayfs-0:1.4.0-2.module+el8.4.0+10607+f4da7515.s390x", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:fuse-overlayfs-0:1.4.0-2.module+el8.4.0+10607+f4da7515.src", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:fuse-overlayfs-0:1.4.0-2.module+el8.4.0+10607+f4da7515.x86_64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:fuse-overlayfs-debuginfo-0:1.4.0-2.module+el8.4.0+10607+f4da7515.aarch64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:fuse-overlayfs-debuginfo-0:1.4.0-2.module+el8.4.0+10607+f4da7515.ppc64le", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:fuse-overlayfs-debuginfo-0:1.4.0-2.module+el8.4.0+10607+f4da7515.s390x", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:fuse-overlayfs-debuginfo-0:1.4.0-2.module+el8.4.0+10607+f4da7515.x86_64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:fuse-overlayfs-debugsource-0:1.4.0-2.module+el8.4.0+10607+f4da7515.aarch64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:fuse-overlayfs-debugsource-0:1.4.0-2.module+el8.4.0+10607+f4da7515.ppc64le", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:fuse-overlayfs-debugsource-0:1.4.0-2.module+el8.4.0+10607+f4da7515.s390x", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:fuse-overlayfs-debugsource-0:1.4.0-2.module+el8.4.0+10607+f4da7515.x86_64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:libslirp-0:4.3.1-1.module+el8.4.0+10607+f4da7515.aarch64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:libslirp-0:4.3.1-1.module+el8.4.0+10607+f4da7515.ppc64le", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:libslirp-0:4.3.1-1.module+el8.4.0+10607+f4da7515.s390x", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:libslirp-0:4.3.1-1.module+el8.4.0+10607+f4da7515.src", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:libslirp-0:4.3.1-1.module+el8.4.0+10607+f4da7515.x86_64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:libslirp-debuginfo-0:4.3.1-1.module+el8.4.0+10607+f4da7515.aarch64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:libslirp-debuginfo-0:4.3.1-1.module+el8.4.0+10607+f4da7515.ppc64le", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:libslirp-debuginfo-0:4.3.1-1.module+el8.4.0+10607+f4da7515.s390x", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:libslirp-debuginfo-0:4.3.1-1.module+el8.4.0+10607+f4da7515.x86_64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:libslirp-debugsource-0:4.3.1-1.module+el8.4.0+10607+f4da7515.aarch64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:libslirp-debugsource-0:4.3.1-1.module+el8.4.0+10607+f4da7515.ppc64le", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:libslirp-debugsource-0:4.3.1-1.module+el8.4.0+10607+f4da7515.s390x", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:libslirp-debugsource-0:4.3.1-1.module+el8.4.0+10607+f4da7515.x86_64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:libslirp-devel-0:4.3.1-1.module+el8.4.0+10607+f4da7515.aarch64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:libslirp-devel-0:4.3.1-1.module+el8.4.0+10607+f4da7515.ppc64le", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:libslirp-devel-0:4.3.1-1.module+el8.4.0+10607+f4da7515.s390x", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:libslirp-devel-0:4.3.1-1.module+el8.4.0+10607+f4da7515.x86_64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:oci-seccomp-bpf-hook-0:1.2.0-2.module+el8.4.0+10607+f4da7515.aarch64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:oci-seccomp-bpf-hook-0:1.2.0-2.module+el8.4.0+10607+f4da7515.ppc64le", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:oci-seccomp-bpf-hook-0:1.2.0-2.module+el8.4.0+10607+f4da7515.s390x", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:oci-seccomp-bpf-hook-0:1.2.0-2.module+el8.4.0+10607+f4da7515.src", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:oci-seccomp-bpf-hook-0:1.2.0-2.module+el8.4.0+10607+f4da7515.x86_64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:oci-seccomp-bpf-hook-debuginfo-0:1.2.0-2.module+el8.4.0+10607+f4da7515.aarch64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:oci-seccomp-bpf-hook-debuginfo-0:1.2.0-2.module+el8.4.0+10607+f4da7515.ppc64le", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:oci-seccomp-bpf-hook-debuginfo-0:1.2.0-2.module+el8.4.0+10607+f4da7515.s390x", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:oci-seccomp-bpf-hook-debuginfo-0:1.2.0-2.module+el8.4.0+10607+f4da7515.x86_64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:oci-seccomp-bpf-hook-debugsource-0:1.2.0-2.module+el8.4.0+10607+f4da7515.aarch64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:oci-seccomp-bpf-hook-debugsource-0:1.2.0-2.module+el8.4.0+10607+f4da7515.ppc64le", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:oci-seccomp-bpf-hook-debugsource-0:1.2.0-2.module+el8.4.0+10607+f4da7515.s390x", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:oci-seccomp-bpf-hook-debugsource-0:1.2.0-2.module+el8.4.0+10607+f4da7515.x86_64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:podman-0:3.0.1-6.module+el8.4.0+10607+f4da7515.aarch64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:podman-0:3.0.1-6.module+el8.4.0+10607+f4da7515.ppc64le", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:podman-0:3.0.1-6.module+el8.4.0+10607+f4da7515.s390x", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:podman-0:3.0.1-6.module+el8.4.0+10607+f4da7515.src", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:podman-0:3.0.1-6.module+el8.4.0+10607+f4da7515.x86_64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:podman-catatonit-0:3.0.1-6.module+el8.4.0+10607+f4da7515.aarch64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:podman-catatonit-0:3.0.1-6.module+el8.4.0+10607+f4da7515.ppc64le", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:podman-catatonit-0:3.0.1-6.module+el8.4.0+10607+f4da7515.s390x", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:podman-catatonit-0:3.0.1-6.module+el8.4.0+10607+f4da7515.x86_64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:podman-catatonit-debuginfo-0:3.0.1-6.module+el8.4.0+10607+f4da7515.aarch64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:podman-catatonit-debuginfo-0:3.0.1-6.module+el8.4.0+10607+f4da7515.ppc64le", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:podman-catatonit-debuginfo-0:3.0.1-6.module+el8.4.0+10607+f4da7515.s390x", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:podman-catatonit-debuginfo-0:3.0.1-6.module+el8.4.0+10607+f4da7515.x86_64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:podman-debuginfo-0:3.0.1-6.module+el8.4.0+10607+f4da7515.aarch64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:podman-debuginfo-0:3.0.1-6.module+el8.4.0+10607+f4da7515.ppc64le", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:podman-debuginfo-0:3.0.1-6.module+el8.4.0+10607+f4da7515.s390x", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:podman-debuginfo-0:3.0.1-6.module+el8.4.0+10607+f4da7515.x86_64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:podman-debugsource-0:3.0.1-6.module+el8.4.0+10607+f4da7515.aarch64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:podman-debugsource-0:3.0.1-6.module+el8.4.0+10607+f4da7515.ppc64le", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:podman-debugsource-0:3.0.1-6.module+el8.4.0+10607+f4da7515.s390x", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:podman-debugsource-0:3.0.1-6.module+el8.4.0+10607+f4da7515.x86_64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:podman-docker-0:3.0.1-6.module+el8.4.0+10607+f4da7515.noarch", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:podman-plugins-0:3.0.1-6.module+el8.4.0+10607+f4da7515.aarch64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:podman-plugins-0:3.0.1-6.module+el8.4.0+10607+f4da7515.ppc64le", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:podman-plugins-0:3.0.1-6.module+el8.4.0+10607+f4da7515.s390x", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:podman-plugins-0:3.0.1-6.module+el8.4.0+10607+f4da7515.x86_64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:podman-plugins-debuginfo-0:3.0.1-6.module+el8.4.0+10607+f4da7515.aarch64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:podman-plugins-debuginfo-0:3.0.1-6.module+el8.4.0+10607+f4da7515.ppc64le", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:podman-plugins-debuginfo-0:3.0.1-6.module+el8.4.0+10607+f4da7515.s390x", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:podman-plugins-debuginfo-0:3.0.1-6.module+el8.4.0+10607+f4da7515.x86_64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:podman-remote-0:3.0.1-6.module+el8.4.0+10607+f4da7515.aarch64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:podman-remote-0:3.0.1-6.module+el8.4.0+10607+f4da7515.ppc64le", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:podman-remote-0:3.0.1-6.module+el8.4.0+10607+f4da7515.s390x", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:podman-remote-0:3.0.1-6.module+el8.4.0+10607+f4da7515.x86_64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:podman-remote-debuginfo-0:3.0.1-6.module+el8.4.0+10607+f4da7515.aarch64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:podman-remote-debuginfo-0:3.0.1-6.module+el8.4.0+10607+f4da7515.ppc64le", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:podman-remote-debuginfo-0:3.0.1-6.module+el8.4.0+10607+f4da7515.s390x", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:podman-remote-debuginfo-0:3.0.1-6.module+el8.4.0+10607+f4da7515.x86_64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:podman-tests-0:3.0.1-6.module+el8.4.0+10607+f4da7515.aarch64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:podman-tests-0:3.0.1-6.module+el8.4.0+10607+f4da7515.ppc64le", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:podman-tests-0:3.0.1-6.module+el8.4.0+10607+f4da7515.s390x", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:podman-tests-0:3.0.1-6.module+el8.4.0+10607+f4da7515.x86_64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:python3-criu-0:3.15-1.module+el8.4.0+10607+f4da7515.aarch64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:python3-criu-0:3.15-1.module+el8.4.0+10607+f4da7515.ppc64le", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:python3-criu-0:3.15-1.module+el8.4.0+10607+f4da7515.s390x", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:python3-criu-0:3.15-1.module+el8.4.0+10607+f4da7515.x86_64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:runc-0:1.0.0-70.rc92.module+el8.4.0+10607+f4da7515.aarch64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:runc-0:1.0.0-70.rc92.module+el8.4.0+10607+f4da7515.ppc64le", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:runc-0:1.0.0-70.rc92.module+el8.4.0+10607+f4da7515.s390x", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:runc-0:1.0.0-70.rc92.module+el8.4.0+10607+f4da7515.src", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:runc-0:1.0.0-70.rc92.module+el8.4.0+10607+f4da7515.x86_64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:runc-debuginfo-0:1.0.0-70.rc92.module+el8.4.0+10607+f4da7515.aarch64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:runc-debuginfo-0:1.0.0-70.rc92.module+el8.4.0+10607+f4da7515.ppc64le", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:runc-debuginfo-0:1.0.0-70.rc92.module+el8.4.0+10607+f4da7515.s390x", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:runc-debuginfo-0:1.0.0-70.rc92.module+el8.4.0+10607+f4da7515.x86_64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:runc-debugsource-0:1.0.0-70.rc92.module+el8.4.0+10607+f4da7515.aarch64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:runc-debugsource-0:1.0.0-70.rc92.module+el8.4.0+10607+f4da7515.ppc64le", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:runc-debugsource-0:1.0.0-70.rc92.module+el8.4.0+10607+f4da7515.s390x", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:runc-debugsource-0:1.0.0-70.rc92.module+el8.4.0+10607+f4da7515.x86_64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:skopeo-1:1.2.2-8.module+el8.4.0+10607+f4da7515.aarch64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:skopeo-1:1.2.2-8.module+el8.4.0+10607+f4da7515.ppc64le", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:skopeo-1:1.2.2-8.module+el8.4.0+10607+f4da7515.s390x", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:skopeo-1:1.2.2-8.module+el8.4.0+10607+f4da7515.src", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:skopeo-1:1.2.2-8.module+el8.4.0+10607+f4da7515.x86_64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:skopeo-debuginfo-1:1.2.2-8.module+el8.4.0+10607+f4da7515.aarch64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:skopeo-debuginfo-1:1.2.2-8.module+el8.4.0+10607+f4da7515.ppc64le", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:skopeo-debuginfo-1:1.2.2-8.module+el8.4.0+10607+f4da7515.s390x", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:skopeo-debuginfo-1:1.2.2-8.module+el8.4.0+10607+f4da7515.x86_64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:skopeo-debugsource-1:1.2.2-8.module+el8.4.0+10607+f4da7515.aarch64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:skopeo-debugsource-1:1.2.2-8.module+el8.4.0+10607+f4da7515.ppc64le", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:skopeo-debugsource-1:1.2.2-8.module+el8.4.0+10607+f4da7515.s390x", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:skopeo-debugsource-1:1.2.2-8.module+el8.4.0+10607+f4da7515.x86_64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:skopeo-tests-1:1.2.2-8.module+el8.4.0+10607+f4da7515.aarch64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:skopeo-tests-1:1.2.2-8.module+el8.4.0+10607+f4da7515.ppc64le", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:skopeo-tests-1:1.2.2-8.module+el8.4.0+10607+f4da7515.s390x", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:skopeo-tests-1:1.2.2-8.module+el8.4.0+10607+f4da7515.x86_64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:slirp4netns-0:1.1.8-1.module+el8.4.0+10607+f4da7515.aarch64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:slirp4netns-0:1.1.8-1.module+el8.4.0+10607+f4da7515.ppc64le", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:slirp4netns-0:1.1.8-1.module+el8.4.0+10607+f4da7515.s390x", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:slirp4netns-0:1.1.8-1.module+el8.4.0+10607+f4da7515.src", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:slirp4netns-0:1.1.8-1.module+el8.4.0+10607+f4da7515.x86_64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:slirp4netns-debuginfo-0:1.1.8-1.module+el8.4.0+10607+f4da7515.aarch64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:slirp4netns-debuginfo-0:1.1.8-1.module+el8.4.0+10607+f4da7515.ppc64le", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:slirp4netns-debuginfo-0:1.1.8-1.module+el8.4.0+10607+f4da7515.s390x", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:slirp4netns-debuginfo-0:1.1.8-1.module+el8.4.0+10607+f4da7515.x86_64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:slirp4netns-debugsource-0:1.1.8-1.module+el8.4.0+10607+f4da7515.aarch64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:slirp4netns-debugsource-0:1.1.8-1.module+el8.4.0+10607+f4da7515.ppc64le", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:slirp4netns-debugsource-0:1.1.8-1.module+el8.4.0+10607+f4da7515.s390x", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:slirp4netns-debugsource-0:1.1.8-1.module+el8.4.0+10607+f4da7515.x86_64", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:toolbox-0:0.0.8-1.module+el8.4.0+10607+f4da7515.noarch", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:toolbox-0:0.0.8-1.module+el8.4.0+10607+f4da7515.src", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:udica-0:0.2.4-1.module+el8.4.0+10607+f4da7515.noarch", "AppStream-8.4.0.GA:container-tools:rhel8:8040020210407081426:59631bd5:udica-0:0.2.4-1.module+el8.4.0+10607+f4da7515.src" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "podman: Remote traffic to rootless containers is seen as orginating from localhost" } ] }
rhsa-2020_5633
Vulnerability from csaf_redhat
Published
2021-02-24 15:09
Modified
2021-03-02 01:59
Summary
Red Hat Security Advisory: OpenShift Container Platform 4.7.0 security, bug fix, and enhancement update
Notes
Topic
Red Hat OpenShift Container Platform release 4.7.0 is now available.
Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
Red Hat OpenShift Container Platform is Red Hat's cloud computing
Kubernetes application platform solution designed for on-premise or private
cloud deployments.
This advisory contains the container images for Red Hat OpenShift Container
Platform 4.7.0. See the following advisory for the RPM packages for this
release:
https://access.redhat.com/errata/RHSA-2020:5634
Space precludes documenting all of the container images in this advisory. See the following Release Notes documentation, which will be updated shortly for this release, for details about these changes:
https://docs.openshift.com/container-platform/4.7/release_notes/ocp-4-7-release-notes.html
You may download the oc tool and use it to inspect release image metadata as follows:
(For x86_64 architecture)
$ oc adm release info quay.io/openshift-release-dev/ocp-release:4.7.0-x86_64
The image digest is sha256:d74b1cfa81f8c9cc23336aee72d8ae9c9905e62c4874b071317a078c316f8a70
(For s390x architecture)
$ oc adm release info quay.io/openshift-release-dev/ocp-release:4.7.0-s390x
The image digest is sha256:a68ca03d87496ddfea0ac26b82af77231583a58a7836b95de85efe5e390ad45d
(For ppc64le architecture)
$ oc adm release info quay.io/openshift-release-dev/ocp-release:4.7.0-ppc64le
The image digest is sha256:bc7b04e038c8ff3a33b827f4ee19aa79b26e14c359a7dcc1ced9f3b58e5f1ac6
All OpenShift Container Platform 4.7 users are advised to upgrade to these updated packages and images when they are available in the appropriate release channel. To check for available updates, use the OpenShift Console or the CLI oc command. Instructions for upgrading a cluster are available at https://docs.openshift.com/container-platform/4.7/updating/updating-cluster-between-minor.html#understanding-upgrade-channels_updating-cluster-between-minor.
Security Fix(es):
* crewjam/saml: authentication bypass in saml authentication (CVE-2020-27846)
* golang: crypto/ssh: crafted authentication request can lead to nil pointer dereference (CVE-2020-29652)
* gogo/protobuf: plugin/unmarshal/unmarshal.go lacks certain index validation (CVE-2021-3121)
* nodejs-y18n: prototype pollution vulnerability (CVE-2020-7774)
* kubernetes: Secret leaks in kube-controller-manager when using vSphere Provider (CVE-2020-8563)
* containernetworking/plugins: IPv6 router advertisements allow for MitM attacks on IPv4 clusters (CVE-2020-10749)
* heketi: gluster-block volume password details available in logs (CVE-2020-10763)
* golang.org/x/text: possibility to trigger an infinite loop in encoding/unicode could lead to crash (CVE-2020-14040)
* jwt-go: access restriction bypass vulnerability (CVE-2020-26160)
* golang-github-gorilla-websocket: integer overflow leads to denial of service (CVE-2020-27813)
* golang: math/big: panic during recursive division of very large numbers (CVE-2020-28362)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_vex", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 2023 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Red Hat OpenShift Container Platform release 4.7.0 is now available.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "Red Hat OpenShift Container Platform is Red Hat\u0027s cloud computing\nKubernetes application platform solution designed for on-premise or private\ncloud deployments.\n\nThis advisory contains the container images for Red Hat OpenShift Container\nPlatform 4.7.0. See the following advisory for the RPM packages for this\nrelease:\n\nhttps://access.redhat.com/errata/RHSA-2020:5634\n\nSpace precludes documenting all of the container images in this advisory. See the following Release Notes documentation, which will be updated shortly for this release, for details about these changes:\n\nhttps://docs.openshift.com/container-platform/4.7/release_notes/ocp-4-7-release-notes.html\n\nYou may download the oc tool and use it to inspect release image metadata as follows:\n\n(For x86_64 architecture)\n\n $ oc adm release info quay.io/openshift-release-dev/ocp-release:4.7.0-x86_64\n\nThe image digest is sha256:d74b1cfa81f8c9cc23336aee72d8ae9c9905e62c4874b071317a078c316f8a70\n\n(For s390x architecture)\n\n $ oc adm release info quay.io/openshift-release-dev/ocp-release:4.7.0-s390x\n\nThe image digest is sha256:a68ca03d87496ddfea0ac26b82af77231583a58a7836b95de85efe5e390ad45d\n\n(For ppc64le architecture)\n\n $ oc adm release info quay.io/openshift-release-dev/ocp-release:4.7.0-ppc64le\n\nThe image digest is sha256:bc7b04e038c8ff3a33b827f4ee19aa79b26e14c359a7dcc1ced9f3b58e5f1ac6\n\nAll OpenShift Container Platform 4.7 users are advised to upgrade to these updated packages and images when they are available in the appropriate release channel. To check for available updates, use the OpenShift Console or the CLI oc command. Instructions for upgrading a cluster are available at https://docs.openshift.com/container-platform/4.7/updating/updating-cluster-between-minor.html#understanding-upgrade-channels_updating-cluster-between-minor.\n\nSecurity Fix(es):\n\n* crewjam/saml: authentication bypass in saml authentication (CVE-2020-27846)\n\n* golang: crypto/ssh: crafted authentication request can lead to nil pointer dereference (CVE-2020-29652)\n\n* gogo/protobuf: plugin/unmarshal/unmarshal.go lacks certain index validation (CVE-2021-3121)\n\n* nodejs-y18n: prototype pollution vulnerability (CVE-2020-7774)\n\n* kubernetes: Secret leaks in kube-controller-manager when using vSphere Provider (CVE-2020-8563)\n\n* containernetworking/plugins: IPv6 router advertisements allow for MitM attacks on IPv4 clusters (CVE-2020-10749)\n\n* heketi: gluster-block volume password details available in logs (CVE-2020-10763)\n\n* golang.org/x/text: possibility to trigger an infinite loop in encoding/unicode could lead to crash (CVE-2020-14040)\n\n* jwt-go: access restriction bypass vulnerability (CVE-2020-26160)\n\n* golang-github-gorilla-websocket: integer overflow leads to denial of service (CVE-2020-27813)\n\n* golang: math/big: panic during recursive division of very large numbers (CVE-2020-28362)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat offerings.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2020:5633", "url": "https://access.redhat.com/errata/RHSA-2020:5633" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#moderate", "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/data/csaf/v2/advisories/2021/rhsa-2020_5633.json" } ], "title": "Red Hat Security Advisory: OpenShift Container Platform 4.7.0 security, bug fix, and enhancement update", "tracking": { "current_release_date": "2021-03-02T01:59:00Z", "generator": { "date": "2023-07-01T04:39:00Z", "engine": { "name": "Red Hat SDEngine", "version": "3.18.0" } }, "id": "RHSA-2020:5633", "initial_release_date": "2021-02-24T15:09:00Z", "revision_history": [ { "date": "2021-03-02T01:59:00Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat OpenShift Container Platform 4.7", "product": { "name": "Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7", "product_identification_helper": { "cpe": "cpe:/a:redhat:openshift:4.7::el8" } } } ], "category": "product_family", "name": "Red Hat OpenShift Enterprise" }, { "category": "product_version", "name": "openshift4/egress-router-cni-rhel8:v4.7.0-202102130115.p0", "product": { "name": "openshift4/egress-router-cni-rhel8:v4.7.0-202102130115.p0", "product_id": "openshift4/egress-router-cni-rhel8:v4.7.0-202102130115.p0" } }, { "category": "product_version", "name": "openshift4/ose-aws-ebs-csi-driver-rhel8-operator:v4.7.0-202102130115.p0", "product": { "name": "openshift4/ose-aws-ebs-csi-driver-rhel8-operator:v4.7.0-202102130115.p0", "product_id": "openshift4/ose-aws-ebs-csi-driver-rhel8-operator:v4.7.0-202102130115.p0" } }, { "category": "product_version", "name": "openshift4/ose-aws-ebs-csi-driver-rhel8:v4.7.0-202102130115.p0", "product": { "name": "openshift4/ose-aws-ebs-csi-driver-rhel8:v4.7.0-202102130115.p0", "product_id": "openshift4/ose-aws-ebs-csi-driver-rhel8:v4.7.0-202102130115.p0" } }, { "category": "product_version", "name": "openshift4/ose-aws-machine-controllers:v4.7.0-202102130115.p0", "product": { "name": "openshift4/ose-aws-machine-controllers:v4.7.0-202102130115.p0", "product_id": "openshift4/ose-aws-machine-controllers:v4.7.0-202102130115.p0" } }, { "category": "product_version", "name": "openshift4/ose-aws-pod-identity-webhook-rhel8:v4.7.0-202102130115.p0", "product": { "name": "openshift4/ose-aws-pod-identity-webhook-rhel8:v4.7.0-202102130115.p0", "product_id": "openshift4/ose-aws-pod-identity-webhook-rhel8:v4.7.0-202102130115.p0" } }, { "category": "product_version", "name": "openshift4/ose-azure-machine-controllers:v4.7.0-202102130115.p0", "product": { "name": "openshift4/ose-azure-machine-controllers:v4.7.0-202102130115.p0", "product_id": "openshift4/ose-azure-machine-controllers:v4.7.0-202102130115.p0" } }, { "category": "product_version", "name": "openshift4/ose-baremetal-installer-rhel8:v4.7.0-202102130115.p0", "product": { "name": "openshift4/ose-baremetal-installer-rhel8:v4.7.0-202102130115.p0", "product_id": "openshift4/ose-baremetal-installer-rhel8:v4.7.0-202102130115.p0" } }, { "category": "product_version", "name": "openshift4/ose-baremetal-machine-controllers:v4.7.0-202102130115.p0", "product": { "name": "openshift4/ose-baremetal-machine-controllers:v4.7.0-202102130115.p0", "product_id": "openshift4/ose-baremetal-machine-controllers:v4.7.0-202102130115.p0" } }, { "category": "product_version", "name": "openshift4/ose-baremetal-rhel8-operator:v4.7.0-202102130115.p0", "product": { "name": "openshift4/ose-baremetal-rhel8-operator:v4.7.0-202102130115.p0", "product_id": "openshift4/ose-baremetal-rhel8-operator:v4.7.0-202102130115.p0" } }, { "category": "product_version", "name": "openshift4/ose-baremetal-runtimecfg-rhel8:v4.7.0-202102130115.p0", "product": { "name": "openshift4/ose-baremetal-runtimecfg-rhel8:v4.7.0-202102130115.p0", "product_id": "openshift4/ose-baremetal-runtimecfg-rhel8:v4.7.0-202102130115.p0" } }, { "category": "product_version", "name": "openshift4/ose-cli-artifacts:v4.7.0-202102130115.p0", "product": { "name": "openshift4/ose-cli-artifacts:v4.7.0-202102130115.p0", "product_id": "openshift4/ose-cli-artifacts:v4.7.0-202102130115.p0" } }, { "category": "product_version", "name": "openshift4/ose-cli:v4.7.0-202102130115.p0", "product": { "name": "openshift4/ose-cli:v4.7.0-202102130115.p0", "product_id": "openshift4/ose-cli:v4.7.0-202102130115.p0" } }, { "category": "product_version", "name": "openshift4/ose-cloud-credential-operator:v4.7.0-202102130115.p0", "product": { "name": "openshift4/ose-cloud-credential-operator:v4.7.0-202102130115.p0", "product_id": "openshift4/ose-cloud-credential-operator:v4.7.0-202102130115.p0" } }, { "category": "product_version", "name": "openshift4/ose-cluster-authentication-operator:v4.7.0-202102130115.p0", "product": { "name": "openshift4/ose-cluster-authentication-operator:v4.7.0-202102130115.p0", "product_id": "openshift4/ose-cluster-authentication-operator:v4.7.0-202102130115.p0" } }, { "category": "product_version", "name": "openshift4/ose-cluster-autoscaler-operator:v4.7.0-202102130115.p0", "product": { "name": "openshift4/ose-cluster-autoscaler-operator:v4.7.0-202102130115.p0", "product_id": "openshift4/ose-cluster-autoscaler-operator:v4.7.0-202102130115.p0" } }, { "category": "product_version", "name": "openshift4/ose-cluster-autoscaler:v4.7.0-202102130115.p0", "product": { "name": "openshift4/ose-cluster-autoscaler:v4.7.0-202102130115.p0", "product_id": "openshift4/ose-cluster-autoscaler:v4.7.0-202102130115.p0" } }, { "category": "product_version", "name": "openshift4/ose-cluster-baremetal-operator-rhel8:v4.7.0-202102130115.p0", "product": { "name": "openshift4/ose-cluster-baremetal-operator-rhel8:v4.7.0-202102130115.p0", "product_id": "openshift4/ose-cluster-baremetal-operator-rhel8:v4.7.0-202102130115.p0" } }, { "category": "product_version", "name": "openshift4/ose-cluster-bootstrap:v4.7.0-202102130115.p0", "product": { "name": "openshift4/ose-cluster-bootstrap:v4.7.0-202102130115.p0", "product_id": "openshift4/ose-cluster-bootstrap:v4.7.0-202102130115.p0" } }, { "category": "product_version", "name": "openshift4/ose-cluster-config-operator:v4.7.0-202102130115.p0", "product": { "name": "openshift4/ose-cluster-config-operator:v4.7.0-202102130115.p0", "product_id": "openshift4/ose-cluster-config-operator:v4.7.0-202102130115.p0" } }, { "category": "product_version", "name": "openshift4/ose-cluster-csi-snapshot-controller-rhel8-operator:v4.7.0-202102130115.p0", "product": { "name": "openshift4/ose-cluster-csi-snapshot-controller-rhel8-operator:v4.7.0-202102130115.p0", "product_id": "openshift4/ose-cluster-csi-snapshot-controller-rhel8-operator:v4.7.0-202102130115.p0" } }, { "category": "product_version", "name": "openshift4/ose-cluster-dns-operator:v4.7.0-202102130115.p0", "product": { "name": "openshift4/ose-cluster-dns-operator:v4.7.0-202102130115.p0", "product_id": "openshift4/ose-cluster-dns-operator:v4.7.0-202102130115.p0" } }, { "category": "product_version", "name": "openshift4/ose-cluster-etcd-rhel8-operator:v4.7.0-202102130115.p0", "product": { "name": "openshift4/ose-cluster-etcd-rhel8-operator:v4.7.0-202102130115.p0", "product_id": "openshift4/ose-cluster-etcd-rhel8-operator:v4.7.0-202102130115.p0" } }, { "category": "product_version", "name": "openshift4/ose-cluster-image-registry-operator:v4.7.0-202102130115.p0", "product": { "name": "openshift4/ose-cluster-image-registry-operator:v4.7.0-202102130115.p0", "product_id": "openshift4/ose-cluster-image-registry-operator:v4.7.0-202102130115.p0" } }, { "category": "product_version", "name": "openshift4/ose-cluster-ingress-operator:v4.7.0-202102130115.p0", "product": { "name": "openshift4/ose-cluster-ingress-operator:v4.7.0-202102130115.p0", "product_id": "openshift4/ose-cluster-ingress-operator:v4.7.0-202102130115.p0" } }, { "category": "product_version", "name": "openshift4/ose-cluster-kube-apiserver-operator:v4.7.0-202102130115.p0", "product": { "name": "openshift4/ose-cluster-kube-apiserver-operator:v4.7.0-202102130115.p0", "product_id": "openshift4/ose-cluster-kube-apiserver-operator:v4.7.0-202102130115.p0" } }, { "category": "product_version", "name": "openshift4/ose-cluster-kube-controller-manager-operator:v4.7.0-202102130115.p0", "product": { "name": "openshift4/ose-cluster-kube-controller-manager-operator:v4.7.0-202102130115.p0", "product_id": "openshift4/ose-cluster-kube-controller-manager-operator:v4.7.0-202102130115.p0" } }, { "category": "product_version", "name": "openshift4/ose-cluster-kube-scheduler-operator:v4.7.0-202102130115.p0", "product": { "name": "openshift4/ose-cluster-kube-scheduler-operator:v4.7.0-202102130115.p0", "product_id": "openshift4/ose-cluster-kube-scheduler-operator:v4.7.0-202102130115.p0" } }, { "category": "product_version", "name": "openshift4/ose-cluster-kube-storage-version-migrator-rhel8-operator:v4.7.0-202102130115.p0", "product": { "name": "openshift4/ose-cluster-kube-storage-version-migrator-rhel8-operator:v4.7.0-202102130115.p0", "product_id": "openshift4/ose-cluster-kube-storage-version-migrator-rhel8-operator:v4.7.0-202102130115.p0" } }, { "category": "product_version", "name": "openshift4/ose-cluster-machine-approver:v4.7.0-202102130115.p0", "product": { "name": "openshift4/ose-cluster-machine-approver:v4.7.0-202102130115.p0", "product_id": "openshift4/ose-cluster-machine-approver:v4.7.0-202102130115.p0" } }, { "category": "product_version", "name": "openshift4/ose-cluster-monitoring-operator:v4.7.0-202102172008.p0", "product": { "name": "openshift4/ose-cluster-monitoring-operator:v4.7.0-202102172008.p0", "product_id": "openshift4/ose-cluster-monitoring-operator:v4.7.0-202102172008.p0" } }, { "category": "product_version", "name": "openshift4/ose-cluster-network-operator:v4.7.0-202102130115.p0", "product": { "name": "openshift4/ose-cluster-network-operator:v4.7.0-202102130115.p0", "product_id": "openshift4/ose-cluster-network-operator:v4.7.0-202102130115.p0" } }, { "category": "product_version", "name": "openshift4/ose-cluster-node-tuning-operator:v4.7.0-202102130115.p0", "product": { "name": "openshift4/ose-cluster-node-tuning-operator:v4.7.0-202102130115.p0", "product_id": "openshift4/ose-cluster-node-tuning-operator:v4.7.0-202102130115.p0" } }, { "category": "product_version", "name": "openshift4/ose-cluster-openshift-apiserver-operator:v4.7.0-202102130115.p0", "product": { "name": "openshift4/ose-cluster-openshift-apiserver-operator:v4.7.0-202102130115.p0", "product_id": "openshift4/ose-cluster-openshift-apiserver-operator:v4.7.0-202102130115.p0" } }, { "category": "product_version", "name": "openshift4/ose-cluster-openshift-controller-manager-operator:v4.7.0-202102130115.p0", "product": { "name": "openshift4/ose-cluster-openshift-controller-manager-operator:v4.7.0-202102130115.p0", "product_id": "openshift4/ose-cluster-openshift-controller-manager-operator:v4.7.0-202102130115.p0" } }, { "category": "product_version", "name": "openshift4/ose-cluster-policy-controller-rhel8:v4.7.0-202102130115.p0", "product": { "name": "openshift4/ose-cluster-policy-controller-rhel8:v4.7.0-202102130115.p0", "product_id": "openshift4/ose-cluster-policy-controller-rhel8:v4.7.0-202102130115.p0" } }, { "category": "product_version", "name": "openshift4/ose-cluster-samples-operator:v4.7.0-202102130115.p0", "product": { "name": "openshift4/ose-cluster-samples-operator:v4.7.0-202102130115.p0", "product_id": "openshift4/ose-cluster-samples-operator:v4.7.0-202102130115.p0" } }, { "category": "product_version", "name": "openshift4/ose-cluster-storage-operator:v4.7.0-202102130115.p0", "product": { "name": "openshift4/ose-cluster-storage-operator:v4.7.0-202102130115.p0", "product_id": "openshift4/ose-cluster-storage-operator:v4.7.0-202102130115.p0" } }, { "category": "product_version", "name": "openshift4/ose-cluster-update-keys:v4.7.0-202102130115.p0", "product": { "name": "openshift4/ose-cluster-update-keys:v4.7.0-202102130115.p0", "product_id": "openshift4/ose-cluster-update-keys:v4.7.0-202102130115.p0" } }, { "category": "product_version", "name": "openshift4/ose-cluster-version-operator:v4.7.0-202102130115.p0", "product": { "name": "openshift4/ose-cluster-version-operator:v4.7.0-202102130115.p0", "product_id": "openshift4/ose-cluster-version-operator:v4.7.0-202102130115.p0" } }, { "category": "product_version", "name": "openshift4/ose-configmap-reloader:v4.7.0-202102130115.p0", "product": { "name": "openshift4/ose-configmap-reloader:v4.7.0-202102130115.p0", "product_id": "openshift4/ose-configmap-reloader:v4.7.0-202102130115.p0" } }, { "category": "product_version", "name": "openshift4/ose-console-operator:v4.7.0-202102130115.p0", "product": { "name": "openshift4/ose-console-operator:v4.7.0-202102130115.p0", "product_id": "openshift4/ose-console-operator:v4.7.0-202102130115.p0" } }, { "category": "product_version", "name": "openshift4/ose-console:v4.7.0-202102130115.p0", "product": { "name": "openshift4/ose-console:v4.7.0-202102130115.p0", "product_id": "openshift4/ose-console:v4.7.0-202102130115.p0" } }, { "category": "product_version", "name": "openshift4/ose-container-networking-plugins-rhel8:v4.7.0-202102130115.p0", "product": { "name": "openshift4/ose-container-networking-plugins-rhel8:v4.7.0-202102130115.p0", "product_id": "openshift4/ose-container-networking-plugins-rhel8:v4.7.0-202102130115.p0" } }, { "category": "product_version", "name": "openshift4/ose-coredns:v4.7.0-202102130115.p0", "product": { "name": "openshift4/ose-coredns:v4.7.0-202102130115.p0", "product_id": "openshift4/ose-coredns:v4.7.0-202102130115.p0" } }, { "category": "product_version", "name": "openshift4/ose-csi-driver-manila-rhel8-operator:v4.7.0-202102130115.p0", "product": { "name": "openshift4/ose-csi-driver-manila-rhel8-operator:v4.7.0-202102130115.p0", "product_id": "openshift4/ose-csi-driver-manila-rhel8-operator:v4.7.0-202102130115.p0" } }, { "category": "product_version", "name": "openshift4/ose-csi-driver-manila-rhel8:v4.7.0-202102130115.p0", "product": { "name": "openshift4/ose-csi-driver-manila-rhel8:v4.7.0-202102130115.p0", "product_id": "openshift4/ose-csi-driver-manila-rhel8:v4.7.0-202102130115.p0" } }, { "category": "product_version", "name": "openshift4/ose-csi-driver-nfs-rhel8:v4.7.0-202102130115.p0", "product": { "name": "openshift4/ose-csi-driver-nfs-rhel8:v4.7.0-202102130115.p0", "product_id": "openshift4/ose-csi-driver-nfs-rhel8:v4.7.0-202102130115.p0" } }, { "category": "product_version", "name": "openshift4/ose-csi-external-attacher-rhel8:v4.7.0-202102130115.p0", "product": { "name": "openshift4/ose-csi-external-attacher-rhel8:v4.7.0-202102130115.p0", "product_id": "openshift4/ose-csi-external-attacher-rhel8:v4.7.0-202102130115.p0" } }, { "category": "product_version", "name": "openshift4/ose-csi-external-attacher:v4.7.0-202102130115.p0", "product": { "name": "openshift4/ose-csi-external-attacher:v4.7.0-202102130115.p0", "product_id": "openshift4/ose-csi-external-attacher:v4.7.0-202102130115.p0" } }, { "category": "product_version", "name": "openshift4/ose-csi-external-provisioner-rhel8:v4.7.0-202102130115.p0", "product": { "name": "openshift4/ose-csi-external-provisioner-rhel8:v4.7.0-202102130115.p0", "product_id": "openshift4/ose-csi-external-provisioner-rhel8:v4.7.0-202102130115.p0" } }, { "category": "product_version", "name": "openshift4/ose-csi-external-provisioner:v4.7.0-202102130115.p0", "product": { "name": "openshift4/ose-csi-external-provisioner:v4.7.0-202102130115.p0", "product_id": "openshift4/ose-csi-external-provisioner:v4.7.0-202102130115.p0" } }, { "category": "product_version", "name": "openshift4/ose-csi-external-resizer-rhel8:v4.7.0-202102130115.p0", "product": { "name": "openshift4/ose-csi-external-resizer-rhel8:v4.7.0-202102130115.p0", "product_id": "openshift4/ose-csi-external-resizer-rhel8:v4.7.0-202102130115.p0" } }, { "category": "product_version", "name": "openshift4/ose-csi-external-resizer:v4.7.0-202102130115.p0", "product": { "name": "openshift4/ose-csi-external-resizer:v4.7.0-202102130115.p0", "product_id": "openshift4/ose-csi-external-resizer:v4.7.0-202102130115.p0" } }, { "category": "product_version", "name": "openshift4/ose-csi-external-snapshotter-rhel8:v4.7.0-202102130115.p0", "product": { "name": "openshift4/ose-csi-external-snapshotter-rhel8:v4.7.0-202102130115.p0", "product_id": "openshift4/ose-csi-external-snapshotter-rhel8:v4.7.0-202102130115.p0" } }, { "category": "product_version", "name": "openshift4/ose-csi-external-snapshotter:v4.7.0-202102130115.p0", "product": { "name": "openshift4/ose-csi-external-snapshotter:v4.7.0-202102130115.p0", "product_id": "openshift4/ose-csi-external-snapshotter:v4.7.0-202102130115.p0" } }, { "category": "product_version", "name": "openshift4/ose-csi-livenessprobe-rhel8:v4.7.0-202102130115.p0", "product": { "name": "openshift4/ose-csi-livenessprobe-rhel8:v4.7.0-202102130115.p0", "product_id": "openshift4/ose-csi-livenessprobe-rhel8:v4.7.0-202102130115.p0" } }, { "category": "product_version", "name": "openshift4/ose-csi-livenessprobe:v4.7.0-202102130115.p0", "product": { "name": "openshift4/ose-csi-livenessprobe:v4.7.0-202102130115.p0", "product_id": "openshift4/ose-csi-livenessprobe:v4.7.0-202102130115.p0" } }, { "category": "product_version", "name": "openshift4/ose-csi-node-driver-registrar-rhel8:v4.7.0-202102130115.p0", "product": { "name": "openshift4/ose-csi-node-driver-registrar-rhel8:v4.7.0-202102130115.p0", "product_id": "openshift4/ose-csi-node-driver-registrar-rhel8:v4.7.0-202102130115.p0" } }, { "category": "product_version", "name": "openshift4/ose-csi-node-driver-registrar:v4.7.0-202102130115.p0", "product": { "name": "openshift4/ose-csi-node-driver-registrar:v4.7.0-202102130115.p0", "product_id": "openshift4/ose-csi-node-driver-registrar:v4.7.0-202102130115.p0" } }, { "category": "product_version", "name": "openshift4/ose-csi-snapshot-controller-rhel8:v4.7.0-202102130115.p0", "product": { "name": "openshift4/ose-csi-snapshot-controller-rhel8:v4.7.0-202102130115.p0", "product_id": "openshift4/ose-csi-snapshot-controller-rhel8:v4.7.0-202102130115.p0" } }, { "category": "product_version", "name": "openshift4/ose-csi-snapshot-controller:v4.7.0-202102130115.p0", "product": { "name": "openshift4/ose-csi-snapshot-controller:v4.7.0-202102130115.p0", "product_id": "openshift4/ose-csi-snapshot-controller:v4.7.0-202102130115.p0" } }, { "category": "product_version", "name": "openshift4/ose-csi-snapshot-validation-webhook-rhel8:v4.7.0-202102130115.p0", "product": { "name": "openshift4/ose-csi-snapshot-validation-webhook-rhel8:v4.7.0-202102130115.p0", "product_id": "openshift4/ose-csi-snapshot-validation-webhook-rhel8:v4.7.0-202102130115.p0" } }, { "category": "product_version", "name": "openshift4/ose-deployer:v4.7.0-202102130115.p0", "product": { "name": "openshift4/ose-deployer:v4.7.0-202102130115.p0", "product_id": "openshift4/ose-deployer:v4.7.0-202102130115.p0" } }, { "category": "product_version", "name": "openshift4/ose-docker-builder:v4.7.0-202102130115.p0", "product": { "name": "openshift4/ose-docker-builder:v4.7.0-202102130115.p0", "product_id": "openshift4/ose-docker-builder:v4.7.0-202102130115.p0" } }, { "category": "product_version", "name": "openshift4/ose-docker-registry:v4.7.0-202102130115.p0", "product": { "name": "openshift4/ose-docker-registry:v4.7.0-202102130115.p0", "product_id": "openshift4/ose-docker-registry:v4.7.0-202102130115.p0" } }, { "category": "product_version", "name": "openshift4/ose-etcd:v4.7.0-202102130115.p0", "product": { "name": "openshift4/ose-etcd:v4.7.0-202102130115.p0", "product_id": "openshift4/ose-etcd:v4.7.0-202102130115.p0" } }, { "category": "product_version", "name": "openshift4/ose-gcp-machine-controllers-rhel8:v4.7.0-202102130115.p0", "product": { "name": "openshift4/ose-gcp-machine-controllers-rhel8:v4.7.0-202102130115.p0", "product_id": "openshift4/ose-gcp-machine-controllers-rhel8:v4.7.0-202102130115.p0" } }, { "category": "product_version", "name": "openshift4/ose-gcp-pd-csi-driver-operator-rhel8:v4.7.0-202102130115.p0", "product": { "name": "openshift4/ose-gcp-pd-csi-driver-operator-rhel8:v4.7.0-202102130115.p0", "product_id": "openshift4/ose-gcp-pd-csi-driver-operator-rhel8:v4.7.0-202102130115.p0" } }, { "category": "product_version", "name": "openshift4/ose-gcp-pd-csi-driver-rhel8:v4.7.0-202102130115.p0", "product": { "name": "openshift4/ose-gcp-pd-csi-driver-rhel8:v4.7.0-202102130115.p0", "product_id": "openshift4/ose-gcp-pd-csi-driver-rhel8:v4.7.0-202102130115.p0" } }, { "category": "product_version", "name": "openshift4/ose-grafana:v4.7.0-202102130115.p0", "product": { "name": "openshift4/ose-grafana:v4.7.0-202102130115.p0", "product_id": "openshift4/ose-grafana:v4.7.0-202102130115.p0" } }, { "category": "product_version", "name": "openshift4/ose-haproxy-router:v4.7.0-202102130115.p0", "product": { "name": "openshift4/ose-haproxy-router:v4.7.0-202102130115.p0", "product_id": "openshift4/ose-haproxy-router:v4.7.0-202102130115.p0" } }, { "category": "product_version", "name": "openshift4/ose-hello-openshift-rhel8:v4.7.0-202102130115.p0", "product": { "name": "openshift4/ose-hello-openshift-rhel8:v4.7.0-202102130115.p0", "product_id": "openshift4/ose-hello-openshift-rhel8:v4.7.0-202102130115.p0" } }, { "category": "product_version", "name": "openshift4/ose-hyperkube:v4.7.0-202102130115.p0", "product": { "name": "openshift4/ose-hyperkube:v4.7.0-202102130115.p0", "product_id": "openshift4/ose-hyperkube:v4.7.0-202102130115.p0" } }, { "category": "product_version", "name": "openshift4/ose-insights-rhel8-operator:v4.7.0-202102130115.p0", "product": { "name": "openshift4/ose-insights-rhel8-operator:v4.7.0-202102130115.p0", "product_id": "openshift4/ose-insights-rhel8-operator:v4.7.0-202102130115.p0" } }, { "category": "product_version", "name": "openshift4/ose-installer-artifacts:v4.7.0-202102130115.p0", "product": { "name": "openshift4/ose-installer-artifacts:v4.7.0-202102130115.p0", "product_id": "openshift4/ose-installer-artifacts:v4.7.0-202102130115.p0" } }, { "category": "product_version", "name": "openshift4/ose-installer:v4.7.0-202102130115.p0", "product": { "name": "openshift4/ose-installer:v4.7.0-202102130115.p0", "product_id": "openshift4/ose-installer:v4.7.0-202102130115.p0" } }, { "category": "product_version", "name": "openshift4/ose-ironic-hardware-inventory-recorder-rhel8:v4.7.0-202102130115.p0", "product": { "name": "openshift4/ose-ironic-hardware-inventory-recorder-rhel8:v4.7.0-202102130115.p0", "product_id": "openshift4/ose-ironic-hardware-inventory-recorder-rhel8:v4.7.0-202102130115.p0" } }, { "category": "product_version", "name": "openshift4/ose-ironic-inspector-rhel8:v4.7.0-202102130115.p0", "product": { "name": "openshift4/ose-ironic-inspector-rhel8:v4.7.0-202102130115.p0", "product_id": "openshift4/ose-ironic-inspector-rhel8:v4.7.0-202102130115.p0" } }, { "category": "product_version", "name": "openshift4/ose-ironic-ipa-downloader-rhel8:v4.7.0-202102130115.p0", "product": { "name": "openshift4/ose-ironic-ipa-downloader-rhel8:v4.7.0-202102130115.p0", "product_id": "openshift4/ose-ironic-ipa-downloader-rhel8:v4.7.0-202102130115.p0" } }, { "category": "product_version", "name": "openshift4/ose-ironic-machine-os-downloader-rhel8:v4.7.0-202102130115.p0", "product": { "name": "openshift4/ose-ironic-machine-os-downloader-rhel8:v4.7.0-202102130115.p0", "product_id": "openshift4/ose-ironic-machine-os-downloader-rhel8:v4.7.0-202102130115.p0" } }, { "category": "product_version", "name": "openshift4/ose-ironic-rhel8:v4.7.0-202102130115.p0", "product": { "name": "openshift4/ose-ironic-rhel8:v4.7.0-202102130115.p0", "product_id": "openshift4/ose-ironic-rhel8:v4.7.0-202102130115.p0" } }, { "category": "product_version", "name": "openshift4/ose-ironic-static-ip-manager-rhel8:v4.7.0-202102130115.p0", "product": { "name": "openshift4/ose-ironic-static-ip-manager-rhel8:v4.7.0-202102130115.p0", "product_id": "openshift4/ose-ironic-static-ip-manager-rhel8:v4.7.0-202102130115.p0" } }, { "category": "product_version", "name": "openshift4/ose-jenkins-agent-base:v4.7.0-202102130115.p0", "product": { "name": "openshift4/ose-jenkins-agent-base:v4.7.0-202102130115.p0", "product_id": "openshift4/ose-jenkins-agent-base:v4.7.0-202102130115.p0" } }, { "category": "product_version", "name": "openshift4/ose-jenkins-agent-maven:v4.7.0-202102130115.p0", "product": { "name": "openshift4/ose-jenkins-agent-maven:v4.7.0-202102130115.p0", "product_id": "openshift4/ose-jenkins-agent-maven:v4.7.0-202102130115.p0" } }, { "category": "product_version", "name": "openshift4/ose-jenkins-agent-nodejs-12-rhel8:v4.7.0-202102130115.p0", "product": { "name": "openshift4/ose-jenkins-agent-nodejs-12-rhel8:v4.7.0-202102130115.p0", "product_id": "openshift4/ose-jenkins-agent-nodejs-12-rhel8:v4.7.0-202102130115.p0" } }, { "category": "product_version", "name": "openshift4/ose-jenkins:v4.7.0-202102130115.p0", "product": { "name": "openshift4/ose-jenkins:v4.7.0-202102130115.p0", "product_id": "openshift4/ose-jenkins:v4.7.0-202102130115.p0" } }, { "category": "product_version", "name": "openshift4/ose-k8s-prometheus-adapter:v4.7.0-202102130115.p0", "product": { "name": "openshift4/ose-k8s-prometheus-adapter:v4.7.0-202102130115.p0", "product_id": "openshift4/ose-k8s-prometheus-adapter:v4.7.0-202102130115.p0" } }, { "category": "product_version", "name": "openshift4/ose-keepalived-ipfailover:v4.7.0-202102130115.p0", "product": { "name": "openshift4/ose-keepalived-ipfailover:v4.7.0-202102130115.p0", "product_id": "openshift4/ose-keepalived-ipfailover:v4.7.0-202102130115.p0" } }, { "category": "product_version", "name": "openshift4/ose-kube-proxy:v4.7.0-202102130115.p0", "product": { "name": "openshift4/ose-kube-proxy:v4.7.0-202102130115.p0", "product_id": "openshift4/ose-kube-proxy:v4.7.0-202102130115.p0" } }, { "category": "product_version", "name": "openshift4/ose-kube-rbac-proxy:v4.7.0-202102130115.p0", "product": { "name": "openshift4/ose-kube-rbac-proxy:v4.7.0-202102130115.p0", "product_id": "openshift4/ose-kube-rbac-proxy:v4.7.0-202102130115.p0" } }, { "category": "product_version", "name": "openshift4/ose-kube-state-metrics:v4.7.0-202102130115.p0", "product": { "name": "openshift4/ose-kube-state-metrics:v4.7.0-202102130115.p0", "product_id": "openshift4/ose-kube-state-metrics:v4.7.0-202102130115.p0" } }, { "category": "product_version", "name": "openshift4/ose-kube-storage-version-migrator-rhel8:v4.7.0-202102130115.p0", "product": { "name": "openshift4/ose-kube-storage-version-migrator-rhel8:v4.7.0-202102130115.p0", "product_id": "openshift4/ose-kube-storage-version-migrator-rhel8:v4.7.0-202102130115.p0" } }, { "category": "product_version", "name": "openshift4/ose-kuryr-cni-rhel8:v4.7.0-202102130115.p0", "product": { "name": "openshift4/ose-kuryr-cni-rhel8:v4.7.0-202102130115.p0", "product_id": "openshift4/ose-kuryr-cni-rhel8:v4.7.0-202102130115.p0" } }, { "category": "product_version", "name": "openshift4/ose-kuryr-controller-rhel8:v4.7.0-202102130115.p0", "product": { "name": "openshift4/ose-kuryr-controller-rhel8:v4.7.0-202102130115.p0", "product_id": "openshift4/ose-kuryr-controller-rhel8:v4.7.0-202102130115.p0" } }, { "category": "product_version", "name": "openshift4/ose-libvirt-machine-controllers:v4.7.0-202102130115.p0", "product": { "name": "openshift4/ose-libvirt-machine-controllers:v4.7.0-202102130115.p0", "product_id": "openshift4/ose-libvirt-machine-controllers:v4.7.0-202102130115.p0" } }, { "category": "product_version", "name": "openshift4/ose-local-storage-static-provisioner:v4.7.0-202102130115.p0", "product": { "name": "openshift4/ose-local-storage-static-provisioner:v4.7.0-202102130115.p0", "product_id": "openshift4/ose-local-storage-static-provisioner:v4.7.0-202102130115.p0" } }, { "category": "product_version", "name": "openshift4/ose-machine-api-operator:v4.7.0-202102172008.p0", "product": { "name": "openshift4/ose-machine-api-operator:v4.7.0-202102172008.p0", "product_id": "openshift4/ose-machine-api-operator:v4.7.0-202102172008.p0" } }, { "category": "product_version", "name": "openshift4/ose-machine-config-operator:v4.7.0-202102130115.p0", "product": { "name": "openshift4/ose-machine-config-operator:v4.7.0-202102130115.p0", "product_id": "openshift4/ose-machine-config-operator:v4.7.0-202102130115.p0" } }, { "category": "product_version", "name": "openshift4/ose-mdns-publisher-rhel8:v4.7.0-202102130115.p0", "product": { "name": "openshift4/ose-mdns-publisher-rhel8:v4.7.0-202102130115.p0", "product_id": "openshift4/ose-mdns-publisher-rhel8:v4.7.0-202102130115.p0" } }, { "category": "product_version", "name": "openshift4/ose-multus-admission-controller:v4.7.0-202102130115.p0", "product": { "name": "openshift4/ose-multus-admission-controller:v4.7.0-202102130115.p0", "product_id": "openshift4/ose-multus-admission-controller:v4.7.0-202102130115.p0" } }, { "category": "product_version", "name": "openshift4/ose-multus-cni:v4.7.0-202102130115.p0", "product": { "name": "openshift4/ose-multus-cni:v4.7.0-202102130115.p0", "product_id": "openshift4/ose-multus-cni:v4.7.0-202102130115.p0" } }, { "category": "product_version", "name": "openshift4/ose-multus-networkpolicy-rhel8:v4.7.0-202102130115.p0", "product": { "name": "openshift4/ose-multus-networkpolicy-rhel8:v4.7.0-202102130115.p0", "product_id": "openshift4/ose-multus-networkpolicy-rhel8:v4.7.0-202102130115.p0" } }, { "category": "product_version", "name": "openshift4/ose-multus-route-override-cni-rhel8:v4.7.0-202102130115.p0", "product": { "name": "openshift4/ose-multus-route-override-cni-rhel8:v4.7.0-202102130115.p0", "product_id": "openshift4/ose-multus-route-override-cni-rhel8:v4.7.0-202102130115.p0" } }, { "category": "product_version", "name": "openshift4/ose-multus-whereabouts-ipam-cni-rhel8:v4.7.0-202102130115.p0", "product": { "name": "openshift4/ose-multus-whereabouts-ipam-cni-rhel8:v4.7.0-202102130115.p0", "product_id": "openshift4/ose-multus-whereabouts-ipam-cni-rhel8:v4.7.0-202102130115.p0" } }, { "category": "product_version", "name": "openshift4/ose-must-gather:v4.7.0-202102130115.p0", "product": { "name": "openshift4/ose-must-gather:v4.7.0-202102130115.p0", "product_id": "openshift4/ose-must-gather:v4.7.0-202102130115.p0" } }, { "category": "product_version", "name": "openshift4/ose-network-metrics-daemon-rhel8:v4.7.0-202102130115.p0", "product": { "name": "openshift4/ose-network-metrics-daemon-rhel8:v4.7.0-202102130115.p0", "product_id": "openshift4/ose-network-metrics-daemon-rhel8:v4.7.0-202102130115.p0" } }, { "category": "product_version", "name": "openshift4/ose-oauth-apiserver-rhel8:v4.7.0-202102130115.p0", "product": { "name": "openshift4/ose-oauth-apiserver-rhel8:v4.7.0-202102130115.p0", "product_id": "openshift4/ose-oauth-apiserver-rhel8:v4.7.0-202102130115.p0" } }, { "category": "product_version", "name": "openshift4/ose-oauth-proxy:v4.7.0-202102130115.p0", "product": { "name": "openshift4/ose-oauth-proxy:v4.7.0-202102130115.p0", "product_id": "openshift4/ose-oauth-proxy:v4.7.0-202102130115.p0" } }, { "category": "product_version", "name": "openshift4/ose-oauth-server-rhel8:v4.7.0-202102130115.p0", "product": { "name": "openshift4/ose-oauth-server-rhel8:v4.7.0-202102130115.p0", "product_id": "openshift4/ose-oauth-server-rhel8:v4.7.0-202102130115.p0" } }, { "category": "product_version", "name": "openshift4/ose-openshift-apiserver-rhel8:v4.7.0-202102130115.p0", "product": { "name": "openshift4/ose-openshift-apiserver-rhel8:v4.7.0-202102130115.p0", "product_id": "openshift4/ose-openshift-apiserver-rhel8:v4.7.0-202102130115.p0" } }, { "category": "product_version", "name": "openshift4/ose-openshift-controller-manager-rhel8:v4.7.0-202102130115.p0", "product": { "name": "openshift4/ose-openshift-controller-manager-rhel8:v4.7.0-202102130115.p0", "product_id": "openshift4/ose-openshift-controller-manager-rhel8:v4.7.0-202102130115.p0" } }, { "category": "product_version", "name": "openshift4/ose-openshift-state-metrics-rhel8:v4.7.0-202102130115.p0", "product": { "name": "openshift4/ose-openshift-state-metrics-rhel8:v4.7.0-202102130115.p0", "product_id": "openshift4/ose-openshift-state-metrics-rhel8:v4.7.0-202102130115.p0" } }, { "category": "product_version", "name": "openshift4/ose-openstack-cinder-csi-driver-rhel8-operator:v4.7.0-202102130115.p0", "product": { "name": "openshift4/ose-openstack-cinder-csi-driver-rhel8-operator:v4.7.0-202102130115.p0", "product_id": "openshift4/ose-openstack-cinder-csi-driver-rhel8-operator:v4.7.0-202102130115.p0" } }, { "category": "product_version", "name": "openshift4/ose-openstack-cinder-csi-driver-rhel8:v4.7.0-202102130115.p0", "product": { "name": "openshift4/ose-openstack-cinder-csi-driver-rhel8:v4.7.0-202102130115.p0", "product_id": "openshift4/ose-openstack-cinder-csi-driver-rhel8:v4.7.0-202102130115.p0" } }, { "category": "product_version", "name": "openshift4/ose-openstack-machine-controllers:v4.7.0-202102130115.p0", "product": { "name": "openshift4/ose-openstack-machine-controllers:v4.7.0-202102130115.p0", "product_id": "openshift4/ose-openstack-machine-controllers:v4.7.0-202102130115.p0" } }, { "category": "product_version", "name": "openshift4/ose-operator-lifecycle-manager:v4.7.0-202102130115.p0", "product": { "name": "openshift4/ose-operator-lifecycle-manager:v4.7.0-202102130115.p0", "product_id": "openshift4/ose-operator-lifecycle-manager:v4.7.0-202102130115.p0" } }, { "category": "product_version", "name": "openshift4/ose-operator-marketplace:v4.7.0-202102130115.p0", "product": { "name": "openshift4/ose-operator-marketplace:v4.7.0-202102130115.p0", "product_id": "openshift4/ose-operator-marketplace:v4.7.0-202102130115.p0" } }, { "category": "product_version", "name": "openshift4/ose-operator-registry:v4.7.0-202102130115.p0", "product": { "name": "openshift4/ose-operator-registry:v4.7.0-202102130115.p0", "product_id": "openshift4/ose-operator-registry:v4.7.0-202102130115.p0" } }, { "category": "product_version", "name": "openshift4/ose-ovirt-machine-controllers-rhel8:v4.7.0-202102130115.p0", "product": { "name": "openshift4/ose-ovirt-machine-controllers-rhel8:v4.7.0-202102130115.p0", "product_id": "openshift4/ose-ovirt-machine-controllers-rhel8:v4.7.0-202102130115.p0" } }, { "category": "product_version", "name": "openshift4/ose-ovn-kubernetes:v4.7.0-202102130115.p0", "product": { "name": "openshift4/ose-ovn-kubernetes:v4.7.0-202102130115.p0", "product_id": "openshift4/ose-ovn-kubernetes:v4.7.0-202102130115.p0" } }, { "category": "product_version", "name": "openshift4/ose-pod:v4.7.0-202102130115.p0", "product": { "name": "openshift4/ose-pod:v4.7.0-202102130115.p0", "product_id": "openshift4/ose-pod:v4.7.0-202102130115.p0" } }, { "category": "product_version", "name": "openshift4/ose-prom-label-proxy:v4.7.0-202102130115.p0", "product": { "name": "openshift4/ose-prom-label-proxy:v4.7.0-202102130115.p0", "product_id": "openshift4/ose-prom-label-proxy:v4.7.0-202102130115.p0" } }, { "category": "product_version", "name": "openshift4/ose-prometheus-alertmanager:v4.7.0-202102130115.p0", "product": { "name": "openshift4/ose-prometheus-alertmanager:v4.7.0-202102130115.p0", "product_id": "openshift4/ose-prometheus-alertmanager:v4.7.0-202102130115.p0" } }, { "category": "product_version", "name": "openshift4/ose-prometheus-config-reloader:v4.7.0-202102130115.p0", "product": { "name": "openshift4/ose-prometheus-config-reloader:v4.7.0-202102130115.p0", "product_id": "openshift4/ose-prometheus-config-reloader:v4.7.0-202102130115.p0" } }, { "category": "product_version", "name": "openshift4/ose-prometheus-node-exporter:v4.7.0-202102130115.p0", "product": { "name": "openshift4/ose-prometheus-node-exporter:v4.7.0-202102130115.p0", "product_id": "openshift4/ose-prometheus-node-exporter:v4.7.0-202102130115.p0" } }, { "category": "product_version", "name": "openshift4/ose-prometheus-operator:v4.7.0-202102130115.p0", "product": { "name": "openshift4/ose-prometheus-operator:v4.7.0-202102130115.p0", "product_id": "openshift4/ose-prometheus-operator:v4.7.0-202102130115.p0" } }, { "category": "product_version", "name": "openshift4/ose-prometheus:v4.7.0-202102130115.p0", "product": { "name": "openshift4/ose-prometheus:v4.7.0-202102130115.p0", "product_id": "openshift4/ose-prometheus:v4.7.0-202102130115.p0" } }, { "category": "product_version", "name": "openshift4/ose-sdn-rhel8:v4.7.0-202102130115.p0", "product": { "name": "openshift4/ose-sdn-rhel8:v4.7.0-202102130115.p0", "product_id": "openshift4/ose-sdn-rhel8:v4.7.0-202102130115.p0" } }, { "category": "product_version", "name": "openshift4/ose-service-ca-operator:v4.7.0-202102130115.p0", "product": { "name": "openshift4/ose-service-ca-operator:v4.7.0-202102130115.p0", "product_id": "openshift4/ose-service-ca-operator:v4.7.0-202102130115.p0" } }, { "category": "product_version", "name": "openshift4/ose-telemeter:v4.7.0-202102130115.p0", "product": { "name": "openshift4/ose-telemeter:v4.7.0-202102130115.p0", "product_id": "openshift4/ose-telemeter:v4.7.0-202102130115.p0" } }, { "category": "product_version", "name": "openshift4/ose-tests:v4.7.0-202102181036.p0", "product": { "name": "openshift4/ose-tests:v4.7.0-202102181036.p0", "product_id": "openshift4/ose-tests:v4.7.0-202102181036.p0" } }, { "category": "product_version", "name": "openshift4/ose-thanos-rhel8:v4.7.0-202102130115.p0", "product": { "name": "openshift4/ose-thanos-rhel8:v4.7.0-202102130115.p0", "product_id": "openshift4/ose-thanos-rhel8:v4.7.0-202102130115.p0" } }, { "category": "product_version", "name": "openshift4/ose-tools-rhel8:v4.7.0-202102130115.p0", "product": { "name": "openshift4/ose-tools-rhel8:v4.7.0-202102130115.p0", "product_id": "openshift4/ose-tools-rhel8:v4.7.0-202102130115.p0" } }, { "category": "product_version", "name": "openshift4/ose-vsphere-problem-detector-rhel8:v4.7.0-202102130115.p0", "product": { "name": "openshift4/ose-vsphere-problem-detector-rhel8:v4.7.0-202102130115.p0", "product_id": "openshift4/ose-vsphere-problem-detector-rhel8:v4.7.0-202102130115.p0" } }, { "category": "product_version", "name": "openshift4/ovirt-csi-driver-rhel7:v4.7.0-202102130115.p0", "product": { "name": "openshift4/ovirt-csi-driver-rhel7:v4.7.0-202102130115.p0", "product_id": "openshift4/ovirt-csi-driver-rhel7:v4.7.0-202102130115.p0" } }, { "category": "product_version", "name": "openshift4/ovirt-csi-driver-rhel8-operator:v4.7.0-202102130115.p0", "product": { "name": "openshift4/ovirt-csi-driver-rhel8-operator:v4.7.0-202102130115.p0", "product_id": "openshift4/ovirt-csi-driver-rhel8-operator:v4.7.0-202102130115.p0" } } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "openshift4/egress-router-cni-rhel8:v4.7.0-202102130115.p0 as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:openshift4/egress-router-cni-rhel8:v4.7.0-202102130115.p0" }, "product_reference": "openshift4/egress-router-cni-rhel8:v4.7.0-202102130115.p0", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-aws-ebs-csi-driver-rhel8-operator:v4.7.0-202102130115.p0 as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:openshift4/ose-aws-ebs-csi-driver-rhel8-operator:v4.7.0-202102130115.p0" }, "product_reference": "openshift4/ose-aws-ebs-csi-driver-rhel8-operator:v4.7.0-202102130115.p0", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-aws-ebs-csi-driver-rhel8:v4.7.0-202102130115.p0 as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:openshift4/ose-aws-ebs-csi-driver-rhel8:v4.7.0-202102130115.p0" }, "product_reference": "openshift4/ose-aws-ebs-csi-driver-rhel8:v4.7.0-202102130115.p0", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-aws-machine-controllers:v4.7.0-202102130115.p0 as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:openshift4/ose-aws-machine-controllers:v4.7.0-202102130115.p0" }, "product_reference": "openshift4/ose-aws-machine-controllers:v4.7.0-202102130115.p0", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-aws-pod-identity-webhook-rhel8:v4.7.0-202102130115.p0 as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:openshift4/ose-aws-pod-identity-webhook-rhel8:v4.7.0-202102130115.p0" }, "product_reference": "openshift4/ose-aws-pod-identity-webhook-rhel8:v4.7.0-202102130115.p0", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-azure-machine-controllers:v4.7.0-202102130115.p0 as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:openshift4/ose-azure-machine-controllers:v4.7.0-202102130115.p0" }, "product_reference": "openshift4/ose-azure-machine-controllers:v4.7.0-202102130115.p0", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-baremetal-installer-rhel8:v4.7.0-202102130115.p0 as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:openshift4/ose-baremetal-installer-rhel8:v4.7.0-202102130115.p0" }, "product_reference": "openshift4/ose-baremetal-installer-rhel8:v4.7.0-202102130115.p0", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-baremetal-machine-controllers:v4.7.0-202102130115.p0 as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:openshift4/ose-baremetal-machine-controllers:v4.7.0-202102130115.p0" }, "product_reference": "openshift4/ose-baremetal-machine-controllers:v4.7.0-202102130115.p0", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-baremetal-rhel8-operator:v4.7.0-202102130115.p0 as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:openshift4/ose-baremetal-rhel8-operator:v4.7.0-202102130115.p0" }, "product_reference": "openshift4/ose-baremetal-rhel8-operator:v4.7.0-202102130115.p0", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-baremetal-runtimecfg-rhel8:v4.7.0-202102130115.p0 as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:openshift4/ose-baremetal-runtimecfg-rhel8:v4.7.0-202102130115.p0" }, "product_reference": "openshift4/ose-baremetal-runtimecfg-rhel8:v4.7.0-202102130115.p0", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cli-artifacts:v4.7.0-202102130115.p0 as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:openshift4/ose-cli-artifacts:v4.7.0-202102130115.p0" }, "product_reference": "openshift4/ose-cli-artifacts:v4.7.0-202102130115.p0", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cli:v4.7.0-202102130115.p0 as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:openshift4/ose-cli:v4.7.0-202102130115.p0" }, "product_reference": "openshift4/ose-cli:v4.7.0-202102130115.p0", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cloud-credential-operator:v4.7.0-202102130115.p0 as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:openshift4/ose-cloud-credential-operator:v4.7.0-202102130115.p0" }, "product_reference": "openshift4/ose-cloud-credential-operator:v4.7.0-202102130115.p0", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cluster-authentication-operator:v4.7.0-202102130115.p0 as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:openshift4/ose-cluster-authentication-operator:v4.7.0-202102130115.p0" }, "product_reference": "openshift4/ose-cluster-authentication-operator:v4.7.0-202102130115.p0", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cluster-autoscaler-operator:v4.7.0-202102130115.p0 as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:openshift4/ose-cluster-autoscaler-operator:v4.7.0-202102130115.p0" }, "product_reference": "openshift4/ose-cluster-autoscaler-operator:v4.7.0-202102130115.p0", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cluster-autoscaler:v4.7.0-202102130115.p0 as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:openshift4/ose-cluster-autoscaler:v4.7.0-202102130115.p0" }, "product_reference": "openshift4/ose-cluster-autoscaler:v4.7.0-202102130115.p0", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cluster-baremetal-operator-rhel8:v4.7.0-202102130115.p0 as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:openshift4/ose-cluster-baremetal-operator-rhel8:v4.7.0-202102130115.p0" }, "product_reference": "openshift4/ose-cluster-baremetal-operator-rhel8:v4.7.0-202102130115.p0", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cluster-bootstrap:v4.7.0-202102130115.p0 as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:openshift4/ose-cluster-bootstrap:v4.7.0-202102130115.p0" }, "product_reference": "openshift4/ose-cluster-bootstrap:v4.7.0-202102130115.p0", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cluster-config-operator:v4.7.0-202102130115.p0 as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:openshift4/ose-cluster-config-operator:v4.7.0-202102130115.p0" }, "product_reference": "openshift4/ose-cluster-config-operator:v4.7.0-202102130115.p0", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cluster-csi-snapshot-controller-rhel8-operator:v4.7.0-202102130115.p0 as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:openshift4/ose-cluster-csi-snapshot-controller-rhel8-operator:v4.7.0-202102130115.p0" }, "product_reference": "openshift4/ose-cluster-csi-snapshot-controller-rhel8-operator:v4.7.0-202102130115.p0", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cluster-dns-operator:v4.7.0-202102130115.p0 as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:openshift4/ose-cluster-dns-operator:v4.7.0-202102130115.p0" }, "product_reference": "openshift4/ose-cluster-dns-operator:v4.7.0-202102130115.p0", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cluster-etcd-rhel8-operator:v4.7.0-202102130115.p0 as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:openshift4/ose-cluster-etcd-rhel8-operator:v4.7.0-202102130115.p0" }, "product_reference": "openshift4/ose-cluster-etcd-rhel8-operator:v4.7.0-202102130115.p0", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cluster-image-registry-operator:v4.7.0-202102130115.p0 as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:openshift4/ose-cluster-image-registry-operator:v4.7.0-202102130115.p0" }, "product_reference": "openshift4/ose-cluster-image-registry-operator:v4.7.0-202102130115.p0", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cluster-ingress-operator:v4.7.0-202102130115.p0 as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:openshift4/ose-cluster-ingress-operator:v4.7.0-202102130115.p0" }, "product_reference": "openshift4/ose-cluster-ingress-operator:v4.7.0-202102130115.p0", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cluster-kube-apiserver-operator:v4.7.0-202102130115.p0 as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:openshift4/ose-cluster-kube-apiserver-operator:v4.7.0-202102130115.p0" }, "product_reference": "openshift4/ose-cluster-kube-apiserver-operator:v4.7.0-202102130115.p0", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cluster-kube-controller-manager-operator:v4.7.0-202102130115.p0 as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:openshift4/ose-cluster-kube-controller-manager-operator:v4.7.0-202102130115.p0" }, "product_reference": "openshift4/ose-cluster-kube-controller-manager-operator:v4.7.0-202102130115.p0", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cluster-kube-scheduler-operator:v4.7.0-202102130115.p0 as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:openshift4/ose-cluster-kube-scheduler-operator:v4.7.0-202102130115.p0" }, "product_reference": "openshift4/ose-cluster-kube-scheduler-operator:v4.7.0-202102130115.p0", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cluster-kube-storage-version-migrator-rhel8-operator:v4.7.0-202102130115.p0 as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:openshift4/ose-cluster-kube-storage-version-migrator-rhel8-operator:v4.7.0-202102130115.p0" }, "product_reference": "openshift4/ose-cluster-kube-storage-version-migrator-rhel8-operator:v4.7.0-202102130115.p0", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cluster-machine-approver:v4.7.0-202102130115.p0 as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:openshift4/ose-cluster-machine-approver:v4.7.0-202102130115.p0" }, "product_reference": "openshift4/ose-cluster-machine-approver:v4.7.0-202102130115.p0", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cluster-monitoring-operator:v4.7.0-202102172008.p0 as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:openshift4/ose-cluster-monitoring-operator:v4.7.0-202102172008.p0" }, "product_reference": "openshift4/ose-cluster-monitoring-operator:v4.7.0-202102172008.p0", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cluster-network-operator:v4.7.0-202102130115.p0 as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:openshift4/ose-cluster-network-operator:v4.7.0-202102130115.p0" }, "product_reference": "openshift4/ose-cluster-network-operator:v4.7.0-202102130115.p0", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cluster-node-tuning-operator:v4.7.0-202102130115.p0 as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:openshift4/ose-cluster-node-tuning-operator:v4.7.0-202102130115.p0" }, "product_reference": "openshift4/ose-cluster-node-tuning-operator:v4.7.0-202102130115.p0", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cluster-openshift-apiserver-operator:v4.7.0-202102130115.p0 as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:openshift4/ose-cluster-openshift-apiserver-operator:v4.7.0-202102130115.p0" }, "product_reference": "openshift4/ose-cluster-openshift-apiserver-operator:v4.7.0-202102130115.p0", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cluster-openshift-controller-manager-operator:v4.7.0-202102130115.p0 as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:openshift4/ose-cluster-openshift-controller-manager-operator:v4.7.0-202102130115.p0" }, "product_reference": "openshift4/ose-cluster-openshift-controller-manager-operator:v4.7.0-202102130115.p0", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cluster-policy-controller-rhel8:v4.7.0-202102130115.p0 as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:openshift4/ose-cluster-policy-controller-rhel8:v4.7.0-202102130115.p0" }, "product_reference": "openshift4/ose-cluster-policy-controller-rhel8:v4.7.0-202102130115.p0", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cluster-samples-operator:v4.7.0-202102130115.p0 as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:openshift4/ose-cluster-samples-operator:v4.7.0-202102130115.p0" }, "product_reference": "openshift4/ose-cluster-samples-operator:v4.7.0-202102130115.p0", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cluster-storage-operator:v4.7.0-202102130115.p0 as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:openshift4/ose-cluster-storage-operator:v4.7.0-202102130115.p0" }, "product_reference": "openshift4/ose-cluster-storage-operator:v4.7.0-202102130115.p0", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cluster-update-keys:v4.7.0-202102130115.p0 as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:openshift4/ose-cluster-update-keys:v4.7.0-202102130115.p0" }, "product_reference": "openshift4/ose-cluster-update-keys:v4.7.0-202102130115.p0", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cluster-version-operator:v4.7.0-202102130115.p0 as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:openshift4/ose-cluster-version-operator:v4.7.0-202102130115.p0" }, "product_reference": "openshift4/ose-cluster-version-operator:v4.7.0-202102130115.p0", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-configmap-reloader:v4.7.0-202102130115.p0 as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:openshift4/ose-configmap-reloader:v4.7.0-202102130115.p0" }, "product_reference": "openshift4/ose-configmap-reloader:v4.7.0-202102130115.p0", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-console-operator:v4.7.0-202102130115.p0 as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:openshift4/ose-console-operator:v4.7.0-202102130115.p0" }, "product_reference": "openshift4/ose-console-operator:v4.7.0-202102130115.p0", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-console:v4.7.0-202102130115.p0 as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:openshift4/ose-console:v4.7.0-202102130115.p0" }, "product_reference": "openshift4/ose-console:v4.7.0-202102130115.p0", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-container-networking-plugins-rhel8:v4.7.0-202102130115.p0 as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:openshift4/ose-container-networking-plugins-rhel8:v4.7.0-202102130115.p0" }, "product_reference": "openshift4/ose-container-networking-plugins-rhel8:v4.7.0-202102130115.p0", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-coredns:v4.7.0-202102130115.p0 as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:openshift4/ose-coredns:v4.7.0-202102130115.p0" }, "product_reference": "openshift4/ose-coredns:v4.7.0-202102130115.p0", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-csi-driver-manila-rhel8-operator:v4.7.0-202102130115.p0 as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:openshift4/ose-csi-driver-manila-rhel8-operator:v4.7.0-202102130115.p0" }, "product_reference": "openshift4/ose-csi-driver-manila-rhel8-operator:v4.7.0-202102130115.p0", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-csi-driver-manila-rhel8:v4.7.0-202102130115.p0 as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:openshift4/ose-csi-driver-manila-rhel8:v4.7.0-202102130115.p0" }, "product_reference": "openshift4/ose-csi-driver-manila-rhel8:v4.7.0-202102130115.p0", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-csi-driver-nfs-rhel8:v4.7.0-202102130115.p0 as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:openshift4/ose-csi-driver-nfs-rhel8:v4.7.0-202102130115.p0" }, "product_reference": "openshift4/ose-csi-driver-nfs-rhel8:v4.7.0-202102130115.p0", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-csi-external-attacher-rhel8:v4.7.0-202102130115.p0 as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:openshift4/ose-csi-external-attacher-rhel8:v4.7.0-202102130115.p0" }, "product_reference": "openshift4/ose-csi-external-attacher-rhel8:v4.7.0-202102130115.p0", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-csi-external-attacher:v4.7.0-202102130115.p0 as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:openshift4/ose-csi-external-attacher:v4.7.0-202102130115.p0" }, "product_reference": "openshift4/ose-csi-external-attacher:v4.7.0-202102130115.p0", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-csi-external-provisioner-rhel8:v4.7.0-202102130115.p0 as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:openshift4/ose-csi-external-provisioner-rhel8:v4.7.0-202102130115.p0" }, "product_reference": "openshift4/ose-csi-external-provisioner-rhel8:v4.7.0-202102130115.p0", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-csi-external-provisioner:v4.7.0-202102130115.p0 as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:openshift4/ose-csi-external-provisioner:v4.7.0-202102130115.p0" }, "product_reference": "openshift4/ose-csi-external-provisioner:v4.7.0-202102130115.p0", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-csi-external-resizer-rhel8:v4.7.0-202102130115.p0 as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:openshift4/ose-csi-external-resizer-rhel8:v4.7.0-202102130115.p0" }, "product_reference": "openshift4/ose-csi-external-resizer-rhel8:v4.7.0-202102130115.p0", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-csi-external-resizer:v4.7.0-202102130115.p0 as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:openshift4/ose-csi-external-resizer:v4.7.0-202102130115.p0" }, "product_reference": "openshift4/ose-csi-external-resizer:v4.7.0-202102130115.p0", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-csi-external-snapshotter-rhel8:v4.7.0-202102130115.p0 as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:openshift4/ose-csi-external-snapshotter-rhel8:v4.7.0-202102130115.p0" }, "product_reference": "openshift4/ose-csi-external-snapshotter-rhel8:v4.7.0-202102130115.p0", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-csi-external-snapshotter:v4.7.0-202102130115.p0 as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:openshift4/ose-csi-external-snapshotter:v4.7.0-202102130115.p0" }, "product_reference": "openshift4/ose-csi-external-snapshotter:v4.7.0-202102130115.p0", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-csi-livenessprobe-rhel8:v4.7.0-202102130115.p0 as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:openshift4/ose-csi-livenessprobe-rhel8:v4.7.0-202102130115.p0" }, "product_reference": "openshift4/ose-csi-livenessprobe-rhel8:v4.7.0-202102130115.p0", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-csi-livenessprobe:v4.7.0-202102130115.p0 as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:openshift4/ose-csi-livenessprobe:v4.7.0-202102130115.p0" }, "product_reference": "openshift4/ose-csi-livenessprobe:v4.7.0-202102130115.p0", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-csi-node-driver-registrar-rhel8:v4.7.0-202102130115.p0 as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:openshift4/ose-csi-node-driver-registrar-rhel8:v4.7.0-202102130115.p0" }, "product_reference": "openshift4/ose-csi-node-driver-registrar-rhel8:v4.7.0-202102130115.p0", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-csi-node-driver-registrar:v4.7.0-202102130115.p0 as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:openshift4/ose-csi-node-driver-registrar:v4.7.0-202102130115.p0" }, "product_reference": "openshift4/ose-csi-node-driver-registrar:v4.7.0-202102130115.p0", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-csi-snapshot-controller-rhel8:v4.7.0-202102130115.p0 as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:openshift4/ose-csi-snapshot-controller-rhel8:v4.7.0-202102130115.p0" }, "product_reference": "openshift4/ose-csi-snapshot-controller-rhel8:v4.7.0-202102130115.p0", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-csi-snapshot-controller:v4.7.0-202102130115.p0 as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:openshift4/ose-csi-snapshot-controller:v4.7.0-202102130115.p0" }, "product_reference": "openshift4/ose-csi-snapshot-controller:v4.7.0-202102130115.p0", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-csi-snapshot-validation-webhook-rhel8:v4.7.0-202102130115.p0 as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:openshift4/ose-csi-snapshot-validation-webhook-rhel8:v4.7.0-202102130115.p0" }, "product_reference": "openshift4/ose-csi-snapshot-validation-webhook-rhel8:v4.7.0-202102130115.p0", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-deployer:v4.7.0-202102130115.p0 as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:openshift4/ose-deployer:v4.7.0-202102130115.p0" }, "product_reference": "openshift4/ose-deployer:v4.7.0-202102130115.p0", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-docker-builder:v4.7.0-202102130115.p0 as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:openshift4/ose-docker-builder:v4.7.0-202102130115.p0" }, "product_reference": "openshift4/ose-docker-builder:v4.7.0-202102130115.p0", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-docker-registry:v4.7.0-202102130115.p0 as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:openshift4/ose-docker-registry:v4.7.0-202102130115.p0" }, "product_reference": "openshift4/ose-docker-registry:v4.7.0-202102130115.p0", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-etcd:v4.7.0-202102130115.p0 as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:openshift4/ose-etcd:v4.7.0-202102130115.p0" }, "product_reference": "openshift4/ose-etcd:v4.7.0-202102130115.p0", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-gcp-machine-controllers-rhel8:v4.7.0-202102130115.p0 as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:openshift4/ose-gcp-machine-controllers-rhel8:v4.7.0-202102130115.p0" }, "product_reference": "openshift4/ose-gcp-machine-controllers-rhel8:v4.7.0-202102130115.p0", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-gcp-pd-csi-driver-operator-rhel8:v4.7.0-202102130115.p0 as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:openshift4/ose-gcp-pd-csi-driver-operator-rhel8:v4.7.0-202102130115.p0" }, "product_reference": "openshift4/ose-gcp-pd-csi-driver-operator-rhel8:v4.7.0-202102130115.p0", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-gcp-pd-csi-driver-rhel8:v4.7.0-202102130115.p0 as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:openshift4/ose-gcp-pd-csi-driver-rhel8:v4.7.0-202102130115.p0" }, "product_reference": "openshift4/ose-gcp-pd-csi-driver-rhel8:v4.7.0-202102130115.p0", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-grafana:v4.7.0-202102130115.p0 as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:openshift4/ose-grafana:v4.7.0-202102130115.p0" }, "product_reference": "openshift4/ose-grafana:v4.7.0-202102130115.p0", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-haproxy-router:v4.7.0-202102130115.p0 as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:openshift4/ose-haproxy-router:v4.7.0-202102130115.p0" }, "product_reference": "openshift4/ose-haproxy-router:v4.7.0-202102130115.p0", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-hello-openshift-rhel8:v4.7.0-202102130115.p0 as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:openshift4/ose-hello-openshift-rhel8:v4.7.0-202102130115.p0" }, "product_reference": "openshift4/ose-hello-openshift-rhel8:v4.7.0-202102130115.p0", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-hyperkube:v4.7.0-202102130115.p0 as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:openshift4/ose-hyperkube:v4.7.0-202102130115.p0" }, "product_reference": "openshift4/ose-hyperkube:v4.7.0-202102130115.p0", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-insights-rhel8-operator:v4.7.0-202102130115.p0 as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:openshift4/ose-insights-rhel8-operator:v4.7.0-202102130115.p0" }, "product_reference": "openshift4/ose-insights-rhel8-operator:v4.7.0-202102130115.p0", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-installer-artifacts:v4.7.0-202102130115.p0 as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:openshift4/ose-installer-artifacts:v4.7.0-202102130115.p0" }, "product_reference": "openshift4/ose-installer-artifacts:v4.7.0-202102130115.p0", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-installer:v4.7.0-202102130115.p0 as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:openshift4/ose-installer:v4.7.0-202102130115.p0" }, "product_reference": "openshift4/ose-installer:v4.7.0-202102130115.p0", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-ironic-hardware-inventory-recorder-rhel8:v4.7.0-202102130115.p0 as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:openshift4/ose-ironic-hardware-inventory-recorder-rhel8:v4.7.0-202102130115.p0" }, "product_reference": "openshift4/ose-ironic-hardware-inventory-recorder-rhel8:v4.7.0-202102130115.p0", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-ironic-inspector-rhel8:v4.7.0-202102130115.p0 as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:openshift4/ose-ironic-inspector-rhel8:v4.7.0-202102130115.p0" }, "product_reference": "openshift4/ose-ironic-inspector-rhel8:v4.7.0-202102130115.p0", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-ironic-ipa-downloader-rhel8:v4.7.0-202102130115.p0 as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:openshift4/ose-ironic-ipa-downloader-rhel8:v4.7.0-202102130115.p0" }, "product_reference": "openshift4/ose-ironic-ipa-downloader-rhel8:v4.7.0-202102130115.p0", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-ironic-machine-os-downloader-rhel8:v4.7.0-202102130115.p0 as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:openshift4/ose-ironic-machine-os-downloader-rhel8:v4.7.0-202102130115.p0" }, "product_reference": "openshift4/ose-ironic-machine-os-downloader-rhel8:v4.7.0-202102130115.p0", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-ironic-rhel8:v4.7.0-202102130115.p0 as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:openshift4/ose-ironic-rhel8:v4.7.0-202102130115.p0" }, "product_reference": "openshift4/ose-ironic-rhel8:v4.7.0-202102130115.p0", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-ironic-static-ip-manager-rhel8:v4.7.0-202102130115.p0 as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:openshift4/ose-ironic-static-ip-manager-rhel8:v4.7.0-202102130115.p0" }, "product_reference": "openshift4/ose-ironic-static-ip-manager-rhel8:v4.7.0-202102130115.p0", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-jenkins-agent-base:v4.7.0-202102130115.p0 as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:openshift4/ose-jenkins-agent-base:v4.7.0-202102130115.p0" }, "product_reference": "openshift4/ose-jenkins-agent-base:v4.7.0-202102130115.p0", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-jenkins-agent-maven:v4.7.0-202102130115.p0 as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:openshift4/ose-jenkins-agent-maven:v4.7.0-202102130115.p0" }, "product_reference": "openshift4/ose-jenkins-agent-maven:v4.7.0-202102130115.p0", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-jenkins-agent-nodejs-12-rhel8:v4.7.0-202102130115.p0 as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:openshift4/ose-jenkins-agent-nodejs-12-rhel8:v4.7.0-202102130115.p0" }, "product_reference": "openshift4/ose-jenkins-agent-nodejs-12-rhel8:v4.7.0-202102130115.p0", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-jenkins:v4.7.0-202102130115.p0 as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:openshift4/ose-jenkins:v4.7.0-202102130115.p0" }, "product_reference": "openshift4/ose-jenkins:v4.7.0-202102130115.p0", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-k8s-prometheus-adapter:v4.7.0-202102130115.p0 as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:openshift4/ose-k8s-prometheus-adapter:v4.7.0-202102130115.p0" }, "product_reference": "openshift4/ose-k8s-prometheus-adapter:v4.7.0-202102130115.p0", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-keepalived-ipfailover:v4.7.0-202102130115.p0 as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:openshift4/ose-keepalived-ipfailover:v4.7.0-202102130115.p0" }, "product_reference": "openshift4/ose-keepalived-ipfailover:v4.7.0-202102130115.p0", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-kube-proxy:v4.7.0-202102130115.p0 as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:openshift4/ose-kube-proxy:v4.7.0-202102130115.p0" }, "product_reference": "openshift4/ose-kube-proxy:v4.7.0-202102130115.p0", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-kube-rbac-proxy:v4.7.0-202102130115.p0 as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:openshift4/ose-kube-rbac-proxy:v4.7.0-202102130115.p0" }, "product_reference": "openshift4/ose-kube-rbac-proxy:v4.7.0-202102130115.p0", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-kube-state-metrics:v4.7.0-202102130115.p0 as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:openshift4/ose-kube-state-metrics:v4.7.0-202102130115.p0" }, "product_reference": "openshift4/ose-kube-state-metrics:v4.7.0-202102130115.p0", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-kube-storage-version-migrator-rhel8:v4.7.0-202102130115.p0 as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:openshift4/ose-kube-storage-version-migrator-rhel8:v4.7.0-202102130115.p0" }, "product_reference": "openshift4/ose-kube-storage-version-migrator-rhel8:v4.7.0-202102130115.p0", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-kuryr-cni-rhel8:v4.7.0-202102130115.p0 as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:openshift4/ose-kuryr-cni-rhel8:v4.7.0-202102130115.p0" }, "product_reference": "openshift4/ose-kuryr-cni-rhel8:v4.7.0-202102130115.p0", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-kuryr-controller-rhel8:v4.7.0-202102130115.p0 as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:openshift4/ose-kuryr-controller-rhel8:v4.7.0-202102130115.p0" }, "product_reference": "openshift4/ose-kuryr-controller-rhel8:v4.7.0-202102130115.p0", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-libvirt-machine-controllers:v4.7.0-202102130115.p0 as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:openshift4/ose-libvirt-machine-controllers:v4.7.0-202102130115.p0" }, "product_reference": "openshift4/ose-libvirt-machine-controllers:v4.7.0-202102130115.p0", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-local-storage-static-provisioner:v4.7.0-202102130115.p0 as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:openshift4/ose-local-storage-static-provisioner:v4.7.0-202102130115.p0" }, "product_reference": "openshift4/ose-local-storage-static-provisioner:v4.7.0-202102130115.p0", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-machine-api-operator:v4.7.0-202102172008.p0 as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:openshift4/ose-machine-api-operator:v4.7.0-202102172008.p0" }, "product_reference": "openshift4/ose-machine-api-operator:v4.7.0-202102172008.p0", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-machine-config-operator:v4.7.0-202102130115.p0 as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:openshift4/ose-machine-config-operator:v4.7.0-202102130115.p0" }, "product_reference": "openshift4/ose-machine-config-operator:v4.7.0-202102130115.p0", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-mdns-publisher-rhel8:v4.7.0-202102130115.p0 as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:openshift4/ose-mdns-publisher-rhel8:v4.7.0-202102130115.p0" }, "product_reference": "openshift4/ose-mdns-publisher-rhel8:v4.7.0-202102130115.p0", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-multus-admission-controller:v4.7.0-202102130115.p0 as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:openshift4/ose-multus-admission-controller:v4.7.0-202102130115.p0" }, "product_reference": "openshift4/ose-multus-admission-controller:v4.7.0-202102130115.p0", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-multus-cni:v4.7.0-202102130115.p0 as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:openshift4/ose-multus-cni:v4.7.0-202102130115.p0" }, "product_reference": "openshift4/ose-multus-cni:v4.7.0-202102130115.p0", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-multus-networkpolicy-rhel8:v4.7.0-202102130115.p0 as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:openshift4/ose-multus-networkpolicy-rhel8:v4.7.0-202102130115.p0" }, "product_reference": "openshift4/ose-multus-networkpolicy-rhel8:v4.7.0-202102130115.p0", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-multus-route-override-cni-rhel8:v4.7.0-202102130115.p0 as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:openshift4/ose-multus-route-override-cni-rhel8:v4.7.0-202102130115.p0" }, "product_reference": "openshift4/ose-multus-route-override-cni-rhel8:v4.7.0-202102130115.p0", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-multus-whereabouts-ipam-cni-rhel8:v4.7.0-202102130115.p0 as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:openshift4/ose-multus-whereabouts-ipam-cni-rhel8:v4.7.0-202102130115.p0" }, "product_reference": "openshift4/ose-multus-whereabouts-ipam-cni-rhel8:v4.7.0-202102130115.p0", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-must-gather:v4.7.0-202102130115.p0 as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:openshift4/ose-must-gather:v4.7.0-202102130115.p0" }, "product_reference": "openshift4/ose-must-gather:v4.7.0-202102130115.p0", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-network-metrics-daemon-rhel8:v4.7.0-202102130115.p0 as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:openshift4/ose-network-metrics-daemon-rhel8:v4.7.0-202102130115.p0" }, "product_reference": "openshift4/ose-network-metrics-daemon-rhel8:v4.7.0-202102130115.p0", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-oauth-apiserver-rhel8:v4.7.0-202102130115.p0 as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:openshift4/ose-oauth-apiserver-rhel8:v4.7.0-202102130115.p0" }, "product_reference": "openshift4/ose-oauth-apiserver-rhel8:v4.7.0-202102130115.p0", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-oauth-proxy:v4.7.0-202102130115.p0 as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:openshift4/ose-oauth-proxy:v4.7.0-202102130115.p0" }, "product_reference": "openshift4/ose-oauth-proxy:v4.7.0-202102130115.p0", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-oauth-server-rhel8:v4.7.0-202102130115.p0 as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:openshift4/ose-oauth-server-rhel8:v4.7.0-202102130115.p0" }, "product_reference": "openshift4/ose-oauth-server-rhel8:v4.7.0-202102130115.p0", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-openshift-apiserver-rhel8:v4.7.0-202102130115.p0 as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:openshift4/ose-openshift-apiserver-rhel8:v4.7.0-202102130115.p0" }, "product_reference": "openshift4/ose-openshift-apiserver-rhel8:v4.7.0-202102130115.p0", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-openshift-controller-manager-rhel8:v4.7.0-202102130115.p0 as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:openshift4/ose-openshift-controller-manager-rhel8:v4.7.0-202102130115.p0" }, "product_reference": "openshift4/ose-openshift-controller-manager-rhel8:v4.7.0-202102130115.p0", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-openshift-state-metrics-rhel8:v4.7.0-202102130115.p0 as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:openshift4/ose-openshift-state-metrics-rhel8:v4.7.0-202102130115.p0" }, "product_reference": "openshift4/ose-openshift-state-metrics-rhel8:v4.7.0-202102130115.p0", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-openstack-cinder-csi-driver-rhel8-operator:v4.7.0-202102130115.p0 as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:openshift4/ose-openstack-cinder-csi-driver-rhel8-operator:v4.7.0-202102130115.p0" }, "product_reference": "openshift4/ose-openstack-cinder-csi-driver-rhel8-operator:v4.7.0-202102130115.p0", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-openstack-cinder-csi-driver-rhel8:v4.7.0-202102130115.p0 as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:openshift4/ose-openstack-cinder-csi-driver-rhel8:v4.7.0-202102130115.p0" }, "product_reference": "openshift4/ose-openstack-cinder-csi-driver-rhel8:v4.7.0-202102130115.p0", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-openstack-machine-controllers:v4.7.0-202102130115.p0 as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:openshift4/ose-openstack-machine-controllers:v4.7.0-202102130115.p0" }, "product_reference": "openshift4/ose-openstack-machine-controllers:v4.7.0-202102130115.p0", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-operator-lifecycle-manager:v4.7.0-202102130115.p0 as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:openshift4/ose-operator-lifecycle-manager:v4.7.0-202102130115.p0" }, "product_reference": "openshift4/ose-operator-lifecycle-manager:v4.7.0-202102130115.p0", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-operator-marketplace:v4.7.0-202102130115.p0 as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:openshift4/ose-operator-marketplace:v4.7.0-202102130115.p0" }, "product_reference": "openshift4/ose-operator-marketplace:v4.7.0-202102130115.p0", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-operator-registry:v4.7.0-202102130115.p0 as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:openshift4/ose-operator-registry:v4.7.0-202102130115.p0" }, "product_reference": "openshift4/ose-operator-registry:v4.7.0-202102130115.p0", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-ovirt-machine-controllers-rhel8:v4.7.0-202102130115.p0 as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:openshift4/ose-ovirt-machine-controllers-rhel8:v4.7.0-202102130115.p0" }, "product_reference": "openshift4/ose-ovirt-machine-controllers-rhel8:v4.7.0-202102130115.p0", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-ovn-kubernetes:v4.7.0-202102130115.p0 as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:openshift4/ose-ovn-kubernetes:v4.7.0-202102130115.p0" }, "product_reference": "openshift4/ose-ovn-kubernetes:v4.7.0-202102130115.p0", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-pod:v4.7.0-202102130115.p0 as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:openshift4/ose-pod:v4.7.0-202102130115.p0" }, "product_reference": "openshift4/ose-pod:v4.7.0-202102130115.p0", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-prom-label-proxy:v4.7.0-202102130115.p0 as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:openshift4/ose-prom-label-proxy:v4.7.0-202102130115.p0" }, "product_reference": "openshift4/ose-prom-label-proxy:v4.7.0-202102130115.p0", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-prometheus-alertmanager:v4.7.0-202102130115.p0 as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:openshift4/ose-prometheus-alertmanager:v4.7.0-202102130115.p0" }, "product_reference": "openshift4/ose-prometheus-alertmanager:v4.7.0-202102130115.p0", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-prometheus-config-reloader:v4.7.0-202102130115.p0 as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:openshift4/ose-prometheus-config-reloader:v4.7.0-202102130115.p0" }, "product_reference": "openshift4/ose-prometheus-config-reloader:v4.7.0-202102130115.p0", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-prometheus-node-exporter:v4.7.0-202102130115.p0 as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:openshift4/ose-prometheus-node-exporter:v4.7.0-202102130115.p0" }, "product_reference": "openshift4/ose-prometheus-node-exporter:v4.7.0-202102130115.p0", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-prometheus-operator:v4.7.0-202102130115.p0 as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:openshift4/ose-prometheus-operator:v4.7.0-202102130115.p0" }, "product_reference": "openshift4/ose-prometheus-operator:v4.7.0-202102130115.p0", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-prometheus:v4.7.0-202102130115.p0 as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:openshift4/ose-prometheus:v4.7.0-202102130115.p0" }, "product_reference": "openshift4/ose-prometheus:v4.7.0-202102130115.p0", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-sdn-rhel8:v4.7.0-202102130115.p0 as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:openshift4/ose-sdn-rhel8:v4.7.0-202102130115.p0" }, "product_reference": "openshift4/ose-sdn-rhel8:v4.7.0-202102130115.p0", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-service-ca-operator:v4.7.0-202102130115.p0 as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:openshift4/ose-service-ca-operator:v4.7.0-202102130115.p0" }, "product_reference": "openshift4/ose-service-ca-operator:v4.7.0-202102130115.p0", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-telemeter:v4.7.0-202102130115.p0 as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:openshift4/ose-telemeter:v4.7.0-202102130115.p0" }, "product_reference": "openshift4/ose-telemeter:v4.7.0-202102130115.p0", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-tests:v4.7.0-202102181036.p0 as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:openshift4/ose-tests:v4.7.0-202102181036.p0" }, "product_reference": "openshift4/ose-tests:v4.7.0-202102181036.p0", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-thanos-rhel8:v4.7.0-202102130115.p0 as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:openshift4/ose-thanos-rhel8:v4.7.0-202102130115.p0" }, "product_reference": "openshift4/ose-thanos-rhel8:v4.7.0-202102130115.p0", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-tools-rhel8:v4.7.0-202102130115.p0 as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:openshift4/ose-tools-rhel8:v4.7.0-202102130115.p0" }, "product_reference": "openshift4/ose-tools-rhel8:v4.7.0-202102130115.p0", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-vsphere-problem-detector-rhel8:v4.7.0-202102130115.p0 as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:openshift4/ose-vsphere-problem-detector-rhel8:v4.7.0-202102130115.p0" }, "product_reference": "openshift4/ose-vsphere-problem-detector-rhel8:v4.7.0-202102130115.p0", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ovirt-csi-driver-rhel7:v4.7.0-202102130115.p0 as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:openshift4/ovirt-csi-driver-rhel7:v4.7.0-202102130115.p0" }, "product_reference": "openshift4/ovirt-csi-driver-rhel7:v4.7.0-202102130115.p0", "relates_to_product_reference": "8Base-RHOSE-4.7" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ovirt-csi-driver-rhel8-operator:v4.7.0-202102130115.p0 as a component of Red Hat OpenShift Container Platform 4.7", "product_id": "8Base-RHOSE-4.7:openshift4/ovirt-csi-driver-rhel8-operator:v4.7.0-202102130115.p0" }, "product_reference": "openshift4/ovirt-csi-driver-rhel8-operator:v4.7.0-202102130115.p0", "relates_to_product_reference": "8Base-RHOSE-4.7" } ] }, "vulnerabilities": [ { "cve": "CVE-2020-7774", "cwe": { "id": "CWE-915", "name": "Improperly Controlled Modification of Dynamically-Determined Object Attributes" }, "discovery_date": "2020-11-17T00:00:00Z", "flags": [ { "label": "component_not_present", "product_ids": [ "8Base-RHOSE-4.7:openshift4/egress-router-cni-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-aws-ebs-csi-driver-rhel8-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-aws-ebs-csi-driver-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-aws-machine-controllers:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-aws-pod-identity-webhook-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-azure-machine-controllers:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-baremetal-installer-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-baremetal-machine-controllers:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-baremetal-rhel8-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-baremetal-runtimecfg-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cli-artifacts:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cli:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cloud-credential-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-authentication-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-autoscaler-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-autoscaler:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-baremetal-operator-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-bootstrap:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-config-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-csi-snapshot-controller-rhel8-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-dns-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-etcd-rhel8-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-image-registry-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-ingress-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-kube-apiserver-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-kube-controller-manager-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-kube-scheduler-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-kube-storage-version-migrator-rhel8-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-machine-approver:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-monitoring-operator:v4.7.0-202102172008.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-network-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-node-tuning-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-openshift-apiserver-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-openshift-controller-manager-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-policy-controller-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-samples-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-storage-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-update-keys:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-version-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-configmap-reloader:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-console-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-console:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-container-networking-plugins-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-coredns:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-driver-manila-rhel8-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-driver-manila-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-driver-nfs-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-external-attacher-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-external-attacher:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-external-provisioner-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-external-provisioner:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-external-resizer-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-external-resizer:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-external-snapshotter-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-external-snapshotter:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-livenessprobe-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-livenessprobe:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-node-driver-registrar-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-node-driver-registrar:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-snapshot-controller-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-snapshot-controller:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-snapshot-validation-webhook-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-deployer:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-docker-builder:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-docker-registry:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-etcd:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-gcp-machine-controllers-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-gcp-pd-csi-driver-operator-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-gcp-pd-csi-driver-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-haproxy-router:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-hello-openshift-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-hyperkube:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-insights-rhel8-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-installer-artifacts:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-installer:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-ironic-hardware-inventory-recorder-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-ironic-inspector-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-ironic-ipa-downloader-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-ironic-machine-os-downloader-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-ironic-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-ironic-static-ip-manager-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-jenkins-agent-base:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-jenkins-agent-maven:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-jenkins-agent-nodejs-12-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-jenkins:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-k8s-prometheus-adapter:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-keepalived-ipfailover:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-kube-proxy:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-kube-rbac-proxy:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-kube-state-metrics:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-kube-storage-version-migrator-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-kuryr-cni-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-kuryr-controller-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-libvirt-machine-controllers:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-local-storage-static-provisioner:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-machine-api-operator:v4.7.0-202102172008.p0", "8Base-RHOSE-4.7:openshift4/ose-machine-config-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-mdns-publisher-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-multus-admission-controller:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-multus-cni:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-multus-networkpolicy-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-multus-route-override-cni-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-multus-whereabouts-ipam-cni-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-must-gather:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-network-metrics-daemon-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-oauth-apiserver-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-oauth-proxy:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-oauth-server-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-openshift-apiserver-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-openshift-controller-manager-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-openshift-state-metrics-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-openstack-cinder-csi-driver-rhel8-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-openstack-cinder-csi-driver-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-openstack-machine-controllers:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-operator-lifecycle-manager:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-operator-marketplace:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-operator-registry:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-ovirt-machine-controllers-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-ovn-kubernetes:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-pod:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-prom-label-proxy:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-prometheus-alertmanager:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-prometheus-config-reloader:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-prometheus-node-exporter:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-prometheus-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-prometheus:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-sdn-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-service-ca-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-telemeter:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-tests:v4.7.0-202102181036.p0", "8Base-RHOSE-4.7:openshift4/ose-thanos-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-tools-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-vsphere-problem-detector-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ovirt-csi-driver-rhel7:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ovirt-csi-driver-rhel8-operator:v4.7.0-202102130115.p0" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla", "text": "https://bugzilla.redhat.com/show_bug.cgi?id=1898680" } ], "notes": [ { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" }, { "category": "description", "text": "A flaw was found in nodejs-y18n. There is a prototype pollution vulnerability in y18n\u0027s locale functionality. If an attacker is able to provide untrusted input via locale, they may be able to cause denial of service or in rare circumstances, impact to data integrity or confidentiality.", "title": "Vulnerability description" }, { "category": "summary", "text": "nodejs-y18n: prototype pollution vulnerability", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "8Base-RHOSE-4.7:openshift4/ose-grafana:v4.7.0-202102130115.p0" ], "known_not_affected": [ "8Base-RHOSE-4.7:openshift4/egress-router-cni-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-aws-ebs-csi-driver-rhel8-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-aws-ebs-csi-driver-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-aws-machine-controllers:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-aws-pod-identity-webhook-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-azure-machine-controllers:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-baremetal-installer-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-baremetal-machine-controllers:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-baremetal-rhel8-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-baremetal-runtimecfg-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cli-artifacts:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cli:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cloud-credential-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-authentication-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-autoscaler-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-autoscaler:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-baremetal-operator-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-bootstrap:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-config-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-csi-snapshot-controller-rhel8-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-dns-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-etcd-rhel8-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-image-registry-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-ingress-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-kube-apiserver-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-kube-controller-manager-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-kube-scheduler-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-kube-storage-version-migrator-rhel8-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-machine-approver:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-monitoring-operator:v4.7.0-202102172008.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-network-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-node-tuning-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-openshift-apiserver-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-openshift-controller-manager-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-policy-controller-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-samples-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-storage-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-update-keys:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-version-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-configmap-reloader:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-console-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-console:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-container-networking-plugins-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-coredns:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-driver-manila-rhel8-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-driver-manila-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-driver-nfs-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-external-attacher-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-external-attacher:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-external-provisioner-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-external-provisioner:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-external-resizer-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-external-resizer:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-external-snapshotter-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-external-snapshotter:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-livenessprobe-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-livenessprobe:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-node-driver-registrar-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-node-driver-registrar:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-snapshot-controller-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-snapshot-controller:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-snapshot-validation-webhook-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-deployer:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-docker-builder:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-docker-registry:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-etcd:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-gcp-machine-controllers-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-gcp-pd-csi-driver-operator-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-gcp-pd-csi-driver-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-haproxy-router:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-hello-openshift-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-hyperkube:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-insights-rhel8-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-installer-artifacts:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-installer:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-ironic-hardware-inventory-recorder-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-ironic-inspector-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-ironic-ipa-downloader-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-ironic-machine-os-downloader-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-ironic-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-ironic-static-ip-manager-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-jenkins-agent-base:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-jenkins-agent-maven:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-jenkins-agent-nodejs-12-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-jenkins:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-k8s-prometheus-adapter:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-keepalived-ipfailover:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-kube-proxy:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-kube-rbac-proxy:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-kube-state-metrics:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-kube-storage-version-migrator-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-kuryr-cni-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-kuryr-controller-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-libvirt-machine-controllers:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-local-storage-static-provisioner:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-machine-api-operator:v4.7.0-202102172008.p0", "8Base-RHOSE-4.7:openshift4/ose-machine-config-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-mdns-publisher-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-multus-admission-controller:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-multus-cni:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-multus-networkpolicy-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-multus-route-override-cni-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-multus-whereabouts-ipam-cni-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-must-gather:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-network-metrics-daemon-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-oauth-apiserver-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-oauth-proxy:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-oauth-server-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-openshift-apiserver-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-openshift-controller-manager-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-openshift-state-metrics-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-openstack-cinder-csi-driver-rhel8-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-openstack-cinder-csi-driver-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-openstack-machine-controllers:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-operator-lifecycle-manager:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-operator-marketplace:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-operator-registry:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-ovirt-machine-controllers-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-ovn-kubernetes:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-pod:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-prom-label-proxy:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-prometheus-alertmanager:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-prometheus-config-reloader:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-prometheus-node-exporter:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-prometheus-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-prometheus:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-sdn-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-service-ca-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-telemeter:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-tests:v4.7.0-202102181036.p0", "8Base-RHOSE-4.7:openshift4/ose-thanos-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-tools-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-vsphere-problem-detector-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ovirt-csi-driver-rhel7:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ovirt-csi-driver-rhel8-operator:v4.7.0-202102130115.p0" ] }, "references": [ { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-7774", "url": "https://www.cve.org/CVERecord?id=CVE-2020-7774" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-7774", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-7774" }, { "category": "external", "summary": "https://snyk.io/vuln/SNYK-JS-Y18N-1021887", "url": "https://snyk.io/vuln/SNYK-JS-Y18N-1021887" }, { "category": "external", "summary": "CVE-2020-7774", "url": "https://access.redhat.com/security/cve/CVE-2020-7774" }, { "category": "external", "summary": "bz#1898680: CVE-2020-7774 nodejs-y18n: prototype pollution vulnerability", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1898680" } ], "release_date": "2020-10-25T00:00:00Z", "remediations": [ { "category": "vendor_fix", "details": "For OpenShift Container Platform 4.7, see the following documentation, which\nwill be updated shortly for this release, for important instructions on how\nto upgrade your cluster and fully apply this asynchronous errata update:\n\nhttps://docs.openshift.com/container-platform/4.7/release_notes/ocp-4-7-release-notes.html\n\nDetails on how to access this content are available at\nhttps://docs.openshift.com/container-platform/4.7/updating/updating-cluster-cli.html.", "product_ids": [ "8Base-RHOSE-4.7:openshift4/ose-grafana:v4.7.0-202102130115.p0" ], "url": "https://access.redhat.com/errata/RHSA-2020:5633" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 7.3, "baseSeverity": "HIGH", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.1" }, "products": [ "8Base-RHOSE-4.7:openshift4/ose-grafana:v4.7.0-202102130115.p0" ] } ], "threats": [ { "category": "impact", "date": "2020-11-17T00:00:00Z", "details": "Moderate" } ], "title": "CVE-2020-7774 nodejs-y18n: prototype pollution vulnerability" }, { "acknowledgments": [ { "names": [ "the Kubernetes Product Security Committee" ] }, { "names": [ "Kaizhe Huang" ], "organization": "derek0405", "summary": "Acknowledged by upstream." } ], "cve": "CVE-2020-8563", "cwe": { "id": "CWE-117", "name": "Improper Output Neutralization for Logs" }, "discovery_date": "2020-10-09T00:00:00Z", "flags": [ { "label": "component_not_present", "product_ids": [ "8Base-RHOSE-4.7:openshift4/egress-router-cni-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-aws-ebs-csi-driver-rhel8-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-aws-ebs-csi-driver-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-aws-machine-controllers:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-aws-pod-identity-webhook-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-azure-machine-controllers:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-baremetal-installer-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-baremetal-machine-controllers:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-baremetal-rhel8-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-baremetal-runtimecfg-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cli-artifacts:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cli:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cloud-credential-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-authentication-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-autoscaler-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-autoscaler:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-baremetal-operator-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-bootstrap:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-config-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-csi-snapshot-controller-rhel8-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-dns-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-etcd-rhel8-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-image-registry-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-ingress-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-kube-apiserver-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-kube-controller-manager-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-kube-scheduler-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-kube-storage-version-migrator-rhel8-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-machine-approver:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-monitoring-operator:v4.7.0-202102172008.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-network-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-node-tuning-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-openshift-apiserver-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-openshift-controller-manager-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-policy-controller-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-samples-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-storage-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-update-keys:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-version-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-configmap-reloader:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-console-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-console:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-container-networking-plugins-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-coredns:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-driver-manila-rhel8-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-driver-manila-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-driver-nfs-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-external-attacher-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-external-attacher:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-external-provisioner-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-external-provisioner:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-external-resizer-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-external-resizer:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-external-snapshotter-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-external-snapshotter:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-livenessprobe-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-livenessprobe:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-node-driver-registrar-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-node-driver-registrar:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-snapshot-controller-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-snapshot-controller:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-snapshot-validation-webhook-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-deployer:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-docker-builder:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-docker-registry:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-etcd:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-gcp-machine-controllers-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-gcp-pd-csi-driver-operator-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-gcp-pd-csi-driver-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-grafana:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-haproxy-router:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-hello-openshift-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-insights-rhel8-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-installer-artifacts:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-installer:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-ironic-hardware-inventory-recorder-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-ironic-inspector-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-ironic-ipa-downloader-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-ironic-machine-os-downloader-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-ironic-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-ironic-static-ip-manager-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-jenkins-agent-base:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-jenkins-agent-maven:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-jenkins-agent-nodejs-12-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-jenkins:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-k8s-prometheus-adapter:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-keepalived-ipfailover:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-kube-proxy:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-kube-rbac-proxy:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-kube-state-metrics:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-kube-storage-version-migrator-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-kuryr-cni-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-kuryr-controller-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-libvirt-machine-controllers:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-local-storage-static-provisioner:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-machine-api-operator:v4.7.0-202102172008.p0", "8Base-RHOSE-4.7:openshift4/ose-machine-config-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-mdns-publisher-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-multus-admission-controller:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-multus-cni:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-multus-networkpolicy-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-multus-route-override-cni-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-multus-whereabouts-ipam-cni-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-must-gather:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-network-metrics-daemon-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-oauth-apiserver-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-oauth-proxy:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-oauth-server-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-openshift-apiserver-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-openshift-controller-manager-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-openshift-state-metrics-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-openstack-cinder-csi-driver-rhel8-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-openstack-cinder-csi-driver-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-openstack-machine-controllers:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-operator-lifecycle-manager:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-operator-marketplace:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-operator-registry:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-ovirt-machine-controllers-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-ovn-kubernetes:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-pod:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-prom-label-proxy:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-prometheus-alertmanager:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-prometheus-config-reloader:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-prometheus-node-exporter:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-prometheus-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-prometheus:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-sdn-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-service-ca-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-telemeter:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-tests:v4.7.0-202102181036.p0", "8Base-RHOSE-4.7:openshift4/ose-thanos-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-tools-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-vsphere-problem-detector-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ovirt-csi-driver-rhel7:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ovirt-csi-driver-rhel8-operator:v4.7.0-202102130115.p0" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla", "text": "https://bugzilla.redhat.com/show_bug.cgi?id=1886635" } ], "notes": [ { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" }, { "category": "description", "text": "A flaw was found in kubernetes. Clusters running on VSphere, using VSphere as a cloud provider a with logging level set to 4 or above, VSphere cloud credentials will be leaked in the cloud controller manager\u0027s log.", "title": "Vulnerability description" }, { "category": "summary", "text": "kubernetes: Secret leaks in kube-controller-manager when using vSphere Provider", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "8Base-RHOSE-4.7:openshift4/ose-hyperkube:v4.7.0-202102130115.p0" ], "known_not_affected": [ "8Base-RHOSE-4.7:openshift4/egress-router-cni-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-aws-ebs-csi-driver-rhel8-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-aws-ebs-csi-driver-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-aws-machine-controllers:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-aws-pod-identity-webhook-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-azure-machine-controllers:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-baremetal-installer-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-baremetal-machine-controllers:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-baremetal-rhel8-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-baremetal-runtimecfg-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cli-artifacts:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cli:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cloud-credential-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-authentication-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-autoscaler-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-autoscaler:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-baremetal-operator-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-bootstrap:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-config-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-csi-snapshot-controller-rhel8-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-dns-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-etcd-rhel8-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-image-registry-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-ingress-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-kube-apiserver-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-kube-controller-manager-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-kube-scheduler-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-kube-storage-version-migrator-rhel8-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-machine-approver:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-monitoring-operator:v4.7.0-202102172008.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-network-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-node-tuning-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-openshift-apiserver-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-openshift-controller-manager-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-policy-controller-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-samples-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-storage-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-update-keys:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-version-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-configmap-reloader:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-console-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-console:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-container-networking-plugins-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-coredns:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-driver-manila-rhel8-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-driver-manila-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-driver-nfs-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-external-attacher-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-external-attacher:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-external-provisioner-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-external-provisioner:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-external-resizer-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-external-resizer:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-external-snapshotter-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-external-snapshotter:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-livenessprobe-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-livenessprobe:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-node-driver-registrar-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-node-driver-registrar:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-snapshot-controller-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-snapshot-controller:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-snapshot-validation-webhook-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-deployer:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-docker-builder:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-docker-registry:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-etcd:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-gcp-machine-controllers-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-gcp-pd-csi-driver-operator-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-gcp-pd-csi-driver-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-grafana:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-haproxy-router:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-hello-openshift-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-insights-rhel8-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-installer-artifacts:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-installer:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-ironic-hardware-inventory-recorder-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-ironic-inspector-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-ironic-ipa-downloader-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-ironic-machine-os-downloader-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-ironic-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-ironic-static-ip-manager-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-jenkins-agent-base:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-jenkins-agent-maven:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-jenkins-agent-nodejs-12-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-jenkins:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-k8s-prometheus-adapter:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-keepalived-ipfailover:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-kube-proxy:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-kube-rbac-proxy:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-kube-state-metrics:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-kube-storage-version-migrator-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-kuryr-cni-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-kuryr-controller-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-libvirt-machine-controllers:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-local-storage-static-provisioner:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-machine-api-operator:v4.7.0-202102172008.p0", "8Base-RHOSE-4.7:openshift4/ose-machine-config-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-mdns-publisher-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-multus-admission-controller:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-multus-cni:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-multus-networkpolicy-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-multus-route-override-cni-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-multus-whereabouts-ipam-cni-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-must-gather:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-network-metrics-daemon-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-oauth-apiserver-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-oauth-proxy:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-oauth-server-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-openshift-apiserver-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-openshift-controller-manager-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-openshift-state-metrics-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-openstack-cinder-csi-driver-rhel8-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-openstack-cinder-csi-driver-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-openstack-machine-controllers:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-operator-lifecycle-manager:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-operator-marketplace:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-operator-registry:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-ovirt-machine-controllers-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-ovn-kubernetes:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-pod:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-prom-label-proxy:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-prometheus-alertmanager:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-prometheus-config-reloader:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-prometheus-node-exporter:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-prometheus-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-prometheus:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-sdn-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-service-ca-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-telemeter:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-tests:v4.7.0-202102181036.p0", "8Base-RHOSE-4.7:openshift4/ose-thanos-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-tools-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-vsphere-problem-detector-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ovirt-csi-driver-rhel7:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ovirt-csi-driver-rhel8-operator:v4.7.0-202102130115.p0" ] }, "references": [ { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-8563", "url": "https://www.cve.org/CVERecord?id=CVE-2020-8563" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-8563", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-8563" }, { "category": "external", "summary": "https://github.com/kubernetes/kubernetes/issues/95621", "url": "https://github.com/kubernetes/kubernetes/issues/95621" }, { "category": "external", "summary": "https://groups.google.com/g/kubernetes-announce/c/ScdmyORnPDk", "url": "https://groups.google.com/g/kubernetes-announce/c/ScdmyORnPDk" }, { "category": "external", "summary": "CVE-2020-8563", "url": "https://access.redhat.com/security/cve/CVE-2020-8563" }, { "category": "external", "summary": "bz#1886635: CVE-2020-8563 kubernetes: Secret leaks in kube-controller-manager when using vSphere Provider", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1886635" } ], "release_date": "2020-10-14T00:00:00Z", "remediations": [ { "category": "vendor_fix", "details": "For OpenShift Container Platform 4.7, see the following documentation, which\nwill be updated shortly for this release, for important instructions on how\nto upgrade your cluster and fully apply this asynchronous errata update:\n\nhttps://docs.openshift.com/container-platform/4.7/release_notes/ocp-4-7-release-notes.html\n\nDetails on how to access this content are available at\nhttps://docs.openshift.com/container-platform/4.7/updating/updating-cluster-cli.html.", "product_ids": [ "8Base-RHOSE-4.7:openshift4/ose-hyperkube:v4.7.0-202102130115.p0" ], "url": "https://access.redhat.com/errata/RHSA-2020:5633" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.1" }, "products": [ "8Base-RHOSE-4.7:openshift4/ose-hyperkube:v4.7.0-202102130115.p0" ] } ], "threats": [ { "category": "impact", "date": "2020-10-09T00:00:00Z", "details": "Moderate" } ], "title": "CVE-2020-8563 kubernetes: Secret leaks in kube-controller-manager when using vSphere Provider" }, { "acknowledgments": [ { "names": [ "the Kubernetes Product Security Committee" ] }, { "names": [ "Etienne Champetier" ], "summary": "Acknowledged by upstream." } ], "cve": "CVE-2020-10749", "cwe": { "id": "CWE-300", "name": "Channel Accessible by Non-Endpoint" }, "discovery_date": "2020-05-08T00:00:00Z", "flags": [ { "label": "component_not_present", "product_ids": [ "8Base-RHOSE-4.7:openshift4/egress-router-cni-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-aws-ebs-csi-driver-rhel8-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-aws-ebs-csi-driver-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-aws-machine-controllers:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-aws-pod-identity-webhook-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-azure-machine-controllers:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-baremetal-installer-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-baremetal-machine-controllers:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-baremetal-rhel8-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-baremetal-runtimecfg-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cli-artifacts:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cli:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cloud-credential-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-authentication-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-autoscaler-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-autoscaler:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-baremetal-operator-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-bootstrap:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-config-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-csi-snapshot-controller-rhel8-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-dns-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-etcd-rhel8-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-image-registry-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-ingress-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-kube-apiserver-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-kube-controller-manager-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-kube-scheduler-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-kube-storage-version-migrator-rhel8-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-machine-approver:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-monitoring-operator:v4.7.0-202102172008.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-network-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-node-tuning-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-openshift-apiserver-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-openshift-controller-manager-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-policy-controller-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-samples-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-storage-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-update-keys:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-version-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-configmap-reloader:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-console-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-console:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-container-networking-plugins-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-coredns:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-driver-manila-rhel8-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-driver-manila-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-driver-nfs-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-external-attacher-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-external-attacher:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-external-provisioner-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-external-provisioner:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-external-resizer-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-external-resizer:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-external-snapshotter-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-external-snapshotter:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-livenessprobe-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-livenessprobe:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-node-driver-registrar-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-node-driver-registrar:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-snapshot-controller-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-snapshot-controller:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-snapshot-validation-webhook-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-deployer:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-docker-builder:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-docker-registry:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-etcd:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-gcp-machine-controllers-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-gcp-pd-csi-driver-operator-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-gcp-pd-csi-driver-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-grafana:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-haproxy-router:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-hello-openshift-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-hyperkube:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-insights-rhel8-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-installer-artifacts:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-installer:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-ironic-hardware-inventory-recorder-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-ironic-inspector-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-ironic-ipa-downloader-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-ironic-machine-os-downloader-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-ironic-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-ironic-static-ip-manager-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-jenkins-agent-base:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-jenkins-agent-maven:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-jenkins-agent-nodejs-12-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-jenkins:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-k8s-prometheus-adapter:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-keepalived-ipfailover:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-kube-proxy:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-kube-rbac-proxy:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-kube-state-metrics:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-kube-storage-version-migrator-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-kuryr-cni-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-kuryr-controller-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-libvirt-machine-controllers:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-local-storage-static-provisioner:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-machine-api-operator:v4.7.0-202102172008.p0", "8Base-RHOSE-4.7:openshift4/ose-machine-config-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-mdns-publisher-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-multus-admission-controller:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-multus-cni:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-multus-networkpolicy-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-multus-route-override-cni-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-multus-whereabouts-ipam-cni-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-must-gather:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-network-metrics-daemon-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-oauth-apiserver-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-oauth-proxy:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-oauth-server-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-openshift-apiserver-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-openshift-controller-manager-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-openshift-state-metrics-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-openstack-cinder-csi-driver-rhel8-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-openstack-cinder-csi-driver-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-openstack-machine-controllers:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-operator-lifecycle-manager:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-operator-marketplace:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-operator-registry:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-ovirt-machine-controllers-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-ovn-kubernetes:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-pod:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-prom-label-proxy:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-prometheus-alertmanager:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-prometheus-config-reloader:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-prometheus-node-exporter:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-prometheus-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-prometheus:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-service-ca-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-telemeter:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-tests:v4.7.0-202102181036.p0", "8Base-RHOSE-4.7:openshift4/ose-thanos-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-tools-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-vsphere-problem-detector-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ovirt-csi-driver-rhel7:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ovirt-csi-driver-rhel8-operator:v4.7.0-202102130115.p0" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla", "text": "https://bugzilla.redhat.com/show_bug.cgi?id=1833220" } ], "notes": [ { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" }, { "category": "description", "text": "A vulnerability was found in affected container networking implementations that allow malicious containers in Kubernetes clusters to perform man-in-the-middle (MitM) attacks. A malicious container can exploit this flaw by sending \u201crogue\u201d IPv6 router advertisements to the host or other containers, to redirect traffic to the malicious container.", "title": "Vulnerability description" }, { "category": "summary", "text": "containernetworking/plugins: IPv6 router advertisements allow for MitM attacks on IPv4 clusters", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "8Base-RHOSE-4.7:openshift4/ose-sdn-rhel8:v4.7.0-202102130115.p0" ], "known_not_affected": [ "8Base-RHOSE-4.7:openshift4/egress-router-cni-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-aws-ebs-csi-driver-rhel8-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-aws-ebs-csi-driver-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-aws-machine-controllers:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-aws-pod-identity-webhook-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-azure-machine-controllers:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-baremetal-installer-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-baremetal-machine-controllers:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-baremetal-rhel8-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-baremetal-runtimecfg-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cli-artifacts:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cli:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cloud-credential-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-authentication-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-autoscaler-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-autoscaler:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-baremetal-operator-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-bootstrap:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-config-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-csi-snapshot-controller-rhel8-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-dns-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-etcd-rhel8-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-image-registry-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-ingress-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-kube-apiserver-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-kube-controller-manager-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-kube-scheduler-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-kube-storage-version-migrator-rhel8-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-machine-approver:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-monitoring-operator:v4.7.0-202102172008.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-network-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-node-tuning-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-openshift-apiserver-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-openshift-controller-manager-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-policy-controller-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-samples-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-storage-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-update-keys:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-version-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-configmap-reloader:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-console-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-console:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-container-networking-plugins-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-coredns:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-driver-manila-rhel8-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-driver-manila-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-driver-nfs-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-external-attacher-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-external-attacher:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-external-provisioner-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-external-provisioner:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-external-resizer-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-external-resizer:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-external-snapshotter-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-external-snapshotter:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-livenessprobe-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-livenessprobe:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-node-driver-registrar-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-node-driver-registrar:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-snapshot-controller-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-snapshot-controller:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-snapshot-validation-webhook-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-deployer:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-docker-builder:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-docker-registry:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-etcd:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-gcp-machine-controllers-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-gcp-pd-csi-driver-operator-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-gcp-pd-csi-driver-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-grafana:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-haproxy-router:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-hello-openshift-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-hyperkube:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-insights-rhel8-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-installer-artifacts:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-installer:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-ironic-hardware-inventory-recorder-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-ironic-inspector-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-ironic-ipa-downloader-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-ironic-machine-os-downloader-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-ironic-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-ironic-static-ip-manager-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-jenkins-agent-base:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-jenkins-agent-maven:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-jenkins-agent-nodejs-12-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-jenkins:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-k8s-prometheus-adapter:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-keepalived-ipfailover:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-kube-proxy:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-kube-rbac-proxy:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-kube-state-metrics:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-kube-storage-version-migrator-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-kuryr-cni-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-kuryr-controller-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-libvirt-machine-controllers:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-local-storage-static-provisioner:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-machine-api-operator:v4.7.0-202102172008.p0", "8Base-RHOSE-4.7:openshift4/ose-machine-config-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-mdns-publisher-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-multus-admission-controller:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-multus-cni:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-multus-networkpolicy-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-multus-route-override-cni-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-multus-whereabouts-ipam-cni-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-must-gather:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-network-metrics-daemon-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-oauth-apiserver-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-oauth-proxy:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-oauth-server-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-openshift-apiserver-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-openshift-controller-manager-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-openshift-state-metrics-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-openstack-cinder-csi-driver-rhel8-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-openstack-cinder-csi-driver-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-openstack-machine-controllers:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-operator-lifecycle-manager:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-operator-marketplace:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-operator-registry:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-ovirt-machine-controllers-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-ovn-kubernetes:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-pod:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-prom-label-proxy:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-prometheus-alertmanager:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-prometheus-config-reloader:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-prometheus-node-exporter:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-prometheus-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-prometheus:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-service-ca-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-telemeter:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-tests:v4.7.0-202102181036.p0", "8Base-RHOSE-4.7:openshift4/ose-thanos-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-tools-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-vsphere-problem-detector-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ovirt-csi-driver-rhel7:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ovirt-csi-driver-rhel8-operator:v4.7.0-202102130115.p0" ] }, "references": [ { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-10749", "url": "https://www.cve.org/CVERecord?id=CVE-2020-10749" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-10749", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-10749" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/BMb_6ICCfp8", "url": "https://groups.google.com/forum/#!topic/kubernetes-security-announce/BMb_6ICCfp8" }, { "category": "external", "summary": "CVE-2020-10749", "url": "https://access.redhat.com/security/cve/CVE-2020-10749" }, { "category": "external", "summary": "bz#1833220: CVE-2020-10749 containernetworking/plugins: IPv6 router advertisements allow for MitM attacks on IPv4 clusters", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1833220" } ], "release_date": "2020-06-01T00:00:00Z", "remediations": [ { "category": "vendor_fix", "details": "For OpenShift Container Platform 4.7, see the following documentation, which\nwill be updated shortly for this release, for important instructions on how\nto upgrade your cluster and fully apply this asynchronous errata update:\n\nhttps://docs.openshift.com/container-platform/4.7/release_notes/ocp-4-7-release-notes.html\n\nDetails on how to access this content are available at\nhttps://docs.openshift.com/container-platform/4.7/updating/updating-cluster-cli.html.", "product_ids": [ "8Base-RHOSE-4.7:openshift4/ose-sdn-rhel8:v4.7.0-202102130115.p0" ], "url": "https://access.redhat.com/errata/RHSA-2020:5633" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 6.0, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:L", "version": "3.1" }, "products": [ "8Base-RHOSE-4.7:openshift4/ose-sdn-rhel8:v4.7.0-202102130115.p0" ] } ], "threats": [ { "category": "impact", "date": "2020-05-08T00:00:00Z", "details": "Moderate" } ], "title": "CVE-2020-10749 containernetworking/plugins: IPv6 router advertisements allow for MitM attacks on IPv4 clusters" }, { "acknowledgments": [ { "names": [ "Prasanna Kumar Kalever" ], "organization": "Red Hat", "summary": "This issue was discovered by Red Hat." } ], "cve": "CVE-2020-10763", "cwe": { "id": "CWE-532", "name": "Insertion of Sensitive Information into Log File" }, "discovery_date": "2020-06-05T00:00:00Z", "flags": [ { "label": "component_not_present", "product_ids": [ "8Base-RHOSE-4.7:openshift4/egress-router-cni-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-aws-ebs-csi-driver-rhel8-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-aws-ebs-csi-driver-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-aws-machine-controllers:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-aws-pod-identity-webhook-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-azure-machine-controllers:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-baremetal-installer-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-baremetal-machine-controllers:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-baremetal-rhel8-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-baremetal-runtimecfg-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cli-artifacts:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cli:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cloud-credential-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-authentication-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-autoscaler-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-baremetal-operator-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-bootstrap:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-config-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-csi-snapshot-controller-rhel8-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-dns-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-etcd-rhel8-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-image-registry-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-ingress-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-kube-apiserver-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-kube-controller-manager-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-kube-scheduler-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-kube-storage-version-migrator-rhel8-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-machine-approver:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-monitoring-operator:v4.7.0-202102172008.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-network-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-node-tuning-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-openshift-apiserver-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-openshift-controller-manager-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-policy-controller-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-samples-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-storage-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-update-keys:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-version-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-configmap-reloader:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-console-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-console:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-container-networking-plugins-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-coredns:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-driver-manila-rhel8-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-driver-manila-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-driver-nfs-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-external-attacher-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-external-attacher:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-external-provisioner-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-external-provisioner:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-external-resizer-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-external-resizer:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-external-snapshotter-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-external-snapshotter:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-livenessprobe-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-livenessprobe:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-node-driver-registrar-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-node-driver-registrar:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-snapshot-controller-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-snapshot-controller:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-snapshot-validation-webhook-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-deployer:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-docker-builder:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-docker-registry:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-etcd:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-gcp-machine-controllers-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-gcp-pd-csi-driver-operator-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-gcp-pd-csi-driver-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-grafana:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-haproxy-router:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-hello-openshift-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-hyperkube:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-insights-rhel8-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-installer-artifacts:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-installer:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-ironic-hardware-inventory-recorder-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-ironic-inspector-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-ironic-ipa-downloader-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-ironic-machine-os-downloader-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-ironic-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-ironic-static-ip-manager-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-jenkins-agent-base:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-jenkins-agent-maven:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-jenkins-agent-nodejs-12-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-jenkins:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-k8s-prometheus-adapter:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-keepalived-ipfailover:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-kube-proxy:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-kube-rbac-proxy:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-kube-state-metrics:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-kube-storage-version-migrator-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-kuryr-cni-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-kuryr-controller-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-libvirt-machine-controllers:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-local-storage-static-provisioner:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-machine-api-operator:v4.7.0-202102172008.p0", "8Base-RHOSE-4.7:openshift4/ose-machine-config-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-mdns-publisher-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-multus-admission-controller:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-multus-cni:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-multus-networkpolicy-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-multus-route-override-cni-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-multus-whereabouts-ipam-cni-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-must-gather:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-network-metrics-daemon-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-oauth-apiserver-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-oauth-proxy:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-oauth-server-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-openshift-apiserver-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-openshift-controller-manager-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-openshift-state-metrics-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-openstack-cinder-csi-driver-rhel8-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-openstack-cinder-csi-driver-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-openstack-machine-controllers:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-operator-lifecycle-manager:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-operator-marketplace:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-operator-registry:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-ovirt-machine-controllers-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-ovn-kubernetes:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-pod:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-prom-label-proxy:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-prometheus-alertmanager:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-prometheus-config-reloader:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-prometheus-node-exporter:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-prometheus-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-prometheus:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-sdn-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-service-ca-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-telemeter:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-tests:v4.7.0-202102181036.p0", "8Base-RHOSE-4.7:openshift4/ose-thanos-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-tools-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-vsphere-problem-detector-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ovirt-csi-driver-rhel7:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ovirt-csi-driver-rhel8-operator:v4.7.0-202102130115.p0" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla", "text": "https://bugzilla.redhat.com/show_bug.cgi?id=1845387" } ], "notes": [ { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" }, { "category": "description", "text": "An information-disclosure flaw was found in the way Heketi logs sensitive information. This flaw allows an attacker with local access to the Heketi server, to read potentially sensitive information, such as gluster-block passwords.", "title": "Vulnerability description" }, { "category": "summary", "text": "heketi: gluster-block volume password details available in logs", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "8Base-RHOSE-4.7:openshift4/ose-cluster-autoscaler:v4.7.0-202102130115.p0" ], "known_not_affected": [ "8Base-RHOSE-4.7:openshift4/egress-router-cni-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-aws-ebs-csi-driver-rhel8-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-aws-ebs-csi-driver-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-aws-machine-controllers:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-aws-pod-identity-webhook-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-azure-machine-controllers:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-baremetal-installer-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-baremetal-machine-controllers:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-baremetal-rhel8-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-baremetal-runtimecfg-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cli-artifacts:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cli:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cloud-credential-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-authentication-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-autoscaler-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-baremetal-operator-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-bootstrap:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-config-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-csi-snapshot-controller-rhel8-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-dns-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-etcd-rhel8-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-image-registry-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-ingress-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-kube-apiserver-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-kube-controller-manager-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-kube-scheduler-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-kube-storage-version-migrator-rhel8-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-machine-approver:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-monitoring-operator:v4.7.0-202102172008.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-network-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-node-tuning-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-openshift-apiserver-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-openshift-controller-manager-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-policy-controller-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-samples-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-storage-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-update-keys:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-version-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-configmap-reloader:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-console-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-console:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-container-networking-plugins-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-coredns:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-driver-manila-rhel8-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-driver-manila-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-driver-nfs-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-external-attacher-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-external-attacher:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-external-provisioner-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-external-provisioner:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-external-resizer-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-external-resizer:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-external-snapshotter-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-external-snapshotter:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-livenessprobe-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-livenessprobe:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-node-driver-registrar-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-node-driver-registrar:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-snapshot-controller-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-snapshot-controller:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-snapshot-validation-webhook-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-deployer:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-docker-builder:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-docker-registry:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-etcd:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-gcp-machine-controllers-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-gcp-pd-csi-driver-operator-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-gcp-pd-csi-driver-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-grafana:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-haproxy-router:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-hello-openshift-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-hyperkube:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-insights-rhel8-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-installer-artifacts:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-installer:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-ironic-hardware-inventory-recorder-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-ironic-inspector-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-ironic-ipa-downloader-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-ironic-machine-os-downloader-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-ironic-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-ironic-static-ip-manager-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-jenkins-agent-base:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-jenkins-agent-maven:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-jenkins-agent-nodejs-12-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-jenkins:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-k8s-prometheus-adapter:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-keepalived-ipfailover:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-kube-proxy:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-kube-rbac-proxy:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-kube-state-metrics:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-kube-storage-version-migrator-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-kuryr-cni-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-kuryr-controller-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-libvirt-machine-controllers:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-local-storage-static-provisioner:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-machine-api-operator:v4.7.0-202102172008.p0", "8Base-RHOSE-4.7:openshift4/ose-machine-config-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-mdns-publisher-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-multus-admission-controller:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-multus-cni:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-multus-networkpolicy-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-multus-route-override-cni-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-multus-whereabouts-ipam-cni-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-must-gather:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-network-metrics-daemon-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-oauth-apiserver-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-oauth-proxy:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-oauth-server-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-openshift-apiserver-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-openshift-controller-manager-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-openshift-state-metrics-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-openstack-cinder-csi-driver-rhel8-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-openstack-cinder-csi-driver-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-openstack-machine-controllers:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-operator-lifecycle-manager:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-operator-marketplace:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-operator-registry:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-ovirt-machine-controllers-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-ovn-kubernetes:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-pod:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-prom-label-proxy:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-prometheus-alertmanager:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-prometheus-config-reloader:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-prometheus-node-exporter:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-prometheus-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-prometheus:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-sdn-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-service-ca-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-telemeter:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-tests:v4.7.0-202102181036.p0", "8Base-RHOSE-4.7:openshift4/ose-thanos-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-tools-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-vsphere-problem-detector-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ovirt-csi-driver-rhel7:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ovirt-csi-driver-rhel8-operator:v4.7.0-202102130115.p0" ] }, "references": [ { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-10763", "url": "https://www.cve.org/CVERecord?id=CVE-2020-10763" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-10763", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-10763" }, { "category": "external", "summary": "https://github.com/heketi/heketi/releases/tag/v10.1.0", "url": "https://github.com/heketi/heketi/releases/tag/v10.1.0" }, { "category": "external", "summary": "CVE-2020-10763", "url": "https://access.redhat.com/security/cve/CVE-2020-10763" }, { "category": "external", "summary": "bz#1845387: CVE-2020-10763 heketi: gluster-block volume password details available in logs", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1845387" } ], "release_date": "2020-09-30T00:00:00Z", "remediations": [ { "category": "vendor_fix", "details": "For OpenShift Container Platform 4.7, see the following documentation, which\nwill be updated shortly for this release, for important instructions on how\nto upgrade your cluster and fully apply this asynchronous errata update:\n\nhttps://docs.openshift.com/container-platform/4.7/release_notes/ocp-4-7-release-notes.html\n\nDetails on how to access this content are available at\nhttps://docs.openshift.com/container-platform/4.7/updating/updating-cluster-cli.html.", "product_ids": [ "8Base-RHOSE-4.7:openshift4/ose-cluster-autoscaler:v4.7.0-202102130115.p0" ], "url": "https://access.redhat.com/errata/RHSA-2020:5633" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "8Base-RHOSE-4.7:openshift4/ose-cluster-autoscaler:v4.7.0-202102130115.p0" ] } ], "threats": [ { "category": "impact", "date": "2020-06-05T00:00:00Z", "details": "Moderate" } ], "title": "CVE-2020-10763 heketi: gluster-block volume password details available in logs" }, { "cve": "CVE-2020-14040", "cwe": { "id": "CWE-835", "name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)" }, "discovery_date": "2020-06-17T00:00:00Z", "flags": [ { "label": "component_not_present", "product_ids": [ "8Base-RHOSE-4.7:openshift4/egress-router-cni-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-aws-ebs-csi-driver-rhel8-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-aws-ebs-csi-driver-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-aws-machine-controllers:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-aws-pod-identity-webhook-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-azure-machine-controllers:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-baremetal-installer-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-baremetal-machine-controllers:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-baremetal-rhel8-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-baremetal-runtimecfg-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cli-artifacts:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cli:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cloud-credential-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-authentication-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-autoscaler-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-autoscaler:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-baremetal-operator-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-config-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-csi-snapshot-controller-rhel8-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-dns-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-etcd-rhel8-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-image-registry-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-ingress-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-kube-apiserver-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-kube-controller-manager-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-kube-scheduler-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-kube-storage-version-migrator-rhel8-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-machine-approver:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-monitoring-operator:v4.7.0-202102172008.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-network-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-node-tuning-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-openshift-apiserver-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-openshift-controller-manager-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-policy-controller-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-samples-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-storage-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-update-keys:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-version-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-configmap-reloader:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-console-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-console:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-container-networking-plugins-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-coredns:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-driver-manila-rhel8-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-driver-manila-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-driver-nfs-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-external-attacher-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-external-attacher:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-external-provisioner-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-external-provisioner:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-external-resizer-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-external-resizer:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-external-snapshotter-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-external-snapshotter:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-livenessprobe-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-livenessprobe:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-node-driver-registrar-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-node-driver-registrar:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-snapshot-controller-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-snapshot-controller:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-snapshot-validation-webhook-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-deployer:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-docker-builder:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-docker-registry:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-etcd:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-gcp-machine-controllers-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-gcp-pd-csi-driver-operator-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-gcp-pd-csi-driver-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-grafana:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-haproxy-router:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-hello-openshift-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-hyperkube:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-insights-rhel8-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-installer-artifacts:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-installer:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-ironic-hardware-inventory-recorder-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-ironic-inspector-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-ironic-ipa-downloader-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-ironic-machine-os-downloader-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-ironic-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-ironic-static-ip-manager-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-jenkins-agent-base:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-jenkins-agent-maven:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-jenkins-agent-nodejs-12-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-jenkins:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-k8s-prometheus-adapter:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-keepalived-ipfailover:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-kube-proxy:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-kube-rbac-proxy:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-kube-state-metrics:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-kube-storage-version-migrator-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-kuryr-cni-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-kuryr-controller-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-libvirt-machine-controllers:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-local-storage-static-provisioner:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-machine-api-operator:v4.7.0-202102172008.p0", "8Base-RHOSE-4.7:openshift4/ose-machine-config-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-mdns-publisher-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-multus-admission-controller:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-multus-cni:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-multus-networkpolicy-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-multus-route-override-cni-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-multus-whereabouts-ipam-cni-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-must-gather:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-network-metrics-daemon-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-oauth-apiserver-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-oauth-proxy:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-oauth-server-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-openshift-apiserver-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-openshift-controller-manager-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-openshift-state-metrics-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-openstack-cinder-csi-driver-rhel8-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-openstack-cinder-csi-driver-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-openstack-machine-controllers:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-operator-lifecycle-manager:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-operator-marketplace:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-operator-registry:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-ovirt-machine-controllers-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-pod:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-prom-label-proxy:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-prometheus-alertmanager:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-prometheus-config-reloader:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-prometheus-node-exporter:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-prometheus-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-prometheus:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-sdn-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-service-ca-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-telemeter:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-tests:v4.7.0-202102181036.p0", "8Base-RHOSE-4.7:openshift4/ose-thanos-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-tools-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-vsphere-problem-detector-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ovirt-csi-driver-rhel7:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ovirt-csi-driver-rhel8-operator:v4.7.0-202102130115.p0" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla", "text": "https://bugzilla.redhat.com/show_bug.cgi?id=1853652" } ], "notes": [ { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" }, { "category": "description", "text": "A denial of service vulnerability was found in the golang.org/x/text library. A library or application must use one of the vulnerable functions, such as unicode.Transform, transform.String, or transform.Byte, to be susceptible to this vulnerability. If an attacker is able to supply specific characters or strings to the vulnerable application, there is the potential to cause an infinite loop to occur using more memory, resulting in a denial of service.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang.org/x/text: possibility to trigger an infinite loop in encoding/unicode could lead to crash", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "8Base-RHOSE-4.7:openshift4/ose-cluster-bootstrap:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-ovn-kubernetes:v4.7.0-202102130115.p0" ], "known_not_affected": [ "8Base-RHOSE-4.7:openshift4/egress-router-cni-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-aws-ebs-csi-driver-rhel8-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-aws-ebs-csi-driver-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-aws-machine-controllers:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-aws-pod-identity-webhook-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-azure-machine-controllers:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-baremetal-installer-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-baremetal-machine-controllers:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-baremetal-rhel8-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-baremetal-runtimecfg-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cli-artifacts:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cli:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cloud-credential-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-authentication-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-autoscaler-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-autoscaler:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-baremetal-operator-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-config-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-csi-snapshot-controller-rhel8-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-dns-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-etcd-rhel8-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-image-registry-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-ingress-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-kube-apiserver-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-kube-controller-manager-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-kube-scheduler-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-kube-storage-version-migrator-rhel8-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-machine-approver:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-monitoring-operator:v4.7.0-202102172008.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-network-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-node-tuning-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-openshift-apiserver-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-openshift-controller-manager-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-policy-controller-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-samples-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-storage-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-update-keys:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-version-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-configmap-reloader:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-console-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-console:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-container-networking-plugins-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-coredns:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-driver-manila-rhel8-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-driver-manila-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-driver-nfs-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-external-attacher-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-external-attacher:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-external-provisioner-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-external-provisioner:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-external-resizer-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-external-resizer:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-external-snapshotter-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-external-snapshotter:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-livenessprobe-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-livenessprobe:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-node-driver-registrar-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-node-driver-registrar:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-snapshot-controller-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-snapshot-controller:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-snapshot-validation-webhook-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-deployer:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-docker-builder:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-docker-registry:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-etcd:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-gcp-machine-controllers-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-gcp-pd-csi-driver-operator-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-gcp-pd-csi-driver-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-grafana:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-haproxy-router:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-hello-openshift-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-hyperkube:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-insights-rhel8-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-installer-artifacts:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-installer:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-ironic-hardware-inventory-recorder-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-ironic-inspector-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-ironic-ipa-downloader-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-ironic-machine-os-downloader-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-ironic-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-ironic-static-ip-manager-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-jenkins-agent-base:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-jenkins-agent-maven:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-jenkins-agent-nodejs-12-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-jenkins:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-k8s-prometheus-adapter:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-keepalived-ipfailover:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-kube-proxy:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-kube-rbac-proxy:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-kube-state-metrics:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-kube-storage-version-migrator-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-kuryr-cni-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-kuryr-controller-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-libvirt-machine-controllers:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-local-storage-static-provisioner:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-machine-api-operator:v4.7.0-202102172008.p0", "8Base-RHOSE-4.7:openshift4/ose-machine-config-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-mdns-publisher-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-multus-admission-controller:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-multus-cni:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-multus-networkpolicy-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-multus-route-override-cni-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-multus-whereabouts-ipam-cni-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-must-gather:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-network-metrics-daemon-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-oauth-apiserver-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-oauth-proxy:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-oauth-server-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-openshift-apiserver-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-openshift-controller-manager-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-openshift-state-metrics-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-openstack-cinder-csi-driver-rhel8-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-openstack-cinder-csi-driver-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-openstack-machine-controllers:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-operator-lifecycle-manager:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-operator-marketplace:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-operator-registry:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-ovirt-machine-controllers-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-pod:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-prom-label-proxy:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-prometheus-alertmanager:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-prometheus-config-reloader:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-prometheus-node-exporter:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-prometheus-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-prometheus:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-sdn-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-service-ca-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-telemeter:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-tests:v4.7.0-202102181036.p0", "8Base-RHOSE-4.7:openshift4/ose-thanos-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-tools-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-vsphere-problem-detector-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ovirt-csi-driver-rhel7:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ovirt-csi-driver-rhel8-operator:v4.7.0-202102130115.p0" ] }, "references": [ { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-14040", "url": "https://www.cve.org/CVERecord?id=CVE-2020-14040" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-14040", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-14040" }, { "category": "external", "summary": "https://github.com/golang/go/issues/39491", "url": "https://github.com/golang/go/issues/39491" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/golang-announce/bXVeAmGOqz0", "url": "https://groups.google.com/forum/#!topic/golang-announce/bXVeAmGOqz0" }, { "category": "external", "summary": "CVE-2020-14040", "url": "https://access.redhat.com/security/cve/CVE-2020-14040" }, { "category": "external", "summary": "bz#1853652: CVE-2020-14040 golang.org/x/text: possibility to trigger an infinite loop in encoding/unicode could lead to crash", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1853652" } ], "release_date": "2020-06-17T00:00:00Z", "remediations": [ { "category": "vendor_fix", "details": "For OpenShift Container Platform 4.7, see the following documentation, which\nwill be updated shortly for this release, for important instructions on how\nto upgrade your cluster and fully apply this asynchronous errata update:\n\nhttps://docs.openshift.com/container-platform/4.7/release_notes/ocp-4-7-release-notes.html\n\nDetails on how to access this content are available at\nhttps://docs.openshift.com/container-platform/4.7/updating/updating-cluster-cli.html.", "product_ids": [ "8Base-RHOSE-4.7:openshift4/ose-cluster-bootstrap:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-ovn-kubernetes:v4.7.0-202102130115.p0" ], "url": "https://access.redhat.com/errata/RHSA-2020:5633" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "8Base-RHOSE-4.7:openshift4/ose-cluster-bootstrap:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-ovn-kubernetes:v4.7.0-202102130115.p0" ] } ], "threats": [ { "category": "impact", "date": "2020-06-17T00:00:00Z", "details": "Moderate" } ], "title": "CVE-2020-14040 golang.org/x/text: possibility to trigger an infinite loop in encoding/unicode could lead to crash" }, { "cve": "CVE-2020-26160", "cwe": { "id": "CWE-284", "name": "Improper Access Control" }, "discovery_date": "2020-09-23T00:00:00Z", "flags": [ { "label": "component_not_present", "product_ids": [ "8Base-RHOSE-4.7:openshift4/egress-router-cni-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-aws-ebs-csi-driver-rhel8-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-aws-ebs-csi-driver-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-aws-machine-controllers:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-aws-pod-identity-webhook-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-baremetal-installer-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-baremetal-machine-controllers:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-baremetal-rhel8-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-baremetal-runtimecfg-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cli-artifacts:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cli:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cloud-credential-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-authentication-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-autoscaler-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-autoscaler:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-baremetal-operator-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-bootstrap:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-config-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-csi-snapshot-controller-rhel8-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-dns-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-etcd-rhel8-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-image-registry-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-ingress-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-kube-apiserver-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-kube-controller-manager-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-kube-scheduler-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-kube-storage-version-migrator-rhel8-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-machine-approver:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-monitoring-operator:v4.7.0-202102172008.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-network-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-node-tuning-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-openshift-apiserver-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-openshift-controller-manager-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-policy-controller-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-samples-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-storage-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-update-keys:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-version-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-configmap-reloader:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-console-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-console:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-container-networking-plugins-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-coredns:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-driver-manila-rhel8-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-driver-manila-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-driver-nfs-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-external-attacher-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-external-attacher:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-external-provisioner-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-external-provisioner:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-external-resizer-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-external-resizer:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-external-snapshotter-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-external-snapshotter:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-livenessprobe-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-livenessprobe:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-node-driver-registrar-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-node-driver-registrar:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-snapshot-controller-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-snapshot-controller:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-snapshot-validation-webhook-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-deployer:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-docker-builder:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-docker-registry:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-etcd:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-gcp-machine-controllers-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-gcp-pd-csi-driver-operator-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-gcp-pd-csi-driver-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-grafana:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-haproxy-router:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-hello-openshift-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-hyperkube:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-insights-rhel8-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-installer-artifacts:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-installer:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-ironic-hardware-inventory-recorder-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-ironic-inspector-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-ironic-ipa-downloader-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-ironic-machine-os-downloader-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-ironic-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-ironic-static-ip-manager-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-jenkins-agent-base:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-jenkins-agent-maven:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-jenkins-agent-nodejs-12-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-jenkins:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-k8s-prometheus-adapter:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-keepalived-ipfailover:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-kube-proxy:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-kube-rbac-proxy:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-kube-state-metrics:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-kube-storage-version-migrator-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-kuryr-cni-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-kuryr-controller-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-libvirt-machine-controllers:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-local-storage-static-provisioner:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-machine-api-operator:v4.7.0-202102172008.p0", "8Base-RHOSE-4.7:openshift4/ose-machine-config-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-mdns-publisher-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-multus-admission-controller:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-multus-cni:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-multus-networkpolicy-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-multus-route-override-cni-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-multus-whereabouts-ipam-cni-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-must-gather:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-network-metrics-daemon-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-oauth-apiserver-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-oauth-proxy:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-oauth-server-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-openshift-apiserver-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-openshift-controller-manager-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-openshift-state-metrics-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-openstack-cinder-csi-driver-rhel8-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-openstack-cinder-csi-driver-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-openstack-machine-controllers:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-operator-lifecycle-manager:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-operator-marketplace:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-operator-registry:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-ovirt-machine-controllers-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-ovn-kubernetes:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-pod:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-prom-label-proxy:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-prometheus-alertmanager:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-prometheus-config-reloader:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-prometheus-node-exporter:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-prometheus-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-prometheus:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-sdn-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-service-ca-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-telemeter:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-tests:v4.7.0-202102181036.p0", "8Base-RHOSE-4.7:openshift4/ose-thanos-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-tools-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-vsphere-problem-detector-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ovirt-csi-driver-rhel7:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ovirt-csi-driver-rhel8-operator:v4.7.0-202102130115.p0" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla", "text": "https://bugzilla.redhat.com/show_bug.cgi?id=1883371" } ], "notes": [ { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" }, { "category": "description", "text": "A vulnerability was found in jwt-go where it is vulnerable to Access Restriction Bypass if m[\"aud\"] happens to be []string{}, as allowed by the spec, the type assertion fails and the value of aud is \"\". This can cause audience verification to succeed even if the audiences being passed are incorrect if required is set to false.", "title": "Vulnerability description" }, { "category": "summary", "text": "jwt-go: access restriction bypass vulnerability", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "8Base-RHOSE-4.7:openshift4/ose-azure-machine-controllers:v4.7.0-202102130115.p0" ], "known_not_affected": [ "8Base-RHOSE-4.7:openshift4/egress-router-cni-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-aws-ebs-csi-driver-rhel8-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-aws-ebs-csi-driver-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-aws-machine-controllers:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-aws-pod-identity-webhook-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-baremetal-installer-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-baremetal-machine-controllers:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-baremetal-rhel8-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-baremetal-runtimecfg-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cli-artifacts:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cli:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cloud-credential-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-authentication-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-autoscaler-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-autoscaler:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-baremetal-operator-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-bootstrap:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-config-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-csi-snapshot-controller-rhel8-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-dns-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-etcd-rhel8-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-image-registry-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-ingress-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-kube-apiserver-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-kube-controller-manager-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-kube-scheduler-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-kube-storage-version-migrator-rhel8-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-machine-approver:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-monitoring-operator:v4.7.0-202102172008.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-network-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-node-tuning-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-openshift-apiserver-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-openshift-controller-manager-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-policy-controller-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-samples-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-storage-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-update-keys:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-version-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-configmap-reloader:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-console-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-console:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-container-networking-plugins-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-coredns:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-driver-manila-rhel8-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-driver-manila-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-driver-nfs-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-external-attacher-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-external-attacher:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-external-provisioner-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-external-provisioner:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-external-resizer-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-external-resizer:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-external-snapshotter-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-external-snapshotter:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-livenessprobe-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-livenessprobe:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-node-driver-registrar-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-node-driver-registrar:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-snapshot-controller-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-snapshot-controller:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-snapshot-validation-webhook-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-deployer:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-docker-builder:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-docker-registry:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-etcd:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-gcp-machine-controllers-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-gcp-pd-csi-driver-operator-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-gcp-pd-csi-driver-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-grafana:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-haproxy-router:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-hello-openshift-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-hyperkube:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-insights-rhel8-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-installer-artifacts:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-installer:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-ironic-hardware-inventory-recorder-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-ironic-inspector-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-ironic-ipa-downloader-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-ironic-machine-os-downloader-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-ironic-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-ironic-static-ip-manager-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-jenkins-agent-base:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-jenkins-agent-maven:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-jenkins-agent-nodejs-12-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-jenkins:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-k8s-prometheus-adapter:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-keepalived-ipfailover:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-kube-proxy:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-kube-rbac-proxy:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-kube-state-metrics:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-kube-storage-version-migrator-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-kuryr-cni-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-kuryr-controller-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-libvirt-machine-controllers:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-local-storage-static-provisioner:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-machine-api-operator:v4.7.0-202102172008.p0", "8Base-RHOSE-4.7:openshift4/ose-machine-config-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-mdns-publisher-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-multus-admission-controller:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-multus-cni:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-multus-networkpolicy-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-multus-route-override-cni-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-multus-whereabouts-ipam-cni-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-must-gather:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-network-metrics-daemon-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-oauth-apiserver-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-oauth-proxy:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-oauth-server-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-openshift-apiserver-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-openshift-controller-manager-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-openshift-state-metrics-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-openstack-cinder-csi-driver-rhel8-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-openstack-cinder-csi-driver-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-openstack-machine-controllers:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-operator-lifecycle-manager:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-operator-marketplace:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-operator-registry:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-ovirt-machine-controllers-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-ovn-kubernetes:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-pod:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-prom-label-proxy:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-prometheus-alertmanager:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-prometheus-config-reloader:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-prometheus-node-exporter:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-prometheus-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-prometheus:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-sdn-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-service-ca-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-telemeter:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-tests:v4.7.0-202102181036.p0", "8Base-RHOSE-4.7:openshift4/ose-thanos-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-tools-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-vsphere-problem-detector-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ovirt-csi-driver-rhel7:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ovirt-csi-driver-rhel8-operator:v4.7.0-202102130115.p0" ] }, "references": [ { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-26160", "url": "https://www.cve.org/CVERecord?id=CVE-2020-26160" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-26160", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-26160" }, { "category": "external", "summary": "https://snyk.io/vuln/SNYK-GOLANG-GITHUBCOMDGRIJALVAJWTGO-596515", "url": "https://snyk.io/vuln/SNYK-GOLANG-GITHUBCOMDGRIJALVAJWTGO-596515" }, { "category": "external", "summary": "CVE-2020-26160", "url": "https://access.redhat.com/security/cve/CVE-2020-26160" }, { "category": "external", "summary": "bz#1883371: CVE-2020-26160 jwt-go: access restriction bypass vulnerability", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1883371" } ], "release_date": "2020-09-15T00:00:00Z", "remediations": [ { "category": "vendor_fix", "details": "For OpenShift Container Platform 4.7, see the following documentation, which\nwill be updated shortly for this release, for important instructions on how\nto upgrade your cluster and fully apply this asynchronous errata update:\n\nhttps://docs.openshift.com/container-platform/4.7/release_notes/ocp-4-7-release-notes.html\n\nDetails on how to access this content are available at\nhttps://docs.openshift.com/container-platform/4.7/updating/updating-cluster-cli.html.", "product_ids": [ "8Base-RHOSE-4.7:openshift4/ose-azure-machine-controllers:v4.7.0-202102130115.p0" ], "url": "https://access.redhat.com/errata/RHSA-2020:5633" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "8Base-RHOSE-4.7:openshift4/ose-azure-machine-controllers:v4.7.0-202102130115.p0" ] } ], "threats": [ { "category": "impact", "date": "2020-09-23T00:00:00Z", "details": "Moderate" } ], "title": "CVE-2020-26160 jwt-go: access restriction bypass vulnerability" }, { "cve": "CVE-2020-27813", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2020-11-27T00:00:00Z", "flags": [ { "label": "component_not_present", "product_ids": [ "8Base-RHOSE-4.7:openshift4/egress-router-cni-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-aws-ebs-csi-driver-rhel8-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-aws-ebs-csi-driver-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-aws-machine-controllers:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-aws-pod-identity-webhook-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-azure-machine-controllers:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-baremetal-installer-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-baremetal-machine-controllers:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-baremetal-rhel8-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-baremetal-runtimecfg-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cli-artifacts:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cli:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cloud-credential-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-authentication-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-autoscaler-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-autoscaler:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-baremetal-operator-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-bootstrap:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-config-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-csi-snapshot-controller-rhel8-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-dns-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-etcd-rhel8-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-image-registry-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-ingress-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-kube-apiserver-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-kube-controller-manager-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-kube-scheduler-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-kube-storage-version-migrator-rhel8-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-machine-approver:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-monitoring-operator:v4.7.0-202102172008.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-network-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-node-tuning-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-openshift-apiserver-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-openshift-controller-manager-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-policy-controller-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-samples-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-storage-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-update-keys:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-version-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-configmap-reloader:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-console-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-container-networking-plugins-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-coredns:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-driver-manila-rhel8-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-driver-manila-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-driver-nfs-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-external-attacher-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-external-attacher:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-external-provisioner-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-external-provisioner:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-external-resizer-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-external-resizer:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-external-snapshotter-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-external-snapshotter:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-livenessprobe-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-livenessprobe:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-node-driver-registrar-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-node-driver-registrar:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-snapshot-controller-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-snapshot-controller:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-snapshot-validation-webhook-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-deployer:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-docker-builder:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-docker-registry:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-etcd:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-gcp-machine-controllers-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-gcp-pd-csi-driver-operator-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-gcp-pd-csi-driver-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-grafana:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-haproxy-router:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-hello-openshift-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-hyperkube:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-insights-rhel8-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-installer-artifacts:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-installer:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-ironic-hardware-inventory-recorder-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-ironic-inspector-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-ironic-ipa-downloader-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-ironic-machine-os-downloader-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-ironic-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-ironic-static-ip-manager-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-jenkins-agent-base:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-jenkins-agent-maven:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-jenkins-agent-nodejs-12-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-jenkins:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-k8s-prometheus-adapter:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-keepalived-ipfailover:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-kube-proxy:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-kube-rbac-proxy:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-kube-state-metrics:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-kube-storage-version-migrator-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-kuryr-cni-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-kuryr-controller-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-libvirt-machine-controllers:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-local-storage-static-provisioner:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-machine-api-operator:v4.7.0-202102172008.p0", "8Base-RHOSE-4.7:openshift4/ose-machine-config-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-mdns-publisher-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-multus-admission-controller:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-multus-cni:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-multus-networkpolicy-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-multus-route-override-cni-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-multus-whereabouts-ipam-cni-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-must-gather:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-network-metrics-daemon-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-oauth-apiserver-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-oauth-proxy:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-oauth-server-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-openshift-apiserver-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-openshift-controller-manager-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-openshift-state-metrics-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-openstack-cinder-csi-driver-rhel8-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-openstack-cinder-csi-driver-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-openstack-machine-controllers:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-operator-lifecycle-manager:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-operator-marketplace:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-operator-registry:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-ovirt-machine-controllers-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-ovn-kubernetes:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-pod:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-prom-label-proxy:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-prometheus-alertmanager:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-prometheus-config-reloader:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-prometheus-node-exporter:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-prometheus-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-prometheus:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-sdn-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-service-ca-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-telemeter:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-tests:v4.7.0-202102181036.p0", "8Base-RHOSE-4.7:openshift4/ose-thanos-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-tools-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-vsphere-problem-detector-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ovirt-csi-driver-rhel7:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ovirt-csi-driver-rhel8-operator:v4.7.0-202102130115.p0" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla", "text": "https://bugzilla.redhat.com/show_bug.cgi?id=1902111" } ], "notes": [ { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" }, { "category": "description", "text": "An integer overflow vulnerability exists with the length of websocket frames received via a websocket connection. An attacker could use this flaw to cause a denial of service attack on an HTTP Server allowing websocket connections.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang-github-gorilla-websocket: integer overflow leads to denial of service", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "8Base-RHOSE-4.7:openshift4/ose-console:v4.7.0-202102130115.p0" ], "known_not_affected": [ "8Base-RHOSE-4.7:openshift4/egress-router-cni-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-aws-ebs-csi-driver-rhel8-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-aws-ebs-csi-driver-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-aws-machine-controllers:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-aws-pod-identity-webhook-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-azure-machine-controllers:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-baremetal-installer-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-baremetal-machine-controllers:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-baremetal-rhel8-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-baremetal-runtimecfg-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cli-artifacts:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cli:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cloud-credential-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-authentication-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-autoscaler-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-autoscaler:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-baremetal-operator-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-bootstrap:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-config-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-csi-snapshot-controller-rhel8-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-dns-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-etcd-rhel8-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-image-registry-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-ingress-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-kube-apiserver-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-kube-controller-manager-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-kube-scheduler-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-kube-storage-version-migrator-rhel8-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-machine-approver:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-monitoring-operator:v4.7.0-202102172008.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-network-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-node-tuning-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-openshift-apiserver-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-openshift-controller-manager-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-policy-controller-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-samples-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-storage-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-update-keys:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-version-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-configmap-reloader:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-console-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-container-networking-plugins-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-coredns:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-driver-manila-rhel8-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-driver-manila-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-driver-nfs-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-external-attacher-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-external-attacher:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-external-provisioner-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-external-provisioner:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-external-resizer-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-external-resizer:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-external-snapshotter-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-external-snapshotter:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-livenessprobe-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-livenessprobe:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-node-driver-registrar-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-node-driver-registrar:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-snapshot-controller-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-snapshot-controller:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-snapshot-validation-webhook-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-deployer:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-docker-builder:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-docker-registry:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-etcd:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-gcp-machine-controllers-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-gcp-pd-csi-driver-operator-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-gcp-pd-csi-driver-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-grafana:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-haproxy-router:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-hello-openshift-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-hyperkube:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-insights-rhel8-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-installer-artifacts:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-installer:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-ironic-hardware-inventory-recorder-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-ironic-inspector-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-ironic-ipa-downloader-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-ironic-machine-os-downloader-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-ironic-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-ironic-static-ip-manager-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-jenkins-agent-base:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-jenkins-agent-maven:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-jenkins-agent-nodejs-12-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-jenkins:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-k8s-prometheus-adapter:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-keepalived-ipfailover:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-kube-proxy:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-kube-rbac-proxy:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-kube-state-metrics:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-kube-storage-version-migrator-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-kuryr-cni-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-kuryr-controller-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-libvirt-machine-controllers:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-local-storage-static-provisioner:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-machine-api-operator:v4.7.0-202102172008.p0", "8Base-RHOSE-4.7:openshift4/ose-machine-config-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-mdns-publisher-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-multus-admission-controller:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-multus-cni:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-multus-networkpolicy-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-multus-route-override-cni-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-multus-whereabouts-ipam-cni-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-must-gather:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-network-metrics-daemon-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-oauth-apiserver-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-oauth-proxy:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-oauth-server-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-openshift-apiserver-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-openshift-controller-manager-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-openshift-state-metrics-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-openstack-cinder-csi-driver-rhel8-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-openstack-cinder-csi-driver-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-openstack-machine-controllers:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-operator-lifecycle-manager:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-operator-marketplace:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-operator-registry:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-ovirt-machine-controllers-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-ovn-kubernetes:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-pod:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-prom-label-proxy:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-prometheus-alertmanager:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-prometheus-config-reloader:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-prometheus-node-exporter:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-prometheus-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-prometheus:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-sdn-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-service-ca-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-telemeter:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-tests:v4.7.0-202102181036.p0", "8Base-RHOSE-4.7:openshift4/ose-thanos-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-tools-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-vsphere-problem-detector-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ovirt-csi-driver-rhel7:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ovirt-csi-driver-rhel8-operator:v4.7.0-202102130115.p0" ] }, "references": [ { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-27813", "url": "https://www.cve.org/CVERecord?id=CVE-2020-27813" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-27813", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-27813" }, { "category": "external", "summary": "https://github.com/gorilla/websocket/security/advisories/GHSA-jf24-p9p9-4rjh", "url": "https://github.com/gorilla/websocket/security/advisories/GHSA-jf24-p9p9-4rjh" }, { "category": "external", "summary": "CVE-2020-27813", "url": "https://access.redhat.com/security/cve/CVE-2020-27813" }, { "category": "external", "summary": "bz#1902111: CVE-2020-27813 golang-github-gorilla-websocket: integer overflow leads to denial of service", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1902111" } ], "release_date": "2019-08-25T00:00:00Z", "remediations": [ { "category": "vendor_fix", "details": "For OpenShift Container Platform 4.7, see the following documentation, which\nwill be updated shortly for this release, for important instructions on how\nto upgrade your cluster and fully apply this asynchronous errata update:\n\nhttps://docs.openshift.com/container-platform/4.7/release_notes/ocp-4-7-release-notes.html\n\nDetails on how to access this content are available at\nhttps://docs.openshift.com/container-platform/4.7/updating/updating-cluster-cli.html.", "product_ids": [ "8Base-RHOSE-4.7:openshift4/ose-console:v4.7.0-202102130115.p0" ], "url": "https://access.redhat.com/errata/RHSA-2020:5633" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "8Base-RHOSE-4.7:openshift4/ose-console:v4.7.0-202102130115.p0" ] } ], "threats": [ { "category": "impact", "date": "2020-11-27T00:00:00Z", "details": "Moderate" } ], "title": "CVE-2020-27813 golang-github-gorilla-websocket: integer overflow leads to denial of service" }, { "cve": "CVE-2020-27846", "cwe": { "id": "CWE-115", "name": "Misinterpretation of Input" }, "discovery_date": "2020-12-15T00:00:00Z", "flags": [ { "label": "component_not_present", "product_ids": [ "8Base-RHOSE-4.7:openshift4/egress-router-cni-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-aws-ebs-csi-driver-rhel8-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-aws-ebs-csi-driver-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-aws-machine-controllers:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-aws-pod-identity-webhook-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-azure-machine-controllers:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-baremetal-installer-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-baremetal-machine-controllers:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-baremetal-rhel8-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-baremetal-runtimecfg-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cli-artifacts:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cli:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cloud-credential-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-authentication-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-autoscaler-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-autoscaler:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-baremetal-operator-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-bootstrap:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-config-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-csi-snapshot-controller-rhel8-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-dns-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-etcd-rhel8-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-image-registry-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-ingress-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-kube-apiserver-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-kube-controller-manager-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-kube-scheduler-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-kube-storage-version-migrator-rhel8-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-machine-approver:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-monitoring-operator:v4.7.0-202102172008.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-network-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-node-tuning-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-openshift-apiserver-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-openshift-controller-manager-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-policy-controller-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-samples-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-storage-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-update-keys:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-version-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-configmap-reloader:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-console-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-console:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-container-networking-plugins-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-coredns:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-driver-manila-rhel8-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-driver-manila-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-driver-nfs-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-external-attacher-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-external-attacher:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-external-provisioner-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-external-provisioner:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-external-resizer-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-external-resizer:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-external-snapshotter-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-external-snapshotter:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-livenessprobe-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-livenessprobe:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-node-driver-registrar-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-node-driver-registrar:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-snapshot-controller-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-snapshot-controller:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-snapshot-validation-webhook-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-deployer:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-docker-builder:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-docker-registry:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-etcd:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-gcp-machine-controllers-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-gcp-pd-csi-driver-operator-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-gcp-pd-csi-driver-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-haproxy-router:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-hello-openshift-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-hyperkube:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-insights-rhel8-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-installer-artifacts:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-installer:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-ironic-hardware-inventory-recorder-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-ironic-inspector-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-ironic-ipa-downloader-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-ironic-machine-os-downloader-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-ironic-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-ironic-static-ip-manager-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-jenkins-agent-base:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-jenkins-agent-maven:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-jenkins-agent-nodejs-12-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-jenkins:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-k8s-prometheus-adapter:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-keepalived-ipfailover:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-kube-proxy:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-kube-rbac-proxy:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-kube-state-metrics:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-kube-storage-version-migrator-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-kuryr-cni-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-kuryr-controller-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-libvirt-machine-controllers:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-local-storage-static-provisioner:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-machine-api-operator:v4.7.0-202102172008.p0", "8Base-RHOSE-4.7:openshift4/ose-machine-config-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-mdns-publisher-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-multus-admission-controller:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-multus-cni:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-multus-networkpolicy-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-multus-route-override-cni-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-multus-whereabouts-ipam-cni-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-must-gather:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-network-metrics-daemon-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-oauth-apiserver-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-oauth-proxy:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-oauth-server-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-openshift-apiserver-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-openshift-controller-manager-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-openshift-state-metrics-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-openstack-cinder-csi-driver-rhel8-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-openstack-cinder-csi-driver-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-openstack-machine-controllers:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-operator-lifecycle-manager:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-operator-marketplace:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-operator-registry:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-ovirt-machine-controllers-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-ovn-kubernetes:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-pod:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-prom-label-proxy:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-prometheus-alertmanager:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-prometheus-config-reloader:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-prometheus-node-exporter:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-prometheus-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-prometheus:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-sdn-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-service-ca-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-telemeter:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-tests:v4.7.0-202102181036.p0", "8Base-RHOSE-4.7:openshift4/ose-thanos-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-tools-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-vsphere-problem-detector-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ovirt-csi-driver-rhel7:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ovirt-csi-driver-rhel8-operator:v4.7.0-202102130115.p0" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla", "text": "https://bugzilla.redhat.com/show_bug.cgi?id=1907670" } ], "notes": [ { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" }, { "category": "description", "text": "A signature verification vulnerability exists in crewjam/saml. This flaw allows an attacker to bypass SAML Authentication. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "crewjam/saml: authentication bypass in saml authentication", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "8Base-RHOSE-4.7:openshift4/ose-grafana:v4.7.0-202102130115.p0" ], "known_not_affected": [ "8Base-RHOSE-4.7:openshift4/egress-router-cni-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-aws-ebs-csi-driver-rhel8-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-aws-ebs-csi-driver-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-aws-machine-controllers:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-aws-pod-identity-webhook-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-azure-machine-controllers:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-baremetal-installer-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-baremetal-machine-controllers:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-baremetal-rhel8-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-baremetal-runtimecfg-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cli-artifacts:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cli:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cloud-credential-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-authentication-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-autoscaler-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-autoscaler:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-baremetal-operator-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-bootstrap:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-config-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-csi-snapshot-controller-rhel8-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-dns-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-etcd-rhel8-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-image-registry-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-ingress-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-kube-apiserver-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-kube-controller-manager-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-kube-scheduler-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-kube-storage-version-migrator-rhel8-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-machine-approver:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-monitoring-operator:v4.7.0-202102172008.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-network-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-node-tuning-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-openshift-apiserver-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-openshift-controller-manager-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-policy-controller-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-samples-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-storage-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-update-keys:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-version-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-configmap-reloader:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-console-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-console:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-container-networking-plugins-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-coredns:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-driver-manila-rhel8-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-driver-manila-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-driver-nfs-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-external-attacher-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-external-attacher:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-external-provisioner-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-external-provisioner:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-external-resizer-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-external-resizer:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-external-snapshotter-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-external-snapshotter:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-livenessprobe-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-livenessprobe:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-node-driver-registrar-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-node-driver-registrar:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-snapshot-controller-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-snapshot-controller:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-snapshot-validation-webhook-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-deployer:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-docker-builder:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-docker-registry:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-etcd:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-gcp-machine-controllers-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-gcp-pd-csi-driver-operator-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-gcp-pd-csi-driver-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-haproxy-router:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-hello-openshift-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-hyperkube:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-insights-rhel8-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-installer-artifacts:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-installer:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-ironic-hardware-inventory-recorder-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-ironic-inspector-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-ironic-ipa-downloader-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-ironic-machine-os-downloader-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-ironic-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-ironic-static-ip-manager-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-jenkins-agent-base:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-jenkins-agent-maven:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-jenkins-agent-nodejs-12-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-jenkins:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-k8s-prometheus-adapter:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-keepalived-ipfailover:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-kube-proxy:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-kube-rbac-proxy:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-kube-state-metrics:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-kube-storage-version-migrator-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-kuryr-cni-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-kuryr-controller-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-libvirt-machine-controllers:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-local-storage-static-provisioner:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-machine-api-operator:v4.7.0-202102172008.p0", "8Base-RHOSE-4.7:openshift4/ose-machine-config-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-mdns-publisher-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-multus-admission-controller:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-multus-cni:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-multus-networkpolicy-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-multus-route-override-cni-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-multus-whereabouts-ipam-cni-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-must-gather:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-network-metrics-daemon-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-oauth-apiserver-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-oauth-proxy:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-oauth-server-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-openshift-apiserver-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-openshift-controller-manager-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-openshift-state-metrics-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-openstack-cinder-csi-driver-rhel8-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-openstack-cinder-csi-driver-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-openstack-machine-controllers:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-operator-lifecycle-manager:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-operator-marketplace:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-operator-registry:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-ovirt-machine-controllers-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-ovn-kubernetes:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-pod:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-prom-label-proxy:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-prometheus-alertmanager:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-prometheus-config-reloader:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-prometheus-node-exporter:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-prometheus-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-prometheus:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-sdn-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-service-ca-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-telemeter:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-tests:v4.7.0-202102181036.p0", "8Base-RHOSE-4.7:openshift4/ose-thanos-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-tools-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-vsphere-problem-detector-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ovirt-csi-driver-rhel7:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ovirt-csi-driver-rhel8-operator:v4.7.0-202102130115.p0" ] }, "references": [ { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-27846", "url": "https://www.cve.org/CVERecord?id=CVE-2020-27846" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-27846", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-27846" }, { "category": "external", "summary": "https://github.com/crewjam/saml/security/advisories/GHSA-4hq8-gmxx-h6w9", "url": "https://github.com/crewjam/saml/security/advisories/GHSA-4hq8-gmxx-h6w9" }, { "category": "external", "summary": "https://grafana.com/blog/2020/12/17/grafana-6.7.5-7.2.3-and-7.3.6-released-with-important-security-fix-for-grafana-enterprise/", "url": "https://grafana.com/blog/2020/12/17/grafana-6.7.5-7.2.3-and-7.3.6-released-with-important-security-fix-for-grafana-enterprise/" }, { "category": "external", "summary": "https://mattermost.com/blog/coordinated-disclosure-go-xml-vulnerabilities/", "url": "https://mattermost.com/blog/coordinated-disclosure-go-xml-vulnerabilities/" }, { "category": "external", "summary": "CVE-2020-27846", "url": "https://access.redhat.com/security/cve/CVE-2020-27846" }, { "category": "external", "summary": "bz#1907670: CVE-2020-27846 crewjam/saml: authentication bypass in saml authentication", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1907670" } ], "release_date": "2020-12-17T13:00:00Z", "remediations": [ { "category": "vendor_fix", "details": "For OpenShift Container Platform 4.7, see the following documentation, which\nwill be updated shortly for this release, for important instructions on how\nto upgrade your cluster and fully apply this asynchronous errata update:\n\nhttps://docs.openshift.com/container-platform/4.7/release_notes/ocp-4-7-release-notes.html\n\nDetails on how to access this content are available at\nhttps://docs.openshift.com/container-platform/4.7/updating/updating-cluster-cli.html.", "product_ids": [ "8Base-RHOSE-4.7:openshift4/ose-grafana:v4.7.0-202102130115.p0" ], "url": "https://access.redhat.com/errata/RHSA-2020:5633" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "8Base-RHOSE-4.7:openshift4/ose-grafana:v4.7.0-202102130115.p0" ] } ], "threats": [ { "category": "impact", "date": "2020-12-15T00:00:00Z", "details": "Critical" } ], "title": "CVE-2020-27846 crewjam/saml: authentication bypass in saml authentication" }, { "cve": "CVE-2020-28362", "cwe": { "id": "CWE-295", "name": "Improper Certificate Validation" }, "discovery_date": "2020-11-12T00:00:00Z", "flags": [ { "label": "component_not_present", "product_ids": [ "8Base-RHOSE-4.7:openshift4/egress-router-cni-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-aws-ebs-csi-driver-rhel8-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-aws-ebs-csi-driver-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-aws-machine-controllers:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-aws-pod-identity-webhook-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-azure-machine-controllers:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-baremetal-installer-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-baremetal-machine-controllers:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-baremetal-rhel8-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-baremetal-runtimecfg-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cli-artifacts:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cli:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cloud-credential-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-authentication-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-autoscaler-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-autoscaler:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-baremetal-operator-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-bootstrap:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-config-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-csi-snapshot-controller-rhel8-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-dns-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-etcd-rhel8-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-image-registry-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-ingress-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-kube-apiserver-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-kube-controller-manager-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-kube-scheduler-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-kube-storage-version-migrator-rhel8-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-machine-approver:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-monitoring-operator:v4.7.0-202102172008.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-network-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-node-tuning-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-openshift-apiserver-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-openshift-controller-manager-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-policy-controller-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-samples-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-storage-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-update-keys:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-version-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-configmap-reloader:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-console-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-console:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-container-networking-plugins-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-coredns:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-driver-manila-rhel8-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-driver-manila-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-driver-nfs-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-external-attacher-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-external-attacher:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-external-provisioner-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-external-provisioner:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-external-resizer-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-external-resizer:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-external-snapshotter-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-external-snapshotter:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-livenessprobe-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-livenessprobe:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-node-driver-registrar-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-node-driver-registrar:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-snapshot-controller-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-snapshot-controller:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-snapshot-validation-webhook-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-deployer:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-docker-builder:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-docker-registry:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-etcd:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-gcp-machine-controllers-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-gcp-pd-csi-driver-operator-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-gcp-pd-csi-driver-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-grafana:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-haproxy-router:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-hello-openshift-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-hyperkube:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-insights-rhel8-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-installer-artifacts:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-installer:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-ironic-hardware-inventory-recorder-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-ironic-inspector-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-ironic-ipa-downloader-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-ironic-machine-os-downloader-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-ironic-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-ironic-static-ip-manager-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-jenkins-agent-base:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-jenkins-agent-maven:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-jenkins-agent-nodejs-12-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-jenkins:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-k8s-prometheus-adapter:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-keepalived-ipfailover:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-kube-proxy:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-kube-rbac-proxy:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-kube-state-metrics:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-kube-storage-version-migrator-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-kuryr-cni-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-kuryr-controller-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-libvirt-machine-controllers:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-local-storage-static-provisioner:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-machine-api-operator:v4.7.0-202102172008.p0", "8Base-RHOSE-4.7:openshift4/ose-machine-config-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-mdns-publisher-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-multus-admission-controller:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-multus-cni:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-multus-networkpolicy-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-multus-route-override-cni-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-multus-whereabouts-ipam-cni-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-must-gather:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-network-metrics-daemon-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-oauth-apiserver-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-oauth-proxy:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-oauth-server-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-openshift-apiserver-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-openshift-controller-manager-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-openshift-state-metrics-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-openstack-cinder-csi-driver-rhel8-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-openstack-cinder-csi-driver-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-openstack-machine-controllers:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-operator-lifecycle-manager:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-operator-marketplace:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-ovirt-machine-controllers-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-ovn-kubernetes:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-pod:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-prom-label-proxy:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-prometheus-alertmanager:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-prometheus-config-reloader:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-prometheus-node-exporter:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-prometheus-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-prometheus:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-sdn-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-service-ca-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-telemeter:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-tests:v4.7.0-202102181036.p0", "8Base-RHOSE-4.7:openshift4/ose-thanos-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-tools-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-vsphere-problem-detector-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ovirt-csi-driver-rhel7:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ovirt-csi-driver-rhel8-operator:v4.7.0-202102130115.p0" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla", "text": "https://bugzilla.redhat.com/show_bug.cgi?id=1897635" } ], "notes": [ { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" }, { "category": "description", "text": "A flaw was found in the math/big package of Go\u0027s standard library that causes a denial of service. Applications written in Go that use math/big via cryptographic packages, including crypto/rsa and crypto/x509, are vulnerable and can potentially cause panic via a crafted certificate chain. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: math/big: panic during recursive division of very large numbers", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "8Base-RHOSE-4.7:openshift4/ose-operator-registry:v4.7.0-202102130115.p0" ], "known_not_affected": [ "8Base-RHOSE-4.7:openshift4/egress-router-cni-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-aws-ebs-csi-driver-rhel8-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-aws-ebs-csi-driver-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-aws-machine-controllers:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-aws-pod-identity-webhook-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-azure-machine-controllers:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-baremetal-installer-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-baremetal-machine-controllers:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-baremetal-rhel8-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-baremetal-runtimecfg-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cli-artifacts:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cli:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cloud-credential-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-authentication-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-autoscaler-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-autoscaler:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-baremetal-operator-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-bootstrap:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-config-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-csi-snapshot-controller-rhel8-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-dns-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-etcd-rhel8-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-image-registry-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-ingress-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-kube-apiserver-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-kube-controller-manager-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-kube-scheduler-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-kube-storage-version-migrator-rhel8-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-machine-approver:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-monitoring-operator:v4.7.0-202102172008.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-network-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-node-tuning-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-openshift-apiserver-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-openshift-controller-manager-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-policy-controller-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-samples-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-storage-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-update-keys:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-version-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-configmap-reloader:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-console-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-console:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-container-networking-plugins-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-coredns:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-driver-manila-rhel8-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-driver-manila-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-driver-nfs-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-external-attacher-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-external-attacher:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-external-provisioner-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-external-provisioner:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-external-resizer-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-external-resizer:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-external-snapshotter-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-external-snapshotter:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-livenessprobe-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-livenessprobe:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-node-driver-registrar-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-node-driver-registrar:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-snapshot-controller-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-snapshot-controller:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-snapshot-validation-webhook-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-deployer:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-docker-builder:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-docker-registry:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-etcd:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-gcp-machine-controllers-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-gcp-pd-csi-driver-operator-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-gcp-pd-csi-driver-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-grafana:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-haproxy-router:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-hello-openshift-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-hyperkube:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-insights-rhel8-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-installer-artifacts:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-installer:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-ironic-hardware-inventory-recorder-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-ironic-inspector-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-ironic-ipa-downloader-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-ironic-machine-os-downloader-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-ironic-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-ironic-static-ip-manager-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-jenkins-agent-base:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-jenkins-agent-maven:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-jenkins-agent-nodejs-12-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-jenkins:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-k8s-prometheus-adapter:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-keepalived-ipfailover:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-kube-proxy:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-kube-rbac-proxy:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-kube-state-metrics:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-kube-storage-version-migrator-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-kuryr-cni-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-kuryr-controller-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-libvirt-machine-controllers:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-local-storage-static-provisioner:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-machine-api-operator:v4.7.0-202102172008.p0", "8Base-RHOSE-4.7:openshift4/ose-machine-config-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-mdns-publisher-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-multus-admission-controller:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-multus-cni:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-multus-networkpolicy-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-multus-route-override-cni-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-multus-whereabouts-ipam-cni-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-must-gather:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-network-metrics-daemon-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-oauth-apiserver-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-oauth-proxy:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-oauth-server-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-openshift-apiserver-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-openshift-controller-manager-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-openshift-state-metrics-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-openstack-cinder-csi-driver-rhel8-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-openstack-cinder-csi-driver-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-openstack-machine-controllers:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-operator-lifecycle-manager:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-operator-marketplace:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-ovirt-machine-controllers-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-ovn-kubernetes:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-pod:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-prom-label-proxy:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-prometheus-alertmanager:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-prometheus-config-reloader:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-prometheus-node-exporter:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-prometheus-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-prometheus:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-sdn-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-service-ca-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-telemeter:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-tests:v4.7.0-202102181036.p0", "8Base-RHOSE-4.7:openshift4/ose-thanos-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-tools-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-vsphere-problem-detector-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ovirt-csi-driver-rhel7:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ovirt-csi-driver-rhel8-operator:v4.7.0-202102130115.p0" ] }, "references": [ { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-28362", "url": "https://www.cve.org/CVERecord?id=CVE-2020-28362" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-28362", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-28362" }, { "category": "external", "summary": "CVE-2020-28362", "url": "https://access.redhat.com/security/cve/CVE-2020-28362" }, { "category": "external", "summary": "bz#1897635: CVE-2020-28362 golang: math/big: panic during recursive division of very large numbers", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1897635" } ], "release_date": "2020-11-12T00:00:00Z", "remediations": [ { "category": "vendor_fix", "details": "For OpenShift Container Platform 4.7, see the following documentation, which\nwill be updated shortly for this release, for important instructions on how\nto upgrade your cluster and fully apply this asynchronous errata update:\n\nhttps://docs.openshift.com/container-platform/4.7/release_notes/ocp-4-7-release-notes.html\n\nDetails on how to access this content are available at\nhttps://docs.openshift.com/container-platform/4.7/updating/updating-cluster-cli.html.", "product_ids": [ "8Base-RHOSE-4.7:openshift4/ose-operator-registry:v4.7.0-202102130115.p0" ], "url": "https://access.redhat.com/errata/RHSA-2020:5633" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "8Base-RHOSE-4.7:openshift4/ose-operator-registry:v4.7.0-202102130115.p0" ] } ], "threats": [ { "category": "impact", "date": "2020-11-12T00:00:00Z", "details": "Moderate" } ], "title": "CVE-2020-28362 golang: math/big: panic during recursive division of very large numbers" }, { "cve": "CVE-2020-29652", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "discovery_date": "2020-12-17T00:00:00Z", "flags": [ { "label": "component_not_present", "product_ids": [ "8Base-RHOSE-4.7:openshift4/egress-router-cni-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-aws-ebs-csi-driver-rhel8-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-aws-machine-controllers:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-aws-pod-identity-webhook-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-baremetal-machine-controllers:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-baremetal-rhel8-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-baremetal-runtimecfg-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cli-artifacts:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cli:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cloud-credential-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-authentication-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-autoscaler-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-autoscaler:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-baremetal-operator-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-bootstrap:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-config-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-csi-snapshot-controller-rhel8-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-dns-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-etcd-rhel8-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-image-registry-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-ingress-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-kube-apiserver-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-kube-controller-manager-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-kube-scheduler-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-kube-storage-version-migrator-rhel8-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-machine-approver:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-monitoring-operator:v4.7.0-202102172008.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-network-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-node-tuning-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-openshift-apiserver-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-openshift-controller-manager-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-policy-controller-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-samples-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-storage-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-update-keys:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-version-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-configmap-reloader:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-console-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-console:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-container-networking-plugins-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-coredns:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-driver-manila-rhel8-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-driver-manila-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-driver-nfs-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-external-attacher-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-external-attacher:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-external-provisioner-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-external-provisioner:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-external-resizer-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-external-resizer:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-external-snapshotter-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-external-snapshotter:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-livenessprobe-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-livenessprobe:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-node-driver-registrar-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-node-driver-registrar:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-snapshot-controller-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-snapshot-controller:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-snapshot-validation-webhook-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-deployer:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-docker-builder:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-docker-registry:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-etcd:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-gcp-machine-controllers-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-gcp-pd-csi-driver-operator-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-gcp-pd-csi-driver-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-grafana:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-haproxy-router:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-hello-openshift-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-hyperkube:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-insights-rhel8-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-ironic-hardware-inventory-recorder-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-ironic-inspector-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-ironic-ipa-downloader-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-ironic-machine-os-downloader-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-ironic-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-ironic-static-ip-manager-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-jenkins-agent-base:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-jenkins-agent-maven:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-jenkins-agent-nodejs-12-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-jenkins:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-k8s-prometheus-adapter:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-keepalived-ipfailover:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-kube-proxy:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-kube-rbac-proxy:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-kube-state-metrics:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-kube-storage-version-migrator-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-kuryr-cni-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-kuryr-controller-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-libvirt-machine-controllers:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-local-storage-static-provisioner:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-machine-api-operator:v4.7.0-202102172008.p0", "8Base-RHOSE-4.7:openshift4/ose-machine-config-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-mdns-publisher-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-multus-admission-controller:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-multus-cni:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-multus-networkpolicy-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-multus-route-override-cni-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-multus-whereabouts-ipam-cni-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-must-gather:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-network-metrics-daemon-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-oauth-apiserver-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-oauth-proxy:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-oauth-server-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-openshift-apiserver-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-openshift-controller-manager-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-openshift-state-metrics-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-openstack-cinder-csi-driver-rhel8-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-openstack-cinder-csi-driver-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-openstack-machine-controllers:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-operator-lifecycle-manager:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-operator-marketplace:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-operator-registry:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-ovirt-machine-controllers-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-ovn-kubernetes:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-pod:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-prom-label-proxy:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-prometheus-alertmanager:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-prometheus-config-reloader:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-prometheus-node-exporter:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-prometheus-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-prometheus:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-sdn-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-service-ca-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-telemeter:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-tests:v4.7.0-202102181036.p0", "8Base-RHOSE-4.7:openshift4/ose-thanos-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-tools-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-vsphere-problem-detector-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ovirt-csi-driver-rhel7:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ovirt-csi-driver-rhel8-operator:v4.7.0-202102130115.p0" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla", "text": "https://bugzilla.redhat.com/show_bug.cgi?id=1908883" } ], "notes": [ { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" }, { "category": "description", "text": "A null pointer dereference vulnerability was found in golang. When using the library\u0027s ssh server without specifying an option for GSSAPIWithMICConfig, it is possible for an attacker to craft an ssh client connection using the `gssapi-with-mic` authentication method and cause the server to panic resulting in a denial of service. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: crypto/ssh: crafted authentication request can lead to nil pointer dereference", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "8Base-RHOSE-4.7:openshift4/ose-aws-ebs-csi-driver-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-azure-machine-controllers:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-baremetal-installer-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-installer-artifacts:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-installer:v4.7.0-202102130115.p0" ], "known_not_affected": [ "8Base-RHOSE-4.7:openshift4/egress-router-cni-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-aws-ebs-csi-driver-rhel8-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-aws-machine-controllers:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-aws-pod-identity-webhook-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-baremetal-machine-controllers:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-baremetal-rhel8-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-baremetal-runtimecfg-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cli-artifacts:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cli:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cloud-credential-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-authentication-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-autoscaler-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-autoscaler:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-baremetal-operator-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-bootstrap:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-config-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-csi-snapshot-controller-rhel8-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-dns-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-etcd-rhel8-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-image-registry-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-ingress-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-kube-apiserver-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-kube-controller-manager-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-kube-scheduler-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-kube-storage-version-migrator-rhel8-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-machine-approver:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-monitoring-operator:v4.7.0-202102172008.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-network-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-node-tuning-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-openshift-apiserver-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-openshift-controller-manager-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-policy-controller-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-samples-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-storage-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-update-keys:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-version-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-configmap-reloader:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-console-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-console:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-container-networking-plugins-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-coredns:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-driver-manila-rhel8-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-driver-manila-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-driver-nfs-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-external-attacher-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-external-attacher:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-external-provisioner-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-external-provisioner:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-external-resizer-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-external-resizer:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-external-snapshotter-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-external-snapshotter:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-livenessprobe-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-livenessprobe:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-node-driver-registrar-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-node-driver-registrar:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-snapshot-controller-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-snapshot-controller:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-snapshot-validation-webhook-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-deployer:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-docker-builder:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-docker-registry:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-etcd:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-gcp-machine-controllers-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-gcp-pd-csi-driver-operator-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-gcp-pd-csi-driver-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-grafana:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-haproxy-router:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-hello-openshift-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-hyperkube:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-insights-rhel8-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-ironic-hardware-inventory-recorder-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-ironic-inspector-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-ironic-ipa-downloader-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-ironic-machine-os-downloader-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-ironic-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-ironic-static-ip-manager-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-jenkins-agent-base:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-jenkins-agent-maven:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-jenkins-agent-nodejs-12-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-jenkins:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-k8s-prometheus-adapter:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-keepalived-ipfailover:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-kube-proxy:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-kube-rbac-proxy:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-kube-state-metrics:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-kube-storage-version-migrator-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-kuryr-cni-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-kuryr-controller-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-libvirt-machine-controllers:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-local-storage-static-provisioner:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-machine-api-operator:v4.7.0-202102172008.p0", "8Base-RHOSE-4.7:openshift4/ose-machine-config-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-mdns-publisher-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-multus-admission-controller:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-multus-cni:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-multus-networkpolicy-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-multus-route-override-cni-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-multus-whereabouts-ipam-cni-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-must-gather:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-network-metrics-daemon-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-oauth-apiserver-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-oauth-proxy:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-oauth-server-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-openshift-apiserver-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-openshift-controller-manager-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-openshift-state-metrics-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-openstack-cinder-csi-driver-rhel8-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-openstack-cinder-csi-driver-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-openstack-machine-controllers:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-operator-lifecycle-manager:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-operator-marketplace:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-operator-registry:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-ovirt-machine-controllers-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-ovn-kubernetes:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-pod:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-prom-label-proxy:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-prometheus-alertmanager:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-prometheus-config-reloader:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-prometheus-node-exporter:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-prometheus-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-prometheus:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-sdn-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-service-ca-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-telemeter:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-tests:v4.7.0-202102181036.p0", "8Base-RHOSE-4.7:openshift4/ose-thanos-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-tools-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-vsphere-problem-detector-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ovirt-csi-driver-rhel7:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ovirt-csi-driver-rhel8-operator:v4.7.0-202102130115.p0" ] }, "references": [ { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-29652", "url": "https://www.cve.org/CVERecord?id=CVE-2020-29652" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-29652", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-29652" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/ouZIlBimOsE?pli=1", "url": "https://groups.google.com/g/golang-announce/c/ouZIlBimOsE?pli=1" }, { "category": "external", "summary": "CVE-2020-29652", "url": "https://access.redhat.com/security/cve/CVE-2020-29652" }, { "category": "external", "summary": "bz#1908883: CVE-2020-29652 golang: crypto/ssh: crafted authentication request can lead to nil pointer dereference", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1908883" } ], "release_date": "2020-12-16T00:00:00Z", "remediations": [ { "category": "vendor_fix", "details": "For OpenShift Container Platform 4.7, see the following documentation, which\nwill be updated shortly for this release, for important instructions on how\nto upgrade your cluster and fully apply this asynchronous errata update:\n\nhttps://docs.openshift.com/container-platform/4.7/release_notes/ocp-4-7-release-notes.html\n\nDetails on how to access this content are available at\nhttps://docs.openshift.com/container-platform/4.7/updating/updating-cluster-cli.html.", "product_ids": [ "8Base-RHOSE-4.7:openshift4/ose-aws-ebs-csi-driver-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-azure-machine-controllers:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-baremetal-installer-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-installer-artifacts:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-installer:v4.7.0-202102130115.p0" ], "url": "https://access.redhat.com/errata/RHSA-2020:5633" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "8Base-RHOSE-4.7:openshift4/ose-aws-ebs-csi-driver-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-azure-machine-controllers:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-baremetal-installer-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-installer-artifacts:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-installer:v4.7.0-202102130115.p0" ] } ], "threats": [ { "category": "impact", "date": "2020-12-17T00:00:00Z", "details": "Important" } ], "title": "CVE-2020-29652 golang: crypto/ssh: crafted authentication request can lead to nil pointer dereference" }, { "cve": "CVE-2021-3121", "cwe": { "id": "CWE-129", "name": "Improper Validation of Array Index" }, "discovery_date": "2021-01-28T00:00:00Z", "flags": [ { "label": "component_not_present", "product_ids": [ "8Base-RHOSE-4.7:openshift4/egress-router-cni-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-aws-ebs-csi-driver-rhel8-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-aws-ebs-csi-driver-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-aws-machine-controllers:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-aws-pod-identity-webhook-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-azure-machine-controllers:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-baremetal-installer-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-baremetal-machine-controllers:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-baremetal-rhel8-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-baremetal-runtimecfg-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cli-artifacts:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cli:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cloud-credential-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-authentication-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-autoscaler-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-autoscaler:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-baremetal-operator-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-bootstrap:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-config-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-csi-snapshot-controller-rhel8-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-dns-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-etcd-rhel8-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-image-registry-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-ingress-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-kube-apiserver-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-kube-controller-manager-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-kube-scheduler-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-kube-storage-version-migrator-rhel8-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-machine-approver:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-monitoring-operator:v4.7.0-202102172008.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-network-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-openshift-apiserver-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-openshift-controller-manager-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-policy-controller-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-samples-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-storage-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-update-keys:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-version-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-configmap-reloader:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-console-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-console:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-container-networking-plugins-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-coredns:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-driver-manila-rhel8-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-driver-manila-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-driver-nfs-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-external-attacher-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-external-attacher:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-external-provisioner-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-external-provisioner:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-external-resizer-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-external-resizer:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-external-snapshotter-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-external-snapshotter:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-livenessprobe-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-livenessprobe:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-node-driver-registrar-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-node-driver-registrar:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-snapshot-controller-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-snapshot-controller:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-snapshot-validation-webhook-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-deployer:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-docker-builder:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-docker-registry:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-etcd:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-gcp-machine-controllers-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-gcp-pd-csi-driver-operator-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-gcp-pd-csi-driver-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-grafana:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-haproxy-router:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-hello-openshift-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-hyperkube:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-insights-rhel8-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-installer-artifacts:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-installer:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-ironic-hardware-inventory-recorder-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-ironic-inspector-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-ironic-ipa-downloader-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-ironic-machine-os-downloader-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-ironic-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-ironic-static-ip-manager-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-jenkins-agent-base:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-jenkins-agent-maven:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-jenkins-agent-nodejs-12-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-jenkins:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-k8s-prometheus-adapter:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-keepalived-ipfailover:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-kube-proxy:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-kube-rbac-proxy:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-kube-state-metrics:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-kube-storage-version-migrator-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-kuryr-cni-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-kuryr-controller-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-libvirt-machine-controllers:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-local-storage-static-provisioner:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-machine-api-operator:v4.7.0-202102172008.p0", "8Base-RHOSE-4.7:openshift4/ose-machine-config-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-mdns-publisher-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-multus-admission-controller:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-multus-cni:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-multus-networkpolicy-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-multus-route-override-cni-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-multus-whereabouts-ipam-cni-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-must-gather:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-network-metrics-daemon-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-oauth-apiserver-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-oauth-proxy:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-oauth-server-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-openshift-apiserver-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-openshift-controller-manager-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-openshift-state-metrics-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-openstack-cinder-csi-driver-rhel8-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-openstack-cinder-csi-driver-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-openstack-machine-controllers:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-operator-lifecycle-manager:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-operator-marketplace:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-operator-registry:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-ovirt-machine-controllers-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-ovn-kubernetes:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-pod:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-prom-label-proxy:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-prometheus-alertmanager:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-prometheus-config-reloader:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-prometheus-node-exporter:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-prometheus-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-prometheus:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-sdn-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-service-ca-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-telemeter:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-tests:v4.7.0-202102181036.p0", "8Base-RHOSE-4.7:openshift4/ose-thanos-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-tools-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-vsphere-problem-detector-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ovirt-csi-driver-rhel7:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ovirt-csi-driver-rhel8-operator:v4.7.0-202102130115.p0" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla", "text": "https://bugzilla.redhat.com/show_bug.cgi?id=1921650" } ], "notes": [ { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" }, { "category": "description", "text": "A flaw was found in github.com/gogo/protobuf before 1.3.2 that allows an out-of-bounds access when unmarshalling certain protobuf objects. This flaw allows a remote attacker to send crafted protobuf messages, causing panic and resulting in a denial of service. The highest threat from this vulnerability is to availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "gogo/protobuf: plugin/unmarshal/unmarshal.go lacks certain index validation", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "8Base-RHOSE-4.7:openshift4/ose-cluster-node-tuning-operator:v4.7.0-202102130115.p0" ], "known_not_affected": [ "8Base-RHOSE-4.7:openshift4/egress-router-cni-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-aws-ebs-csi-driver-rhel8-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-aws-ebs-csi-driver-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-aws-machine-controllers:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-aws-pod-identity-webhook-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-azure-machine-controllers:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-baremetal-installer-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-baremetal-machine-controllers:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-baremetal-rhel8-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-baremetal-runtimecfg-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cli-artifacts:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cli:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cloud-credential-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-authentication-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-autoscaler-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-autoscaler:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-baremetal-operator-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-bootstrap:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-config-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-csi-snapshot-controller-rhel8-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-dns-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-etcd-rhel8-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-image-registry-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-ingress-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-kube-apiserver-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-kube-controller-manager-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-kube-scheduler-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-kube-storage-version-migrator-rhel8-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-machine-approver:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-monitoring-operator:v4.7.0-202102172008.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-network-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-openshift-apiserver-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-openshift-controller-manager-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-policy-controller-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-samples-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-storage-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-update-keys:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-version-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-configmap-reloader:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-console-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-console:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-container-networking-plugins-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-coredns:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-driver-manila-rhel8-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-driver-manila-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-driver-nfs-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-external-attacher-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-external-attacher:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-external-provisioner-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-external-provisioner:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-external-resizer-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-external-resizer:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-external-snapshotter-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-external-snapshotter:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-livenessprobe-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-livenessprobe:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-node-driver-registrar-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-node-driver-registrar:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-snapshot-controller-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-snapshot-controller:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-snapshot-validation-webhook-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-deployer:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-docker-builder:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-docker-registry:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-etcd:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-gcp-machine-controllers-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-gcp-pd-csi-driver-operator-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-gcp-pd-csi-driver-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-grafana:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-haproxy-router:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-hello-openshift-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-hyperkube:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-insights-rhel8-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-installer-artifacts:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-installer:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-ironic-hardware-inventory-recorder-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-ironic-inspector-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-ironic-ipa-downloader-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-ironic-machine-os-downloader-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-ironic-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-ironic-static-ip-manager-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-jenkins-agent-base:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-jenkins-agent-maven:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-jenkins-agent-nodejs-12-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-jenkins:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-k8s-prometheus-adapter:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-keepalived-ipfailover:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-kube-proxy:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-kube-rbac-proxy:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-kube-state-metrics:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-kube-storage-version-migrator-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-kuryr-cni-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-kuryr-controller-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-libvirt-machine-controllers:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-local-storage-static-provisioner:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-machine-api-operator:v4.7.0-202102172008.p0", "8Base-RHOSE-4.7:openshift4/ose-machine-config-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-mdns-publisher-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-multus-admission-controller:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-multus-cni:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-multus-networkpolicy-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-multus-route-override-cni-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-multus-whereabouts-ipam-cni-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-must-gather:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-network-metrics-daemon-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-oauth-apiserver-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-oauth-proxy:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-oauth-server-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-openshift-apiserver-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-openshift-controller-manager-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-openshift-state-metrics-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-openstack-cinder-csi-driver-rhel8-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-openstack-cinder-csi-driver-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-openstack-machine-controllers:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-operator-lifecycle-manager:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-operator-marketplace:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-operator-registry:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-ovirt-machine-controllers-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-ovn-kubernetes:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-pod:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-prom-label-proxy:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-prometheus-alertmanager:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-prometheus-config-reloader:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-prometheus-node-exporter:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-prometheus-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-prometheus:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-sdn-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-service-ca-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-telemeter:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-tests:v4.7.0-202102181036.p0", "8Base-RHOSE-4.7:openshift4/ose-thanos-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-tools-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-vsphere-problem-detector-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ovirt-csi-driver-rhel7:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ovirt-csi-driver-rhel8-operator:v4.7.0-202102130115.p0" ] }, "references": [ { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-3121", "url": "https://www.cve.org/CVERecord?id=CVE-2021-3121" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3121", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3121" }, { "category": "external", "summary": "CVE-2021-3121", "url": "https://access.redhat.com/security/cve/CVE-2021-3121" }, { "category": "external", "summary": "bz#1921650: CVE-2021-3121 gogo/protobuf: plugin/unmarshal/unmarshal.go lacks certain index validation", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1921650" } ], "release_date": "2021-01-11T00:00:00Z", "remediations": [ { "category": "vendor_fix", "details": "For OpenShift Container Platform 4.7, see the following documentation, which\nwill be updated shortly for this release, for important instructions on how\nto upgrade your cluster and fully apply this asynchronous errata update:\n\nhttps://docs.openshift.com/container-platform/4.7/release_notes/ocp-4-7-release-notes.html\n\nDetails on how to access this content are available at\nhttps://docs.openshift.com/container-platform/4.7/updating/updating-cluster-cli.html.", "product_ids": [ "8Base-RHOSE-4.7:openshift4/ose-cluster-node-tuning-operator:v4.7.0-202102130115.p0" ], "url": "https://access.redhat.com/errata/RHSA-2020:5633" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.6, "baseSeverity": "HIGH", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H", "version": "3.1" }, "products": [ "8Base-RHOSE-4.7:openshift4/ose-cluster-node-tuning-operator:v4.7.0-202102130115.p0" ] } ], "threats": [ { "category": "impact", "date": "2021-01-28T00:00:00Z", "details": "Important" } ], "title": "CVE-2021-3121 gogo/protobuf: plugin/unmarshal/unmarshal.go lacks certain index validation" }, { "cve": "CVE-2021-26539", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2021-02-08T00:00:00Z", "flags": [ { "label": "component_not_present", "product_ids": [ "8Base-RHOSE-4.7:openshift4/egress-router-cni-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-aws-ebs-csi-driver-rhel8-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-aws-ebs-csi-driver-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-aws-machine-controllers:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-aws-pod-identity-webhook-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-azure-machine-controllers:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-baremetal-installer-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-baremetal-machine-controllers:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-baremetal-rhel8-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-baremetal-runtimecfg-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cli-artifacts:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cli:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cloud-credential-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-authentication-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-autoscaler-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-autoscaler:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-baremetal-operator-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-bootstrap:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-config-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-csi-snapshot-controller-rhel8-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-dns-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-etcd-rhel8-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-image-registry-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-ingress-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-kube-apiserver-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-kube-controller-manager-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-kube-scheduler-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-kube-storage-version-migrator-rhel8-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-machine-approver:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-monitoring-operator:v4.7.0-202102172008.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-network-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-node-tuning-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-openshift-apiserver-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-openshift-controller-manager-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-policy-controller-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-samples-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-storage-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-update-keys:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-version-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-configmap-reloader:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-console-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-container-networking-plugins-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-coredns:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-driver-manila-rhel8-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-driver-manila-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-driver-nfs-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-external-attacher-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-external-attacher:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-external-provisioner-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-external-provisioner:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-external-resizer-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-external-resizer:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-external-snapshotter-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-external-snapshotter:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-livenessprobe-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-livenessprobe:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-node-driver-registrar-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-node-driver-registrar:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-snapshot-controller-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-snapshot-controller:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-snapshot-validation-webhook-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-deployer:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-docker-builder:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-docker-registry:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-etcd:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-gcp-machine-controllers-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-gcp-pd-csi-driver-operator-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-gcp-pd-csi-driver-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-grafana:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-haproxy-router:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-hello-openshift-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-hyperkube:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-insights-rhel8-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-installer-artifacts:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-installer:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-ironic-hardware-inventory-recorder-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-ironic-inspector-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-ironic-ipa-downloader-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-ironic-machine-os-downloader-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-ironic-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-ironic-static-ip-manager-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-jenkins-agent-base:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-jenkins-agent-maven:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-jenkins-agent-nodejs-12-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-jenkins:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-k8s-prometheus-adapter:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-keepalived-ipfailover:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-kube-proxy:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-kube-rbac-proxy:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-kube-state-metrics:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-kube-storage-version-migrator-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-kuryr-cni-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-kuryr-controller-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-libvirt-machine-controllers:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-local-storage-static-provisioner:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-machine-api-operator:v4.7.0-202102172008.p0", "8Base-RHOSE-4.7:openshift4/ose-machine-config-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-mdns-publisher-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-multus-admission-controller:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-multus-cni:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-multus-networkpolicy-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-multus-route-override-cni-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-multus-whereabouts-ipam-cni-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-must-gather:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-network-metrics-daemon-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-oauth-apiserver-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-oauth-proxy:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-oauth-server-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-openshift-apiserver-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-openshift-controller-manager-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-openshift-state-metrics-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-openstack-cinder-csi-driver-rhel8-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-openstack-cinder-csi-driver-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-openstack-machine-controllers:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-operator-lifecycle-manager:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-operator-marketplace:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-operator-registry:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-ovirt-machine-controllers-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-ovn-kubernetes:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-pod:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-prom-label-proxy:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-prometheus-alertmanager:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-prometheus-config-reloader:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-prometheus-node-exporter:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-prometheus-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-prometheus:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-sdn-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-service-ca-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-telemeter:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-tests:v4.7.0-202102181036.p0", "8Base-RHOSE-4.7:openshift4/ose-thanos-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-tools-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-vsphere-problem-detector-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ovirt-csi-driver-rhel7:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ovirt-csi-driver-rhel8-operator:v4.7.0-202102130115.p0" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla", "text": "https://bugzilla.redhat.com/show_bug.cgi?id=1932362" } ], "notes": [ { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" }, { "category": "description", "text": "Apostrophe Technologies sanitize-html before 2.3.1 does not properly handle internationalized domain name (IDN) which could allow an attacker to bypass hostname whitelist validation set by the \"allowedIframeHostnames\" option.", "title": "Vulnerability description" }, { "category": "summary", "text": "sanitize-html: improper handling of internationalized domain name (IDN) can lead to bypass hostname whitelist validation", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "8Base-RHOSE-4.7:openshift4/ose-console:v4.7.0-202102130115.p0" ], "known_not_affected": [ "8Base-RHOSE-4.7:openshift4/egress-router-cni-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-aws-ebs-csi-driver-rhel8-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-aws-ebs-csi-driver-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-aws-machine-controllers:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-aws-pod-identity-webhook-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-azure-machine-controllers:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-baremetal-installer-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-baremetal-machine-controllers:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-baremetal-rhel8-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-baremetal-runtimecfg-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cli-artifacts:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cli:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cloud-credential-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-authentication-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-autoscaler-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-autoscaler:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-baremetal-operator-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-bootstrap:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-config-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-csi-snapshot-controller-rhel8-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-dns-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-etcd-rhel8-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-image-registry-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-ingress-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-kube-apiserver-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-kube-controller-manager-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-kube-scheduler-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-kube-storage-version-migrator-rhel8-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-machine-approver:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-monitoring-operator:v4.7.0-202102172008.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-network-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-node-tuning-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-openshift-apiserver-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-openshift-controller-manager-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-policy-controller-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-samples-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-storage-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-update-keys:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-cluster-version-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-configmap-reloader:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-console-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-container-networking-plugins-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-coredns:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-driver-manila-rhel8-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-driver-manila-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-driver-nfs-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-external-attacher-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-external-attacher:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-external-provisioner-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-external-provisioner:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-external-resizer-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-external-resizer:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-external-snapshotter-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-external-snapshotter:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-livenessprobe-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-livenessprobe:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-node-driver-registrar-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-node-driver-registrar:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-snapshot-controller-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-snapshot-controller:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-csi-snapshot-validation-webhook-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-deployer:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-docker-builder:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-docker-registry:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-etcd:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-gcp-machine-controllers-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-gcp-pd-csi-driver-operator-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-gcp-pd-csi-driver-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-grafana:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-haproxy-router:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-hello-openshift-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-hyperkube:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-insights-rhel8-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-installer-artifacts:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-installer:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-ironic-hardware-inventory-recorder-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-ironic-inspector-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-ironic-ipa-downloader-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-ironic-machine-os-downloader-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-ironic-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-ironic-static-ip-manager-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-jenkins-agent-base:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-jenkins-agent-maven:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-jenkins-agent-nodejs-12-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-jenkins:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-k8s-prometheus-adapter:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-keepalived-ipfailover:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-kube-proxy:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-kube-rbac-proxy:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-kube-state-metrics:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-kube-storage-version-migrator-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-kuryr-cni-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-kuryr-controller-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-libvirt-machine-controllers:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-local-storage-static-provisioner:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-machine-api-operator:v4.7.0-202102172008.p0", "8Base-RHOSE-4.7:openshift4/ose-machine-config-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-mdns-publisher-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-multus-admission-controller:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-multus-cni:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-multus-networkpolicy-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-multus-route-override-cni-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-multus-whereabouts-ipam-cni-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-must-gather:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-network-metrics-daemon-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-oauth-apiserver-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-oauth-proxy:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-oauth-server-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-openshift-apiserver-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-openshift-controller-manager-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-openshift-state-metrics-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-openstack-cinder-csi-driver-rhel8-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-openstack-cinder-csi-driver-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-openstack-machine-controllers:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-operator-lifecycle-manager:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-operator-marketplace:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-operator-registry:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-ovirt-machine-controllers-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-ovn-kubernetes:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-pod:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-prom-label-proxy:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-prometheus-alertmanager:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-prometheus-config-reloader:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-prometheus-node-exporter:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-prometheus-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-prometheus:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-sdn-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-service-ca-operator:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-telemeter:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-tests:v4.7.0-202102181036.p0", "8Base-RHOSE-4.7:openshift4/ose-thanos-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-tools-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ose-vsphere-problem-detector-rhel8:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ovirt-csi-driver-rhel7:v4.7.0-202102130115.p0", "8Base-RHOSE-4.7:openshift4/ovirt-csi-driver-rhel8-operator:v4.7.0-202102130115.p0" ] }, "references": [ { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-26539", "url": "https://www.cve.org/CVERecord?id=CVE-2021-26539" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-26539", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-26539" }, { "category": "external", "summary": "CVE-2021-26539", "url": "https://access.redhat.com/security/cve/CVE-2021-26539" }, { "category": "external", "summary": "bz#1932362: CVE-2021-26539 sanitize-html: improper handling of internationalized domain name (IDN) can lead to bypass hostname whitelist validation", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1932362" } ], "release_date": "2021-01-22T00:00:00Z", "remediations": [ { "category": "vendor_fix", "details": "For OpenShift Container Platform 4.7, see the following documentation, which\nwill be updated shortly for this release, for important instructions on how\nto upgrade your cluster and fully apply this asynchronous errata update:\n\nhttps://docs.openshift.com/container-platform/4.7/release_notes/ocp-4-7-release-notes.html\n\nDetails on how to access this content are available at\nhttps://docs.openshift.com/container-platform/4.7/updating/updating-cluster-cli.html.", "product_ids": [ "8Base-RHOSE-4.7:openshift4/ose-console:v4.7.0-202102130115.p0" ], "url": "https://access.redhat.com/errata/RHSA-2020:5633" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.1" }, "products": [ "8Base-RHOSE-4.7:openshift4/ose-console:v4.7.0-202102130115.p0" ] } ], "threats": [ { "category": "impact", "date": "2021-02-08T00:00:00Z", "details": "Moderate" } ], "title": "CVE-2021-26539 sanitize-html: improper handling of internationalized domain name (IDN) can lead to bypass hostname whitelist validation" } ] }
rhsa-2021_2920
Vulnerability from csaf_redhat
Published
2021-07-28 14:11
Modified
2024-09-18 04:19
Summary
Red Hat Security Advisory: OpenShift Virtualization 4.8.0 Images
Notes
Topic
Red Hat OpenShift Virtualization release 4.8.0 is now available with updates to packages and images that fix several bugs and add enhancements.
Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
OpenShift Virtualization is Red Hat's virtualization solution designed for Red Hat OpenShift Container Platform.
This advisory contains the following OpenShift Virtualization 4.8.0 images:
RHEL-8-CNV-4.8
==============
kubevirt-template-validator-container-v4.8.0-9
kubevirt-ssp-operator-container-v4.8.0-41
virt-cdi-uploadserver-container-v4.8.0-25
cnv-must-gather-container-v4.8.0-50
virt-cdi-uploadproxy-container-v4.8.0-25
virt-cdi-cloner-container-v4.8.0-25
virt-cdi-apiserver-container-v4.8.0-25
kubevirt-v2v-conversion-container-v4.8.0-10
hostpath-provisioner-operator-container-v4.8.0-17
hyperconverged-cluster-webhook-container-v4.8.0-62
hyperconverged-cluster-operator-container-v4.8.0-62
virt-cdi-operator-container-v4.8.0-25
virt-cdi-importer-container-v4.8.0-25
virt-cdi-controller-container-v4.8.0-25
cnv-containernetworking-plugins-container-v4.8.0-14
kubemacpool-container-v4.8.0-22
ovs-cni-plugin-container-v4.8.0-17
ovs-cni-marker-container-v4.8.0-17
bridge-marker-container-v4.8.0-17
cluster-network-addons-operator-container-v4.8.0-28
kubernetes-nmstate-handler-container-v4.8.0-21
virtio-win-container-v4.8.0-9
kubevirt-vmware-container-v4.8.0-11
hostpath-provisioner-container-v4.8.0-14
node-maintenance-operator-container-v4.8.0-19
virt-launcher-container-v4.8.0-67
vm-import-virtv2v-container-v4.8.0-18
vm-import-controller-container-v4.8.0-18
vm-import-operator-container-v4.8.0-18
virt-handler-container-v4.8.0-67
virt-api-container-v4.8.0-67
virt-controller-container-v4.8.0-67
virt-operator-container-v4.8.0-67
hco-bundle-registry-container-v4.8.0-451
Security Fix(es):
* golang: crypto/ssh: crafted authentication request can lead to nil pointer dereference (CVE-2020-29652)
* gogo/protobuf: plugin/unmarshal/unmarshal.go lacks certain index validation (CVE-2021-3121)
* golang-github-gorilla-websocket: integer overflow leads to denial of service (CVE-2020-27813)
* golang: crypto/elliptic: incorrect operations on the P-224 curve (CVE-2021-3114)
* ulikunitz/xz: Infinite loop in readUvarint allows for denial of service (CVE-2021-29482)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_vex", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Red Hat OpenShift Virtualization release 4.8.0 is now available with updates to packages and images that fix several bugs and add enhancements.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "OpenShift Virtualization is Red Hat\u0027s virtualization solution designed for Red Hat OpenShift Container Platform.\n\nThis advisory contains the following OpenShift Virtualization 4.8.0 images:\n\nRHEL-8-CNV-4.8\n==============\n\nkubevirt-template-validator-container-v4.8.0-9\nkubevirt-ssp-operator-container-v4.8.0-41\nvirt-cdi-uploadserver-container-v4.8.0-25\ncnv-must-gather-container-v4.8.0-50\nvirt-cdi-uploadproxy-container-v4.8.0-25\nvirt-cdi-cloner-container-v4.8.0-25\nvirt-cdi-apiserver-container-v4.8.0-25\nkubevirt-v2v-conversion-container-v4.8.0-10\nhostpath-provisioner-operator-container-v4.8.0-17\nhyperconverged-cluster-webhook-container-v4.8.0-62\nhyperconverged-cluster-operator-container-v4.8.0-62\nvirt-cdi-operator-container-v4.8.0-25\nvirt-cdi-importer-container-v4.8.0-25\nvirt-cdi-controller-container-v4.8.0-25\ncnv-containernetworking-plugins-container-v4.8.0-14\nkubemacpool-container-v4.8.0-22\novs-cni-plugin-container-v4.8.0-17\novs-cni-marker-container-v4.8.0-17\nbridge-marker-container-v4.8.0-17\ncluster-network-addons-operator-container-v4.8.0-28\nkubernetes-nmstate-handler-container-v4.8.0-21\nvirtio-win-container-v4.8.0-9\nkubevirt-vmware-container-v4.8.0-11\nhostpath-provisioner-container-v4.8.0-14\nnode-maintenance-operator-container-v4.8.0-19\nvirt-launcher-container-v4.8.0-67\nvm-import-virtv2v-container-v4.8.0-18\nvm-import-controller-container-v4.8.0-18\nvm-import-operator-container-v4.8.0-18\nvirt-handler-container-v4.8.0-67\nvirt-api-container-v4.8.0-67\nvirt-controller-container-v4.8.0-67\nvirt-operator-container-v4.8.0-67\nhco-bundle-registry-container-v4.8.0-451\n\nSecurity Fix(es):\n\n* golang: crypto/ssh: crafted authentication request can lead to nil pointer dereference (CVE-2020-29652)\n\n* gogo/protobuf: plugin/unmarshal/unmarshal.go lacks certain index validation (CVE-2021-3121)\n\n* golang-github-gorilla-websocket: integer overflow leads to denial of service (CVE-2020-27813)\n\n* golang: crypto/elliptic: incorrect operations on the P-224 curve (CVE-2021-3114)\n\n* ulikunitz/xz: Infinite loop in readUvarint allows for denial of service (CVE-2021-29482)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat offerings.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2021:2920", "url": "https://access.redhat.com/errata/RHSA-2021:2920" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#moderate", "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "category": "external", "summary": "1663162", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1663162" }, { "category": "external", "summary": "1731819", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1731819" }, { "category": "external", "summary": "1827793", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1827793" }, { "category": "external", "summary": "1860671", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1860671" }, { "category": "external", "summary": "1862701", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1862701" }, { "category": "external", "summary": "1862997", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1862997" }, { "category": "external", "summary": "1868099", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1868099" }, { "category": "external", "summary": "1868359", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1868359" }, { "category": "external", "summary": "1873555", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1873555" }, { "category": "external", "summary": "1893790", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1893790" }, { "category": "external", "summary": "1896387", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1896387" }, { "category": "external", "summary": "1896795", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1896795" }, { "category": "external", "summary": "1896797", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1896797" }, { "category": "external", "summary": "1898999", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1898999" }, { "category": "external", "summary": "1900273", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1900273" }, { "category": "external", "summary": "1901335", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1901335" }, { "category": "external", "summary": "1901859", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1901859" }, { "category": "external", "summary": "1902111", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1902111" }, { "category": "external", "summary": "1903667", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1903667" }, { "category": "external", "summary": "1903679", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1903679" }, { "category": "external", "summary": "1907707", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1907707" }, { "category": "external", "summary": "1908883", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1908883" }, { "category": "external", "summary": "1911590", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1911590" }, { "category": "external", "summary": "1915474", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1915474" }, { "category": "external", "summary": "1917380", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1917380" }, { "category": "external", "summary": "1918750", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1918750" }, { "category": "external", "summary": "1921280", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1921280" }, { "category": "external", "summary": "1921650", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1921650" }, { "category": "external", "summary": "1923243", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1923243" }, { "category": "external", "summary": "1923251", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1923251" }, { "category": "external", "summary": "1924479", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1924479" }, { "category": "external", "summary": "1926019", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1926019" }, { "category": "external", "summary": "1926746", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1926746" }, { "category": "external", "summary": "1926986", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1926986" }, { "category": "external", "summary": "1927473", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1927473" }, { "category": "external", "summary": "1927853", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1927853" }, { "category": "external", "summary": "1927886", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1927886" }, { "category": "external", "summary": "1929351", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1929351" }, { "category": "external", "summary": "1931519", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1931519" }, { "category": "external", "summary": "1932672", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1932672" }, { "category": "external", "summary": "1936432", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1936432" }, { "category": "external", "summary": "1936926", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1936926" }, { "category": "external", "summary": "1936932", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1936932" }, { "category": "external", "summary": "1937307", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1937307" }, { "category": "external", "summary": "1937873", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1937873" }, { "category": "external", "summary": "1937920", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1937920" }, { "category": "external", "summary": "1938241", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1938241" }, { "category": "external", "summary": "1939987", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1939987" }, { "category": "external", "summary": "1941811", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1941811" }, { "category": "external", "summary": "1942424", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1942424" }, { "category": "external", "summary": "1943217", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1943217" }, { "category": "external", "summary": "1944379", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1944379" }, { "category": "external", "summary": "1945522", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1945522" }, { "category": "external", "summary": "1945606", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1945606" }, { "category": "external", "summary": "1945608", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1945608" }, { "category": "external", "summary": "1946100", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1946100" }, { "category": "external", "summary": "1949392", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1949392" }, { "category": "external", "summary": "1949795", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1949795" }, { "category": "external", "summary": "1950776", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1950776" }, { "category": "external", "summary": "1951551", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1951551" }, { "category": "external", "summary": "1952033", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1952033" }, { "category": "external", "summary": "1952034", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1952034" }, { "category": "external", "summary": "1952036", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1952036" }, { "category": "external", "summary": "1952041", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1952041" }, { "category": "external", "summary": "1952052", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1952052" }, { "category": "external", "summary": "1952619", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1952619" }, { "category": "external", "summary": "1953604", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1953604" }, { "category": "external", "summary": "1953796", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1953796" }, { "category": "external", "summary": "1953999", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1953999" }, { "category": "external", "summary": "1954017", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1954017" }, { "category": "external", "summary": "1954368", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1954368" }, { "category": "external", "summary": "1954470", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1954470" }, { "category": "external", "summary": "1954486", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1954486" }, { "category": "external", "summary": "1954498", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1954498" }, { "category": "external", "summary": "1954663", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1954663" }, { "category": "external", "summary": "1954667", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1954667" }, { "category": "external", "summary": "1956245", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1956245" }, { "category": "external", "summary": "1956304", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1956304" }, { "category": "external", "summary": "1956792", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1956792" }, { "category": "external", "summary": "1957423", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1957423" }, { "category": "external", "summary": "1957521", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1957521" }, { "category": "external", "summary": "1958108", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1958108" }, { "category": "external", "summary": "1958862", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1958862" }, { "category": "external", "summary": "1961222", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1961222" }, { "category": "external", "summary": "1961227", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1961227" }, { "category": "external", "summary": "1962135", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1962135" }, { "category": "external", "summary": "1962604", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1962604" }, { "category": "external", "summary": "1964483", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1964483" }, { "category": "external", "summary": "1964583", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1964583" }, { "category": "external", "summary": "1965390", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1965390" }, { "category": "external", "summary": "1967526", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1967526" }, { "category": "external", "summary": "1967771", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1967771" }, { "category": "external", "summary": "1968196", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1968196" }, { "category": "external", "summary": "1969272", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1969272" }, { "category": "external", "summary": "1969894", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1969894" }, { "category": "external", "summary": "1969912", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1969912" }, { "category": "external", "summary": "1972895", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1972895" }, { "category": "external", "summary": "1974297", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1974297" }, { "category": "external", "summary": "1977179", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1977179" }, { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/data/csaf/v2/advisories/2021/rhsa-2021_2920.json" } ], "title": "Red Hat Security Advisory: OpenShift Virtualization 4.8.0 Images", "tracking": { "current_release_date": "2024-09-18T04:19:15+00:00", "generator": { "date": "2024-09-18T04:19:15+00:00", "engine": { "name": "Red Hat SDEngine", "version": "3.33.3" } }, "id": "RHSA-2021:2920", "initial_release_date": "2021-07-28T14:11:53+00:00", "revision_history": [ { "date": "2021-07-28T14:11:53+00:00", "number": "1", "summary": "Initial version" }, { "date": "2021-07-28T14:11:53+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-09-18T04:19:15+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "CNV 4.8 for RHEL 8", "product": { "name": "CNV 4.8 for RHEL 8", "product_id": "8Base-CNV-4.8", "product_identification_helper": { "cpe": "cpe:/a:redhat:container_native_virtualization:4.8::el8" } } } ], "category": "product_family", "name": "OpenShift Virtualization" }, { "branches": [ { "category": "product_version", "name": "container-native-virtualization/kubernetes-nmstate-handler-rhel8@sha256:3824ad38c9096358a7a901d1a790de5748fa84cb4c755751abe41f924d091d14_amd64", "product": { "name": "container-native-virtualization/kubernetes-nmstate-handler-rhel8@sha256:3824ad38c9096358a7a901d1a790de5748fa84cb4c755751abe41f924d091d14_amd64", "product_id": "container-native-virtualization/kubernetes-nmstate-handler-rhel8@sha256:3824ad38c9096358a7a901d1a790de5748fa84cb4c755751abe41f924d091d14_amd64", "product_identification_helper": { "purl": "pkg:oci/kubernetes-nmstate-handler-rhel8@sha256:3824ad38c9096358a7a901d1a790de5748fa84cb4c755751abe41f924d091d14?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/kubernetes-nmstate-handler-rhel8\u0026tag=v4.8.0-21" } } }, { "category": "product_version", "name": "container-native-virtualization/kubevirt-v2v-conversion@sha256:2f445fac142b49317c7fb819031f2022618274f4fc0cc8e49431afa26bbf5d28_amd64", "product": { "name": "container-native-virtualization/kubevirt-v2v-conversion@sha256:2f445fac142b49317c7fb819031f2022618274f4fc0cc8e49431afa26bbf5d28_amd64", "product_id": "container-native-virtualization/kubevirt-v2v-conversion@sha256:2f445fac142b49317c7fb819031f2022618274f4fc0cc8e49431afa26bbf5d28_amd64", "product_identification_helper": { "purl": "pkg:oci/kubevirt-v2v-conversion@sha256:2f445fac142b49317c7fb819031f2022618274f4fc0cc8e49431afa26bbf5d28?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/kubevirt-v2v-conversion\u0026tag=v4.8.0-10" } } }, { "category": "product_version", "name": "container-native-virtualization/kubevirt-vmware@sha256:f0c0f709a55956c330158c5312261b80b954adf9bb2c6c9507406127175eb8c1_amd64", "product": { "name": "container-native-virtualization/kubevirt-vmware@sha256:f0c0f709a55956c330158c5312261b80b954adf9bb2c6c9507406127175eb8c1_amd64", "product_id": "container-native-virtualization/kubevirt-vmware@sha256:f0c0f709a55956c330158c5312261b80b954adf9bb2c6c9507406127175eb8c1_amd64", "product_identification_helper": { "purl": "pkg:oci/kubevirt-vmware@sha256:f0c0f709a55956c330158c5312261b80b954adf9bb2c6c9507406127175eb8c1?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/kubevirt-vmware\u0026tag=v4.8.0-11" } } }, { "category": "product_version", "name": "container-native-virtualization/node-maintenance-operator@sha256:a987c89b87c05a96dacabc78bccfb4526536207f0da31383776dba0b77dfad75_amd64", "product": { "name": "container-native-virtualization/node-maintenance-operator@sha256:a987c89b87c05a96dacabc78bccfb4526536207f0da31383776dba0b77dfad75_amd64", "product_id": "container-native-virtualization/node-maintenance-operator@sha256:a987c89b87c05a96dacabc78bccfb4526536207f0da31383776dba0b77dfad75_amd64", "product_identification_helper": { "purl": "pkg:oci/node-maintenance-operator@sha256:a987c89b87c05a96dacabc78bccfb4526536207f0da31383776dba0b77dfad75?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/node-maintenance-operator\u0026tag=v4.8.0-19" } } }, { "category": "product_version", "name": "container-native-virtualization/vm-import-controller@sha256:cf7a32623aa1cb88571f9ad762f323d91e02aa851d9e80ebe1d7c6a930fe4f7d_amd64", "product": { "name": "container-native-virtualization/vm-import-controller@sha256:cf7a32623aa1cb88571f9ad762f323d91e02aa851d9e80ebe1d7c6a930fe4f7d_amd64", "product_id": "container-native-virtualization/vm-import-controller@sha256:cf7a32623aa1cb88571f9ad762f323d91e02aa851d9e80ebe1d7c6a930fe4f7d_amd64", "product_identification_helper": { "purl": "pkg:oci/vm-import-controller@sha256:cf7a32623aa1cb88571f9ad762f323d91e02aa851d9e80ebe1d7c6a930fe4f7d?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/vm-import-controller\u0026tag=v4.8.0-18" } } }, { "category": "product_version", "name": "container-native-virtualization/vm-import-controller-rhel8@sha256:cf7a32623aa1cb88571f9ad762f323d91e02aa851d9e80ebe1d7c6a930fe4f7d_amd64", "product": { "name": "container-native-virtualization/vm-import-controller-rhel8@sha256:cf7a32623aa1cb88571f9ad762f323d91e02aa851d9e80ebe1d7c6a930fe4f7d_amd64", "product_id": "container-native-virtualization/vm-import-controller-rhel8@sha256:cf7a32623aa1cb88571f9ad762f323d91e02aa851d9e80ebe1d7c6a930fe4f7d_amd64", "product_identification_helper": { "purl": "pkg:oci/vm-import-controller-rhel8@sha256:cf7a32623aa1cb88571f9ad762f323d91e02aa851d9e80ebe1d7c6a930fe4f7d?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/vm-import-controller-rhel8\u0026tag=v4.8.0-18" } } }, { "category": "product_version", "name": "container-native-virtualization/vm-import-operator-rhel8@sha256:d5f101aa6d75dc70af48b74ab8e18b381f6956cb24fb79beaefecd0940233ae6_amd64", "product": { "name": "container-native-virtualization/vm-import-operator-rhel8@sha256:d5f101aa6d75dc70af48b74ab8e18b381f6956cb24fb79beaefecd0940233ae6_amd64", "product_id": "container-native-virtualization/vm-import-operator-rhel8@sha256:d5f101aa6d75dc70af48b74ab8e18b381f6956cb24fb79beaefecd0940233ae6_amd64", "product_identification_helper": { "purl": "pkg:oci/vm-import-operator-rhel8@sha256:d5f101aa6d75dc70af48b74ab8e18b381f6956cb24fb79beaefecd0940233ae6?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/vm-import-operator-rhel8\u0026tag=v4.8.0-18" } } }, { "category": "product_version", "name": "container-native-virtualization/vm-import-virtv2v-rhel8@sha256:fdd5a557c189674f9c222154fa38892b4f647b36804b79276b3d39ebfe40527d_amd64", "product": { "name": "container-native-virtualization/vm-import-virtv2v-rhel8@sha256:fdd5a557c189674f9c222154fa38892b4f647b36804b79276b3d39ebfe40527d_amd64", "product_id": "container-native-virtualization/vm-import-virtv2v-rhel8@sha256:fdd5a557c189674f9c222154fa38892b4f647b36804b79276b3d39ebfe40527d_amd64", "product_identification_helper": { "purl": "pkg:oci/vm-import-virtv2v-rhel8@sha256:fdd5a557c189674f9c222154fa38892b4f647b36804b79276b3d39ebfe40527d?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/vm-import-virtv2v-rhel8\u0026tag=v4.8.0-18" } } } ], "category": "architecture", "name": "amd64" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/kubernetes-nmstate-handler-rhel8@sha256:3824ad38c9096358a7a901d1a790de5748fa84cb4c755751abe41f924d091d14_amd64 as a component of CNV 4.8 for RHEL 8", "product_id": "8Base-CNV-4.8:container-native-virtualization/kubernetes-nmstate-handler-rhel8@sha256:3824ad38c9096358a7a901d1a790de5748fa84cb4c755751abe41f924d091d14_amd64" }, "product_reference": "container-native-virtualization/kubernetes-nmstate-handler-rhel8@sha256:3824ad38c9096358a7a901d1a790de5748fa84cb4c755751abe41f924d091d14_amd64", "relates_to_product_reference": "8Base-CNV-4.8" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/kubevirt-v2v-conversion@sha256:2f445fac142b49317c7fb819031f2022618274f4fc0cc8e49431afa26bbf5d28_amd64 as a component of CNV 4.8 for RHEL 8", "product_id": "8Base-CNV-4.8:container-native-virtualization/kubevirt-v2v-conversion@sha256:2f445fac142b49317c7fb819031f2022618274f4fc0cc8e49431afa26bbf5d28_amd64" }, "product_reference": "container-native-virtualization/kubevirt-v2v-conversion@sha256:2f445fac142b49317c7fb819031f2022618274f4fc0cc8e49431afa26bbf5d28_amd64", "relates_to_product_reference": "8Base-CNV-4.8" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/kubevirt-vmware@sha256:f0c0f709a55956c330158c5312261b80b954adf9bb2c6c9507406127175eb8c1_amd64 as a component of CNV 4.8 for RHEL 8", "product_id": "8Base-CNV-4.8:container-native-virtualization/kubevirt-vmware@sha256:f0c0f709a55956c330158c5312261b80b954adf9bb2c6c9507406127175eb8c1_amd64" }, "product_reference": "container-native-virtualization/kubevirt-vmware@sha256:f0c0f709a55956c330158c5312261b80b954adf9bb2c6c9507406127175eb8c1_amd64", "relates_to_product_reference": "8Base-CNV-4.8" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/node-maintenance-operator@sha256:a987c89b87c05a96dacabc78bccfb4526536207f0da31383776dba0b77dfad75_amd64 as a component of CNV 4.8 for RHEL 8", "product_id": "8Base-CNV-4.8:container-native-virtualization/node-maintenance-operator@sha256:a987c89b87c05a96dacabc78bccfb4526536207f0da31383776dba0b77dfad75_amd64" }, "product_reference": "container-native-virtualization/node-maintenance-operator@sha256:a987c89b87c05a96dacabc78bccfb4526536207f0da31383776dba0b77dfad75_amd64", "relates_to_product_reference": "8Base-CNV-4.8" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/vm-import-controller-rhel8@sha256:cf7a32623aa1cb88571f9ad762f323d91e02aa851d9e80ebe1d7c6a930fe4f7d_amd64 as a component of CNV 4.8 for RHEL 8", "product_id": "8Base-CNV-4.8:container-native-virtualization/vm-import-controller-rhel8@sha256:cf7a32623aa1cb88571f9ad762f323d91e02aa851d9e80ebe1d7c6a930fe4f7d_amd64" }, "product_reference": "container-native-virtualization/vm-import-controller-rhel8@sha256:cf7a32623aa1cb88571f9ad762f323d91e02aa851d9e80ebe1d7c6a930fe4f7d_amd64", "relates_to_product_reference": "8Base-CNV-4.8" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/vm-import-controller@sha256:cf7a32623aa1cb88571f9ad762f323d91e02aa851d9e80ebe1d7c6a930fe4f7d_amd64 as a component of CNV 4.8 for RHEL 8", "product_id": "8Base-CNV-4.8:container-native-virtualization/vm-import-controller@sha256:cf7a32623aa1cb88571f9ad762f323d91e02aa851d9e80ebe1d7c6a930fe4f7d_amd64" }, "product_reference": "container-native-virtualization/vm-import-controller@sha256:cf7a32623aa1cb88571f9ad762f323d91e02aa851d9e80ebe1d7c6a930fe4f7d_amd64", "relates_to_product_reference": "8Base-CNV-4.8" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/vm-import-operator-rhel8@sha256:d5f101aa6d75dc70af48b74ab8e18b381f6956cb24fb79beaefecd0940233ae6_amd64 as a component of CNV 4.8 for RHEL 8", "product_id": "8Base-CNV-4.8:container-native-virtualization/vm-import-operator-rhel8@sha256:d5f101aa6d75dc70af48b74ab8e18b381f6956cb24fb79beaefecd0940233ae6_amd64" }, "product_reference": "container-native-virtualization/vm-import-operator-rhel8@sha256:d5f101aa6d75dc70af48b74ab8e18b381f6956cb24fb79beaefecd0940233ae6_amd64", "relates_to_product_reference": "8Base-CNV-4.8" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/vm-import-virtv2v-rhel8@sha256:fdd5a557c189674f9c222154fa38892b4f647b36804b79276b3d39ebfe40527d_amd64 as a component of CNV 4.8 for RHEL 8", "product_id": "8Base-CNV-4.8:container-native-virtualization/vm-import-virtv2v-rhel8@sha256:fdd5a557c189674f9c222154fa38892b4f647b36804b79276b3d39ebfe40527d_amd64" }, "product_reference": "container-native-virtualization/vm-import-virtv2v-rhel8@sha256:fdd5a557c189674f9c222154fa38892b4f647b36804b79276b3d39ebfe40527d_amd64", "relates_to_product_reference": "8Base-CNV-4.8" } ] }, "vulnerabilities": [ { "cve": "CVE-2020-27813", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2020-11-27T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1902111" } ], "notes": [ { "category": "description", "text": "An integer overflow vulnerability exists with the length of websocket frames received via a websocket connection. An attacker could use this flaw to cause a denial of service attack on an HTTP Server allowing websocket connections.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang-github-gorilla-websocket: integer overflow leads to denial of service", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-CNV-4.8:container-native-virtualization/kubernetes-nmstate-handler-rhel8@sha256:3824ad38c9096358a7a901d1a790de5748fa84cb4c755751abe41f924d091d14_amd64", "8Base-CNV-4.8:container-native-virtualization/kubevirt-v2v-conversion@sha256:2f445fac142b49317c7fb819031f2022618274f4fc0cc8e49431afa26bbf5d28_amd64", "8Base-CNV-4.8:container-native-virtualization/kubevirt-vmware@sha256:f0c0f709a55956c330158c5312261b80b954adf9bb2c6c9507406127175eb8c1_amd64", "8Base-CNV-4.8:container-native-virtualization/node-maintenance-operator@sha256:a987c89b87c05a96dacabc78bccfb4526536207f0da31383776dba0b77dfad75_amd64", "8Base-CNV-4.8:container-native-virtualization/vm-import-controller-rhel8@sha256:cf7a32623aa1cb88571f9ad762f323d91e02aa851d9e80ebe1d7c6a930fe4f7d_amd64", "8Base-CNV-4.8:container-native-virtualization/vm-import-controller@sha256:cf7a32623aa1cb88571f9ad762f323d91e02aa851d9e80ebe1d7c6a930fe4f7d_amd64", "8Base-CNV-4.8:container-native-virtualization/vm-import-operator-rhel8@sha256:d5f101aa6d75dc70af48b74ab8e18b381f6956cb24fb79beaefecd0940233ae6_amd64", "8Base-CNV-4.8:container-native-virtualization/vm-import-virtv2v-rhel8@sha256:fdd5a557c189674f9c222154fa38892b4f647b36804b79276b3d39ebfe40527d_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-27813" }, { "category": "external", "summary": "RHBZ#1902111", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1902111" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-27813", "url": "https://www.cve.org/CVERecord?id=CVE-2020-27813" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-27813", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-27813" }, { "category": "external", "summary": "https://github.com/gorilla/websocket/security/advisories/GHSA-jf24-p9p9-4rjh", "url": "https://github.com/gorilla/websocket/security/advisories/GHSA-jf24-p9p9-4rjh" } ], "release_date": "2019-08-25T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "8Base-CNV-4.8:container-native-virtualization/kubernetes-nmstate-handler-rhel8@sha256:3824ad38c9096358a7a901d1a790de5748fa84cb4c755751abe41f924d091d14_amd64", "8Base-CNV-4.8:container-native-virtualization/kubevirt-v2v-conversion@sha256:2f445fac142b49317c7fb819031f2022618274f4fc0cc8e49431afa26bbf5d28_amd64", "8Base-CNV-4.8:container-native-virtualization/kubevirt-vmware@sha256:f0c0f709a55956c330158c5312261b80b954adf9bb2c6c9507406127175eb8c1_amd64", "8Base-CNV-4.8:container-native-virtualization/node-maintenance-operator@sha256:a987c89b87c05a96dacabc78bccfb4526536207f0da31383776dba0b77dfad75_amd64", "8Base-CNV-4.8:container-native-virtualization/vm-import-controller-rhel8@sha256:cf7a32623aa1cb88571f9ad762f323d91e02aa851d9e80ebe1d7c6a930fe4f7d_amd64", "8Base-CNV-4.8:container-native-virtualization/vm-import-controller@sha256:cf7a32623aa1cb88571f9ad762f323d91e02aa851d9e80ebe1d7c6a930fe4f7d_amd64", "8Base-CNV-4.8:container-native-virtualization/vm-import-operator-rhel8@sha256:d5f101aa6d75dc70af48b74ab8e18b381f6956cb24fb79beaefecd0940233ae6_amd64", "8Base-CNV-4.8:container-native-virtualization/vm-import-virtv2v-rhel8@sha256:fdd5a557c189674f9c222154fa38892b4f647b36804b79276b3d39ebfe40527d_amd64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:2920" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "8Base-CNV-4.8:container-native-virtualization/kubernetes-nmstate-handler-rhel8@sha256:3824ad38c9096358a7a901d1a790de5748fa84cb4c755751abe41f924d091d14_amd64", "8Base-CNV-4.8:container-native-virtualization/kubevirt-v2v-conversion@sha256:2f445fac142b49317c7fb819031f2022618274f4fc0cc8e49431afa26bbf5d28_amd64", "8Base-CNV-4.8:container-native-virtualization/kubevirt-vmware@sha256:f0c0f709a55956c330158c5312261b80b954adf9bb2c6c9507406127175eb8c1_amd64", "8Base-CNV-4.8:container-native-virtualization/node-maintenance-operator@sha256:a987c89b87c05a96dacabc78bccfb4526536207f0da31383776dba0b77dfad75_amd64", "8Base-CNV-4.8:container-native-virtualization/vm-import-controller-rhel8@sha256:cf7a32623aa1cb88571f9ad762f323d91e02aa851d9e80ebe1d7c6a930fe4f7d_amd64", "8Base-CNV-4.8:container-native-virtualization/vm-import-controller@sha256:cf7a32623aa1cb88571f9ad762f323d91e02aa851d9e80ebe1d7c6a930fe4f7d_amd64", "8Base-CNV-4.8:container-native-virtualization/vm-import-operator-rhel8@sha256:d5f101aa6d75dc70af48b74ab8e18b381f6956cb24fb79beaefecd0940233ae6_amd64", "8Base-CNV-4.8:container-native-virtualization/vm-import-virtv2v-rhel8@sha256:fdd5a557c189674f9c222154fa38892b4f647b36804b79276b3d39ebfe40527d_amd64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang-github-gorilla-websocket: integer overflow leads to denial of service" }, { "cve": "CVE-2020-29652", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "discovery_date": "2020-12-17T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1908883" } ], "notes": [ { "category": "description", "text": "A null pointer dereference vulnerability was found in golang. When using the library\u0027s ssh server without specifying an option for GSSAPIWithMICConfig, it is possible for an attacker to craft an ssh client connection using the `gssapi-with-mic` authentication method and cause the server to panic resulting in a denial of service. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: crypto/ssh: crafted authentication request can lead to nil pointer dereference", "title": "Vulnerability summary" }, { "category": "other", "text": "A large number of products include the affected package, but do not make use of the vulnerable SSH server code. Accordingly, the flaw itself is rated as \"Important\", but these products themselves all have a \"Low\" severity rating.\n\nAdditionally, a number of products include golang.org/x/crypto (or even golang.org/x/crypto/ssh/terminal) but not specifically golang.org/x/crypto/ssh/server.go in the final build. As this would result in a very large number of entries of not affected products, only products which include the ssh server code (golang.org/x/crypto/ssh/server.go) have been represented here. \n\nRed Hat Enterprise Linux 8 container-tools:rhel8/containernetworking-plugins is not affected because although it uses some functionality from golang.org/x/crypto, it does not use or import anything from golang.org/x/crypto/ssh/*.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-CNV-4.8:container-native-virtualization/kubernetes-nmstate-handler-rhel8@sha256:3824ad38c9096358a7a901d1a790de5748fa84cb4c755751abe41f924d091d14_amd64", "8Base-CNV-4.8:container-native-virtualization/kubevirt-v2v-conversion@sha256:2f445fac142b49317c7fb819031f2022618274f4fc0cc8e49431afa26bbf5d28_amd64", "8Base-CNV-4.8:container-native-virtualization/kubevirt-vmware@sha256:f0c0f709a55956c330158c5312261b80b954adf9bb2c6c9507406127175eb8c1_amd64", "8Base-CNV-4.8:container-native-virtualization/node-maintenance-operator@sha256:a987c89b87c05a96dacabc78bccfb4526536207f0da31383776dba0b77dfad75_amd64", "8Base-CNV-4.8:container-native-virtualization/vm-import-controller-rhel8@sha256:cf7a32623aa1cb88571f9ad762f323d91e02aa851d9e80ebe1d7c6a930fe4f7d_amd64", "8Base-CNV-4.8:container-native-virtualization/vm-import-controller@sha256:cf7a32623aa1cb88571f9ad762f323d91e02aa851d9e80ebe1d7c6a930fe4f7d_amd64", "8Base-CNV-4.8:container-native-virtualization/vm-import-operator-rhel8@sha256:d5f101aa6d75dc70af48b74ab8e18b381f6956cb24fb79beaefecd0940233ae6_amd64", "8Base-CNV-4.8:container-native-virtualization/vm-import-virtv2v-rhel8@sha256:fdd5a557c189674f9c222154fa38892b4f647b36804b79276b3d39ebfe40527d_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-29652" }, { "category": "external", "summary": "RHBZ#1908883", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1908883" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-29652", "url": "https://www.cve.org/CVERecord?id=CVE-2020-29652" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-29652", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-29652" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/ouZIlBimOsE?pli=1", "url": "https://groups.google.com/g/golang-announce/c/ouZIlBimOsE?pli=1" } ], "release_date": "2020-12-16T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "8Base-CNV-4.8:container-native-virtualization/kubernetes-nmstate-handler-rhel8@sha256:3824ad38c9096358a7a901d1a790de5748fa84cb4c755751abe41f924d091d14_amd64", "8Base-CNV-4.8:container-native-virtualization/kubevirt-v2v-conversion@sha256:2f445fac142b49317c7fb819031f2022618274f4fc0cc8e49431afa26bbf5d28_amd64", "8Base-CNV-4.8:container-native-virtualization/kubevirt-vmware@sha256:f0c0f709a55956c330158c5312261b80b954adf9bb2c6c9507406127175eb8c1_amd64", "8Base-CNV-4.8:container-native-virtualization/node-maintenance-operator@sha256:a987c89b87c05a96dacabc78bccfb4526536207f0da31383776dba0b77dfad75_amd64", "8Base-CNV-4.8:container-native-virtualization/vm-import-controller-rhel8@sha256:cf7a32623aa1cb88571f9ad762f323d91e02aa851d9e80ebe1d7c6a930fe4f7d_amd64", "8Base-CNV-4.8:container-native-virtualization/vm-import-controller@sha256:cf7a32623aa1cb88571f9ad762f323d91e02aa851d9e80ebe1d7c6a930fe4f7d_amd64", "8Base-CNV-4.8:container-native-virtualization/vm-import-operator-rhel8@sha256:d5f101aa6d75dc70af48b74ab8e18b381f6956cb24fb79beaefecd0940233ae6_amd64", "8Base-CNV-4.8:container-native-virtualization/vm-import-virtv2v-rhel8@sha256:fdd5a557c189674f9c222154fa38892b4f647b36804b79276b3d39ebfe40527d_amd64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:2920" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "8Base-CNV-4.8:container-native-virtualization/kubernetes-nmstate-handler-rhel8@sha256:3824ad38c9096358a7a901d1a790de5748fa84cb4c755751abe41f924d091d14_amd64", "8Base-CNV-4.8:container-native-virtualization/kubevirt-v2v-conversion@sha256:2f445fac142b49317c7fb819031f2022618274f4fc0cc8e49431afa26bbf5d28_amd64", "8Base-CNV-4.8:container-native-virtualization/kubevirt-vmware@sha256:f0c0f709a55956c330158c5312261b80b954adf9bb2c6c9507406127175eb8c1_amd64", "8Base-CNV-4.8:container-native-virtualization/node-maintenance-operator@sha256:a987c89b87c05a96dacabc78bccfb4526536207f0da31383776dba0b77dfad75_amd64", "8Base-CNV-4.8:container-native-virtualization/vm-import-controller-rhel8@sha256:cf7a32623aa1cb88571f9ad762f323d91e02aa851d9e80ebe1d7c6a930fe4f7d_amd64", "8Base-CNV-4.8:container-native-virtualization/vm-import-controller@sha256:cf7a32623aa1cb88571f9ad762f323d91e02aa851d9e80ebe1d7c6a930fe4f7d_amd64", "8Base-CNV-4.8:container-native-virtualization/vm-import-operator-rhel8@sha256:d5f101aa6d75dc70af48b74ab8e18b381f6956cb24fb79beaefecd0940233ae6_amd64", "8Base-CNV-4.8:container-native-virtualization/vm-import-virtv2v-rhel8@sha256:fdd5a557c189674f9c222154fa38892b4f647b36804b79276b3d39ebfe40527d_amd64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "golang: crypto/ssh: crafted authentication request can lead to nil pointer dereference" }, { "cve": "CVE-2021-3114", "cwe": { "id": "CWE-682", "name": "Incorrect Calculation" }, "discovery_date": "2021-01-21T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1918750" } ], "notes": [ { "category": "description", "text": "A flaw detected in golang: crypto/elliptic, in which P-224 keys as generated can return incorrect inputs, reducing the strength of the cryptography. The highest threat from this vulnerability is confidentiality and integrity.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: crypto/elliptic: incorrect operations on the P-224 curve", "title": "Vulnerability summary" }, { "category": "other", "text": "OpenShift ServiceMesh (OSSM) 1.1 is Out Of Support Scope (OOSS) for Moderate and Low impact vulnerabilities because it is now in the Maintenance Phase of the support.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-CNV-4.8:container-native-virtualization/kubernetes-nmstate-handler-rhel8@sha256:3824ad38c9096358a7a901d1a790de5748fa84cb4c755751abe41f924d091d14_amd64", "8Base-CNV-4.8:container-native-virtualization/kubevirt-v2v-conversion@sha256:2f445fac142b49317c7fb819031f2022618274f4fc0cc8e49431afa26bbf5d28_amd64", "8Base-CNV-4.8:container-native-virtualization/kubevirt-vmware@sha256:f0c0f709a55956c330158c5312261b80b954adf9bb2c6c9507406127175eb8c1_amd64", "8Base-CNV-4.8:container-native-virtualization/node-maintenance-operator@sha256:a987c89b87c05a96dacabc78bccfb4526536207f0da31383776dba0b77dfad75_amd64", "8Base-CNV-4.8:container-native-virtualization/vm-import-controller-rhel8@sha256:cf7a32623aa1cb88571f9ad762f323d91e02aa851d9e80ebe1d7c6a930fe4f7d_amd64", "8Base-CNV-4.8:container-native-virtualization/vm-import-controller@sha256:cf7a32623aa1cb88571f9ad762f323d91e02aa851d9e80ebe1d7c6a930fe4f7d_amd64", "8Base-CNV-4.8:container-native-virtualization/vm-import-operator-rhel8@sha256:d5f101aa6d75dc70af48b74ab8e18b381f6956cb24fb79beaefecd0940233ae6_amd64", "8Base-CNV-4.8:container-native-virtualization/vm-import-virtv2v-rhel8@sha256:fdd5a557c189674f9c222154fa38892b4f647b36804b79276b3d39ebfe40527d_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-3114" }, { "category": "external", "summary": "RHBZ#1918750", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1918750" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-3114", "url": "https://www.cve.org/CVERecord?id=CVE-2021-3114" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3114", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3114" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/mperVMGa98w", "url": "https://groups.google.com/g/golang-announce/c/mperVMGa98w" } ], "release_date": "2021-01-20T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "8Base-CNV-4.8:container-native-virtualization/kubernetes-nmstate-handler-rhel8@sha256:3824ad38c9096358a7a901d1a790de5748fa84cb4c755751abe41f924d091d14_amd64", "8Base-CNV-4.8:container-native-virtualization/kubevirt-v2v-conversion@sha256:2f445fac142b49317c7fb819031f2022618274f4fc0cc8e49431afa26bbf5d28_amd64", "8Base-CNV-4.8:container-native-virtualization/kubevirt-vmware@sha256:f0c0f709a55956c330158c5312261b80b954adf9bb2c6c9507406127175eb8c1_amd64", "8Base-CNV-4.8:container-native-virtualization/node-maintenance-operator@sha256:a987c89b87c05a96dacabc78bccfb4526536207f0da31383776dba0b77dfad75_amd64", "8Base-CNV-4.8:container-native-virtualization/vm-import-controller-rhel8@sha256:cf7a32623aa1cb88571f9ad762f323d91e02aa851d9e80ebe1d7c6a930fe4f7d_amd64", "8Base-CNV-4.8:container-native-virtualization/vm-import-controller@sha256:cf7a32623aa1cb88571f9ad762f323d91e02aa851d9e80ebe1d7c6a930fe4f7d_amd64", "8Base-CNV-4.8:container-native-virtualization/vm-import-operator-rhel8@sha256:d5f101aa6d75dc70af48b74ab8e18b381f6956cb24fb79beaefecd0940233ae6_amd64", "8Base-CNV-4.8:container-native-virtualization/vm-import-virtv2v-rhel8@sha256:fdd5a557c189674f9c222154fa38892b4f647b36804b79276b3d39ebfe40527d_amd64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:2920" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N", "version": "3.1" }, "products": [ "8Base-CNV-4.8:container-native-virtualization/kubernetes-nmstate-handler-rhel8@sha256:3824ad38c9096358a7a901d1a790de5748fa84cb4c755751abe41f924d091d14_amd64", "8Base-CNV-4.8:container-native-virtualization/kubevirt-v2v-conversion@sha256:2f445fac142b49317c7fb819031f2022618274f4fc0cc8e49431afa26bbf5d28_amd64", "8Base-CNV-4.8:container-native-virtualization/kubevirt-vmware@sha256:f0c0f709a55956c330158c5312261b80b954adf9bb2c6c9507406127175eb8c1_amd64", "8Base-CNV-4.8:container-native-virtualization/node-maintenance-operator@sha256:a987c89b87c05a96dacabc78bccfb4526536207f0da31383776dba0b77dfad75_amd64", "8Base-CNV-4.8:container-native-virtualization/vm-import-controller-rhel8@sha256:cf7a32623aa1cb88571f9ad762f323d91e02aa851d9e80ebe1d7c6a930fe4f7d_amd64", "8Base-CNV-4.8:container-native-virtualization/vm-import-controller@sha256:cf7a32623aa1cb88571f9ad762f323d91e02aa851d9e80ebe1d7c6a930fe4f7d_amd64", "8Base-CNV-4.8:container-native-virtualization/vm-import-operator-rhel8@sha256:d5f101aa6d75dc70af48b74ab8e18b381f6956cb24fb79beaefecd0940233ae6_amd64", "8Base-CNV-4.8:container-native-virtualization/vm-import-virtv2v-rhel8@sha256:fdd5a557c189674f9c222154fa38892b4f647b36804b79276b3d39ebfe40527d_amd64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang: crypto/elliptic: incorrect operations on the P-224 curve" }, { "cve": "CVE-2021-3121", "cwe": { "id": "CWE-129", "name": "Improper Validation of Array Index" }, "discovery_date": "2021-01-28T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1921650" } ], "notes": [ { "category": "description", "text": "A flaw was found in github.com/gogo/protobuf before 1.3.2 that allows an out-of-bounds access when unmarshalling certain protobuf objects. This flaw allows a remote attacker to send crafted protobuf messages, causing panic and resulting in a denial of service. The highest threat from this vulnerability is to availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "gogo/protobuf: plugin/unmarshal/unmarshal.go lacks certain index validation", "title": "Vulnerability summary" }, { "category": "other", "text": "OpenShift Container Platform (OCP), OpenShift ServiceMesh (OSSM) and Red Hat OpenShift Jaeger (RHOSJ) all include code generated by github.com/gogo/protobuf to parse protobuf messages. However, no component is known to accept protobuf messages from unauthenticated sources, hence this vulnerability is rated Moderate for OCP, OSSM and RHOSJ.\n\nOpenShift Virtualization includes code generated by github.com/gogo/protobuf to parse protobuf messages. However, no component of OpenShift Virtualization is known to accept protobuf messages from unauthenticated sources, hence this vulnerability is rated Moderate.\n\nRed Hat Advanced Cluster Management for Kubernetes (RHACM) includes code generated by github.com/gogo/protobuf to parse protobuf messages. However, no RHACM component is accepting protobuf messages from unauthenticated sources and are used with a limited scope, hence this vulnerability is rated Moderate for RHACM.\n\nRed Hat Cluster Application Migration (CAM) includes code generated by github.com/gogo/protobuf to parse protobuf messages. However, no CAM component is known to accept protobuf messages from unauthenticated sources, hence this vulnerability is rated Moderate for CAM.\n\nCryostat-2 is affected as it does ship gogo/protobuf library with it\u0027s distribution but the only use for Protobuf would be the Kubernetes/OpenShift API server the operator communicates with and it should be authenticated hence it is affected with Moderate impact.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-CNV-4.8:container-native-virtualization/kubernetes-nmstate-handler-rhel8@sha256:3824ad38c9096358a7a901d1a790de5748fa84cb4c755751abe41f924d091d14_amd64", "8Base-CNV-4.8:container-native-virtualization/kubevirt-v2v-conversion@sha256:2f445fac142b49317c7fb819031f2022618274f4fc0cc8e49431afa26bbf5d28_amd64", "8Base-CNV-4.8:container-native-virtualization/kubevirt-vmware@sha256:f0c0f709a55956c330158c5312261b80b954adf9bb2c6c9507406127175eb8c1_amd64", "8Base-CNV-4.8:container-native-virtualization/node-maintenance-operator@sha256:a987c89b87c05a96dacabc78bccfb4526536207f0da31383776dba0b77dfad75_amd64", "8Base-CNV-4.8:container-native-virtualization/vm-import-controller-rhel8@sha256:cf7a32623aa1cb88571f9ad762f323d91e02aa851d9e80ebe1d7c6a930fe4f7d_amd64", "8Base-CNV-4.8:container-native-virtualization/vm-import-controller@sha256:cf7a32623aa1cb88571f9ad762f323d91e02aa851d9e80ebe1d7c6a930fe4f7d_amd64", "8Base-CNV-4.8:container-native-virtualization/vm-import-operator-rhel8@sha256:d5f101aa6d75dc70af48b74ab8e18b381f6956cb24fb79beaefecd0940233ae6_amd64", "8Base-CNV-4.8:container-native-virtualization/vm-import-virtv2v-rhel8@sha256:fdd5a557c189674f9c222154fa38892b4f647b36804b79276b3d39ebfe40527d_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-3121" }, { "category": "external", "summary": "RHBZ#1921650", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1921650" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-3121", "url": "https://www.cve.org/CVERecord?id=CVE-2021-3121" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3121", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3121" } ], "release_date": "2021-01-11T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "8Base-CNV-4.8:container-native-virtualization/kubernetes-nmstate-handler-rhel8@sha256:3824ad38c9096358a7a901d1a790de5748fa84cb4c755751abe41f924d091d14_amd64", "8Base-CNV-4.8:container-native-virtualization/kubevirt-v2v-conversion@sha256:2f445fac142b49317c7fb819031f2022618274f4fc0cc8e49431afa26bbf5d28_amd64", "8Base-CNV-4.8:container-native-virtualization/kubevirt-vmware@sha256:f0c0f709a55956c330158c5312261b80b954adf9bb2c6c9507406127175eb8c1_amd64", "8Base-CNV-4.8:container-native-virtualization/node-maintenance-operator@sha256:a987c89b87c05a96dacabc78bccfb4526536207f0da31383776dba0b77dfad75_amd64", "8Base-CNV-4.8:container-native-virtualization/vm-import-controller-rhel8@sha256:cf7a32623aa1cb88571f9ad762f323d91e02aa851d9e80ebe1d7c6a930fe4f7d_amd64", "8Base-CNV-4.8:container-native-virtualization/vm-import-controller@sha256:cf7a32623aa1cb88571f9ad762f323d91e02aa851d9e80ebe1d7c6a930fe4f7d_amd64", "8Base-CNV-4.8:container-native-virtualization/vm-import-operator-rhel8@sha256:d5f101aa6d75dc70af48b74ab8e18b381f6956cb24fb79beaefecd0940233ae6_amd64", "8Base-CNV-4.8:container-native-virtualization/vm-import-virtv2v-rhel8@sha256:fdd5a557c189674f9c222154fa38892b4f647b36804b79276b3d39ebfe40527d_amd64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:2920" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.6, "baseSeverity": "HIGH", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H", "version": "3.1" }, "products": [ "8Base-CNV-4.8:container-native-virtualization/kubernetes-nmstate-handler-rhel8@sha256:3824ad38c9096358a7a901d1a790de5748fa84cb4c755751abe41f924d091d14_amd64", "8Base-CNV-4.8:container-native-virtualization/kubevirt-v2v-conversion@sha256:2f445fac142b49317c7fb819031f2022618274f4fc0cc8e49431afa26bbf5d28_amd64", "8Base-CNV-4.8:container-native-virtualization/kubevirt-vmware@sha256:f0c0f709a55956c330158c5312261b80b954adf9bb2c6c9507406127175eb8c1_amd64", "8Base-CNV-4.8:container-native-virtualization/node-maintenance-operator@sha256:a987c89b87c05a96dacabc78bccfb4526536207f0da31383776dba0b77dfad75_amd64", "8Base-CNV-4.8:container-native-virtualization/vm-import-controller-rhel8@sha256:cf7a32623aa1cb88571f9ad762f323d91e02aa851d9e80ebe1d7c6a930fe4f7d_amd64", "8Base-CNV-4.8:container-native-virtualization/vm-import-controller@sha256:cf7a32623aa1cb88571f9ad762f323d91e02aa851d9e80ebe1d7c6a930fe4f7d_amd64", "8Base-CNV-4.8:container-native-virtualization/vm-import-operator-rhel8@sha256:d5f101aa6d75dc70af48b74ab8e18b381f6956cb24fb79beaefecd0940233ae6_amd64", "8Base-CNV-4.8:container-native-virtualization/vm-import-virtv2v-rhel8@sha256:fdd5a557c189674f9c222154fa38892b4f647b36804b79276b3d39ebfe40527d_amd64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "gogo/protobuf: plugin/unmarshal/unmarshal.go lacks certain index validation" }, { "cve": "CVE-2021-29482", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2021-04-28T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1954368" } ], "notes": [ { "category": "description", "text": "A flaw was found in github.com/ulikunitz/xz. The function readUvarint may not terminate a loop what could lead to denial of service (DoS).", "title": "Vulnerability description" }, { "category": "summary", "text": "ulikunitz/xz: Infinite loop in readUvarint allows for denial of service", "title": "Vulnerability summary" }, { "category": "other", "text": "In OpenShift Container Platform (OCP), OpenShift ServiceMesh (OSSM) and Red Hat Advanced Cluster Management for Kubernetes (RHACM) the affected components are behind OpenShift OAuth authentication, therefore the impact is low.\nIn OCP before 4.7 the buildah, skopeo and podman packages include vulnerable version of github.com/ulikunitz/xz, but these OCP releases are already in the Maintenance Phase of the support, hence affected components are marked as wontfix. This may be fixed in the future.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-CNV-4.8:container-native-virtualization/kubernetes-nmstate-handler-rhel8@sha256:3824ad38c9096358a7a901d1a790de5748fa84cb4c755751abe41f924d091d14_amd64", "8Base-CNV-4.8:container-native-virtualization/kubevirt-v2v-conversion@sha256:2f445fac142b49317c7fb819031f2022618274f4fc0cc8e49431afa26bbf5d28_amd64", "8Base-CNV-4.8:container-native-virtualization/kubevirt-vmware@sha256:f0c0f709a55956c330158c5312261b80b954adf9bb2c6c9507406127175eb8c1_amd64", "8Base-CNV-4.8:container-native-virtualization/node-maintenance-operator@sha256:a987c89b87c05a96dacabc78bccfb4526536207f0da31383776dba0b77dfad75_amd64", "8Base-CNV-4.8:container-native-virtualization/vm-import-controller-rhel8@sha256:cf7a32623aa1cb88571f9ad762f323d91e02aa851d9e80ebe1d7c6a930fe4f7d_amd64", "8Base-CNV-4.8:container-native-virtualization/vm-import-controller@sha256:cf7a32623aa1cb88571f9ad762f323d91e02aa851d9e80ebe1d7c6a930fe4f7d_amd64", "8Base-CNV-4.8:container-native-virtualization/vm-import-operator-rhel8@sha256:d5f101aa6d75dc70af48b74ab8e18b381f6956cb24fb79beaefecd0940233ae6_amd64", "8Base-CNV-4.8:container-native-virtualization/vm-import-virtv2v-rhel8@sha256:fdd5a557c189674f9c222154fa38892b4f647b36804b79276b3d39ebfe40527d_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-29482" }, { "category": "external", "summary": "RHBZ#1954368", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1954368" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-29482", "url": "https://www.cve.org/CVERecord?id=CVE-2021-29482" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-29482", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-29482" } ], "release_date": "2020-08-19T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "8Base-CNV-4.8:container-native-virtualization/kubernetes-nmstate-handler-rhel8@sha256:3824ad38c9096358a7a901d1a790de5748fa84cb4c755751abe41f924d091d14_amd64", "8Base-CNV-4.8:container-native-virtualization/kubevirt-v2v-conversion@sha256:2f445fac142b49317c7fb819031f2022618274f4fc0cc8e49431afa26bbf5d28_amd64", "8Base-CNV-4.8:container-native-virtualization/kubevirt-vmware@sha256:f0c0f709a55956c330158c5312261b80b954adf9bb2c6c9507406127175eb8c1_amd64", "8Base-CNV-4.8:container-native-virtualization/node-maintenance-operator@sha256:a987c89b87c05a96dacabc78bccfb4526536207f0da31383776dba0b77dfad75_amd64", "8Base-CNV-4.8:container-native-virtualization/vm-import-controller-rhel8@sha256:cf7a32623aa1cb88571f9ad762f323d91e02aa851d9e80ebe1d7c6a930fe4f7d_amd64", "8Base-CNV-4.8:container-native-virtualization/vm-import-controller@sha256:cf7a32623aa1cb88571f9ad762f323d91e02aa851d9e80ebe1d7c6a930fe4f7d_amd64", "8Base-CNV-4.8:container-native-virtualization/vm-import-operator-rhel8@sha256:d5f101aa6d75dc70af48b74ab8e18b381f6956cb24fb79beaefecd0940233ae6_amd64", "8Base-CNV-4.8:container-native-virtualization/vm-import-virtv2v-rhel8@sha256:fdd5a557c189674f9c222154fa38892b4f647b36804b79276b3d39ebfe40527d_amd64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:2920" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "8Base-CNV-4.8:container-native-virtualization/kubernetes-nmstate-handler-rhel8@sha256:3824ad38c9096358a7a901d1a790de5748fa84cb4c755751abe41f924d091d14_amd64", "8Base-CNV-4.8:container-native-virtualization/kubevirt-v2v-conversion@sha256:2f445fac142b49317c7fb819031f2022618274f4fc0cc8e49431afa26bbf5d28_amd64", "8Base-CNV-4.8:container-native-virtualization/kubevirt-vmware@sha256:f0c0f709a55956c330158c5312261b80b954adf9bb2c6c9507406127175eb8c1_amd64", "8Base-CNV-4.8:container-native-virtualization/node-maintenance-operator@sha256:a987c89b87c05a96dacabc78bccfb4526536207f0da31383776dba0b77dfad75_amd64", "8Base-CNV-4.8:container-native-virtualization/vm-import-controller-rhel8@sha256:cf7a32623aa1cb88571f9ad762f323d91e02aa851d9e80ebe1d7c6a930fe4f7d_amd64", "8Base-CNV-4.8:container-native-virtualization/vm-import-controller@sha256:cf7a32623aa1cb88571f9ad762f323d91e02aa851d9e80ebe1d7c6a930fe4f7d_amd64", "8Base-CNV-4.8:container-native-virtualization/vm-import-operator-rhel8@sha256:d5f101aa6d75dc70af48b74ab8e18b381f6956cb24fb79beaefecd0940233ae6_amd64", "8Base-CNV-4.8:container-native-virtualization/vm-import-virtv2v-rhel8@sha256:fdd5a557c189674f9c222154fa38892b4f647b36804b79276b3d39ebfe40527d_amd64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "ulikunitz/xz: Infinite loop in readUvarint allows for denial of service" } ] }
rhsa-2021_0799
Vulnerability from csaf_redhat
Published
2021-03-10 11:41
Modified
2024-09-18 04:27
Summary
Red Hat Security Advisory: OpenShift Virtualization 2.6.0 security and bug fix update
Notes
Topic
An update is now available for RHEL-8-CNV-2.6.
Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
OpenShift Virtualization is Red Hat's virtualization solution designed for Red Hat OpenShift Container Platform.
This advisory contains the following OpenShift Virtualization 2.6.0 images:
RHEL-8-CNV-2.6
==============
kubevirt-cpu-node-labeller-container-v2.6.0-5
kubevirt-cpu-model-nfd-plugin-container-v2.6.0-5
node-maintenance-operator-container-v2.6.0-13
kubevirt-vmware-container-v2.6.0-5
virtio-win-container-v2.6.0-5
kubevirt-kvm-info-nfd-plugin-container-v2.6.0-5
bridge-marker-container-v2.6.0-9
kubevirt-template-validator-container-v2.6.0-9
kubevirt-v2v-conversion-container-v2.6.0-6
kubemacpool-container-v2.6.0-13
kubevirt-ssp-operator-container-v2.6.0-40
hyperconverged-cluster-webhook-container-v2.6.0-73
hyperconverged-cluster-operator-container-v2.6.0-73
ovs-cni-plugin-container-v2.6.0-10
cnv-containernetworking-plugins-container-v2.6.0-10
ovs-cni-marker-container-v2.6.0-10
cluster-network-addons-operator-container-v2.6.0-16
hostpath-provisioner-container-v2.6.0-11
hostpath-provisioner-operator-container-v2.6.0-14
vm-import-virtv2v-container-v2.6.0-21
kubernetes-nmstate-handler-container-v2.6.0-19
vm-import-controller-container-v2.6.0-21
vm-import-operator-container-v2.6.0-21
virt-api-container-v2.6.0-111
virt-controller-container-v2.6.0-111
virt-handler-container-v2.6.0-111
virt-operator-container-v2.6.0-111
virt-launcher-container-v2.6.0-111
cnv-must-gather-container-v2.6.0-54
virt-cdi-importer-container-v2.6.0-24
virt-cdi-cloner-container-v2.6.0-24
virt-cdi-controller-container-v2.6.0-24
virt-cdi-uploadserver-container-v2.6.0-24
virt-cdi-apiserver-container-v2.6.0-24
virt-cdi-uploadproxy-container-v2.6.0-24
virt-cdi-operator-container-v2.6.0-24
hco-bundle-registry-container-v2.6.0-582
Security Fix(es):
* golang.org/x/crypto: Processing of crafted ssh-ed25519 public keys allows for panic (CVE-2020-9283)
* golang: crypto/ssh: crafted authentication request can lead to nil pointer dereference (CVE-2020-29652)
* gogo/protobuf: plugin/unmarshal/unmarshal.go lacks certain index validation (CVE-2021-3121)
* golang.org/x/text: possibility to trigger an infinite loop in encoding/unicode could lead to crash (CVE-2020-14040)
* golang: data race in certain net/http servers including ReverseProxy can lead to DoS (CVE-2020-15586)
* golang: ReadUvarint and ReadVarint can read an unlimited number of bytes from invalid inputs (CVE-2020-16845)
* jwt-go: access restriction bypass vulnerability (CVE-2020-26160)
* golang-github-gorilla-websocket: integer overflow leads to denial of service (CVE-2020-27813)
* golang: math/big: panic during recursive division of very large numbers (CVE-2020-28362)
* containernetworking-cni: Arbitrary path injection via type field in CNI configuration (CVE-2021-20206)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_vex", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update is now available for RHEL-8-CNV-2.6.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "OpenShift Virtualization is Red Hat\u0027s virtualization solution designed for Red Hat OpenShift Container Platform.\n\nThis advisory contains the following OpenShift Virtualization 2.6.0 images:\n\nRHEL-8-CNV-2.6\n==============\nkubevirt-cpu-node-labeller-container-v2.6.0-5\nkubevirt-cpu-model-nfd-plugin-container-v2.6.0-5\nnode-maintenance-operator-container-v2.6.0-13\nkubevirt-vmware-container-v2.6.0-5\nvirtio-win-container-v2.6.0-5\nkubevirt-kvm-info-nfd-plugin-container-v2.6.0-5\nbridge-marker-container-v2.6.0-9\nkubevirt-template-validator-container-v2.6.0-9\nkubevirt-v2v-conversion-container-v2.6.0-6\nkubemacpool-container-v2.6.0-13\nkubevirt-ssp-operator-container-v2.6.0-40\nhyperconverged-cluster-webhook-container-v2.6.0-73\nhyperconverged-cluster-operator-container-v2.6.0-73\novs-cni-plugin-container-v2.6.0-10\ncnv-containernetworking-plugins-container-v2.6.0-10\novs-cni-marker-container-v2.6.0-10\ncluster-network-addons-operator-container-v2.6.0-16\nhostpath-provisioner-container-v2.6.0-11\nhostpath-provisioner-operator-container-v2.6.0-14\nvm-import-virtv2v-container-v2.6.0-21\nkubernetes-nmstate-handler-container-v2.6.0-19\nvm-import-controller-container-v2.6.0-21\nvm-import-operator-container-v2.6.0-21\nvirt-api-container-v2.6.0-111\nvirt-controller-container-v2.6.0-111\nvirt-handler-container-v2.6.0-111\nvirt-operator-container-v2.6.0-111\nvirt-launcher-container-v2.6.0-111\ncnv-must-gather-container-v2.6.0-54\nvirt-cdi-importer-container-v2.6.0-24\nvirt-cdi-cloner-container-v2.6.0-24\nvirt-cdi-controller-container-v2.6.0-24\nvirt-cdi-uploadserver-container-v2.6.0-24\nvirt-cdi-apiserver-container-v2.6.0-24\nvirt-cdi-uploadproxy-container-v2.6.0-24\nvirt-cdi-operator-container-v2.6.0-24\nhco-bundle-registry-container-v2.6.0-582\n\nSecurity Fix(es):\n\n* golang.org/x/crypto: Processing of crafted ssh-ed25519 public keys allows for panic (CVE-2020-9283)\n\n* golang: crypto/ssh: crafted authentication request can lead to nil pointer dereference (CVE-2020-29652)\n\n* gogo/protobuf: plugin/unmarshal/unmarshal.go lacks certain index validation (CVE-2021-3121)\n\n* golang.org/x/text: possibility to trigger an infinite loop in encoding/unicode could lead to crash (CVE-2020-14040)\n\n* golang: data race in certain net/http servers including ReverseProxy can lead to DoS (CVE-2020-15586)\n\n* golang: ReadUvarint and ReadVarint can read an unlimited number of bytes from invalid inputs (CVE-2020-16845)\n\n* jwt-go: access restriction bypass vulnerability (CVE-2020-26160)\n\n* golang-github-gorilla-websocket: integer overflow leads to denial of service (CVE-2020-27813)\n\n* golang: math/big: panic during recursive division of very large numbers (CVE-2020-28362)\n\n* containernetworking-cni: Arbitrary path injection via type field in CNI configuration (CVE-2021-20206)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat offerings.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2021:0799", "url": "https://access.redhat.com/errata/RHSA-2021:0799" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#moderate", "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "category": "external", "summary": "1732329", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1732329" }, { "category": "external", "summary": "1783192", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1783192" }, { "category": "external", "summary": "1791753", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1791753" }, { "category": "external", "summary": "1804533", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1804533" }, { "category": "external", "summary": "1848954", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1848954" }, { "category": "external", "summary": "1848956", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1848956" }, { "category": "external", "summary": "1853652", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1853652" }, { "category": "external", "summary": "1853911", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1853911" }, { "category": "external", "summary": "1854098", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1854098" }, { "category": "external", "summary": "1856347", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1856347" }, { "category": "external", "summary": "1856953", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1856953" }, { "category": "external", "summary": "1859235", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1859235" }, { "category": "external", "summary": "1860714", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1860714" }, { "category": "external", "summary": "1860992", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1860992" }, { "category": "external", "summary": "1864577", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1864577" }, { "category": "external", "summary": "1866593", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1866593" }, { "category": "external", "summary": "1867099", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1867099" }, { "category": "external", "summary": "1868817", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1868817" }, { "category": "external", "summary": "1873771", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1873771" }, { "category": "external", "summary": "1874812", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1874812" }, { "category": "external", "summary": "1878499", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1878499" }, { "category": "external", "summary": "1879108", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1879108" }, { "category": "external", "summary": "1881874", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1881874" }, { "category": "external", "summary": "1883232", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1883232" }, { "category": "external", "summary": "1883371", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1883371" }, { "category": "external", "summary": "1885153", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1885153" }, { "category": "external", "summary": "1885418", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1885418" }, { "category": "external", "summary": "1887398", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1887398" }, { "category": "external", "summary": "1889295", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1889295" }, { "category": "external", "summary": "1891285", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1891285" }, { "category": "external", "summary": "1891440", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1891440" }, { "category": "external", "summary": "1892227", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1892227" }, { "category": "external", "summary": "1893278", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1893278" }, { "category": "external", "summary": "1893646", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1893646" }, { "category": "external", "summary": "1894428", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1894428" }, { "category": "external", "summary": "1894824", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1894824" }, { "category": "external", "summary": "1894897", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1894897" }, { "category": "external", "summary": "1895414", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1895414" }, { "category": "external", "summary": "1897635", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1897635" }, { "category": "external", "summary": "1898072", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1898072" }, { "category": "external", "summary": "1898840", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1898840" }, { "category": "external", "summary": "1899558", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1899558" }, { "category": "external", "summary": "1901480", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1901480" }, { "category": "external", "summary": "1902046", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1902046" }, { "category": "external", "summary": "1902111", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1902111" }, { "category": "external", "summary": "1903014", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1903014" }, { "category": "external", "summary": "1903585", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1903585" }, { "category": "external", "summary": "1904797", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1904797" }, { "category": "external", "summary": "1906199", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1906199" }, { "category": "external", "summary": "1907151", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1907151" }, { "category": "external", "summary": "1907352", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1907352" }, { "category": "external", "summary": "1907691", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1907691" }, { "category": "external", "summary": "1907988", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1907988" }, { "category": "external", "summary": "1908363", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1908363" }, { "category": "external", "summary": "1908421", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1908421" }, { "category": "external", "summary": "1908883", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1908883" }, { "category": "external", "summary": "1909458", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1909458" }, { "category": "external", "summary": "1910857", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1910857" }, { "category": "external", "summary": "1911118", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1911118" }, { "category": "external", "summary": "1911396", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1911396" }, { "category": "external", "summary": "1911662", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1911662" }, { "category": "external", "summary": "1912908", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1912908" }, { "category": "external", "summary": "1913248", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1913248" }, { "category": "external", "summary": "1913320", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1913320" }, { "category": "external", "summary": "1913717", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1913717" }, { "category": "external", "summary": "1913756", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1913756" }, { "category": "external", "summary": "1914177", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1914177" }, { "category": "external", "summary": "1914608", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1914608" }, { "category": "external", "summary": "1914947", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1914947" }, { "category": "external", "summary": "1917908", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1917908" }, { "category": "external", "summary": "1917963", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1917963" }, { "category": "external", "summary": "1919391", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1919391" }, { "category": "external", "summary": "1920576", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1920576" }, { "category": "external", "summary": "1920610", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1920610" }, { "category": "external", "summary": "1921650", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1921650" }, { "category": "external", "summary": "1923979", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1923979" }, { "category": "external", "summary": "1927373", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1927373" }, { "category": "external", "summary": "1931376", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1931376" }, { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/data/csaf/v2/advisories/2021/rhsa-2021_0799.json" } ], "title": "Red Hat Security Advisory: OpenShift Virtualization 2.6.0 security and bug fix update", "tracking": { "current_release_date": "2024-09-18T04:27:31+00:00", "generator": { "date": "2024-09-18T04:27:31+00:00", "engine": { "name": "Red Hat SDEngine", "version": "3.33.3" } }, "id": "RHSA-2021:0799", "initial_release_date": "2021-03-10T11:41:12+00:00", "revision_history": [ { "date": "2021-03-10T11:41:12+00:00", "number": "1", "summary": "Initial version" }, { "date": "2021-03-10T11:41:12+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-09-18T04:27:31+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "CNV 2.6 for RHEL 8", "product": { "name": "CNV 2.6 for RHEL 8", "product_id": "8Base-CNV-2.6", "product_identification_helper": { "cpe": "cpe:/a:redhat:container_native_virtualization:2.6::el8" } } } ], "category": "product_family", "name": "OpenShift Virtualization" }, { "branches": [ { "category": "product_version", "name": "container-native-virtualization/kubevirt-cpu-model-nfd-plugin@sha256:efb152ddc837945aad0163f96c9668cbb8271c2b14716b9fef5b798c27efbe48_amd64", "product": { "name": "container-native-virtualization/kubevirt-cpu-model-nfd-plugin@sha256:efb152ddc837945aad0163f96c9668cbb8271c2b14716b9fef5b798c27efbe48_amd64", "product_id": "container-native-virtualization/kubevirt-cpu-model-nfd-plugin@sha256:efb152ddc837945aad0163f96c9668cbb8271c2b14716b9fef5b798c27efbe48_amd64", "product_identification_helper": { "purl": "pkg:oci/kubevirt-cpu-model-nfd-plugin@sha256:efb152ddc837945aad0163f96c9668cbb8271c2b14716b9fef5b798c27efbe48?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/kubevirt-cpu-model-nfd-plugin\u0026tag=v2.6.0-9" } } }, { "category": "product_version", "name": "container-native-virtualization/kubevirt-cpu-node-labeller@sha256:2b78b4854b18e53e388d2d30bf68803e39f8fbc9a0b3713885081af25abfb3f1_amd64", "product": { "name": "container-native-virtualization/kubevirt-cpu-node-labeller@sha256:2b78b4854b18e53e388d2d30bf68803e39f8fbc9a0b3713885081af25abfb3f1_amd64", "product_id": "container-native-virtualization/kubevirt-cpu-node-labeller@sha256:2b78b4854b18e53e388d2d30bf68803e39f8fbc9a0b3713885081af25abfb3f1_amd64", "product_identification_helper": { "purl": "pkg:oci/kubevirt-cpu-node-labeller@sha256:2b78b4854b18e53e388d2d30bf68803e39f8fbc9a0b3713885081af25abfb3f1?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/kubevirt-cpu-node-labeller\u0026tag=v2.6.0-7" } } }, { "category": "product_version", "name": "container-native-virtualization/kubevirt-kvm-info-nfd-plugin@sha256:2dcf59515b784d6decf484c1d756d5ddf4b65a38e78800a76ef1dab51020e553_amd64", "product": { "name": "container-native-virtualization/kubevirt-kvm-info-nfd-plugin@sha256:2dcf59515b784d6decf484c1d756d5ddf4b65a38e78800a76ef1dab51020e553_amd64", "product_id": "container-native-virtualization/kubevirt-kvm-info-nfd-plugin@sha256:2dcf59515b784d6decf484c1d756d5ddf4b65a38e78800a76ef1dab51020e553_amd64", "product_identification_helper": { "purl": "pkg:oci/kubevirt-kvm-info-nfd-plugin@sha256:2dcf59515b784d6decf484c1d756d5ddf4b65a38e78800a76ef1dab51020e553?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/kubevirt-kvm-info-nfd-plugin\u0026tag=v2.6.0-7" } } }, { "category": "product_version", "name": "container-native-virtualization/vm-import-controller-rhel8@sha256:ad9c84b90577d32229b803f7b8d014f39f517d0961de46de972fce3801fdfdc8_amd64", "product": { "name": "container-native-virtualization/vm-import-controller-rhel8@sha256:ad9c84b90577d32229b803f7b8d014f39f517d0961de46de972fce3801fdfdc8_amd64", "product_id": "container-native-virtualization/vm-import-controller-rhel8@sha256:ad9c84b90577d32229b803f7b8d014f39f517d0961de46de972fce3801fdfdc8_amd64", "product_identification_helper": { "purl": "pkg:oci/vm-import-controller-rhel8@sha256:ad9c84b90577d32229b803f7b8d014f39f517d0961de46de972fce3801fdfdc8?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/vm-import-controller-rhel8\u0026tag=v2.6.0-25" } } }, { "category": "product_version", "name": "container-native-virtualization/vm-import-controller@sha256:ad9c84b90577d32229b803f7b8d014f39f517d0961de46de972fce3801fdfdc8_amd64", "product": { "name": "container-native-virtualization/vm-import-controller@sha256:ad9c84b90577d32229b803f7b8d014f39f517d0961de46de972fce3801fdfdc8_amd64", "product_id": "container-native-virtualization/vm-import-controller@sha256:ad9c84b90577d32229b803f7b8d014f39f517d0961de46de972fce3801fdfdc8_amd64", "product_identification_helper": { "purl": "pkg:oci/vm-import-controller@sha256:ad9c84b90577d32229b803f7b8d014f39f517d0961de46de972fce3801fdfdc8?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/vm-import-controller\u0026tag=v2.6.0-25" } } } ], "category": "architecture", "name": "amd64" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/kubevirt-cpu-model-nfd-plugin@sha256:efb152ddc837945aad0163f96c9668cbb8271c2b14716b9fef5b798c27efbe48_amd64 as a component of CNV 2.6 for RHEL 8", "product_id": "8Base-CNV-2.6:container-native-virtualization/kubevirt-cpu-model-nfd-plugin@sha256:efb152ddc837945aad0163f96c9668cbb8271c2b14716b9fef5b798c27efbe48_amd64" }, "product_reference": "container-native-virtualization/kubevirt-cpu-model-nfd-plugin@sha256:efb152ddc837945aad0163f96c9668cbb8271c2b14716b9fef5b798c27efbe48_amd64", "relates_to_product_reference": "8Base-CNV-2.6" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/kubevirt-cpu-node-labeller@sha256:2b78b4854b18e53e388d2d30bf68803e39f8fbc9a0b3713885081af25abfb3f1_amd64 as a component of CNV 2.6 for RHEL 8", "product_id": "8Base-CNV-2.6:container-native-virtualization/kubevirt-cpu-node-labeller@sha256:2b78b4854b18e53e388d2d30bf68803e39f8fbc9a0b3713885081af25abfb3f1_amd64" }, "product_reference": "container-native-virtualization/kubevirt-cpu-node-labeller@sha256:2b78b4854b18e53e388d2d30bf68803e39f8fbc9a0b3713885081af25abfb3f1_amd64", "relates_to_product_reference": "8Base-CNV-2.6" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/kubevirt-kvm-info-nfd-plugin@sha256:2dcf59515b784d6decf484c1d756d5ddf4b65a38e78800a76ef1dab51020e553_amd64 as a component of CNV 2.6 for RHEL 8", "product_id": "8Base-CNV-2.6:container-native-virtualization/kubevirt-kvm-info-nfd-plugin@sha256:2dcf59515b784d6decf484c1d756d5ddf4b65a38e78800a76ef1dab51020e553_amd64" }, "product_reference": "container-native-virtualization/kubevirt-kvm-info-nfd-plugin@sha256:2dcf59515b784d6decf484c1d756d5ddf4b65a38e78800a76ef1dab51020e553_amd64", "relates_to_product_reference": "8Base-CNV-2.6" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/vm-import-controller-rhel8@sha256:ad9c84b90577d32229b803f7b8d014f39f517d0961de46de972fce3801fdfdc8_amd64 as a component of CNV 2.6 for RHEL 8", "product_id": "8Base-CNV-2.6:container-native-virtualization/vm-import-controller-rhel8@sha256:ad9c84b90577d32229b803f7b8d014f39f517d0961de46de972fce3801fdfdc8_amd64" }, "product_reference": "container-native-virtualization/vm-import-controller-rhel8@sha256:ad9c84b90577d32229b803f7b8d014f39f517d0961de46de972fce3801fdfdc8_amd64", "relates_to_product_reference": "8Base-CNV-2.6" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/vm-import-controller@sha256:ad9c84b90577d32229b803f7b8d014f39f517d0961de46de972fce3801fdfdc8_amd64 as a component of CNV 2.6 for RHEL 8", "product_id": "8Base-CNV-2.6:container-native-virtualization/vm-import-controller@sha256:ad9c84b90577d32229b803f7b8d014f39f517d0961de46de972fce3801fdfdc8_amd64" }, "product_reference": "container-native-virtualization/vm-import-controller@sha256:ad9c84b90577d32229b803f7b8d014f39f517d0961de46de972fce3801fdfdc8_amd64", "relates_to_product_reference": "8Base-CNV-2.6" } ] }, "vulnerabilities": [ { "cve": "CVE-2020-9283", "cwe": { "id": "CWE-130", "name": "Improper Handling of Length Parameter Inconsistency" }, "discovery_date": "2020-02-19T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1804533" } ], "notes": [ { "category": "description", "text": "A denial of service vulnerability was found in the SSH package of the golang.org/x/crypto library. An attacker could exploit this flaw by supplying crafted SSH ed25519 keys to cause a crash in applications that use this package as either an SSH client or server.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang.org/x/crypto: Processing of crafted ssh-ed25519 public keys allows for panic", "title": "Vulnerability summary" }, { "category": "other", "text": "OpenShift Container Platform uses the vulnerable library in a number of components but strictly as an SSH client. The severity of this vulnerability is reduced for clients as it requires connections to malicious SSH servers, with the maximum impact only a client crash. This vulnerability is rated Low for OpenShift Container Platform.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-CNV-2.6:container-native-virtualization/kubevirt-cpu-model-nfd-plugin@sha256:efb152ddc837945aad0163f96c9668cbb8271c2b14716b9fef5b798c27efbe48_amd64", "8Base-CNV-2.6:container-native-virtualization/kubevirt-cpu-node-labeller@sha256:2b78b4854b18e53e388d2d30bf68803e39f8fbc9a0b3713885081af25abfb3f1_amd64", "8Base-CNV-2.6:container-native-virtualization/kubevirt-kvm-info-nfd-plugin@sha256:2dcf59515b784d6decf484c1d756d5ddf4b65a38e78800a76ef1dab51020e553_amd64", "8Base-CNV-2.6:container-native-virtualization/vm-import-controller-rhel8@sha256:ad9c84b90577d32229b803f7b8d014f39f517d0961de46de972fce3801fdfdc8_amd64", "8Base-CNV-2.6:container-native-virtualization/vm-import-controller@sha256:ad9c84b90577d32229b803f7b8d014f39f517d0961de46de972fce3801fdfdc8_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-9283" }, { "category": "external", "summary": "RHBZ#1804533", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1804533" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-9283", "url": "https://www.cve.org/CVERecord?id=CVE-2020-9283" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-9283", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-9283" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/golang-announce/3L45YRc91SY", "url": "https://groups.google.com/forum/#!topic/golang-announce/3L45YRc91SY" } ], "release_date": "2020-02-21T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "8Base-CNV-2.6:container-native-virtualization/kubevirt-cpu-model-nfd-plugin@sha256:efb152ddc837945aad0163f96c9668cbb8271c2b14716b9fef5b798c27efbe48_amd64", "8Base-CNV-2.6:container-native-virtualization/kubevirt-cpu-node-labeller@sha256:2b78b4854b18e53e388d2d30bf68803e39f8fbc9a0b3713885081af25abfb3f1_amd64", "8Base-CNV-2.6:container-native-virtualization/kubevirt-kvm-info-nfd-plugin@sha256:2dcf59515b784d6decf484c1d756d5ddf4b65a38e78800a76ef1dab51020e553_amd64", "8Base-CNV-2.6:container-native-virtualization/vm-import-controller-rhel8@sha256:ad9c84b90577d32229b803f7b8d014f39f517d0961de46de972fce3801fdfdc8_amd64", "8Base-CNV-2.6:container-native-virtualization/vm-import-controller@sha256:ad9c84b90577d32229b803f7b8d014f39f517d0961de46de972fce3801fdfdc8_amd64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:0799" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "8Base-CNV-2.6:container-native-virtualization/kubevirt-cpu-model-nfd-plugin@sha256:efb152ddc837945aad0163f96c9668cbb8271c2b14716b9fef5b798c27efbe48_amd64", "8Base-CNV-2.6:container-native-virtualization/kubevirt-cpu-node-labeller@sha256:2b78b4854b18e53e388d2d30bf68803e39f8fbc9a0b3713885081af25abfb3f1_amd64", "8Base-CNV-2.6:container-native-virtualization/kubevirt-kvm-info-nfd-plugin@sha256:2dcf59515b784d6decf484c1d756d5ddf4b65a38e78800a76ef1dab51020e553_amd64", "8Base-CNV-2.6:container-native-virtualization/vm-import-controller-rhel8@sha256:ad9c84b90577d32229b803f7b8d014f39f517d0961de46de972fce3801fdfdc8_amd64", "8Base-CNV-2.6:container-native-virtualization/vm-import-controller@sha256:ad9c84b90577d32229b803f7b8d014f39f517d0961de46de972fce3801fdfdc8_amd64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "golang.org/x/crypto: Processing of crafted ssh-ed25519 public keys allows for panic" }, { "cve": "CVE-2020-14040", "cwe": { "id": "CWE-835", "name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)" }, "discovery_date": "2020-06-17T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1853652" } ], "notes": [ { "category": "description", "text": "A denial of service vulnerability was found in the golang.org/x/text library. A library or application must use one of the vulnerable functions, such as unicode.Transform, transform.String, or transform.Byte, to be susceptible to this vulnerability. If an attacker is able to supply specific characters or strings to the vulnerable application, there is the potential to cause an infinite loop to occur using more memory, resulting in a denial of service.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang.org/x/text: possibility to trigger an infinite loop in encoding/unicode could lead to crash", "title": "Vulnerability summary" }, { "category": "other", "text": "* OpenShift ServiceMesh (OSSM) 1.0 is Out Of Support Scope (OOSS) for Moderate and Low impact vulnerabilities. Jaeger was packaged with ServiceMesh in 1.0, and hence is also marked OOSS, but the Jaeger-Operator is a standalone product and is affected by this vulnerability.\n\n* Because Service Telemetry Framework does not directly use unicode.UTF16, no update will be provided at this time for STF\u0027s sg-core-container.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-CNV-2.6:container-native-virtualization/kubevirt-cpu-model-nfd-plugin@sha256:efb152ddc837945aad0163f96c9668cbb8271c2b14716b9fef5b798c27efbe48_amd64", "8Base-CNV-2.6:container-native-virtualization/kubevirt-cpu-node-labeller@sha256:2b78b4854b18e53e388d2d30bf68803e39f8fbc9a0b3713885081af25abfb3f1_amd64", "8Base-CNV-2.6:container-native-virtualization/kubevirt-kvm-info-nfd-plugin@sha256:2dcf59515b784d6decf484c1d756d5ddf4b65a38e78800a76ef1dab51020e553_amd64", "8Base-CNV-2.6:container-native-virtualization/vm-import-controller-rhel8@sha256:ad9c84b90577d32229b803f7b8d014f39f517d0961de46de972fce3801fdfdc8_amd64", "8Base-CNV-2.6:container-native-virtualization/vm-import-controller@sha256:ad9c84b90577d32229b803f7b8d014f39f517d0961de46de972fce3801fdfdc8_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-14040" }, { "category": "external", "summary": "RHBZ#1853652", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1853652" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-14040", "url": "https://www.cve.org/CVERecord?id=CVE-2020-14040" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-14040", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-14040" }, { "category": "external", "summary": "https://github.com/golang/go/issues/39491", "url": "https://github.com/golang/go/issues/39491" }, { "category": "external", "summary": "https://groups.google.com/forum/#!topic/golang-announce/bXVeAmGOqz0", "url": "https://groups.google.com/forum/#!topic/golang-announce/bXVeAmGOqz0" } ], "release_date": "2020-06-17T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "8Base-CNV-2.6:container-native-virtualization/kubevirt-cpu-model-nfd-plugin@sha256:efb152ddc837945aad0163f96c9668cbb8271c2b14716b9fef5b798c27efbe48_amd64", "8Base-CNV-2.6:container-native-virtualization/kubevirt-cpu-node-labeller@sha256:2b78b4854b18e53e388d2d30bf68803e39f8fbc9a0b3713885081af25abfb3f1_amd64", "8Base-CNV-2.6:container-native-virtualization/kubevirt-kvm-info-nfd-plugin@sha256:2dcf59515b784d6decf484c1d756d5ddf4b65a38e78800a76ef1dab51020e553_amd64", "8Base-CNV-2.6:container-native-virtualization/vm-import-controller-rhel8@sha256:ad9c84b90577d32229b803f7b8d014f39f517d0961de46de972fce3801fdfdc8_amd64", "8Base-CNV-2.6:container-native-virtualization/vm-import-controller@sha256:ad9c84b90577d32229b803f7b8d014f39f517d0961de46de972fce3801fdfdc8_amd64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:0799" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "8Base-CNV-2.6:container-native-virtualization/kubevirt-cpu-model-nfd-plugin@sha256:efb152ddc837945aad0163f96c9668cbb8271c2b14716b9fef5b798c27efbe48_amd64", "8Base-CNV-2.6:container-native-virtualization/kubevirt-cpu-node-labeller@sha256:2b78b4854b18e53e388d2d30bf68803e39f8fbc9a0b3713885081af25abfb3f1_amd64", "8Base-CNV-2.6:container-native-virtualization/kubevirt-kvm-info-nfd-plugin@sha256:2dcf59515b784d6decf484c1d756d5ddf4b65a38e78800a76ef1dab51020e553_amd64", "8Base-CNV-2.6:container-native-virtualization/vm-import-controller-rhel8@sha256:ad9c84b90577d32229b803f7b8d014f39f517d0961de46de972fce3801fdfdc8_amd64", "8Base-CNV-2.6:container-native-virtualization/vm-import-controller@sha256:ad9c84b90577d32229b803f7b8d014f39f517d0961de46de972fce3801fdfdc8_amd64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang.org/x/text: possibility to trigger an infinite loop in encoding/unicode could lead to crash" }, { "cve": "CVE-2020-15586", "cwe": { "id": "CWE-362", "name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)" }, "discovery_date": "2020-07-14T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1856953" } ], "notes": [ { "category": "description", "text": "A flaw was found Go\u0027s net/http package. Servers using ReverseProxy from net/http in the Go standard library are vulnerable to a data race that results in a denial of service. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: data race in certain net/http servers including ReverseProxy can lead to DoS", "title": "Vulnerability summary" }, { "category": "other", "text": "OpenShift Container Platform (OCP) components are primarily written in Go, meaning that any component using the net/http package includes the vulnerable code. OCP server endpoints using ReverseProxy are protected by authentication, reducing the severity of this vulnerability to Low for OCP.\n\nSimilar to OCP, OpenShift ServiceMesh (OSSM), RedHat OpenShift Jaeger (RHOSJ) and OpenShift Virtualization are also primarily written in Go and are protected via authentication, reducing the severity of this vulnerability to Low.\n\nRed Hat Gluster Storage 3 and Red Hat Openshift Container Storage 4 components are built with the affected version of Go, however the vulnerable functionality is currently not used by these products and hence this issue has been rated as having a security impact of Low.\n\nRed Hat Ceph Storage 3 and 4 components are built with the affected version of Go, however the vulnerable functionality is currently not used by these products and hence this issue has been rated as having a security impact of Low.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-CNV-2.6:container-native-virtualization/kubevirt-cpu-model-nfd-plugin@sha256:efb152ddc837945aad0163f96c9668cbb8271c2b14716b9fef5b798c27efbe48_amd64", "8Base-CNV-2.6:container-native-virtualization/kubevirt-cpu-node-labeller@sha256:2b78b4854b18e53e388d2d30bf68803e39f8fbc9a0b3713885081af25abfb3f1_amd64", "8Base-CNV-2.6:container-native-virtualization/kubevirt-kvm-info-nfd-plugin@sha256:2dcf59515b784d6decf484c1d756d5ddf4b65a38e78800a76ef1dab51020e553_amd64", "8Base-CNV-2.6:container-native-virtualization/vm-import-controller-rhel8@sha256:ad9c84b90577d32229b803f7b8d014f39f517d0961de46de972fce3801fdfdc8_amd64", "8Base-CNV-2.6:container-native-virtualization/vm-import-controller@sha256:ad9c84b90577d32229b803f7b8d014f39f517d0961de46de972fce3801fdfdc8_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-15586" }, { "category": "external", "summary": "RHBZ#1856953", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1856953" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-15586", "url": "https://www.cve.org/CVERecord?id=CVE-2020-15586" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-15586", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-15586" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/XZNfaiwgt2w/m/E6gHDs32AQAJ", "url": "https://groups.google.com/g/golang-announce/c/XZNfaiwgt2w/m/E6gHDs32AQAJ" } ], "release_date": "2020-07-14T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "8Base-CNV-2.6:container-native-virtualization/kubevirt-cpu-model-nfd-plugin@sha256:efb152ddc837945aad0163f96c9668cbb8271c2b14716b9fef5b798c27efbe48_amd64", "8Base-CNV-2.6:container-native-virtualization/kubevirt-cpu-node-labeller@sha256:2b78b4854b18e53e388d2d30bf68803e39f8fbc9a0b3713885081af25abfb3f1_amd64", "8Base-CNV-2.6:container-native-virtualization/kubevirt-kvm-info-nfd-plugin@sha256:2dcf59515b784d6decf484c1d756d5ddf4b65a38e78800a76ef1dab51020e553_amd64", "8Base-CNV-2.6:container-native-virtualization/vm-import-controller-rhel8@sha256:ad9c84b90577d32229b803f7b8d014f39f517d0961de46de972fce3801fdfdc8_amd64", "8Base-CNV-2.6:container-native-virtualization/vm-import-controller@sha256:ad9c84b90577d32229b803f7b8d014f39f517d0961de46de972fce3801fdfdc8_amd64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:0799" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 5.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "8Base-CNV-2.6:container-native-virtualization/kubevirt-cpu-model-nfd-plugin@sha256:efb152ddc837945aad0163f96c9668cbb8271c2b14716b9fef5b798c27efbe48_amd64", "8Base-CNV-2.6:container-native-virtualization/kubevirt-cpu-node-labeller@sha256:2b78b4854b18e53e388d2d30bf68803e39f8fbc9a0b3713885081af25abfb3f1_amd64", "8Base-CNV-2.6:container-native-virtualization/kubevirt-kvm-info-nfd-plugin@sha256:2dcf59515b784d6decf484c1d756d5ddf4b65a38e78800a76ef1dab51020e553_amd64", "8Base-CNV-2.6:container-native-virtualization/vm-import-controller-rhel8@sha256:ad9c84b90577d32229b803f7b8d014f39f517d0961de46de972fce3801fdfdc8_amd64", "8Base-CNV-2.6:container-native-virtualization/vm-import-controller@sha256:ad9c84b90577d32229b803f7b8d014f39f517d0961de46de972fce3801fdfdc8_amd64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang: data race in certain net/http servers including ReverseProxy can lead to DoS" }, { "cve": "CVE-2020-16845", "cwe": { "id": "CWE-835", "name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)" }, "discovery_date": "2020-08-07T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1867099" } ], "notes": [ { "category": "description", "text": "A flaw was found in the Go encoding/binary package. Certain invalid inputs to the ReadUvarint or the ReadVarint causes those functions to read an unlimited number of bytes from the ByteReader argument before returning an error. This flaw possibly leads to processing more input than expected. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: ReadUvarint and ReadVarint can read an unlimited number of bytes from invalid inputs", "title": "Vulnerability summary" }, { "category": "other", "text": "OpenShift Container Platform (OCP), OpenShift ServiceMesh (OSSM), RedHat OpenShift Jaeger (RHOSJ) and OpenShift Virtualization components are primarily written in Go, meaning that any component using the encoding/binary package includes the vulnerable code. The affected components are behind OpenShift OAuth authentication, therefore the impact is low.\n\nRed Hat Gluster Storage 3, Red Hat OpenShift Container Storage 4 and Red Hat Ceph Storage (3 and 4) components are built with the affected version of Go, however the vulnerable functionality is currently not used by these products and hence this issue has been rated as having a security impact of Low.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-CNV-2.6:container-native-virtualization/kubevirt-cpu-model-nfd-plugin@sha256:efb152ddc837945aad0163f96c9668cbb8271c2b14716b9fef5b798c27efbe48_amd64", "8Base-CNV-2.6:container-native-virtualization/kubevirt-cpu-node-labeller@sha256:2b78b4854b18e53e388d2d30bf68803e39f8fbc9a0b3713885081af25abfb3f1_amd64", "8Base-CNV-2.6:container-native-virtualization/kubevirt-kvm-info-nfd-plugin@sha256:2dcf59515b784d6decf484c1d756d5ddf4b65a38e78800a76ef1dab51020e553_amd64", "8Base-CNV-2.6:container-native-virtualization/vm-import-controller-rhel8@sha256:ad9c84b90577d32229b803f7b8d014f39f517d0961de46de972fce3801fdfdc8_amd64", "8Base-CNV-2.6:container-native-virtualization/vm-import-controller@sha256:ad9c84b90577d32229b803f7b8d014f39f517d0961de46de972fce3801fdfdc8_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-16845" }, { "category": "external", "summary": "RHBZ#1867099", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1867099" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-16845", "url": "https://www.cve.org/CVERecord?id=CVE-2020-16845" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-16845", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-16845" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/NyPIaucMgXo", "url": "https://groups.google.com/g/golang-announce/c/NyPIaucMgXo" } ], "release_date": "2020-08-06T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "8Base-CNV-2.6:container-native-virtualization/kubevirt-cpu-model-nfd-plugin@sha256:efb152ddc837945aad0163f96c9668cbb8271c2b14716b9fef5b798c27efbe48_amd64", "8Base-CNV-2.6:container-native-virtualization/kubevirt-cpu-node-labeller@sha256:2b78b4854b18e53e388d2d30bf68803e39f8fbc9a0b3713885081af25abfb3f1_amd64", "8Base-CNV-2.6:container-native-virtualization/kubevirt-kvm-info-nfd-plugin@sha256:2dcf59515b784d6decf484c1d756d5ddf4b65a38e78800a76ef1dab51020e553_amd64", "8Base-CNV-2.6:container-native-virtualization/vm-import-controller-rhel8@sha256:ad9c84b90577d32229b803f7b8d014f39f517d0961de46de972fce3801fdfdc8_amd64", "8Base-CNV-2.6:container-native-virtualization/vm-import-controller@sha256:ad9c84b90577d32229b803f7b8d014f39f517d0961de46de972fce3801fdfdc8_amd64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:0799" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "8Base-CNV-2.6:container-native-virtualization/kubevirt-cpu-model-nfd-plugin@sha256:efb152ddc837945aad0163f96c9668cbb8271c2b14716b9fef5b798c27efbe48_amd64", "8Base-CNV-2.6:container-native-virtualization/kubevirt-cpu-node-labeller@sha256:2b78b4854b18e53e388d2d30bf68803e39f8fbc9a0b3713885081af25abfb3f1_amd64", "8Base-CNV-2.6:container-native-virtualization/kubevirt-kvm-info-nfd-plugin@sha256:2dcf59515b784d6decf484c1d756d5ddf4b65a38e78800a76ef1dab51020e553_amd64", "8Base-CNV-2.6:container-native-virtualization/vm-import-controller-rhel8@sha256:ad9c84b90577d32229b803f7b8d014f39f517d0961de46de972fce3801fdfdc8_amd64", "8Base-CNV-2.6:container-native-virtualization/vm-import-controller@sha256:ad9c84b90577d32229b803f7b8d014f39f517d0961de46de972fce3801fdfdc8_amd64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang: ReadUvarint and ReadVarint can read an unlimited number of bytes from invalid inputs" }, { "cve": "CVE-2020-26160", "cwe": { "id": "CWE-284", "name": "Improper Access Control" }, "discovery_date": "2020-09-23T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1883371" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in jwt-go where it is vulnerable to Access Restriction Bypass if m[\"aud\"] happens to be []string{}, as allowed by the spec, the type assertion fails and the value of aud is \"\". This can cause audience verification to succeed even if the audiences being passed are incorrect if required is set to false.", "title": "Vulnerability description" }, { "category": "summary", "text": "jwt-go: access restriction bypass vulnerability", "title": "Vulnerability summary" }, { "category": "other", "text": "The github.com/dgrijalva/jwt-go module is an indirect dependency of the k8s.io/client-go module pulled into Quay Bridge, and Setup operators via the Operator\u0027s SDK generated code. The k8s.io/client-go module does not use jwt-go in an unsafe way [1]. Red Hat Quay components have been marked as wontfix. This may be fixed in the future.\n\nSimilar to Quay, multiple OpenShift Container Platform (OCP) containers include jwt-go as a transient dependency due to go-autorest [1]. As such, those containers do not use jwt-go in an unsafe way. They have been marked wontfix at this time and may be fixed in a future update.\n\nSame as Quay and OpenShift Container Platform, components shipped with Red Hat OpenShift Container Storage 4 do not use jwt-go in an unsafe way and hence this issue has been rated as having a security impact of Low. A future update may address this issue.\n\nRed Hat Gluster Storage 3 shipped multi-cloud-object-gateway-cli as a technical preview and is not currently planned to be addressed in future updates, hence the multi-cloud-object-gateway-cli package will not be fixed.\n\n[1] https://github.com/Azure/go-autorest/issues/568#issuecomment-703804062", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-CNV-2.6:container-native-virtualization/kubevirt-cpu-model-nfd-plugin@sha256:efb152ddc837945aad0163f96c9668cbb8271c2b14716b9fef5b798c27efbe48_amd64", "8Base-CNV-2.6:container-native-virtualization/kubevirt-cpu-node-labeller@sha256:2b78b4854b18e53e388d2d30bf68803e39f8fbc9a0b3713885081af25abfb3f1_amd64", "8Base-CNV-2.6:container-native-virtualization/kubevirt-kvm-info-nfd-plugin@sha256:2dcf59515b784d6decf484c1d756d5ddf4b65a38e78800a76ef1dab51020e553_amd64", "8Base-CNV-2.6:container-native-virtualization/vm-import-controller-rhel8@sha256:ad9c84b90577d32229b803f7b8d014f39f517d0961de46de972fce3801fdfdc8_amd64", "8Base-CNV-2.6:container-native-virtualization/vm-import-controller@sha256:ad9c84b90577d32229b803f7b8d014f39f517d0961de46de972fce3801fdfdc8_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-26160" }, { "category": "external", "summary": "RHBZ#1883371", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1883371" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-26160", "url": "https://www.cve.org/CVERecord?id=CVE-2020-26160" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-26160", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-26160" }, { "category": "external", "summary": "https://snyk.io/vuln/SNYK-GOLANG-GITHUBCOMDGRIJALVAJWTGO-596515", "url": "https://snyk.io/vuln/SNYK-GOLANG-GITHUBCOMDGRIJALVAJWTGO-596515" } ], "release_date": "2020-09-15T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "8Base-CNV-2.6:container-native-virtualization/kubevirt-cpu-model-nfd-plugin@sha256:efb152ddc837945aad0163f96c9668cbb8271c2b14716b9fef5b798c27efbe48_amd64", "8Base-CNV-2.6:container-native-virtualization/kubevirt-cpu-node-labeller@sha256:2b78b4854b18e53e388d2d30bf68803e39f8fbc9a0b3713885081af25abfb3f1_amd64", "8Base-CNV-2.6:container-native-virtualization/kubevirt-kvm-info-nfd-plugin@sha256:2dcf59515b784d6decf484c1d756d5ddf4b65a38e78800a76ef1dab51020e553_amd64", "8Base-CNV-2.6:container-native-virtualization/vm-import-controller-rhel8@sha256:ad9c84b90577d32229b803f7b8d014f39f517d0961de46de972fce3801fdfdc8_amd64", "8Base-CNV-2.6:container-native-virtualization/vm-import-controller@sha256:ad9c84b90577d32229b803f7b8d014f39f517d0961de46de972fce3801fdfdc8_amd64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:0799" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "8Base-CNV-2.6:container-native-virtualization/kubevirt-cpu-model-nfd-plugin@sha256:efb152ddc837945aad0163f96c9668cbb8271c2b14716b9fef5b798c27efbe48_amd64", "8Base-CNV-2.6:container-native-virtualization/kubevirt-cpu-node-labeller@sha256:2b78b4854b18e53e388d2d30bf68803e39f8fbc9a0b3713885081af25abfb3f1_amd64", "8Base-CNV-2.6:container-native-virtualization/kubevirt-kvm-info-nfd-plugin@sha256:2dcf59515b784d6decf484c1d756d5ddf4b65a38e78800a76ef1dab51020e553_amd64", "8Base-CNV-2.6:container-native-virtualization/vm-import-controller-rhel8@sha256:ad9c84b90577d32229b803f7b8d014f39f517d0961de46de972fce3801fdfdc8_amd64", "8Base-CNV-2.6:container-native-virtualization/vm-import-controller@sha256:ad9c84b90577d32229b803f7b8d014f39f517d0961de46de972fce3801fdfdc8_amd64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "jwt-go: access restriction bypass vulnerability" }, { "cve": "CVE-2020-27813", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2020-11-27T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1902111" } ], "notes": [ { "category": "description", "text": "An integer overflow vulnerability exists with the length of websocket frames received via a websocket connection. An attacker could use this flaw to cause a denial of service attack on an HTTP Server allowing websocket connections.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang-github-gorilla-websocket: integer overflow leads to denial of service", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-CNV-2.6:container-native-virtualization/kubevirt-cpu-model-nfd-plugin@sha256:efb152ddc837945aad0163f96c9668cbb8271c2b14716b9fef5b798c27efbe48_amd64", "8Base-CNV-2.6:container-native-virtualization/kubevirt-cpu-node-labeller@sha256:2b78b4854b18e53e388d2d30bf68803e39f8fbc9a0b3713885081af25abfb3f1_amd64", "8Base-CNV-2.6:container-native-virtualization/kubevirt-kvm-info-nfd-plugin@sha256:2dcf59515b784d6decf484c1d756d5ddf4b65a38e78800a76ef1dab51020e553_amd64", "8Base-CNV-2.6:container-native-virtualization/vm-import-controller-rhel8@sha256:ad9c84b90577d32229b803f7b8d014f39f517d0961de46de972fce3801fdfdc8_amd64", "8Base-CNV-2.6:container-native-virtualization/vm-import-controller@sha256:ad9c84b90577d32229b803f7b8d014f39f517d0961de46de972fce3801fdfdc8_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-27813" }, { "category": "external", "summary": "RHBZ#1902111", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1902111" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-27813", "url": "https://www.cve.org/CVERecord?id=CVE-2020-27813" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-27813", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-27813" }, { "category": "external", "summary": "https://github.com/gorilla/websocket/security/advisories/GHSA-jf24-p9p9-4rjh", "url": "https://github.com/gorilla/websocket/security/advisories/GHSA-jf24-p9p9-4rjh" } ], "release_date": "2019-08-25T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "8Base-CNV-2.6:container-native-virtualization/kubevirt-cpu-model-nfd-plugin@sha256:efb152ddc837945aad0163f96c9668cbb8271c2b14716b9fef5b798c27efbe48_amd64", "8Base-CNV-2.6:container-native-virtualization/kubevirt-cpu-node-labeller@sha256:2b78b4854b18e53e388d2d30bf68803e39f8fbc9a0b3713885081af25abfb3f1_amd64", "8Base-CNV-2.6:container-native-virtualization/kubevirt-kvm-info-nfd-plugin@sha256:2dcf59515b784d6decf484c1d756d5ddf4b65a38e78800a76ef1dab51020e553_amd64", "8Base-CNV-2.6:container-native-virtualization/vm-import-controller-rhel8@sha256:ad9c84b90577d32229b803f7b8d014f39f517d0961de46de972fce3801fdfdc8_amd64", "8Base-CNV-2.6:container-native-virtualization/vm-import-controller@sha256:ad9c84b90577d32229b803f7b8d014f39f517d0961de46de972fce3801fdfdc8_amd64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:0799" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "8Base-CNV-2.6:container-native-virtualization/kubevirt-cpu-model-nfd-plugin@sha256:efb152ddc837945aad0163f96c9668cbb8271c2b14716b9fef5b798c27efbe48_amd64", "8Base-CNV-2.6:container-native-virtualization/kubevirt-cpu-node-labeller@sha256:2b78b4854b18e53e388d2d30bf68803e39f8fbc9a0b3713885081af25abfb3f1_amd64", "8Base-CNV-2.6:container-native-virtualization/kubevirt-kvm-info-nfd-plugin@sha256:2dcf59515b784d6decf484c1d756d5ddf4b65a38e78800a76ef1dab51020e553_amd64", "8Base-CNV-2.6:container-native-virtualization/vm-import-controller-rhel8@sha256:ad9c84b90577d32229b803f7b8d014f39f517d0961de46de972fce3801fdfdc8_amd64", "8Base-CNV-2.6:container-native-virtualization/vm-import-controller@sha256:ad9c84b90577d32229b803f7b8d014f39f517d0961de46de972fce3801fdfdc8_amd64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang-github-gorilla-websocket: integer overflow leads to denial of service" }, { "cve": "CVE-2020-28362", "cwe": { "id": "CWE-295", "name": "Improper Certificate Validation" }, "discovery_date": "2020-11-12T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1897635" } ], "notes": [ { "category": "description", "text": "A flaw was found in the math/big package of Go\u0027s standard library that causes a denial of service. Applications written in Go that use math/big via cryptographic packages, including crypto/rsa and crypto/x509, are vulnerable and can potentially cause panic via a crafted certificate chain. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: math/big: panic during recursive division of very large numbers", "title": "Vulnerability summary" }, { "category": "other", "text": "OpenShift ServiceMesh (OSSM) 1.1 is Out Of Support Scope (OOSS) for Moderate and Low impact vulnerabilities because it is now in the Maintenance Phase of the support.\nOpenshift Virtualization 1 (formerly Container Native Virtualization) is Out Of Support Scope (OOSS) for Moderate and Low impact vulnerabilities.\n\nRed Hat Gluster Storage 3 shipped multi-cloud-object-gateway-cli and noobaa-operator container as a technical preview and is not currently planned to be addressed in future updates.\n\nOpenShift Container Platform (OCP) 4.5 and earlier are built with Go versions earlier than 1.14, which are not affected by this vulnerability. OCP 4.6 is built with Go 1.15 and is affected.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-CNV-2.6:container-native-virtualization/kubevirt-cpu-model-nfd-plugin@sha256:efb152ddc837945aad0163f96c9668cbb8271c2b14716b9fef5b798c27efbe48_amd64", "8Base-CNV-2.6:container-native-virtualization/kubevirt-cpu-node-labeller@sha256:2b78b4854b18e53e388d2d30bf68803e39f8fbc9a0b3713885081af25abfb3f1_amd64", "8Base-CNV-2.6:container-native-virtualization/kubevirt-kvm-info-nfd-plugin@sha256:2dcf59515b784d6decf484c1d756d5ddf4b65a38e78800a76ef1dab51020e553_amd64", "8Base-CNV-2.6:container-native-virtualization/vm-import-controller-rhel8@sha256:ad9c84b90577d32229b803f7b8d014f39f517d0961de46de972fce3801fdfdc8_amd64", "8Base-CNV-2.6:container-native-virtualization/vm-import-controller@sha256:ad9c84b90577d32229b803f7b8d014f39f517d0961de46de972fce3801fdfdc8_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-28362" }, { "category": "external", "summary": "RHBZ#1897635", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1897635" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-28362", "url": "https://www.cve.org/CVERecord?id=CVE-2020-28362" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-28362", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-28362" } ], "release_date": "2020-11-12T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "8Base-CNV-2.6:container-native-virtualization/kubevirt-cpu-model-nfd-plugin@sha256:efb152ddc837945aad0163f96c9668cbb8271c2b14716b9fef5b798c27efbe48_amd64", "8Base-CNV-2.6:container-native-virtualization/kubevirt-cpu-node-labeller@sha256:2b78b4854b18e53e388d2d30bf68803e39f8fbc9a0b3713885081af25abfb3f1_amd64", "8Base-CNV-2.6:container-native-virtualization/kubevirt-kvm-info-nfd-plugin@sha256:2dcf59515b784d6decf484c1d756d5ddf4b65a38e78800a76ef1dab51020e553_amd64", "8Base-CNV-2.6:container-native-virtualization/vm-import-controller-rhel8@sha256:ad9c84b90577d32229b803f7b8d014f39f517d0961de46de972fce3801fdfdc8_amd64", "8Base-CNV-2.6:container-native-virtualization/vm-import-controller@sha256:ad9c84b90577d32229b803f7b8d014f39f517d0961de46de972fce3801fdfdc8_amd64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:0799" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "8Base-CNV-2.6:container-native-virtualization/kubevirt-cpu-model-nfd-plugin@sha256:efb152ddc837945aad0163f96c9668cbb8271c2b14716b9fef5b798c27efbe48_amd64", "8Base-CNV-2.6:container-native-virtualization/kubevirt-cpu-node-labeller@sha256:2b78b4854b18e53e388d2d30bf68803e39f8fbc9a0b3713885081af25abfb3f1_amd64", "8Base-CNV-2.6:container-native-virtualization/kubevirt-kvm-info-nfd-plugin@sha256:2dcf59515b784d6decf484c1d756d5ddf4b65a38e78800a76ef1dab51020e553_amd64", "8Base-CNV-2.6:container-native-virtualization/vm-import-controller-rhel8@sha256:ad9c84b90577d32229b803f7b8d014f39f517d0961de46de972fce3801fdfdc8_amd64", "8Base-CNV-2.6:container-native-virtualization/vm-import-controller@sha256:ad9c84b90577d32229b803f7b8d014f39f517d0961de46de972fce3801fdfdc8_amd64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang: math/big: panic during recursive division of very large numbers" }, { "cve": "CVE-2020-29652", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "discovery_date": "2020-12-17T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1908883" } ], "notes": [ { "category": "description", "text": "A null pointer dereference vulnerability was found in golang. When using the library\u0027s ssh server without specifying an option for GSSAPIWithMICConfig, it is possible for an attacker to craft an ssh client connection using the `gssapi-with-mic` authentication method and cause the server to panic resulting in a denial of service. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: crypto/ssh: crafted authentication request can lead to nil pointer dereference", "title": "Vulnerability summary" }, { "category": "other", "text": "A large number of products include the affected package, but do not make use of the vulnerable SSH server code. Accordingly, the flaw itself is rated as \"Important\", but these products themselves all have a \"Low\" severity rating.\n\nAdditionally, a number of products include golang.org/x/crypto (or even golang.org/x/crypto/ssh/terminal) but not specifically golang.org/x/crypto/ssh/server.go in the final build. As this would result in a very large number of entries of not affected products, only products which include the ssh server code (golang.org/x/crypto/ssh/server.go) have been represented here. \n\nRed Hat Enterprise Linux 8 container-tools:rhel8/containernetworking-plugins is not affected because although it uses some functionality from golang.org/x/crypto, it does not use or import anything from golang.org/x/crypto/ssh/*.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-CNV-2.6:container-native-virtualization/kubevirt-cpu-model-nfd-plugin@sha256:efb152ddc837945aad0163f96c9668cbb8271c2b14716b9fef5b798c27efbe48_amd64", "8Base-CNV-2.6:container-native-virtualization/kubevirt-cpu-node-labeller@sha256:2b78b4854b18e53e388d2d30bf68803e39f8fbc9a0b3713885081af25abfb3f1_amd64", "8Base-CNV-2.6:container-native-virtualization/kubevirt-kvm-info-nfd-plugin@sha256:2dcf59515b784d6decf484c1d756d5ddf4b65a38e78800a76ef1dab51020e553_amd64", "8Base-CNV-2.6:container-native-virtualization/vm-import-controller-rhel8@sha256:ad9c84b90577d32229b803f7b8d014f39f517d0961de46de972fce3801fdfdc8_amd64", "8Base-CNV-2.6:container-native-virtualization/vm-import-controller@sha256:ad9c84b90577d32229b803f7b8d014f39f517d0961de46de972fce3801fdfdc8_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-29652" }, { "category": "external", "summary": "RHBZ#1908883", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1908883" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-29652", "url": "https://www.cve.org/CVERecord?id=CVE-2020-29652" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-29652", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-29652" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/ouZIlBimOsE?pli=1", "url": "https://groups.google.com/g/golang-announce/c/ouZIlBimOsE?pli=1" } ], "release_date": "2020-12-16T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "8Base-CNV-2.6:container-native-virtualization/kubevirt-cpu-model-nfd-plugin@sha256:efb152ddc837945aad0163f96c9668cbb8271c2b14716b9fef5b798c27efbe48_amd64", "8Base-CNV-2.6:container-native-virtualization/kubevirt-cpu-node-labeller@sha256:2b78b4854b18e53e388d2d30bf68803e39f8fbc9a0b3713885081af25abfb3f1_amd64", "8Base-CNV-2.6:container-native-virtualization/kubevirt-kvm-info-nfd-plugin@sha256:2dcf59515b784d6decf484c1d756d5ddf4b65a38e78800a76ef1dab51020e553_amd64", "8Base-CNV-2.6:container-native-virtualization/vm-import-controller-rhel8@sha256:ad9c84b90577d32229b803f7b8d014f39f517d0961de46de972fce3801fdfdc8_amd64", "8Base-CNV-2.6:container-native-virtualization/vm-import-controller@sha256:ad9c84b90577d32229b803f7b8d014f39f517d0961de46de972fce3801fdfdc8_amd64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:0799" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "8Base-CNV-2.6:container-native-virtualization/kubevirt-cpu-model-nfd-plugin@sha256:efb152ddc837945aad0163f96c9668cbb8271c2b14716b9fef5b798c27efbe48_amd64", "8Base-CNV-2.6:container-native-virtualization/kubevirt-cpu-node-labeller@sha256:2b78b4854b18e53e388d2d30bf68803e39f8fbc9a0b3713885081af25abfb3f1_amd64", "8Base-CNV-2.6:container-native-virtualization/kubevirt-kvm-info-nfd-plugin@sha256:2dcf59515b784d6decf484c1d756d5ddf4b65a38e78800a76ef1dab51020e553_amd64", "8Base-CNV-2.6:container-native-virtualization/vm-import-controller-rhel8@sha256:ad9c84b90577d32229b803f7b8d014f39f517d0961de46de972fce3801fdfdc8_amd64", "8Base-CNV-2.6:container-native-virtualization/vm-import-controller@sha256:ad9c84b90577d32229b803f7b8d014f39f517d0961de46de972fce3801fdfdc8_amd64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "golang: crypto/ssh: crafted authentication request can lead to nil pointer dereference" }, { "cve": "CVE-2021-3121", "cwe": { "id": "CWE-129", "name": "Improper Validation of Array Index" }, "discovery_date": "2021-01-28T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1921650" } ], "notes": [ { "category": "description", "text": "A flaw was found in github.com/gogo/protobuf before 1.3.2 that allows an out-of-bounds access when unmarshalling certain protobuf objects. This flaw allows a remote attacker to send crafted protobuf messages, causing panic and resulting in a denial of service. The highest threat from this vulnerability is to availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "gogo/protobuf: plugin/unmarshal/unmarshal.go lacks certain index validation", "title": "Vulnerability summary" }, { "category": "other", "text": "OpenShift Container Platform (OCP), OpenShift ServiceMesh (OSSM) and Red Hat OpenShift Jaeger (RHOSJ) all include code generated by github.com/gogo/protobuf to parse protobuf messages. However, no component is known to accept protobuf messages from unauthenticated sources, hence this vulnerability is rated Moderate for OCP, OSSM and RHOSJ.\n\nOpenShift Virtualization includes code generated by github.com/gogo/protobuf to parse protobuf messages. However, no component of OpenShift Virtualization is known to accept protobuf messages from unauthenticated sources, hence this vulnerability is rated Moderate.\n\nRed Hat Advanced Cluster Management for Kubernetes (RHACM) includes code generated by github.com/gogo/protobuf to parse protobuf messages. However, no RHACM component is accepting protobuf messages from unauthenticated sources and are used with a limited scope, hence this vulnerability is rated Moderate for RHACM.\n\nRed Hat Cluster Application Migration (CAM) includes code generated by github.com/gogo/protobuf to parse protobuf messages. However, no CAM component is known to accept protobuf messages from unauthenticated sources, hence this vulnerability is rated Moderate for CAM.\n\nCryostat-2 is affected as it does ship gogo/protobuf library with it\u0027s distribution but the only use for Protobuf would be the Kubernetes/OpenShift API server the operator communicates with and it should be authenticated hence it is affected with Moderate impact.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-CNV-2.6:container-native-virtualization/kubevirt-cpu-model-nfd-plugin@sha256:efb152ddc837945aad0163f96c9668cbb8271c2b14716b9fef5b798c27efbe48_amd64", "8Base-CNV-2.6:container-native-virtualization/kubevirt-cpu-node-labeller@sha256:2b78b4854b18e53e388d2d30bf68803e39f8fbc9a0b3713885081af25abfb3f1_amd64", "8Base-CNV-2.6:container-native-virtualization/kubevirt-kvm-info-nfd-plugin@sha256:2dcf59515b784d6decf484c1d756d5ddf4b65a38e78800a76ef1dab51020e553_amd64", "8Base-CNV-2.6:container-native-virtualization/vm-import-controller-rhel8@sha256:ad9c84b90577d32229b803f7b8d014f39f517d0961de46de972fce3801fdfdc8_amd64", "8Base-CNV-2.6:container-native-virtualization/vm-import-controller@sha256:ad9c84b90577d32229b803f7b8d014f39f517d0961de46de972fce3801fdfdc8_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-3121" }, { "category": "external", "summary": "RHBZ#1921650", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1921650" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-3121", "url": "https://www.cve.org/CVERecord?id=CVE-2021-3121" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3121", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3121" } ], "release_date": "2021-01-11T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "8Base-CNV-2.6:container-native-virtualization/kubevirt-cpu-model-nfd-plugin@sha256:efb152ddc837945aad0163f96c9668cbb8271c2b14716b9fef5b798c27efbe48_amd64", "8Base-CNV-2.6:container-native-virtualization/kubevirt-cpu-node-labeller@sha256:2b78b4854b18e53e388d2d30bf68803e39f8fbc9a0b3713885081af25abfb3f1_amd64", "8Base-CNV-2.6:container-native-virtualization/kubevirt-kvm-info-nfd-plugin@sha256:2dcf59515b784d6decf484c1d756d5ddf4b65a38e78800a76ef1dab51020e553_amd64", "8Base-CNV-2.6:container-native-virtualization/vm-import-controller-rhel8@sha256:ad9c84b90577d32229b803f7b8d014f39f517d0961de46de972fce3801fdfdc8_amd64", "8Base-CNV-2.6:container-native-virtualization/vm-import-controller@sha256:ad9c84b90577d32229b803f7b8d014f39f517d0961de46de972fce3801fdfdc8_amd64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:0799" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.6, "baseSeverity": "HIGH", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H", "version": "3.1" }, "products": [ "8Base-CNV-2.6:container-native-virtualization/kubevirt-cpu-model-nfd-plugin@sha256:efb152ddc837945aad0163f96c9668cbb8271c2b14716b9fef5b798c27efbe48_amd64", "8Base-CNV-2.6:container-native-virtualization/kubevirt-cpu-node-labeller@sha256:2b78b4854b18e53e388d2d30bf68803e39f8fbc9a0b3713885081af25abfb3f1_amd64", "8Base-CNV-2.6:container-native-virtualization/kubevirt-kvm-info-nfd-plugin@sha256:2dcf59515b784d6decf484c1d756d5ddf4b65a38e78800a76ef1dab51020e553_amd64", "8Base-CNV-2.6:container-native-virtualization/vm-import-controller-rhel8@sha256:ad9c84b90577d32229b803f7b8d014f39f517d0961de46de972fce3801fdfdc8_amd64", "8Base-CNV-2.6:container-native-virtualization/vm-import-controller@sha256:ad9c84b90577d32229b803f7b8d014f39f517d0961de46de972fce3801fdfdc8_amd64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "gogo/protobuf: plugin/unmarshal/unmarshal.go lacks certain index validation" }, { "acknowledgments": [ { "names": [ "Casey Callendrello" ], "organization": "Red Hat", "summary": "This issue was discovered by Red Hat." } ], "cve": "CVE-2021-20206", "cwe": { "id": "CWE-22", "name": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)" }, "discovery_date": "2021-01-22T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1919391" } ], "notes": [ { "category": "description", "text": "An improper limitation of path name flaw was found in containernetworking/cni. When specifying the plugin to load in the `type` field in the network configuration, it is possible to use special elements such as \"../\" separators to reference binaries elsewhere on the system. This flaw allows an attacker to execute other existing binaries other than the cni plugins/types, such as `reboot`. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "containernetworking-cni: Arbitrary path injection via type field in CNI configuration", "title": "Vulnerability summary" }, { "category": "other", "text": "OpenShift ServiceMesh (OSSM) does package a vulnerable version of containernetworking/cni, however, the NetworkDefinitionAttachment is defined in code and cannot be easily changed except through a user who has access to the operator namespace such as cluster-admin. As such, for OSSM, the impact is Low.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-CNV-2.6:container-native-virtualization/kubevirt-cpu-model-nfd-plugin@sha256:efb152ddc837945aad0163f96c9668cbb8271c2b14716b9fef5b798c27efbe48_amd64", "8Base-CNV-2.6:container-native-virtualization/kubevirt-cpu-node-labeller@sha256:2b78b4854b18e53e388d2d30bf68803e39f8fbc9a0b3713885081af25abfb3f1_amd64", "8Base-CNV-2.6:container-native-virtualization/kubevirt-kvm-info-nfd-plugin@sha256:2dcf59515b784d6decf484c1d756d5ddf4b65a38e78800a76ef1dab51020e553_amd64", "8Base-CNV-2.6:container-native-virtualization/vm-import-controller-rhel8@sha256:ad9c84b90577d32229b803f7b8d014f39f517d0961de46de972fce3801fdfdc8_amd64", "8Base-CNV-2.6:container-native-virtualization/vm-import-controller@sha256:ad9c84b90577d32229b803f7b8d014f39f517d0961de46de972fce3801fdfdc8_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-20206" }, { "category": "external", "summary": "RHBZ#1919391", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1919391" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-20206", "url": "https://www.cve.org/CVERecord?id=CVE-2021-20206" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-20206", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-20206" } ], "release_date": "2021-02-05T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "8Base-CNV-2.6:container-native-virtualization/kubevirt-cpu-model-nfd-plugin@sha256:efb152ddc837945aad0163f96c9668cbb8271c2b14716b9fef5b798c27efbe48_amd64", "8Base-CNV-2.6:container-native-virtualization/kubevirt-cpu-node-labeller@sha256:2b78b4854b18e53e388d2d30bf68803e39f8fbc9a0b3713885081af25abfb3f1_amd64", "8Base-CNV-2.6:container-native-virtualization/kubevirt-kvm-info-nfd-plugin@sha256:2dcf59515b784d6decf484c1d756d5ddf4b65a38e78800a76ef1dab51020e553_amd64", "8Base-CNV-2.6:container-native-virtualization/vm-import-controller-rhel8@sha256:ad9c84b90577d32229b803f7b8d014f39f517d0961de46de972fce3801fdfdc8_amd64", "8Base-CNV-2.6:container-native-virtualization/vm-import-controller@sha256:ad9c84b90577d32229b803f7b8d014f39f517d0961de46de972fce3801fdfdc8_amd64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:0799" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.2, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "8Base-CNV-2.6:container-native-virtualization/kubevirt-cpu-model-nfd-plugin@sha256:efb152ddc837945aad0163f96c9668cbb8271c2b14716b9fef5b798c27efbe48_amd64", "8Base-CNV-2.6:container-native-virtualization/kubevirt-cpu-node-labeller@sha256:2b78b4854b18e53e388d2d30bf68803e39f8fbc9a0b3713885081af25abfb3f1_amd64", "8Base-CNV-2.6:container-native-virtualization/kubevirt-kvm-info-nfd-plugin@sha256:2dcf59515b784d6decf484c1d756d5ddf4b65a38e78800a76ef1dab51020e553_amd64", "8Base-CNV-2.6:container-native-virtualization/vm-import-controller-rhel8@sha256:ad9c84b90577d32229b803f7b8d014f39f517d0961de46de972fce3801fdfdc8_amd64", "8Base-CNV-2.6:container-native-virtualization/vm-import-controller@sha256:ad9c84b90577d32229b803f7b8d014f39f517d0961de46de972fce3801fdfdc8_amd64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "containernetworking-cni: Arbitrary path injection via type field in CNI configuration" } ] }
gsd-2020-29652
Vulnerability from gsd
Modified
2023-12-13 01:22
Details
A nil pointer dereference in the golang.org/x/crypto/ssh component through v0.0.0-20201203163018-be400aefbc4c for Go allows remote attackers to cause a denial of service against SSH servers.
Aliases
Aliases
{ "GSD": { "alias": "CVE-2020-29652", "description": "A nil pointer dereference in the golang.org/x/crypto/ssh component through v0.0.0-20201203163018-be400aefbc4c for Go allows remote attackers to cause a denial of service against SSH servers.", "id": "GSD-2020-29652", "references": [ "https://www.suse.com/security/cve/CVE-2020-29652.html", "https://access.redhat.com/errata/RHSA-2021:2920", "https://access.redhat.com/errata/RHSA-2021:1796", "https://access.redhat.com/errata/RHSA-2021:0799", "https://access.redhat.com/errata/RHSA-2020:5635", "https://access.redhat.com/errata/RHSA-2020:5633", "https://security.archlinux.org/CVE-2020-29652", "https://linux.oracle.com/cve/CVE-2020-29652.html" ] }, "gsd": { "metadata": { "exploitCode": "unknown", "remediation": "unknown", "reportConfidence": "confirmed", "type": "vulnerability" }, "osvSchema": { "aliases": [ "CVE-2020-29652" ], "details": "A nil pointer dereference in the golang.org/x/crypto/ssh component through v0.0.0-20201203163018-be400aefbc4c for Go allows remote attackers to cause a denial of service against SSH servers.", "id": "GSD-2020-29652", "modified": "2023-12-13T01:22:11.862410Z", "schema_version": "1.4.0" } }, "namespaces": { "cve.org": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2020-29652", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A nil pointer dereference in the golang.org/x/crypto/ssh component through v0.0.0-20201203163018-be400aefbc4c for Go allows remote attackers to cause a denial of service against SSH servers." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://groups.google.com/g/golang-announce/c/ouZIlBimOsE?pli=1", "refsource": "MISC", "url": "https://groups.google.com/g/golang-announce/c/ouZIlBimOsE?pli=1" }, { "name": "https://go-review.googlesource.com/c/crypto/+/278852", "refsource": "MISC", "url": "https://go-review.googlesource.com/c/crypto/+/278852" }, { "name": "[skywalking-notifications] 20211018 [GitHub] [skywalking-swck] hanahmily opened a new pull request #37: Fix vulnerabilities", "refsource": "MLIST", "url": "https://lists.apache.org/thread.html/r68032132c0399c29d6cdc7bd44918535da54060a10a12b1591328bff@%3Cnotifications.skywalking.apache.org%3E" } ] } }, "gitlab.com": { "advisories": [ { "affected_range": "\u003c=v0.0.0-20201203163018-be400aefbc4c", "affected_versions": "All versions before version v0.0.0-20201216223049-8b5274cf687f", "cvss_v2": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "cvss_v3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "cwe_ids": [ "CWE-1035", "CWE-476", "CWE-937" ], "date": "2020-12-17", "description": "A nil pointer dereference in the `golang.org/x/crypto/ssh` component enables remote attackers to cause a DoS against SSH servers.", "fixed_versions": [ "v0.0.0-20201216223049-8b5274cf687f" ], "identifier": "CVE-2020-29652", "identifiers": [ "CVE-2020-29652" ], "not_impacted": "All versions starting from v0.0.0-20201216223049-8b5274cf687f", "package_slug": "go/golang.org/x/crypto", "pubdate": "2020-12-17", "solution": "Upgrade to version v0.0.0-20201216223049-8b5274cf687f or above.", "title": "Nil Pointer Dereference", "urls": [ "https://nvd.nist.gov/vuln/detail/CVE-2020-29652", "https://go-review.googlesource.com/c/crypto/+/278852", "https://groups.google.com/g/golang-announce/c/ouZIlBimOsE?pli=1" ], "uuid": "ffb814a0-404c-11eb-b378-0242ac130002" }, { "affected_range": "\u003c0.0.0-20201216223049-8b5274cf687f", "affected_versions": "All versions before 0.0.0-20201216223049-8b5274cf687f", "cvss_v2": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "cvss_v3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "cwe_ids": [ "CWE-1035", "CWE-476", "CWE-937" ], "date": "2023-02-08", "description": "A nil pointer dereference in the golang.org/x/crypto/ssh component through v0.0.0-20201203163018-be400aefbc4c for Go allows remote attackers to cause a denial of service against SSH servers.", "fixed_versions": [ "0.0.0-20201216223049-8b5274cf687f" ], "identifier": "CVE-2020-29652", "identifiers": [ "GHSA-3vm4-22fp-5rfm", "CVE-2020-29652" ], "not_impacted": "All versions starting from 0.0.0-20201216223049-8b5274cf687f", "package_slug": "go/golang.org/x/crypto/ssh", "pubdate": "2022-05-24", "solution": "Upgrade to version 0.0.0-20201216223049-8b5274cf687f or above.", "title": "NULL Pointer Dereference", "urls": [ "https://nvd.nist.gov/vuln/detail/CVE-2020-29652", "https://go-review.googlesource.com/c/crypto/+/278852", "https://groups.google.com/g/golang-announce/c/ouZIlBimOsE?pli=1", "https://lists.apache.org/thread.html/r68032132c0399c29d6cdc7bd44918535da54060a10a12b1591328bff@%3Cnotifications.skywalking.apache.org%3E", "https://go.dev/cl/278852", "https://go.googlesource.com/crypto/+/8b5274cf687fd9316b4108863654cc57385531e8", "https://pkg.go.dev/vuln/GO-2021-0227", "https://github.com/advisories/GHSA-3vm4-22fp-5rfm" ], "uuid": "735f756d-52a4-40b5-927a-37b640f58c92" } ] }, "nvd.nist.gov": { "configurations": { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:golang:ssh:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "0.0.0-20201203163018-be400aefbc4c", "vulnerable": true } ], "operator": "OR" } ] }, "cve": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2020-29652" }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "en", "value": "A nil pointer dereference in the golang.org/x/crypto/ssh component through v0.0.0-20201203163018-be400aefbc4c for Go allows remote attackers to cause a denial of service against SSH servers." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "en", "value": "CWE-476" } ] } ] }, "references": { "reference_data": [ { "name": "https://go-review.googlesource.com/c/crypto/+/278852", "refsource": "MISC", "tags": [ "Third Party Advisory" ], "url": "https://go-review.googlesource.com/c/crypto/+/278852" }, { "name": "https://groups.google.com/g/golang-announce/c/ouZIlBimOsE?pli=1", "refsource": "MISC", "tags": [ "Third Party Advisory" ], "url": "https://groups.google.com/g/golang-announce/c/ouZIlBimOsE?pli=1" }, { "name": "[skywalking-notifications] 20211018 [GitHub] [skywalking-swck] hanahmily opened a new pull request #37: Fix vulnerabilities", "refsource": "MLIST", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.apache.org/thread.html/r68032132c0399c29d6cdc7bd44918535da54060a10a12b1591328bff@%3Cnotifications.skywalking.apache.org%3E" } ] } }, "impact": { "baseMetricV2": { "acInsufInfo": false, "cvssV2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "userInteractionRequired": false }, "baseMetricV3": { "cvssV3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6 } }, "lastModifiedDate": "2022-10-04T14:52Z", "publishedDate": "2020-12-17T05:15Z" } } }
wid-sec-w-2023-2229
Vulnerability from csaf_certbund
Published
2023-08-30 22:00
Modified
2024-05-28 22:00
Summary
Splunk Splunk Enterprise: Mehrere Schwachstellen
Notes
Das BSI ist als Anbieter für die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch dafür verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgfältig im Einzelfall zu prüfen.
Produktbeschreibung
Splunk Enterprise ermöglicht Monitoring und Analyse von Clickstream-Daten und Kundentransaktionen.
Angriff
Ein entfernter, authentifizierter Angreifer kann mehrere Schwachstellen in Splunk Splunk Enterprise ausnutzen, um beliebigen Code auszuführen, einen 'Denial of Service'-Zustand zu verursachen, seine Privilegien zu erweitern und weitere, nicht spezifizierte Auswirkungen zu verursachen.
Betroffene Betriebssysteme
- Linux
- MacOS X
- Windows
{ "document": { "aggregate_severity": { "text": "hoch" }, "category": "csaf_base", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "de-DE", "notes": [ { "category": "legal_disclaimer", "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen." }, { "category": "description", "text": "Splunk Enterprise erm\u00f6glicht Monitoring und Analyse von Clickstream-Daten und Kundentransaktionen.", "title": "Produktbeschreibung" }, { "category": "summary", "text": "Ein entfernter, authentifizierter Angreifer kann mehrere Schwachstellen in Splunk Splunk Enterprise ausnutzen, um beliebigen Code auszuf\u00fchren, einen \u0027Denial of Service\u0027-Zustand zu verursachen, seine Privilegien zu erweitern und weitere, nicht spezifizierte Auswirkungen zu verursachen.", "title": "Angriff" }, { "category": "general", "text": "- Linux\n- MacOS X\n- Windows", "title": "Betroffene Betriebssysteme" } ], "publisher": { "category": "other", "contact_details": "csaf-provider@cert-bund.de", "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik", "namespace": "https://www.bsi.bund.de" }, "references": [ { "category": "self", "summary": "WID-SEC-W-2023-2229 - CSAF Version", "url": "https://wid.cert-bund.de/.well-known/csaf/white/2023/wid-sec-w-2023-2229.json" }, { "category": "self", "summary": "WID-SEC-2023-2229 - Portal Version", "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2023-2229" }, { "category": "external", "summary": "Splunk Security Advisory vom 2023-08-30", "url": "https://advisory.splunk.com//advisories/SVD-2023-0801" }, { "category": "external", "summary": "Splunk Security Advisory vom 2023-08-30", "url": "https://advisory.splunk.com//advisories/SVD-2023-0802" }, { "category": "external", "summary": "Splunk Security Advisory vom 2023-08-30", "url": "https://advisory.splunk.com//advisories/SVD-2023-0803" }, { "category": "external", "summary": "Splunk Security Advisory vom 2023-08-30", "url": "https://advisory.splunk.com//advisories/SVD-2023-0804" }, { "category": "external", "summary": "Splunk Security Advisory vom 2023-08-30", "url": "https://advisory.splunk.com//advisories/SVD-2023-0805" }, { "category": "external", "summary": "Splunk Security Advisory vom 2023-08-30", "url": "https://advisory.splunk.com//advisories/SVD-2023-0806" }, { "category": "external", "summary": "Splunk Security Advisory vom 2023-08-30", "url": "https://advisory.splunk.com//advisories/SVD-2023-0807" }, { "category": "external", "summary": "Splunk Security Advisory vom 2023-08-30", "url": "https://advisory.splunk.com//advisories/SVD-2023-0808" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:0196-1 vom 2024-01-23", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-January/017743.html" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2024-2988 vom 2024-05-28", "url": "https://linux.oracle.com/errata/ELSA-2024-2988.html" } ], "source_lang": "en-US", "title": "Splunk Splunk Enterprise: Mehrere Schwachstellen", "tracking": { "current_release_date": "2024-05-28T22:00:00.000+00:00", "generator": { "date": "2024-05-29T08:07:49.870+00:00", "engine": { "name": "BSI-WID", "version": "1.3.0" } }, "id": "WID-SEC-W-2023-2229", "initial_release_date": "2023-08-30T22:00:00.000+00:00", "revision_history": [ { "date": "2023-08-30T22:00:00.000+00:00", "number": "1", "summary": "Initiale Fassung" }, { "date": "2024-01-23T23:00:00.000+00:00", "number": "2", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2024-05-28T22:00:00.000+00:00", "number": "3", "summary": "Neue Updates von Oracle Linux aufgenommen" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "category": "product_name", "name": "Oracle Linux", "product": { "name": "Oracle Linux", "product_id": "T004914", "product_identification_helper": { "cpe": "cpe:/o:oracle:linux:-" } } } ], "category": "vendor", "name": "Oracle" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux", "product": { "name": "SUSE Linux", "product_id": "T002207", "product_identification_helper": { "cpe": "cpe:/o:suse:suse_linux:-" } } } ], "category": "vendor", "name": "SUSE" }, { "branches": [ { "branches": [ { "category": "product_version_range", "name": "\u003c9.1.1", "product": { "name": "Splunk Splunk Enterprise \u003c9.1.1", "product_id": "T029634", "product_identification_helper": { "cpe": "cpe:/a:splunk:splunk:9.1.1" } } }, { "category": "product_version_range", "name": "\u003c9.0.6", "product": { "name": "Splunk Splunk Enterprise \u003c9.0.6", "product_id": "T029635", "product_identification_helper": { "cpe": "cpe:/a:splunk:splunk:9.0.6" } } }, { "category": "product_version_range", "name": "\u003c8.2.12", "product": { "name": "Splunk Splunk Enterprise \u003c8.2.12", "product_id": "T029636", "product_identification_helper": { "cpe": "cpe:/a:splunk:splunk:8.2.12" } } } ], "category": "product_name", "name": "Splunk Enterprise" } ], "category": "vendor", "name": "Splunk" } ] }, "vulnerabilities": [ { "cve": "CVE-2013-7489", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2013-7489" }, { "cve": "CVE-2018-10237", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2018-10237" }, { "cve": "CVE-2018-20225", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2018-20225" }, { "cve": "CVE-2019-20454", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2019-20454" }, { "cve": "CVE-2019-20838", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2019-20838" }, { "cve": "CVE-2020-14155", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2020-14155" }, { "cve": "CVE-2020-28469", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2020-28469" }, { "cve": "CVE-2020-28851", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2020-28851" }, { "cve": "CVE-2020-29652", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2020-29652" }, { "cve": "CVE-2020-8169", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2020-8169" }, { "cve": "CVE-2020-8177", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2020-8177" }, { "cve": "CVE-2020-8231", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2020-8231" }, { "cve": "CVE-2020-8284", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2020-8284" }, { "cve": "CVE-2020-8285", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2020-8285" }, { "cve": "CVE-2020-8286", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2020-8286" }, { "cve": "CVE-2020-8908", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2020-8908" }, { "cve": "CVE-2021-20066", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2021-20066" }, { "cve": "CVE-2021-22569", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2021-22569" }, { "cve": "CVE-2021-22876", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2021-22876" }, { "cve": "CVE-2021-22890", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2021-22890" }, { "cve": "CVE-2021-22897", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2021-22897" }, { "cve": "CVE-2021-22898", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2021-22898" }, { "cve": "CVE-2021-22901", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2021-22901" }, { "cve": "CVE-2021-22922", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2021-22922" }, { "cve": "CVE-2021-22923", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2021-22923" }, { "cve": "CVE-2021-22924", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2021-22924" }, { "cve": "CVE-2021-22925", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2021-22925" }, { "cve": "CVE-2021-22926", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2021-22926" }, { "cve": "CVE-2021-22945", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2021-22945" }, { "cve": "CVE-2021-22946", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2021-22946" }, { "cve": "CVE-2021-22947", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2021-22947" }, { "cve": "CVE-2021-23343", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2021-23343" }, { "cve": "CVE-2021-23382", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2021-23382" }, { "cve": "CVE-2021-27918", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2021-27918" }, { "cve": "CVE-2021-27919", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2021-27919" }, { "cve": "CVE-2021-29060", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2021-29060" }, { "cve": "CVE-2021-29425", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2021-29425" }, { "cve": "CVE-2021-29923", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2021-29923" }, { "cve": "CVE-2021-31525", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2021-31525" }, { "cve": "CVE-2021-31566", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2021-31566" }, { "cve": "CVE-2021-33194", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2021-33194" }, { "cve": "CVE-2021-33195", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2021-33195" }, { "cve": "CVE-2021-33196", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2021-33196" }, { "cve": "CVE-2021-33197", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2021-33197" }, { "cve": "CVE-2021-33198", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2021-33198" }, { "cve": "CVE-2021-34558", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2021-34558" }, { "cve": "CVE-2021-3520", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2021-3520" }, { "cve": "CVE-2021-3572", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2021-3572" }, { "cve": "CVE-2021-36221", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2021-36221" }, { "cve": "CVE-2021-36976", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2021-36976" }, { "cve": "CVE-2021-3803", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2021-3803" }, { "cve": "CVE-2021-38297", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2021-38297" }, { "cve": "CVE-2021-38561", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2021-38561" }, { "cve": "CVE-2021-39293", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2021-39293" }, { "cve": "CVE-2021-41182", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2021-41182" }, { "cve": "CVE-2021-41183", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2021-41183" }, { "cve": "CVE-2021-41184", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2021-41184" }, { "cve": "CVE-2021-41771", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2021-41771" }, { "cve": "CVE-2021-41772", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2021-41772" }, { "cve": "CVE-2021-43565", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2021-43565" }, { "cve": "CVE-2021-44716", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2021-44716" }, { "cve": "CVE-2021-44717", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2021-44717" }, { "cve": "CVE-2022-1705", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-1705" }, { "cve": "CVE-2022-1941", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-1941" }, { "cve": "CVE-2022-1962", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-1962" }, { "cve": "CVE-2022-22576", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-22576" }, { "cve": "CVE-2022-2309", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-2309" }, { "cve": "CVE-2022-23491", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-23491" }, { "cve": "CVE-2022-23772", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-23772" }, { "cve": "CVE-2022-23773", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-23773" }, { "cve": "CVE-2022-23806", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-23806" }, { "cve": "CVE-2022-24675", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-24675" }, { "cve": "CVE-2022-24921", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-24921" }, { "cve": "CVE-2022-24999", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-24999" }, { "cve": "CVE-2022-25881", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-25881" }, { "cve": "CVE-2022-27191", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-27191" }, { "cve": "CVE-2022-27536", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-27536" }, { "cve": "CVE-2022-27664", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-27664" }, { "cve": "CVE-2022-27774", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-27774" }, { "cve": "CVE-2022-27775", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-27775" }, { "cve": "CVE-2022-27776", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-27776" }, { "cve": "CVE-2022-27778", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-27778" }, { "cve": "CVE-2022-27779", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-27779" }, { "cve": "CVE-2022-27780", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-27780" }, { "cve": "CVE-2022-27781", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-27781" }, { "cve": "CVE-2022-27782", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-27782" }, { "cve": "CVE-2022-28131", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-28131" }, { "cve": "CVE-2022-28327", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-28327" }, { "cve": "CVE-2022-2879", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-2879" }, { "cve": "CVE-2022-2880", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-2880" }, { "cve": "CVE-2022-29526", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-29526" }, { "cve": "CVE-2022-29804", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-29804" }, { "cve": "CVE-2022-30115", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-30115" }, { "cve": "CVE-2022-30580", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-30580" }, { "cve": "CVE-2022-30629", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-30629" }, { "cve": "CVE-2022-30630", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-30630" }, { "cve": "CVE-2022-30631", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-30631" }, { "cve": "CVE-2022-30632", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-30632" }, { "cve": "CVE-2022-30633", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-30633" }, { "cve": "CVE-2022-30634", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-30634" }, { "cve": "CVE-2022-30635", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-30635" }, { "cve": "CVE-2022-31129", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-31129" }, { "cve": "CVE-2022-3171", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-3171" }, { "cve": "CVE-2022-32148", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-32148" }, { "cve": "CVE-2022-32149", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-32149" }, { "cve": "CVE-2022-32189", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-32189" }, { "cve": "CVE-2022-32205", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-32205" }, { "cve": "CVE-2022-32206", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-32206" }, { "cve": "CVE-2022-32207", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-32207" }, { "cve": "CVE-2022-32208", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-32208" }, { "cve": "CVE-2022-32221", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-32221" }, { "cve": "CVE-2022-33987", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-33987" }, { "cve": "CVE-2022-3509", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-3509" }, { "cve": "CVE-2022-3510", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-3510" }, { "cve": "CVE-2022-3517", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-3517" }, { "cve": "CVE-2022-35252", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-35252" }, { "cve": "CVE-2022-35260", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-35260" }, { "cve": "CVE-2022-35737", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-35737" }, { "cve": "CVE-2022-36227", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-36227" }, { "cve": "CVE-2022-37599", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-37599" }, { "cve": "CVE-2022-37601", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-37601" }, { "cve": "CVE-2022-37603", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-37603" }, { "cve": "CVE-2022-38900", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-38900" }, { "cve": "CVE-2022-40023", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-40023" }, { "cve": "CVE-2022-40897", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-40897" }, { "cve": "CVE-2022-40899", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-40899" }, { "cve": "CVE-2022-41715", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-41715" }, { "cve": "CVE-2022-41716", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-41716" }, { "cve": "CVE-2022-41720", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-41720" }, { "cve": "CVE-2022-41722", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-41722" }, { "cve": "CVE-2022-42003", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-42003" }, { "cve": "CVE-2022-42004", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-42004" }, { "cve": "CVE-2022-42915", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-42915" }, { "cve": "CVE-2022-42916", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-42916" }, { "cve": "CVE-2022-43551", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-43551" }, { "cve": "CVE-2022-43552", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-43552" }, { "cve": "CVE-2022-46175", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-46175" }, { "cve": "CVE-2023-23914", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2023-23914" }, { "cve": "CVE-2023-23915", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2023-23915" }, { "cve": "CVE-2023-23916", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2023-23916" }, { "cve": "CVE-2023-24539", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2023-24539" }, { "cve": "CVE-2023-24540", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2023-24540" }, { "cve": "CVE-2023-27533", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2023-27533" }, { "cve": "CVE-2023-27534", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2023-27534" }, { "cve": "CVE-2023-27535", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2023-27535" }, { "cve": "CVE-2023-27536", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2023-27536" }, { "cve": "CVE-2023-27537", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2023-27537" }, { "cve": "CVE-2023-27538", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2023-27538" }, { "cve": "CVE-2023-29400", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2023-29400" }, { "cve": "CVE-2023-29402", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2023-29402" }, { "cve": "CVE-2023-29403", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2023-29403" }, { "cve": "CVE-2023-29404", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2023-29404" }, { "cve": "CVE-2023-29405", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2023-29405" }, { "cve": "CVE-2023-40592", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Splunk Splunk Enterprise. Diese Fehler bestehen in den REST-Endpunkten /app/search/table, /saml/acs, Serialized Session Payload, Dynamic Link Library, runshellscript.py und in den runshellscript-Komponenten sowie in der SPL-Funktion \u0027printf\u0027, u. a. aufgrund eines reflektierten Cross-Site-Scripting (XSS), einer unsachgem\u00e4\u00dfen Signaturvalidierung, einer unsachgem\u00e4\u00dfen Ausdrucksvalidierung und eines Path Traversal. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, einen \u0027Denial of Service\u0027-Zustand zu verursachen und seine Privilegien zu erweitern." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2023-40592" }, { "cve": "CVE-2023-40593", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Splunk Splunk Enterprise. Diese Fehler bestehen in den REST-Endpunkten /app/search/table, /saml/acs, Serialized Session Payload, Dynamic Link Library, runshellscript.py und in den runshellscript-Komponenten sowie in der SPL-Funktion \u0027printf\u0027, u. a. aufgrund eines reflektierten Cross-Site-Scripting (XSS), einer unsachgem\u00e4\u00dfen Signaturvalidierung, einer unsachgem\u00e4\u00dfen Ausdrucksvalidierung und eines Path Traversal. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, einen \u0027Denial of Service\u0027-Zustand zu verursachen und seine Privilegien zu erweitern." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2023-40593" }, { "cve": "CVE-2023-40594", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Splunk Splunk Enterprise. Diese Fehler bestehen in den REST-Endpunkten /app/search/table, /saml/acs, Serialized Session Payload, Dynamic Link Library, runshellscript.py und in den runshellscript-Komponenten sowie in der SPL-Funktion \u0027printf\u0027, u. a. aufgrund eines reflektierten Cross-Site-Scripting (XSS), einer unsachgem\u00e4\u00dfen Signaturvalidierung, einer unsachgem\u00e4\u00dfen Ausdrucksvalidierung und eines Path Traversal. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, einen \u0027Denial of Service\u0027-Zustand zu verursachen und seine Privilegien zu erweitern." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2023-40594" }, { "cve": "CVE-2023-40595", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Splunk Splunk Enterprise. Diese Fehler bestehen in den REST-Endpunkten /app/search/table, /saml/acs, Serialized Session Payload, Dynamic Link Library, runshellscript.py und in den runshellscript-Komponenten sowie in der SPL-Funktion \u0027printf\u0027, u. a. aufgrund eines reflektierten Cross-Site-Scripting (XSS), einer unsachgem\u00e4\u00dfen Signaturvalidierung, einer unsachgem\u00e4\u00dfen Ausdrucksvalidierung und eines Path Traversal. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, einen \u0027Denial of Service\u0027-Zustand zu verursachen und seine Privilegien zu erweitern." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2023-40595" }, { "cve": "CVE-2023-40596", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Splunk Splunk Enterprise. Diese Fehler bestehen in den REST-Endpunkten /app/search/table, /saml/acs, Serialized Session Payload, Dynamic Link Library, runshellscript.py und in den runshellscript-Komponenten sowie in der SPL-Funktion \u0027printf\u0027, u. a. aufgrund eines reflektierten Cross-Site-Scripting (XSS), einer unsachgem\u00e4\u00dfen Signaturvalidierung, einer unsachgem\u00e4\u00dfen Ausdrucksvalidierung und eines Path Traversal. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, einen \u0027Denial of Service\u0027-Zustand zu verursachen und seine Privilegien zu erweitern." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2023-40596" }, { "cve": "CVE-2023-40597", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Splunk Splunk Enterprise. Diese Fehler bestehen in den REST-Endpunkten /app/search/table, /saml/acs, Serialized Session Payload, Dynamic Link Library, runshellscript.py und in den runshellscript-Komponenten sowie in der SPL-Funktion \u0027printf\u0027, u. a. aufgrund eines reflektierten Cross-Site-Scripting (XSS), einer unsachgem\u00e4\u00dfen Signaturvalidierung, einer unsachgem\u00e4\u00dfen Ausdrucksvalidierung und eines Path Traversal. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, einen \u0027Denial of Service\u0027-Zustand zu verursachen und seine Privilegien zu erweitern." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2023-40597" }, { "cve": "CVE-2023-40598", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Splunk Splunk Enterprise. Diese Fehler bestehen in den REST-Endpunkten /app/search/table, /saml/acs, Serialized Session Payload, Dynamic Link Library, runshellscript.py und in den runshellscript-Komponenten sowie in der SPL-Funktion \u0027printf\u0027, u. a. aufgrund eines reflektierten Cross-Site-Scripting (XSS), einer unsachgem\u00e4\u00dfen Signaturvalidierung, einer unsachgem\u00e4\u00dfen Ausdrucksvalidierung und eines Path Traversal. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, einen \u0027Denial of Service\u0027-Zustand zu verursachen und seine Privilegien zu erweitern." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2023-40598" } ] }
ghsa-3vm4-22fp-5rfm
Vulnerability from github
Published
2022-05-24 22:01
Modified
2023-07-12 20:45
Severity
Summary
golang.org/x/crypto/ssh NULL Pointer Dereference vulnerability
Details
A nil pointer dereference in the golang.org/x/crypto/ssh component through v0.0.0-20201203163018-be400aefbc4c for Go allows remote attackers to cause a denial of service against SSH servers. An attacker can craft an authentication request message for the gssapi-with-mic
method which will cause NewServerConn to panic via a nil pointer dereference if ServerConfig.GSSAPIWithMICConfig is nil.
{ "affected": [ { "package": { "ecosystem": "Go", "name": "golang.org/x/crypto" }, "ranges": [ { "events": [ { "introduced": "0" }, { "fixed": "0.0.0-20201216223049-8b5274cf687f" } ], "type": "ECOSYSTEM" } ] } ], "aliases": [ "CVE-2020-29652" ], "database_specific": { "cwe_ids": [ "CWE-476" ], "github_reviewed": true, "github_reviewed_at": "2023-02-08T00:29:05Z", "nvd_published_at": "2020-12-17T05:15:00Z", "severity": "HIGH" }, "details": "A nil pointer dereference in the golang.org/x/crypto/ssh component through v0.0.0-20201203163018-be400aefbc4c for Go allows remote attackers to cause a denial of service against SSH servers. An attacker can craft an authentication request message for the `gssapi-with-mic` method which will cause NewServerConn to panic via a nil pointer dereference if ServerConfig.GSSAPIWithMICConfig is nil.", "id": "GHSA-3vm4-22fp-5rfm", "modified": "2023-07-12T20:45:53Z", "published": "2022-05-24T22:01:25Z", "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-29652" }, { "type": "WEB", "url": "https://go-review.googlesource.com/c/crypto/+/278852" }, { "type": "WEB", "url": "https://go.dev/cl/278852" }, { "type": "WEB", "url": "https://go.googlesource.com/crypto/+/8b5274cf687fd9316b4108863654cc57385531e8" }, { "type": "WEB", "url": "https://groups.google.com/g/golang-announce/c/ouZIlBimOsE?pli=1" }, { "type": "WEB", "url": "https://lists.apache.org/thread.html/r68032132c0399c29d6cdc7bd44918535da54060a10a12b1591328bff@%3Cnotifications.skywalking.apache.org%3E" }, { "type": "WEB", "url": "https://pkg.go.dev/vuln/GO-2021-0227" } ], "schema_version": "1.4.0", "severity": [ { "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "type": "CVSS_V3" } ], "summary": "golang.org/x/crypto/ssh NULL Pointer Dereference vulnerability" }
Loading...